<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zhao-opsawg-network-resilience-ps-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Problem Statement for Network Resilience">Problem Statement for Network Resilience</title>
    <seriesInfo name="Internet-Draft" value="draft-zhao-opsawg-network-resilience-ps-00"/>
    <author initials="J." surname="Zhao" fullname="Jing Zhao" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhaoj501@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="R." surname="Pang" fullname="Ran Pang" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>pangran@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="W." surname="Lv" fullname="Wenxiang Lv" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>lvwx28@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="J." surname="Dong" fullname="Jie Dong" role="editor">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jie.dong@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhang" fullname="Shuai Zhang" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangs366@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Operations and Management Area</area>
    <workgroup>opsawg</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 73?>
<t>This document defines the problem space and analyzes the limitations of current network architectures when dealing with complex, cascading, and unanticipated failures.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Traditional IP network reliability architectures are primarily built upon the principle of "Robustness." While static redundancy and deterministic topology convergence are mature enough to handle predictable single-point failures, modern networks exhibit significant survivability gaps as business logic complexity grows. Therefore, it is necessary to introduce resilience enhancement capabilities to improve the network's ability to adapt and maintain service continuity in complex environments.</t>
      <t>The core drivers for this shift include:</t>
      <ul spacing="normal">
        <li>
          <t>Evolution of Service Requirements: Critical services are shifting from simple "availability" to "deterministic survivability." This requires the network to maintain a baseline SLA even under extreme shocks, rather than accepting long-term interruptions.</t>
        </li>
        <li>
          <t>Complexity Surpassing Human Intervention: As analyzed in <xref target="RFC7276"/>, traditional IP OAM mechanisms primarily focus on connectivity and continuity. However, they are increasingly insufficient for detecting implicit deterioration where the failure is not binary (up/down), especially in high-precision scenarios requiring millisecond-level awareness.</t>
        </li>
        <li>
          <t>Failure Modes Shifting from "Deterministic" to "Unanticipated": Existing robust designs focus on "all-or-nothing" failures. However, they show clear survivability deficiencies when handling cross-layer correlated risks, gray failures, and resource bottlenecks.</t>
        </li>
      </ul>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>The current vulnerability of networks is manifested in four deep failure modes:</t>
      <section anchor="explicit-interruption">
        <name>Explicit Interruption</name>
        <t>This refers to the direct offline status of physical links or nodes. While mechanisms like BFD and FRR are mature, issues persist in multi-point failure scenarios where backup paths may be exhausted or lead to "black holes" due to a lack of real-time capacity awareness.</t>
      </section>
      <section anchor="implicit-deterioration-gray-failures">
        <name>Implicit Deterioration (Gray Failures)</name>
        <ul spacing="normal">
          <li>
            <t>State Deception: Traditional heartbeats often fail to capture micro-burst deteriorations.</t>
          </li>
          <li>
            <t>Detection Gaps: While In-situ OAM (IOAM) as specified in <xref target="RFC9197"/> enables the collection of fine-grained, hop-by-hop telemetry data, it defines the data plane encapsulation rather than the operational logic for mitigation. Consequently, without an integrated automated response mechanism, traffic may remain on degraded links, leading to sustained SLA violations.</t>
          </li>
        </ul>
      </section>
      <section anchor="common-cause-and-correlated-failures">
        <name>Common-Cause and Correlated Failures</name>
        <t>Logical redundancies often have deep coupling at the physical or management layers, such as Shared Risk Link Groups (SRLG).</t>
      </section>
      <section anchor="resource-based-failures">
        <name>Resource-based Failures</name>
        <t>Under extreme pressure (e.g., traffic surges or DDoS), the system hits resource bottlenecks, leading to loss of self-rescue capability; for example, when the control plane CPU is exhausted, the network loses its management entry point.</t>
      </section>
    </section>
    <section anchor="root-cause-classification">
      <name>Root Cause Classification</name>
      <t>Based on the process of failure evolution, the root causes of resilience deficiency are categorized into three stages:</t>
      <section anchor="pre-event-insufficient-prevention-and-assessment">
        <name>Pre-event: Insufficient Prevention and Assessment</name>
        <ul spacing="normal">
          <li>
            <t>Configuration and Specification Issues: Misconfigurations or non-standard networking practices are prevalent in current network deployments.</t>
          </li>
          <li>
            <t>Lack of Simulation/Prediction: Current networks lack the capability for integrated risk analysis and high-fidelity simulation across multi-vendor and multi-disciplinary complex environments.</t>
          </li>
        </ul>
      </section>
      <section anchor="in-event-lack-of-escape-and-fault-tolerance-capacity">
        <name>In-event: Lack of Escape and Fault Tolerance Capacity</name>
        <t>Issues include protocol defects and a lack of real-time resource awareness on escape paths.</t>
        <ul spacing="normal">
          <li>
            <t>Protocol and Solution Defects: Bugs within protocols or improper coordination between solutions in complex scenarios (e.g., multi-solution stacking).</t>
          </li>
          <li>
            <t>Escape Path and Fault Tolerance Failure: Even when backup paths exist, they often fail to provide the intended relief. This is typically due to:
            </t>
            <ul spacing="normal">
              <li>
                <t>Resource Blindness: Traffic switches to backup paths that immediately collapse because they cannot handle the sudden load surge, stemming from a lack of real-time resource awareness.</t>
              </li>
              <li>
                <t>Ineffective Design: The backup or escape schemes themselves are improperly designed (e.g., suboptimal path calculation or logical loops), resulting in a failure to achieve the intended "escape" effect and leaving the service in a degraded or interrupted state.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Insufficient Cross-layer Coordination: The physical and network layers fail to collaborate, preventing rapid responses to cross-layer common-cause failures.</t>
          </li>
        </ul>
      </section>
      <section anchor="post-event-lagging-recovery-and-self-evolution">
        <name>Post-event: Lagging Recovery and Self-Evolution</name>
        <t>Recovery relies too heavily on manual intervention; while frameworks such as Service Assurance for IP-Based Networks (SAIN) <xref target="RFC9417"/> provide a foundation for modeling dependencies, fully automated "closed-loop" evolution remains in its infancy.</t>
        <ul spacing="normal">
          <li>
            <t>Low Automation: Over-reliance on manual intervention leads to lack of automated self-healing logic.</t>
          </li>
          <li>
            <t>Lack of Closed-loop Learning: Systems cannot continuously learn from historical failures, leaving defense strategies static and unable to evolve with the changing network environment.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="technical-requirements-for-resilience-enhancement">
      <name>Technical Requirements for Resilience Enhancement</name>
      <t>To address the aforementioned problems, a resilient architecture should satisfy:</t>
      <ul spacing="normal">
        <li>
          <t>Proactive Risk Awareness: The ability to identify risk trends before failures occur based on multi-dimensional telemetry data.</t>
        </li>
        <li>
          <t>Elastic Resource Buffering: The ability to absorb instantaneous traffic shocks without changing topology through elastic scheduling, isolation, and resource decoupling.</t>
        </li>
        <li>
          <t>Deterministic Self-Healing: The ability to restore service performance to baseline SLA within a predefined time limit and maintain "inertial operation" of services.</t>
        </li>
        <li>
          <t>Closed-loop Immune Evolution: The ability to learn failure patterns through feedback loops and automatically upgrade defense strategies to raise the future anti-risk baseline.</t>
        </li>
      </ul>
      <t>TBD.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Resilience mechanisms may introduce new attack vectors, such as injecting false telemetry data to trigger unnecessary path oscillations. Any framework must introduce identity-based authentication for all sensing data and policy updates.</t>
      <t>TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8341" target="https://www.rfc-editor.org/info/rfc8341" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8341.xml">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272" target="https://www.rfc-editor.org/info/rfc4272" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4272.xml">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC7276" target="https://www.rfc-editor.org/info/rfc7276" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7276.xml">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9197" target="https://www.rfc-editor.org/info/rfc9197" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9197.xml">
          <front>
            <title>Data Fields for In Situ Operations, Administration, and Maintenance (IOAM)</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document discusses the data fields and associated data types for IOAM. IOAM-Data-Fields can be encapsulated into a variety of protocols, such as Network Service Header (NSH), Segment Routing, Generic Network Virtualization Encapsulation (Geneve), or IPv6. IOAM can be used to complement OAM mechanisms based on, e.g., ICMP or other types of probe packets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9197"/>
          <seriesInfo name="DOI" value="10.17487/RFC9197"/>
        </reference>
        <reference anchor="RFC9417" target="https://www.rfc-editor.org/info/rfc9417" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9417.xml">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
