<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-ietf-rtgwg-net-notif-ps-00"
     ipr="trust200902" updates="">
  <front>
    <title abbrev="Fantel Problem Statement">Fast Network Notifications
    Problem Statement</title>

    <author fullname="Jie Dong (editor)" initials="J." surname="Dong, Ed.">
      <organization>Huawei Technologies</organization>

      <address>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>

    <author fullname="Mike McBride (editor)" initials="M."
            surname="McBride, Ed.">
      <organization>Futurewei</organization>

      <address>
        <email>mmcbride7@gmail.com</email>
      </address>
    </author>

    <author fullname="Francois Clad (editor)" initials="F."
            surname="Clad, Ed.">
      <organization>Cisco Systems</organization>

      <address>
        <email>fclad.ietf@gmail.com</email>
      </address>
    </author>

    <author fullname="Jeffrey Zhang" initials="Z." surname="Zhang">
      <organization>HPE</organization>

      <address>
        <email>zhaohui.zhang@hpe.com</email>
      </address>
    </author>

    <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
      <organization>China Telecom</organization>

      <address>
        <email>zhuyq8@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Xiaohu Xu" initials="X." surname="Xu">
      <organization>China Mobile</organization>

      <address>
        <email>xuxiaohu_ietf@hotmail.com</email>
      </address>
    </author>

    <author fullname="Rui Zhuang" initials="R." surname="Zhuang">
      <organization>China Mobile</organization>

      <address>
        <email>zhuangruiyjy@chinamobile.com</email>
      </address>
    </author>

    <author fullname="Ran Pang" initials="R." surname="Pang">
      <organization>China Unicom</organization>

      <address>
        <email>pangran@chinaunicom.cn</email>
      </address>
    </author>

    <author fullname="Hao Lu" initials="H." surname="Lu">
      <organization>Tencent</organization>

      <address>
        <email>vickkylu@tencent.com</email>
      </address>
    </author>

    <author fullname="Yadong Liu" initials="Y." surname="Liu">
      <organization>Tencent</organization>

      <address>
        <email>zeepliu@tencent.com</email>
      </address>
    </author>

    <author fullname="Luis M. Contreras" initials="L." surname="Contreras">
      <organization>Telefonica</organization>

      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>

    <author fullname="Mehmet Durmus" initials="M." surname="Durmus">
      <organization>Turkcell</organization>

      <address>
        <email>mehmet.durmus@turkcell.com.tr</email>
      </address>
    </author>

    <author fullname="Reshad Rahman" initials="R." surname="Rahman">
      <organization>Equinix</organization>

      <address>
        <email>reshad@yahoo.com</email>
      </address>
    </author>

    <date day="12" month="February" year="2026"/>

    <abstract>
      <t>Modern network applications, ranging from Artificial Intelligence
      (AI) /Machine Learning (ML) training to large-scale cloud services,
      require adaptive networks to ensure reliable and congestion-free data
      transfer within or across multiple data centers. A good and timely
      understanding of network operational status can help to enable faster
      response to critical events, so as to enable the selection of paths with
      reduced latency and improve network utilization. This document describes
      the existing problems and the need of fast network notification
      solutions.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Modern network applications, ranging from AI/ML training to
      large-scale cloud services, require adaptive networks to ensure reliable
      and congestion-free data transfer within or across multiple data
      centers. These workloads demand high throughput, low latency, and
      minimal packet loss across dynamically shifting traffic patterns so that
      the service continuity and performance can be maintained. To meet these
      requirements, networks employ mechanisms such as traffic engineering
      (TE), load balancing, flow control, and protection switching. However,
      existing solutions often face limitations in responsiveness, coverage,
      and operational complexity, particularly in high-speed, large-scale
      environments.</t>

      <t>Modern forwarding silicon is capable of detecting congestion,
      microbursts, queue buildup and other localized impairments at
      fine-grained time scales, ranging from microseconds to sub-millisecond,
      depending on hardware capabilities and deployment requirements. These
      detection capabilities substantially outpace the time required for such
      information to be disseminated to other relevant nodes for their
      actions, creating a gap between what the detecting node can observe and
      when recipients can react. Fast network notification identifies the need
      for complementary mechanisms that enable low-latency notification of
      network conditions, allowing actions taken in the data plane to more
      closely align with the capabilities of contemporary forwarding hardware.
      The information delivered by fast network notification may also be used
      for actions taken in the control plane or management plane.</t>

      <t>This document summarizes the limitations of existing mechanisms that
      prevent them being used for rapid notification of critical network
      events, including link or node failures and congestion. It also
      identifies the need for fast network notification which is critical for
      enabling fast reaction. In the context of this document, fast does not
      imply a single, rigid numerical time threshold. Instead, it
      characterizes a class of mechanisms to minimize the notification
      delivery time so that the latency of the notification is in the order of
      sub-milliseconds or milliseconds, depending on the operational objective
      and the range of the network domain, and can be substantially shorter
      than the Round-Trip-Time (RTT) of the network traffic involved. The
      scope of this work is limited to fast notification of network
      conditions. Improvements such as reduced packet loss or faster
      mitigation are possible results of the actions consuming such
      notifications, but are not themselves goals or requirements of the
      notification mechanism.</t>

      <t><xref target="I-D.geng-fantel-fantel-gap-analysis"/> provides a gap
      analysis of existing solutions and where they are deficient in
      supporting high demand services. This document describes the set of
      problems which the a network notification solution needs to address. The
      problems described in this document apply across a range of network
      scenarios and topologies. However, the mechanisms used to provide
      notifications, and the feasibility of meeting specific timeliness
      requirements, may differ depending on topology and deployment context.
      This document does not assume one-size-fits-all.</t>
    </section>

    <section title="Glossary">
      <t>BFD: Bidirectional Forwarding Detection <xref target="RFC5880"/></t>

      <t>ECN: Explicit Congestion Notification <xref target="RFC3168"/></t>

      <t>FRR: Fast Re-Route <xref target="RFC4090"/> <xref
      target="RFC5714"/></t>

      <t>IOAM: In-situ Operations, Administration, and Maintenance <xref
      target="RFC9197"/></t>
    </section>

    <section anchor="fantel.fast"
             title="Why Fast Network Notification is Needed">
      <t>Current network mechanisms were not designed for the responsiveness
      and scale required by todays' dynamic environments. Techniques such as
      load balancing, protection switching, and flow control rely on feedback
      loops that are often too slow, too coarse, or too resource-intensive.
      This results in performance bottlenecks, delayed recovery, and
      inefficiencies in large-scale AI, cloud, and WAN deployments. A fast
      network notification mechanism could help to address these gaps by
      providing lightweight, real-time, actionable alerts that complement
      existing tools and enable faster, more accurate traffic manipulation
      decisions.</t>

      <t>In particular, the detection and propagation of network events (e.g.,
      failure, congestion or state change) must occur within a timeframe short
      enough to meaningfully influence traffic engineering and load-balancing
      decisions before congestion or micro-loops occur or develop. In backbone
      or datacenter networks, this typically implies a target of notification
      delivery in the order of milliseconds, with some environments requiring
      sub-millisecond performance. The precise requirement is driven by: <list
          style="symbols">
          <t>the speed at which traffic shifts can induce overload</t>

          <t>the granularity of TE tuning (fine-grained vs.
          coarse-grained)</t>

          <t>the propagation diameter of the network notification</t>

          <t>the responsiveness of the control-plane and forwarding-plane
          components</t>
        </list></t>

      <t>Therefore, this document focuses on notification mechanisms capable
      of operating within these millisecond/sub-millisecond ranges, rather
      than mechanisms whose latency spans tens or hundreds of milliseconds,
      which are insufficient for preventing transient overload under rapid
      traffic transitions.</t>
    </section>

    <section title="The Problem with Existing Mechanisms">
      <t>Current network traffic manipulation mechanisms such as TE, load
      balancing, flow control, and protection, have deficiencies in providing
      the low-latency, high-granularity responsiveness needed in modern,
      dynamic networks, at least in part due to the lack of dynamic network
      state information. This results in suboptimal performance, low
      reliability and delayed recovery. Fast network notification is a set of
      solutions to address this by enabling real-time, lightweight
      notifications that enhance the responsiveness for traffic engineering,
      congestion mitigation, and failure protection. There is a demonstrable
      need for a standardized framework to define these fast network
      notification mechanisms, requirements and integration strategies.</t>

      <t>There follows a summary of the limitations of existing
      mechanisms:<list style="symbols">
          <t>Slow Dissemination: Existing control protocols (e.g., routing
          protocol, etc.) may be used for dissemination of dynamic network
          state information, while they usually rely on control plane based
          hop-by-hop distribution, which causes delay when the recipient is
          multiple hops away. With modern high-throughput environments (AI/ML
          clusters, multi-DC WANs), this delay is often prohibitive. Explicit
          Congestion Notification (ECN) <xref target="RFC3168"/> needs
          congestion signals to be sent back to the sender, which introduces
          Round-Trip-Time (RTT) delay and can be slow if the source node is
          far away, and it relies on the source node to take action in the
          transport layer. What is needed is a lightweight signaling method
          that can provide real-time alerts (e.g., at the sub-milliseconds
          level or in the order of a few milliseconds) on failures,
          congestion, or threshold breaches, enabling prompt actions (e.g., in
          the range of one millisecond to tens of milliseconds) in the network
          layer.</t>

          <t>Coarse-Grained Signals: Classic ECN <xref target="RFC3168"/> uses
          a 2-bit field in packet header to convey the ECN capability and
          congestion indication, which inherently limits the information it
          can report to the receiving nodes. What would be useful is a set of
          notifications that aren't just "on-off" state reports, but can also
          convey more information like congestion level/utilization
          information, latency spikes, queue buildup or flow characteristics,
          so that it can trigger immediate and precise responses like
          rerouting, rate adjustment, or protection switching for specific
          flows.</t>

          <t>Limited Visibility on Network Conditions: Current load-balancing,
          flow-control, and FRR techniques are limited by their lack of
          visibility over downstream or cross-domain network conditions,
          reducing their effectiveness and leading to suboptimal decisions.
          For example, the Point of Local Repair (PLR) executing FRR makes its
          decision based on its local view of the topology and network status.
          It may switch traffic to a backup path and cause cascading
          congestion on that path, as it lacks visibility into the state of
          the entire backup path. Similarly, traditional load-balancing is
          based on local link utilization information, which may cause some
          paths overloaded while others remain underutilized. This local view
          of network status prevents precise and optimized decisions and
          adjustments. It would be helpful to send fast network notifications
          to upstream nodes so that they can perform action based on a wider
          view of network conditions.</t>

          <t>Overhead and Scalability Challenges: The distribution of
          high-volume network operational status information or frequent
          signaling introduces bandwidth and processing overhead. At scale,
          this becomes a bottleneck rather than a solution. IOAM <xref
          target="RFC9197"/> and similar tools provide detailed telemetry
          information, but the collection and feedback loops are
          controller-centric. They cannot be used to deliver lightweight,
          real-time alerts for immediate action on specific network nodes.
          Carrying dynamic network state information in control protocols
          (e.g., routing protocols) also increases the overhead and churn of
          the control plane, which may have negative impact to the core
          functionality of the protocol. It would be useful to have solutions
          designed to avoid the overhead and churn introduced by telemetry
          flooding or route distribution, so it can adapt to large-scale
          networks and dynamic traffic patterns (e.g., AI workloads, cloud WAN
          bursts).</t>
        </list></t>

      <section anchor="usecase"
               title="Example: AI Training Cluster with Fiber Link Failure">
        <t>Consider a large-scale AI training job distributed across multiple
        data centers. These clusters exchange terabits of data per second
        between Graphics Processing Unit (GPU) nodes, requiring ultra-low
        latency and high throughput to maintain synchronization.<figure
            anchor="ai-link-failure"
            title="Distributed AI Training Clusters with Fiber Link Failure">
            <artwork name="" type="ascii-art"><![CDATA[
 +-------------------------+       +------------------------+
 |   Data Center A (GPUs)  |       |   Data Center B (GPUs) |
 +----------+--------------+       +----------+-------------+
            |                                 |
            |      --------------------       |
            |   ///   +---+             \\\   |
            | //      | R |--\             \\ |
            |///     /+---+\  \--\         \\\|
           /|/     //       \     \----\     \|\
         // |     /          \          ---\  |  \\
        | +-+-+ /            +---+  Failure +-+-+ |
       |  | R +--------------+ R +---- X ---+ R |  |
        | +---+ \            +---+         /+---+ |
         \        \          /      /-----/      //
         \\        \\ +---+ /  /---/           //
           \\\       \| R |---/              ///
              \\      +---+                 //
               \\\ ---------------------- ///

]]></artwork>
          </figure></t>

        <t>As depicted in the above figure, a single fiber link failure event
        can disrupt the entire training run, leading to:</t>

        <list style="symbols">
          <t>Delays in job completion (hours to days for large models)</t>

          <t>Massive energy and compute cost waste due to
          resynchronization</t>

          <t>Degraded convergence accuracy if synchronization windows are
          missed</t>
        </list>

        <section anchor="current-limitations"
                 title="Limitations of Existing Mechanisms">
          <t>Today's mechanisms provide partial solutions but are not fast or
          precise enough for these scenarios:</t>

          <t>
            <list style="symbols">
              <t>BFD <xref target="RFC5880"/>: Provides fast faults detection
              in the bidirectional path between two forwarding engines. BFD
              can be one of the detection mechanisms for link or path
              failures, while it is not used to notify the failure to nodes
              other than the BFD endpoints in the network. BFD is
              preconfigured with periodic message exchange, while fast network
              notifications needs to be event-driven.</t>

              <t>FRR <xref target="RFC4090"/><xref target="RFC5714"/> /Route
              convergence: Without fast notification, the failure detection
              can take tens of milliseconds, followed by either local repair
              (FRR) or route convergence. The former lacks visibility of the
              global network situation and thus may cause congestion on the
              backup paths, while the latter may breach strict synchronization
              requirements of the AI/ML application.</t>
            </list>
          </t>

          <t>In practice, this means that by the time a fiber link failure is
          detected and recovery mechanisms are invoked, critical GPU
          synchronization barriers may already have been missed, forcing
          rollbacks or restarts of the training process.</t>
        </section>

        <section anchor="fantel-solution"
                 title="How Fast Network Notifications Help">
          <t>Fast network notification mechanisms could improve the response
          to fiber link failures and congestion in distributed AI/ML
          clusters:</t>

          <list style="symbols">
            <t>Real-Time Alerts: Nodes adjacent to the failure or congestion
            could immediately (e.g., in the order of sub-milliseconds or
            milliseconds) send lightweight notifications to nodes whose
            forwarding paths might be affected.</t>

            <t>Action-Oriented Response: Upon receiving the notification,
            routing and load balancing mechanisms could instantly shift
            traffic to backup paths or alternative DC interconnects.</t>

            <t>Granularity: Notifications could carry more detailed
            information than "link failure/congestion," e.g., indicating
            specific link utilization, queue buildup or microburst congestion,
            allowing differentiated responses to different traffic flows.</t>

            <t>Complementary: The fast network notification solutions are
            complementary to OAM mechanisms and the control plane or
            management plane information collection mechanisms, such as BFD,
            IGP and Telemetry, it would bridge the time gap between event
            onset and slower control plane or telemetry-driven responses, and
            enable network-wide optimization.</t>
          </list>

          <t>By deploying fast network notifications, large AI/ML workloads
          can maintain synchronization across data centers even during
          transient failures or congestion, protecting job completion time and
          resource utilization.</t>

          <t>Existing Approach:</t>

          <list style="symbols">
            <t>BFD detects failure after tens of ms</t>

            <t>FRR may cause congestion on backup paths</t>

            <t>Reroute/convergence delays impact GPU sync</t>

            <t>Result: Training stalls, compute resources wasted, job
            completion delayed</t>
          </list>

          <t>Fast Notifications Approach:</t>

          <list style="symbols">
            <t>Forwarding plane detects failure at the level of
            sub-millisecond</t>

            <t>Fast network notification alerts upstream nodes of failure or
            congestion in real time</t>

            <t>Regional or global TE steers traffic quickly to alternate
            link/path without causing new congestion</t>

            <t>Result: Training continues with minimal disruption</t>
          </list>
        </section>
      </section>
    </section>

    <section title="Fast Network Notifications Problem Statement">
      <t/>

      <section title="Information of Fast Network Notifications">
        <t>The information carried in the fast network notifications, by the
        originating node, can be one or multiple of the following:</t>

        <t><list style="symbols">
            <t>Event Type: This can be used to indicate the type of events
            (e.g., failure, congestion, performance degradation, etc.).</t>

            <t>Location of Event: This can be used to indicate the location
            where the event occurred in the network (e.g., the identifier of
            the link, the node, or the queue, etc.).</t>

            <t>Fine-grained Network Status information: This can include
            quantifiable network metrics like link utilization, queue length,
            level of congestion, link or node delay, jitter, packet loss,
            etc.</t>

            <t>Path Identification information: This can be used to indicate
            the path which is affected by the event.</t>

            <t>Flow Identification information: This can include the
            identification or the 5-tuple of a flow which is affected by the
            event.</t>
          </list>Other information related to the network status change and
        need to be actioned in a timely manner may also be carried in the fast
        network notifications. Thus there is a need to work on the information
        model of fast network notifications to better understand what needs to
        be carried in the notifications.</t>
      </section>

      <section anchor="fantel-recipients"
               title="Recipients of Fast Network Notifications">
        <t>The primary purpose of fast network notification is to enable
        recipient nodes to take prompt actions. Information delivered by fast
        network notification can be used by recipient nodes to trigger actions
        in the data plane, and may also be used for actions in the control
        plane or management plane. The specific mechanisms for realizing such
        actions are out of the scope of this document. Table 1 provides some
        illustrative examples of potential recipients of fast network
        notifications and describes how they may benefit from the information
        received.</t>

        <t><figure>
            <artwork><![CDATA[    +==================+======================+=======================+
    | Node Type        | Role                 | Example Benefit       |
    +==================+======================+=======================+
    | Adjacent Routers | Data-plane neighbors | Enable local repair   |
    | / Switches       | that forward packets | (e.g., FRR, ECMP      |
    |                  |                      | adjustments)          |
    +------------------+----------------------+-----------------------+
    | Non-Adjacent     | Remote upstream      | Accelerated awareness |
    | Routers /        | forwarding elements  | of failure/congestions|
    | Switches         |                      | on specific nodes     |
    +------------------+----------------------+-----------------------+
    | Ingress Routers  | Traffic entry points | Re-map affected flows |
    | / Switches       | of a network         | before forwarding     |
    |                  | domain               | into failed regions   |
    +------------------+----------------------+-----------------------+
    | End Hosts / Edge | Optional             | Adapt sending rate,   |
    | Nodes            | subscribers, policy- | select alternate      |
    |                  | driven               | uplinks               |
    +------------------+----------------------+-----------------------+
    |Network Controller| Optional             | Accelerated awareness |
    |                  | subscribers, policy- | of failure/congestion |
    |                  | driven               | for global TE/LB      |
    +------------------+----------------------+-----------------------+
                       Table 1: Recipient Nodes]]></artwork>
          </figure></t>

        <t>The table has three columns. The fist column lists the type of
        node. The second column shows the example of the role that the node is
        responsible for within the network that could benefit from fast
        network notifications. The third column indicates examples of how fast
        notification could benefit the node in fulfilling its role.</t>
      </section>

      <section title="Delivery of Fast Network Notifications">
        <t>Depending on the position and number of the recipient nodes, fast
        network notifications may be sent via one of the following delivery
        modes:</t>

        <t><list style="symbols">
            <t>Unicast directly to the recipient node</t>

            <t>Multicast to a group of recipient nodes</t>

            <t>Hop-by-hop to a series of receipt nodes along a specified
            path</t>

            <t>Flooding in a specified range of the network</t>
          </list></t>

        <t>Additionally, recipient nodes or functions may subscribe to
        specific types of notifications based on their roles or interests. A
        subscription-based approach enables selective delivery, reduces
        unnecessary signaling overhead, and ensures that each recipient
        receives only the information relevant to its function. Mechanisms
        supporting both delivery and subscription must guarantee timely,
        reliable, and secure propagation of notifications. Examples:</t>

        <t><list style="symbols">
            <t>Adjacent routers/switches subscribing to all local failure
            notifications</t>

            <t>Non-adjacent routers/switches subscribing to failure or
            congestion notifications within a specific range</t>

            <t>Edge nodes/hosts subscribing only to congestion alerts
            exceeding defined thresholds</t>

            <t>Centralized controllers subscribing only to congestion alerts
            exceeding defined thresholds</t>
          </list>The mechanisms to support the above delivery mode needs to
        make sure the notification is always sent to the targeted recipient
        nodes in a timely manner. It could be based on existing messaging and
        transport mechanisms, or a new protocol may be introduced.</t>
      </section>

      <section title="Actions to Fast Network Notifications">
        <t>Once a fast network notification is received, the recipient needs
        to take appropriate actions to help mitigating the event reported in
        the fast network notification. The action can be based on the
        information carried in the fast network notification, or it can be
        based on both the information in the notification and the information
        obtained by the recipient in other ways. The action to be performed by
        the recipient may be explicitly carried in the notification, or it may
        be implicitly determined by the type of information carried in the
        notification. Some actions are mandatory, while some actions can be
        optional. The possible actions in response to the notification can be,
        but not limited, to one or multiple of the following:</t>

        <t><list style="symbols">
            <t>Switches all traffic from a path to other available paths</t>

            <t>Steers specific traffic flows to alternate links or paths</t>

            <t>Modifies the load balancing ratio among a group of paths</t>

            <t>Sends the notification further to other recipients</t>
          </list></t>

        <t>Whether the actions need to be explicitly indicated in the
        notification, and if so, which ones, requires further consideration.
        It is noted that in some of the cases as described in <xref
        target="fantel-recipients"/>, multiple recipients may receive the same
        notification, then some action may be taken by multiple recipients.
        The sender of the fast network notification needs to take this into
        consideration if some coordination in the actions is needed. The
        mechanism for action coordination is for further study and is out of
        the scope of this document.</t>
      </section>
    </section>

    <section title="IANA Considerations">
      <t>This document has no IANA actions.</t>
    </section>

    <section title="Security Considerations">
      <t>Fast network notifications, if not properly authenticated and
      rate-limited, could be exploited as a vector for Denial-of-Service (DoS)
      attacks. An attacker able to inject or flood spurious notifications may
      trigger unnecessary re-convergence, path changes or repeated state
      updates, overwhelming both recipient nodes and higher-level
      applications. An attacker may cause the sender of fast network
      notifications overwhelmed by making some network state flapping, so that
      the node is busy with sending notifications. Fast network notifications
      may reveal sensitive information about the network, in some scenarios
      such information may be made visible to external entities, either by
      inspecting the notifications, or by registering as a consumer of the
      notifications. Implementations must therefore ensure integrity
      protection, origin authentication, and appropriate rate controls on
      sending and receiving fast network notification messages.</t>

      <t>This document does not specify security mechanisms, but highlights
      that any solution must consider trust boundaries around notification
      subscriptions, authorization of notification sources and protection of
      potentially sensitive operational data. These aspects are expected to be
      addressed by solution proposals based on deployment requirements and
      threat models.</t>
    </section>

    <section title="Acknowledgement">
      <t>The authors would like to thank Alia Atlas, David Black, Jeffrey
      Haas, Tony Li, Carlos J. Bernardos, Fan Zhang, Adrian Farrel, Joel
      Halpern and Dan for their valuable comments and discussion.</t>
    </section>

    <section title="Contributors">
      <t>The following people contributed substantially to the content of this
      document.</t>

      <t><figure>
          <artwork><![CDATA[Zafar Ali
Cisco
zali@cisco.com

Tianran Zhou
Huawei
zhoutianran@huawei.com

Xuesong Geng
Huawei
gengxuesong@huawei.com
]]></artwork>
        </figure></t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>

      <?rfc include='reference.RFC.8174'?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.I-D.geng-fantel-fantel-gap-analysis'?>

      <?rfc include='reference.RFC.3168'?>

      <?rfc include='reference.RFC.4090'?>

      <?rfc include='reference.RFC.5714'?>

      <?rfc include='reference.RFC.5880'?>

      <?rfc include='reference.RFC.9197'?>
    </references>
  </back>
</rfc>
