<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-yao-anima-grasp-cats-metrics-distribution-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="GRASP, CATS ">GRASP Extensions for CATS Metrics Distribution</title>
    <seriesInfo name="Internet-Draft" value="draft-yao-anima-grasp-cats-metrics-distribution-00"/>
    <author initials="K." surname="Yao" fullname="Kehan Yao">
      <organization>China Mobile</organization>
      <address>
        <email>yaokehan@chinamobile.com</email>
      </address>
    </author>
    <author initials="G." surname="Zeng" fullname="Guanming Zeng">
      <organization>Huawei</organization>
      <address>
        <email>zengguanming@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <abstract>
      <?line 36?>

<t>Computing-Aware Traffic Steering (CATS) requires distribution of computing metrics across the network to enable efficient traffic steering decisions. The Generic Autonomic Signaling Protocol (GRASP) provides a distributed approach for autonomic node discovery, state synchronization, and parameter negotiation in Autonomic Networking (AN). This document defines extensions to the GRASP protocol to support the distribution of CATS metrics, by specifing the GRASP Objective definition for CATS metrics, structured encodings, distribution mechanisms  tailored for dynamic and distributed network scenarios such as edge computing.</t>
    </abstract>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Computing-Aware Traffic Steering (CATS) framework <xref target="I-D.ietf-cats-framework"/> aims to optimize traffic steering to service instances by jointly considering dynamic computing resources and network states. A key enabler for CATS is the standardized distribution of CATS metrics, which are defined in <xref target="I-D.ietf-cats-metric-definition"/>. <xref target="I-D.ietf-cats-framework"/> defines a distributed model where CATS metrics need to be disseminated distributedly across. The distributed model is adaptive to dynamic network scales.</t>
      <t>The Generic Autonomic Signaling Protocol (GRASP) <xref target="RFC8990"/> is the core signaling protocol of the Autonomic Networking Integrated Model and Architecture (ANIMA) <xref target="RFC8993"/>, providing native support for autonomic node discovery, peer-to-peer state synchronization, and hop-by-hop flooding without manual configuration. GRASP is deployed over the Autonomic Control Plane (ACP) <xref target="RFC8994"/>, which offers secure, hop-by-hop authenticated and encrypted communication. This provides trusted metric distribution. While GRASP supports generic signaling, it lacks a standardized structure for encoding and distributing CATS metrics.</t>
      <t>This document extends GRASP to address the above gap by:
** Defining a globally unique GRASP Objective for CATS metrics distribution;</t>
      <t>** Specifying a Concise Binary Object Representation (CBOR) <xref target="RFC8949"/>-encoded structured data format for encapsulating CATS L0/L1/L2 metrics, aligned with the CATS metrics framework <xref target="I-D.ietf-cats-metric-definition"/>;</t>
      <t>** Standardizing two GRASP-based CATS metrics distribution mechanisms: active flooding (for proactive metric dissemination) and on-demand synchronization (for reactive metric retrieval);</t>
      <t>** Defining message formats, processing behaviors, and cache management rules for GRASP nodes handling CATS metrics.</t>
      <t>The extensions defined in this document are compatible with existing GRASP protocol semantics <xref target="RFC8990"/> and GRASP information distribution extensions <xref target="I-D.ietf-anima-grasp-distribution"/>, and can be deployed in distributed, dynamic network scenarios such as edge computing, and intelligent transportation.</t>
    </section>
    <section anchor="definition-of-terms">
      <name>Definition of Terms</name>
      <t>This document reuses the terms defined in <xref target="RFC8990"/>, <xref target="RFC8993"/>, <xref target="I-D.ietf-cats-framework"/>, and <xref target="I-D.ietf-cats-metric-definition"/>.</t>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="grasp-objective-cats">
      <name>GRASP Objective Definition for CATS Metrics</name>
      <section anchor="objective-name">
        <name>Objective Name</name>
        <t>The GRASP Objective name for CATS metrics distribution is a unique URI-formatted string in local zone to avoid namespace conflicts, defined as:</t>
        <t><strong>local-zone:cats-metric</strong></t>
        <t>This name MUST be used by all ASAs when transmitting or receiving CATS metrics via GRASP. The namespace "local-zone" is reserved for CATS GRASP Objective within the specific area, and "cats-metric" identifies the objective as CATS  metrics distribution.</t>
      </section>
      <section anchor="objective-data-structure">
        <name>Objective Data Structure</name>
        <t>The GRASP Objective value for "local-zone:cats-metric" is a CBOR map that encapsulates CATS metrics data and all associated metadata, aligned with the CATS metrics framework <xref target="I-D.ietf-cats-metric-definition"/>. The map is composed of mandatory fields that are REQUIRED for all metric levels and optional fields that are conditionally present based on the metric level or deployment needs.</t>
        <t>All field names and values follow CBOR type specifications in <xref target="RFC8949"/>. CATS metrics distribution GRASP Objective contains the following fields, with each field having "filed name", "CBOR type", "mandatory/Optional", "Description", "Applicable Metric Level", and an example for illustration.</t>
        <t><strong>CATS Service Contact Instance ID (CSCI-ID)</strong>: Text, mandatory. It is a unique identifier of the compute node providing the metric. The applicable metric levels are L0, L1, and L2. An example is an IPv6 address, "2001:db8:1::100"</t>
        <t><strong>Metric_Type</strong>: Text, mandatory. CATS metric type per <xref target="I-D.ietf-cats-metric-definition"/>. The applicable metric levels are L0, L1, and L2.   An example is "compute_norm"</t>
        <t><strong>Metric_Level</strong>: Text, mandatory. CATS metric level    per <xref target="I-D.ietf-cats-metric-definition"/>. The applicable metric levels are L0, L1, and L2. An example is        "L1".</t>
        <t><strong>Metric_Format</strong>: Text,        mandatory. Data format of the metric value.     The applicable metric levels are L0, L1, and L2. An example is "unsigned integer".</t>
        <t><strong>Metric_Value</strong>:       Number, mandatory. Numeric value of the CATS metric (integer or float per Metric_Format).       The applicable metric levels are L0, L1, and L2. An example is  8 (L1 metric), 2.8 (L0 metric--CPU GHz).</t>
        <t><strong>Metric_Unit</strong>: Text, optional. Unit of the metric. The applicable metric level is L0. An example is "GHz", "TFlops", "us".</t>
        <t><strong>Metric_Source</strong>: Text, optional. Source of the metric. The applicable metric levels are L0, L1, and L2. An example is "normalization"</t>
        <t><strong>Metric_Statistics</strong>: Text, optional. Statistical type of the metric. The applicable metric levels are L0, L1, and L2. An example is "max".</t>
        <t><strong>Timestamp</strong>: Integer, mandatory. Unix timestamp (in seconds) when the metric was collected.   The applicable metric levels are L0, L1, and L2. An example is 1719283200.</t>
        <t><strong>Expiry</strong>: Integer, mandatory. Validity period of the metric (in seconds), and the metric is considered stale after Timestamp + Expiry. The applicable metric levels are L0, L1, and L2. An example is 15.</t>
        <t>The following is a CBOR encoding example of the CATS metric distribution GRASP Objective:</t>
        <t>CBOR</t>
        <t>{</t>
        <t>"CSCI-ID": "2001:db8:1::100",</t>
        <t>"Metric_Type": "compute_norm",</t>
        <t>"Metric_Level": "L1",</t>
        <t>"Metric_Format": "unsigned integer",</t>
        <t>"Metric_Value": 8,</t>
        <t>"Metric_Source": "normalization",</t>
        <t>"Timestamp": 1719283200,</t>
        <t>"Expiry": 15</t>
        <t>}</t>
      </section>
    </section>
    <section anchor="cats-metric-distritution">
      <name>CATS Metrics Distribution Mechanisms</name>
      <t>This document defines two core GRASP-based distribution mechanisms for CATS metrics. Both extend existing GRASP message types defined in <xref target="RFC8990"/>.</t>
      <t>** Active Flooding: Proactive dissemination of CATS metrics to all adjacent ASAs via GRASP M_FLOOD messages, suitable for real-time metric updates in dynamic networks.</t>
      <t>** On-Demand Synchronization: Reactive retrieval of CATS metrics via GRASP M_REQ_SYN (request) and M_SYNCH (response) messages, which is suitable for nodes that need targeted metric data for traffic steering decisions, and occassions that don't require periodical metric update.</t>
      <section anchor="pre-configuration">
        <name>Pre-configuration</name>
        <t>Both mechanisms require some pre-configurations.</t>
        <ol spacing="normal" type="1"><li>
            <t>ASA Deployment: compute nodes where CATS service contact instances are located and network nodes MUST deploy ASA that implements the GRASP extensions defined in this document.</t>
          </li>
          <li>
            <t>ACP Establishment: ASAs MUST establish a secure ACP channel with adjacent ASAs for GRASP message signaling.</t>
          </li>
          <li>
            <t>Metric Collection: ASAs at compute nodes MUST collect CATS metrics following <xref target="I-D.ietf-cats-metric-definition"/> and update the metrics at a configurable interval.</t>
          </li>
        </ol>
      </section>
      <section anchor="method-1-active-flooding">
        <name>Method 1: Active Flooding</name>
        <t>Active flooding uses the GRASP M_FLOOD message type (message type code: 9 <xref target="RFC8990"/>) to proactively distribute CATS metrics from ASAs at compute nodes to all adjacent ASAs. Adjacent ASAs update the metric and re-flood the message to their neighbors, up to a configurable TTL value. This mechanism is suitable for real-time, global dissemination of CATS metrics in dynamic networks with frequent resource state changes.</t>
        <t><strong>Message Format</strong>:</t>
        <t>The M_FLOOD message for CATS metrics is a CBOR array per <xref target="RFC8990"/>, with the payload extended to include the CATS metrics Objective and its structured data. The message format is defined as:</t>
        <t>CBOR</t>
        <t>[</t>
        <t>9,                       ; GRASP message type: M_FLOOD (fixed = 9)</t>
        <t>generate_msg_id(),       ; Message ID: globally unique (timestamp + CSCI-ID hash)</t>
        <t>local-ipv6-cbor,         ; Sender's IPv6 address (CBOR byte string)</t>
        <t>15000,                   ; TTL: flood scope (ms, Default: 15000)</t>
        <t>[                        ; GRASP Objective List (single Objective for CATS)</t>
        <artwork><![CDATA[
  "local-zone:cats-metric",   ; Objective Name (fixed)

  5,           ; Objective Flags: F_SYNCH_bits (0x5, per {{RFC8990}})

  3,           ; Loop Count: retry count (fixed = 3 for CATS)

  cbor-serialize(cats-metric)  ; CATS Metric Data after CBOR serialization
]]></artwork>
        <t>],</t>
        <t>[]   ; Locator List: empty (flooding does not require locators)</t>
        <t>]</t>
        <t><strong>Basic Workflow for M_Flood</strong></t>
        <t>The basic workflow of M_Flood message for actively flooding CATS metrics Objective is defined in <xref target="active-flooding"/>. There are the following processing steps:</t>
        <ol spacing="normal" type="1"><li>
            <t>Message Reception: ASA receives a M_FLOOD message with the CATS Objective, validates the message format (CBOR array, correct message type, Objective name) and ACP security (authenticated/encrypted). Discard invalid or unauthenticated messages.</t>
          </li>
          <li>
            <t>TTL Check: Decrement the TTL by the local processing delay (in ms). If the resulting TTL is equal to or less than 0, discard the message and end flooding.</t>
          </li>
          <li>
            <t>Staleness Check: Extract the "Timestamp" and "Expiry" fields from the CATS metric data, and calculate the validity window. If the current time &gt; Timestamp + Expiry, discard the stale metric.</t>
          </li>
          <li>
            <t>Cache Check &amp; Update:
a. Check the local CATS metrics cache for an entry with the same "CSCI_ID" and "Metric_Type".</t>
          </li>
        </ol>
        <t>b. If no entry exists: add the metric to the cache, mark with the validity window, and proceed to re-flood.</t>
        <t>c. If an entry exists: compare the "Timestamp" of the received metric with the cached one. If the received "Timestamp" is newer: update the cache with the new metric; if older: discard the received metric (no re-flood).</t>
        <ol spacing="normal" type="1"><li>
            <t>Re-Flood: Re-transmit the M_FLOOD message (with the decremented TTL) to all adjacent ASAs (excluding the sender) via the ACP channel.</t>
          </li>
        </ol>
        <figure anchor="active-flooding">
          <name>Active Flooding</name>
          <artwork><![CDATA[
+-------+                +-------+                   +-------+
|Network|                |Network|                   |Compute|
|  Node |                |  Node |                   |  Node |
|       |                |       |                   |       |
|  ASA  |                |  ASA  |                   |  ASA  |
+---+---+                +---+---+                   +---+---+
    |       Establish        |         Establish         |
    |      ACP  channel      |        ACP  channel       |
    |<---------------------->|<------------------------->|
    |                        |                           |
    |                        |                         Metric
    |                        |                        Collection
    |                        |   send M_Flood message    |
    |                        |       periodically        |
    |                        |<--------------------------+
    |                        |                           |
    |                    TTL Check &                     |
    |                Staleness handling                  |
    |            If TTL<=0 or is_stale: Drop             |
    |                If no:  send M_Flood                |
    |                        |                           |
    |   send M_Flood message |                           |
    |<-----------------------+                           |
    |                        |                           |
]]></artwork>
        </figure>
      </section>
      <section anchor="method-2-on-demand-synchronization">
        <name>Method 2: On-Demand Synchronization</name>
        <t>On-demand synchronization uses two GRASP message types to enable reactive retrieval of CATS metrics. M_REQ_SYN (synchronization request, message type code: 4 <xref target="RFC8990"/>) and M_SYNCH (synchronization response, message type code: 8 <xref target="RFC8990"/>). A metric consumer ASA (e.g., CATS Ingress Node) sends a M_REQ_SYN message to a specific compute node ASA to request its current CATS metrics. The compute node ASA responds with a M_SYNCH message containing the latest metric data which is collected just after request time. This mechanism is suitable for nodes that need targeted, real-time CATS metrics for traffic steering decisions and no need for global flooding.</t>
        <t><strong>Message Format</strong>:</t>
        <t>Both M_REQ_SYN and M_SYNCH messages are CBOR arrays per <xref target="RFC8990"/>, with the payload extended to include the CATS Objective. The request and response are message ID-bound: the M_SYNCH message reuses the M_REQ_SYN message ID to ensure correlation.</t>
        <t>The message format of M_REQ_SYN is defined as:</t>
        <t>CBOR</t>
        <t>[</t>
        <t>4,                  ; GRASP message type: M_REQ_SYN (fixed = 4)</t>
        <t>generate_msg_id(),  ; Request Message ID: globally unique (for response correlation)</t>
        <t>[                           ; GRASP Objective List</t>
        <artwork><![CDATA[
  "local-zone:cats-metric",   ; Objective Name (fixed)

  5,       ; Objective Flags: F_SYNCH_bits (0x5, per {{RFC8990}})

  3,       ; Loop Count: retry count (fixed = 3 for CATS)

  0        ; '0' is an initial value that means CATS metrics request
]]></artwork>
        <t>]</t>
        <t>]</t>
        <t>The message format of M_SYNCH is defined as:</t>
        <t>CBOR</t>
        <t>[
  8,              ; GRASP message type: M_SYNCH (fixed = 8)</t>
        <t>req_msg_id(),   ; Response Message ID: REUSE the request's Message ID (correlation)</t>
        <t>[               ; GRASP Objective List</t>
        <artwork><![CDATA[
  "local-zone:cats-metric",   ; Objective Name (fixed)

  5,    ; Objective Flags: F_SYNCH_bits (0x5, per {{RFC8990}})

  3,    ; Loop Count: match the request's Loop Count

  cbor_serialize(cats-metric)          ; CATS Metric Data
]]></artwork>
        <t>]</t>
        <t>]</t>
        <t><strong>Basic Workflow for M_REQ_SYN and M_SYNCH</strong></t>
        <t>Consumer ASA (Requestor) Processing Steps:</t>
        <t>** Request Generation: Consumer ASA generates an M_REQ_SYN message with a unique message ID and the target "CSCI-ID" and "Metric_Type". It then unicasts the message to the compute node ASA via the ACP channel.</t>
        <t>** Response Reception: Waits for an M_SYNCH response with the same message ID (configurable timeout, Default: 5s). If no response is received within the timeout, retry the request up to the Loop Count (3) times.</t>
        <t>** Response Validation: Validates the M_SYNCH message format, Objective name, and metric freshness (Timestamp + Expiry &gt;= current time). Discard invalid or stale responses.</t>
        <t>** Metric Usage: Extracts the CATS metric data from the M_SYNCH payload and uses it for CATS traffic steering decisions.</t>
        <t>Compute Node ASA (Responder) Processing Steps:</t>
        <t>** Request Reception: Receives an M_REQ_SYN message; validates the message format, Objective name, ACP security, and target CSCI-ID. Discard invalid or unauthenticated requests.</t>
        <t>** Real-Time Metric Collection: Collects the latest local CATS metric data for the requested Metric_Type (or all metrics) per <xref target="I-D.ietf-cats-metric-definition"/>. It then sets the "Timestamp" to the collection time and "Expiry" to 15s (Default value).</t>
        <t>** Response Generation: Generates an M_SYNCH message with the same message ID as the request; encodes the collected metric data into the CATS Objective CBOR map.</t>
        <t>** Response Transmission:  Unicasts the M_SYNCH message to the consumer ASA via the ACP channel.</t>
        <figure anchor="on-demand-sync">
          <name>On-Demand Synchronization</name>
          <artwork><![CDATA[
+-------+                +-------+                   +-------+
|Network|                |Network|                   |Compute|
|  Node |                |  Node |                   |  Node |
|       |                |       |                   |       |
|  ASA  |                |  ASA  |                   |  ASA  |
+---+---+                +---+---+                   +---+---+
    |       Establish        |         Establish         |
    |      ACP  channel      |        ACP  channel       |
    |<---------------------->|<------------------------->|
    |                        |                           |
    |  unicast M_REQ_SYN message to request CATS metrics |
    |--------------------------------------------------->|
    |                        |                          Metric
    |                        |                        Collection
    |                        |                           |
    |       unicast M_SYNCH message for response         |
    |<---------------------------------------------------|
    |                        |                           |
    |                        |                           |
    |                        |                           |
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All CATS metrics distribution messages defined in this document are transmitted over the ACP channel <xref target="RFC8994"/>, which provides mandatory hop-by-hop authentication, encryption, and integrity protection. No additional security mechanisms are required for the metrics messages themselves, as the ACP addresses the following core security concerns:</t>
      <t>** Authentication: All ASAs are authenticated via LDevID certificates that are provisioned by Bootstrapping Remote Secure Key Infrastructure (BRSKI) <xref target="RFC8995"/>. Unauthenticated ASAs cannot join the ACP or receive/transmit GRASP messages.</t>
      <t>** Confidentiality: GRASP messages that include CATS metrics are encrypted hop-by-hop via the ACP, which limits eavesdropping on metric data.</t>
      <t>** Integrity: ACP provides message integrity protection. Tampered CATS metrics messages are detected and discarded by ASAs.</t>
      <t>Some additional security considerations:</t>
      <t>** Flooding Scope Limitation: ASAs SHOULD use the TTL field to limit the flooding scope of CATS metrics. This reduces the attack surface for denial-of-service (DoS) attacks via excessive flooding.</t>
      <t>** Cache Eviction: ASAs SHOULD enforce strict cache eviction rules to prevent cache exhaustion attacks via spoofed CATS metrics messages.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to make the registrations of the GRASP Objective for CATS metrics distribution. 
Details to-be-added.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="I-D.ietf-cats-framework">
        <front>
          <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
          <author fullname="Cheng Li" initials="C." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Zongpeng Du" initials="Z." surname="Du">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Independent</organization>
          </author>
          <date day="26" month="February" year="2026"/>
          <abstract>
            <t>   This document describes a framework for Computing-Aware Traffic
   Steering (CATS).  Specifically, the document identifies a set of CATS
   functional components, describes their interactions, and provides
   illustrative workflows of the control and data planes.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cats-framework-20"/>
      </reference>
      <reference anchor="I-D.ietf-cats-metric-definition">
        <front>
          <title>CATS Metrics Definition</title>
          <author fullname="Kehan Yao" initials="K." surname="Yao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Cheng Li" initials="C." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Jordi Ros-Giralt" initials="J." surname="Ros-Giralt">
            <organization>Qualcomm Europe, Inc.</organization>
          </author>
          <author fullname="Guanming Zeng" initials="G." surname="Zeng">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="2" month="February" year="2026"/>
          <abstract>
            <t>   Computing-Aware Traffic Steering (CATS) is a traffic engineering
   approach that optimizes the steering of traffic to a given service
   instance by considering the dynamic nature of computing and network
   resources.  In order to consider the computing and network resources,
   a system needs to share information (metrics) that describes the
   state of the resources.  Metrics from network domain have been in use
   in network systems for a long time.  This document defines a set of
   metrics from the computing domain used for CATS.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cats-metric-definition-05"/>
      </reference>
      <reference anchor="RFC8990">
        <front>
          <title>GeneRic Autonomic Signaling Protocol (GRASP)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
          <author fullname="B. Liu" initials="B." role="editor" surname="Liu"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document specifies the GeneRic Autonomic Signaling Protocol (GRASP), which enables autonomic nodes and Autonomic Service Agents to dynamically discover peers, to synchronize state with each other, and to negotiate parameter settings with each other. GRASP depends on an external security environment that is described elsewhere. The technical objectives and parameters for specific application scenarios are to be described in separate documents. Appendices briefly discuss requirements for the protocol and existing protocols with comparable features.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8990"/>
        <seriesInfo name="DOI" value="10.17487/RFC8990"/>
      </reference>
      <reference anchor="RFC8993">
        <front>
          <title>A Reference Model for Autonomic Networking</title>
          <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="T. Eckert" initials="T." surname="Eckert"/>
          <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
          <author fullname="J. Nobre" initials="J." surname="Nobre"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document describes a reference model for Autonomic Networking for managed networks. It defines the behavior of an autonomic node, how the various elements in an autonomic context work together, and how autonomic services can use the infrastructure.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8993"/>
        <seriesInfo name="DOI" value="10.17487/RFC8993"/>
      </reference>
      <reference anchor="RFC8994">
        <front>
          <title>An Autonomic Control Plane (ACP)</title>
          <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
          <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
          <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8994"/>
        <seriesInfo name="DOI" value="10.17487/RFC8994"/>
      </reference>
      <reference anchor="RFC8949">
        <front>
          <title>Concise Binary Object Representation (CBOR)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <date month="December" year="2020"/>
          <abstract>
            <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
            <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="94"/>
        <seriesInfo name="RFC" value="8949"/>
        <seriesInfo name="DOI" value="10.17487/RFC8949"/>
      </reference>
      <reference anchor="I-D.ietf-anima-grasp-distribution">
        <front>
          <title>Information Distribution over GRASP</title>
          <author fullname="Sheng Jiang" initials="S." surname="Jiang">
            <organization>Beijing University of Posts and
      Telecommunications</organization>
          </author>
          <author fullname="Bing Liu" initials="B." surname="Liu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Xun Xiao" initials="X." surname="Xiao">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Artur Hecker" initials="A." surname="Hecker">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Xiuli Zheng" initials="X." surname="Zheng">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="11" month="December" year="2024"/>
          <abstract>
            <t>   This document specifies experimental extensions to the GRASP protocol
   to enable information distribution capabilities.  The extension has
   two aspects: 1) new GRASP messages and options; 2) processing
   behaviors on the nodes.  With these extensions, the GRASP would have
   following new capabilities which make it a sufficient tool for
   general information distribution: 1) Pub-Sub model of information
   processing; 2) one node can actively sending data to another, without
   GRASP negotiation procedures; 3) selective flooding mechanism to
   allow the ASAs control the flooding scope.

   This document updates RFC8990, the GeneRic Autonomic Signaling
   Protocol (GRASP)[RFC8990].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-anima-grasp-distribution-12"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8995">
        <front>
          <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
          <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="T. Eckert" initials="T." surname="Eckert"/>
          <author fullname="M. Behringer" initials="M." surname="Behringer"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8995"/>
        <seriesInfo name="DOI" value="10.17487/RFC8995"/>
      </reference>
    </references>
    <?line 350?>



  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1cbXPbNrb+7hn/B4w9cyOlomrnZW+ibHtXsZ3EUyfOtex2
ejudDERCMhuK1BKUbdV1f/s9LwAIUJTitOnul1VnaokggHMOzusDIFEUbW9d
DcTj7a2kiHM5UwORlHJSRUtZRDJPZzKallLPo1hWOpqpqkxjHSWphi/jRZUW
ebS3t70FrQOhq2R7Sy/Gs1RraKiWcxjt+Oj81fZWlVYZ/Hh9Nhy9F0c3lcrx
DS0mRSkOhucj8ZZHFofeyNtbcjwuFZD37faW4M49eh1/QuuiuizKwfZWJJjy
79SlzMWPssD2opwOxMFlmkvxthinmcKHaibTbCCAuY/47j9ibJ9Rcz8uZvVQ
rxcyn6X5VPyfyqduuDcLea1Sb6BfoXVqXv3HJbXiOEAcyAREQKwQjfhfXpQz
WaVXin6fvToQj/b3nw/467PnT+qvz/fqr4/rr0/qr0/h63F02E9VNeHFmZRA
+XVRflxp4WWLEjVJ8xQlS/On+SSgx/Xxl91faXoriiIhx/BQxhX+Pihmc2jN
p9HwWpZKnIP2TNJYjCqlShRgBxesK0r1z0VaKi38EUUxEbEdQBjtEjIuC61F
dalErirkSFSFULkcZ0ooHD1VeSUqM5O2MyUqTkmt+uIc+r5WOTyPxRBWIC9m
SFM6zWWGr74vi6qIi0x0SKu6Yl4WV2kC5MmaQJUIOYcGGV+Soko3UF4kCt+L
iytVLntAgqyU0Ms8viyLPP1VInM9IfNEzCUuS6VK4GVaVCk1iTT3yHrHTJKw
hu+6SH0KcirixQz5pGUDylRtNiAOlA6b09zyAk/1Yj4vyopam4ImOzMy7onx
Uug5CGyC09aDnY5/UTGqhKi1pbZS1xtGXsTVogQRqTwuEhgEngYzzlQMFpbq
mRaiAmMp8GUcKVmCiQHbKB1f1natdQxLXaaFBm5A8hI4T6aq1pO+VcNZmiRo
1ttbu+IYbK1IgCac+nY39X7e4RuoEPdVVWdI4vb2f9bY2N2dkOmMVqKYV+ks
/VWtKiQuiCqv0ljBgoOO5DEsIwj+lwLoy5bAEqxnYpTXSKU2BzCWYlFiF5SU
kw6qGmj4UHxUS2MUZb1CKdsNTpbIMgGykk8owvVlilIuzYrD+6CcK4yvuJC7
u/5m8Vi1DQ1qBpaTwZwK5vPpAP6gFQQ2JsXVCjyqrFSgISAxdg1s36vDAvMy
kXNSXxjKirRWLJmB6Kw6fJZ/AFbB8aJjBtaMkGNQaaFdH2eHIGJsbjVw0FMF
nhVpfks049oOS4hDlSKDQhdw/Hbozfj47q5n/BOOkJPHdpa+2THNQROjqojw
7yYvdVnMo/Eygj9ikhVkz+I6hfC6qMRM5guZobJO0umipF594y7QT6l5ViyB
H5yywfgBhkCQyPtM5sjZgS/JJ8gXa18xmagS7F3FIIGeTw3GeHCCaUwiQ1LB
35TLOf4CU5ktcmwiishrOj8ODkqTZpB+BTbQFz9cQsA3LBhBajE1+uBWtCfS
SmQy/ohKHFiUc38kfusBQ4+GD3wNN3rne3by6Ik2hIDGyiQBq2ftkmMQqJjK
OXgMiLwPH4pDMj6cR0yzYiwzMAjg/5+LVefd9NgB/y+QEhhvRP5/ySPCUkH0
VOIl2F25NEOJMzUHgoBWDludg5enZ/USPnl+dxcR975MQAaykoKTCysgOdeL
TNZCOdn7+mT/65NHtR8CkU/R+6DakQAC+jf45BbX5Dh0i0bu+LpgQUVjqWGm
tQLyYtcAXA5L1JpFBzmirICe1/plfBb075ImQGqcQJoI3xomx0OUKhyhxD/q
SmZdS71b7xnohJwqI1JN3gDigsa2MeSxV2lRajbkGJIVhSYL75OOlQvwebQK
rCPoIbQA7pJsjYYqP9PwYkIV6C4GDIxVwBGmZbRq6gaEiKM2EhONYqhQyoEb
RXqNG7GpKAgnWAiPEn/d12Wo6FFYCjkFEuua0tyPFr2WyLA55eBRIWirDLTU
JJ+5Rr/Bzofz+12zZDbQnqsSUoTb3Vo1o2ISVfj0rukLSrXQii2fXmhEYye1
XiMwbIrBTPa9YrldekwqoDM4pZ23F6PznR7/Fe9O6fvZ0f9eHJ8dHeL30Zvh
yYn7Yt8YvTm9ODmsv9U9D07fvj16d8id3w5/3GHydk7fnx+fvhue7LQrGecE
KPsSfBFFARSOjmE1ffFgKQVKBamFiWlFDv6Rf4JUl5jLK1liB/CcoCLztJIZ
mg2s+mVxnQtMSvq8jk1/etiSDNuS9XaXFbGwb5OUKevc3fXGeAfrYjKPxuhY
cm522ZTaWGd/cXYcsb1U7HfR5ICtrIAER/xa5CQ0eVWkCQ2t5zJWFL+zNEb3
YVVL6gG7GuoZYc+BpyEPH7qQRRSSIsBaLNB5QhqLYhyOhpqEzBYxSytyAOTf
YpVeNX2MuEol889JXE3fTk3EDrKLcae8MjUDDdEUG/ocUhllS5kYNUYavfI4
gQETzCImqTExt1a4+jR4q9j7K4t4iKFtZEOdSyUblIEXX/CK7rSLdocXFMMp
OOs50AShsg6TSjdUAWdFplDkUusiTqVJbiS2fdnoySuDZAGR6AMLXHDwZxjM
ZFVAegCCzBLNZKORWr/A6SgQaYJapq5UxgUMlkkFJFYrfUExk5TbwGBNviE4
RBe8vP5oqFvs2MlFYN3AkWuYmbFZqWhSWggMf1lWXLO4EZZy+kLeW/s+FnOa
/gZDbC41ojwyzVmteB7UeWayZ+IiIQhEGgZraN6ZQALKhKI3dIThDyflr0+N
yPDpIXk8eoA/h/M5GDMhIuyHxAkKx/hUiZFTzuYZK2GaZQtEbDj5ZZMnDkem
OsU8HbIRqE64ShXHh5DrjQ6Oo+PD7sOHA4hkN1WvXv++OK4Cl+TMq7TVD8dO
xRVJXb3Uq8laJms+GioDmnGy1xMn+8zSySOoeWu2cPJcHL+/+ptNmkEoj/b2
9gfJ+NlgfzDY39vbYU5ZPh/OQbytrHhrzcoxBy7ubyefxYFo8LBjxPQBocGQ
XlrPTxLMJgGfv5DokGTz2TnZ3+kHBL+ikFRTbD4e4YdeXWDUxMxOdtqn9/8k
eTuLXLMrxJRhqsoGld/jTEgkf94tZmNVBuKFR8rRZOn0Zd4xI6MngrIAmEHh
B1Lo9s34f1bYz0TnZN906/bEoz4+2DMPoujg/YV4/ebXbsjjBSx2vQ7W8fYF
Pg8Fv1EbkICTvRUBw3zogc5fZcVc47eFbsh4RLhVGwXc8hk03GvJCVfPTHUV
WtEIE3SNtUcrObYVwhKZ/hcmbCZvrGjOU4hJFTQhHcesQIHaweLciMq+hUqG
eAjERt01CVZtLtcSA3OWQQxSSf/Pq9n+f+8/f/TsMfhPQ+3RzTwtl+tIBRsC
b14tUe/TImnYsk85T+g1UkbBqCflrhIIkBOEx52AxFeCp//T8t9/6uqaOjLX
iZfDbWyXFlvfFPspecaR8O8t/g/coomaO4PVcNQzr3gBCV8LQkDjHQ7qA/K2
jSZ2NNi24vEab5LLgxefNZ6zMeIIoQHZ19yKwCu1hthWXiNseopPuN5Zv5kH
D91+wO1uEJ3orWrhYfVt2x+I3hDi6kM463YcmsVUX7wsCKBAwK2JU1h4BT3A
2rrbGIYYctr3ysBBA4SKDZATYEBNoJ1KMszek1+g2gG+qHJy1ZB4++HVyenp
oSUG91gWUKCOTQoHZU0WoXewirmYJ1QnILQRohnaknqaR4cMQI1CAGogziz4
5FCnFXp90iC9/zD68Z3o4C4e6AQDXG/x2cEbfKrnYNSq61HPwG6qQzYYfaLU
nwF/WU6VD9OaDGHD5p4p7uNYarMZhqMlRf6gspuMxi+RWw/EZeu59yUU6T6e
jc9JQzwdsoPpYoYZbKMHS3m/j+soDl09MggSX+3vdNitoNgk2/WWEHoyrBMt
xG1hKR6Cym6ueGgy4jdFh4UTam/z7h64Haf/6CkP3osjjSuT6kumnDSSZlO2
AYFvAuXpfRRNjts3WNSEilwDjNaaHIxOgnrct3XKAcctUkPqCtyEMiMSTHhr
1LHOi9/efjLTJVHyunsRiOaT9W4GaiaBS1eYEBj9AFIvIa7tD5rmTnVmAxB2
uF2rIXNe0Ql+IWA+EM8D/9JFB+FgZSiEa8CyWcsXszWCa3MxsNLBQq0IhMQE
2k38mOeGVtplTnHnOp1ejgljXsxpllB+5+cnNoMn3+2MaMX+nRvrmS2MTzjN
Fu/G2jchT0S4Ke+Smt0tnHiqtMtHmRNXmth0oLlIK+BbnSXIspRLW155MKxD
WuZyCUVAYoIL72KmeZwtErWKxNTAASHKYL6NfRMDvgSIP2+zBZidTTt+4mj8
3JVbjc+Llhg3cOx3JukNjPmNeN7lcWgPDOT4YaanH9Kk0+25cawsjw8HK9tP
ncpL3kwGJC6lvjTDMgiWzq/+FsWgRz2PvBHKrHygg1qeN5rEeIn7lYRvmoH2
n+5BBtLKJyjhgI1S6LggmwN9PVQTuciqAfc0o/y0RlhOWvUqnYAVig7utIAG
r+6vdXE4PItkiuI1aF+Pxg6hYCN8QxJ+nvYCUurXX2VyqgfiFcfbD2NUm87e
zdPeilp6oz0ORzspijn43gU6egz6ePoAftQq8Nhnyg6CqxVB4EoxO1Qdj6cu
Duple1zccypPi2d7mfhqxfSzyR9/+tmQFWNRQXIeCDWbQ1XRca41KcCr5UUd
2DN+XXf5BNjPbOYvpQYCfgDvMEGYD/kADcdBLIStEE/Ewsm+A47GvBL4AOd9
HQlrrDdtJIrcMbLdDM4CFNMWRlCAeJt3kN3MYWFNJmEt7EzFau4CpAHS6SRF
022FaK+jrofeOOX8sFr1Jp3ar/UwpS4xzvoOotfYm+B0DzMASgaw8usEG/Nf
u035bh+z/liWKBeiAlGSRR7u49s0sW+SEQwgB5cq/jgAg41L3rlEyrFhvKSv
vLvhCS9RGThmrDZnGqY95uIN3AfYO7ZjX1gm0BxJZ6OAjow312Uu9ui0EtHp
S4gPGCRu+W3uMsJCNcfehsyjGzoBR529Qol3HkxpZJFuitgrhSXD9rRZmcUE
+tM7V7a2Bl1JimvHF8i9JKlgDfBtS7UcMsSVtcExkIknfXFAe8PEgPgvcUGJ
AAQTCDn8rJZyoPS8pUzWAdV1jq7D6Z1GR0Y17weoeZl7v7ylqcfERF6YzlR9
4cZ6EiAD5kwbzYZoA+S/bpqGUMzJOlQFDrc2faHpYprO0Wqno81qY4z+ihVW
b8jKXCXi5iaCcCdCeTpm3vXHwV0yda3KgZ9isezcWPCCGf+FSCeiyBJ831+3
JhmdvOaOUb6nfXAQEbkurOMiu+9G3ZsOouOmTqxdwdhgGd32erSjbjBxsUi9
puDcpVqQTvbURQDR8vvvv29vfRXx56tmNF3b4Ldtb/1mjkf91nxnbQO28WE+
9Rv0F+IdbjKs9l/X4LdRf/to5Z32Br+N+qObbu3f3uC3sfy+Wie/1ga/jSOr
ncJVdE06W5pwbu8VXFtX4YV9V5tc379HrZ9v1zVQW0hzm2zWfv54X3ZLf7R7
XbXeYwQ0m5X04jOIr+ELyERs26f6rhd4U0nWztvatqGvC9sQTj6nbx1N3Tmk
e/UF9wtT/v2bPYzlqf5AQQ5ShhJS2/vMS1Fo0Fifz+B3Y0PYt1UF7tN33TK2
OYEvRDN58duB2G0ksYJubXzzoIGBPLgLUZJHg/VII755uvYcHCMn9lReA4et
j/yXnwQr+z5G2ZzFYJY90YLBPGlgMAGsuToQw5ytIz0LR8ID2iaE434HbimS
w++o/rTPl1jEcT6lYhcDUZc0hnN8y4mHw8j6hEuwsU54YGFZJDzBJoqhfM6b
W/JcWSBDiYFUpOPcTmzONthsgA6mVAFU61BetxslflnAO1wHWrIwZ/0kNLQO
Gu552HcDDNwEEzOQWvBY+KrBm4LMfg1CREhwvQ6+UtjKheq6uo7SfxogchUX
r5UVHYNzrHc058zBMNEYCnjIATnvC1fOO024qk/Hh2xcekGnb0BdsvoUYwv6
RLWyHeSTUNSTFnhmHQrlbNaCEE824FAvINtloWyEohhmNBLzuPsU9iPWwT9/
CcTz5eCdPwrt7NVcP9h7YA7UEHgOVsJnH8gYZwrqi9DyjHJ6oA4O+/Mm9WH1
3Kg8QjxrqM46tTH+2bL3zHAFZAW4JSqM0QNfY86OLkZHptgiPh5or110Pq0z
/yo9+UJKEmoILEl82WC/bg+hvw/roL9aEk0IsE0p1iB0Lf6V8Tq8VejHTGP3
BVSi72v8Z0TgmdnrtK7hNTsOAs+CQaxHITVf9YkmAhon4nlKe36Bw1G9v9+C
deChOES5BF1K0VUIvll8oxmE19XWxJRRXw8R/EHiyhs0xpqC83chMDMLtNrb
sMFgWiwqDx5/aiA0ghvMYHQI18AR3llb15l9jadJZncIn9QaJTqPu3yuZYWt
7xmlJL6+DxDLZjxjV9LEJRkHMvnIBOi+pKKiswqOiW+/CRC0dpiSQTPLv6PX
aPcFUuKQP92K6NVYn+XABn/ajMSYnFb1btOGK6z13VrFSIWxBMrY1D0swdOZ
M4cgt6j+i41g8arIfRjYHO9h0zCWcS8A2CiMpxLgK3HZ2naJzXftJ6ErOKV3
dKBWSLxlV1uo6ASHk3X3Mw5NWtPWytDhQ3/OtC3NjNIGWDC8s/8UdNNYHEfY
7opJ+P7rdeiyQotYa+lS+xJ4waeclPYpbJy3SHPDQJiIutPpK0SeM+RI5y+g
nL7w3V2TTicbzxf/B05c2/YfOPHfBCeamN1eftv4FmTBtu963O0voflfiGOu
bQv71qJbCdp1MtHsuwGuXPv59wDHXw5fczdCI4SWLLy2FjwzQJsY2U3XA3Ny
1txaud21cTiKg5Y7ex1m0w1Xg2NsvODp7nQF17u9k2Btl7ndFez6ulD7hW66
fW52jt1NdDrDStzi9VFW1T44V9wuNLeE6l1o77QekmtOCSQuDbCsO27h4Uyr
7ErxvT/Ljjl2opq3ePiGv50NhByrMneZ1jBgZSCG9j4c0hLmOxjxTg7VFcRn
GKLiq0fKuwRFQsN4ylfrXhZFhTd25nMk40zNQBSsB0p8p5biOJ+Usr6F3nl5
Nvru2Ltb/xRzlotG0kW0xbBwRUX/BIVj393WU1+73cSg8nZ52gFWEXTXBzK7
ajlovGbOJhpsK9A+ZLK+uu8phJcMWA3K0hkWOUrCOiVlwUIgpXVJiyXo2KrL
gDipdc/4oHZ1Ooe0jQ6gByQG2F6iKs6UzKV+zGh5behUHU4/woOhbWoZWqNV
F4ufixEdTzpBJqU75qGFuS8LRYI7+sB3xiAAkURYOe0ofMhpBQgnlBVYW8RG
m2VVyfij0Itygtcs6V9gUTmsH95FtmdSO4fFqGte5aO/6oaqC++go9MB2tM+
gn6rxCu8yB3zoa24Mtvfyrxq7qLTOUd1hT7GtN9cyoWmN3wKIHAUk3VrZO7p
Hg/fDVfdYipz2eYSmzeuuQbhQYCqmfyoTO48Te19OW0PCHzWP7GAJ0kPFf6z
N8hvNFYR6IlKDNXD+GNeXGd4x5yP8N7uysajO/uP3IyhZXvr/wH3uICxqEsA
AA==

-->

</rfc>
