<?xml version='1.0' encoding='UTF-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-zhangb-cats-service-metrics-op-01" category="std" consensus="true" ipr="trust200902" obsoletes="" updates="" xml:lang="en" version="3">
  <front>
    <title abbrev="Computing Service Metrics and Operation">Computing Service Metric Definitions and Operation under CATS</title>
    <seriesInfo name="Internet-Draft" value="draft-zhangb-cats-service-metrics-op-01"/>
    <author initials="B" surname="Zhang" fullname="Bin Zhang" role="editor">
      <organization>Pengcheng Laboratory</organization>
      <address>
        <email>zhangb@pcl.ac.cn</email>
      </address>
    </author>
    <author initials="Y" surname="Dai" fullname="Yina Dai" role="editor">
      <organization>Sun Yat-sen University</organization>
      <address>
        <email>daiyn5@mail2.sysu.edu.cn</email>
      </address>
    </author>
    <author initials="Z" surname="Du" fullname="Zongpeng Du" role="editor">
      <organization>China Mobile</organization>
      <address>
        <email>duzongpeng@chinamobile.com</email>
      </address>
    </author>
    <author initials="C" surname="Miao" fullname="Chuanyang Miao" role="editor">
      <organization>ZTE Corporation</organization>
      <address>
        <email>miao.chuanyang@zte.com.cn</email>
      </address>
    </author>
    <date year="2026" month="05" day="13"/>
    <area>Routing</area>
    <workgroup>Computing-Aware Traffic Steering</workgroup>
    <keyword>Computing-Aware Traffic Steering</keyword>
    <keyword>Computing Service Metrics</keyword>
    <abstract>
      <t>Computing-Aware Traffic Steering (CATS) optimizes traffic forwarding by considering both computing and networking metrics. While the existing framework and metric drafts provide theoretical models (e.g., L1/L2 normalized metrics), they face significant challenges to achieve direct operational execution in real-world deployments. Normalization methods vary across providers, and aggregated unitless scores often lose critical operational information, making it difficult for routers to make precise decisions.</t>
      <t>This document is proposed to fill this gap by providing an executable approach. It defines a set of Computing Service Metrics and their operations under the CATS framework. Instead of transmitting low-level raw hardware metrics, service sites dynamically evaluate and report service-oriented metrics (e.g., Global Available Slots) to the control plane. This enables efficient and precise traffic-steering policies without negating the value of existing normalized metrics.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sect-1">
      <name>Introduction</name>
      <t>The Computing-Aware Traffic Steering (CATS) <xref target="I-D.ietf-cats-framework-24"/> architecture aims to steer service traffic to the most suitable service contact instance by evaluating both network state and computing resource availability. To achieve this, CATS Service Metric Agents (C-SMAs) collect computing metrics and advertise them to CATS Path Selectors (C-PSes).</t>
      <t><xref target="I-D.ietf-cats-metric-definition-07"/> introduces a multi-level metric framework (Level 0, Level 1, Level 2) and proposes normalizing heterogeneous computing metrics into unitless scores (e.g., compute_norm). While this establishes a solid theoretical baseline, mapping diverse hardware capabilities (CPUs, GPUs, NPUs) into a single normalized score is highly complex and provider-dependent. In practice, such normalization often obscures the actual service capacity, which cannot reach the required operational effect for fine-grained traffic steering.</t>
      <t>To fill the gap between theoretical metric definitions and practical implementation, this document introduces a set of Computing Service Metrics. By decoupling the service capacity from hardware-specific raw metrics, service sites can directly expose actionable metrics that describe their concrete ability to handle specific services.</t>
    </section>
    <section anchor="sect-2">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in <xref target="I-D.ietf-cats-framework-24"/> and <xref target="I-D.ietf-cats-metric-definition-07"/>. In particular, CS-ID and CSCI-ID are used as CATS identifiers. They provide stable service and service-contact-instance references for lookup and forwarding, but are not treated as computing metrics in this document. Additionally, the following terms are used:</t>
      <ul spacing="normal">
        <li>
          <t>Global Available Slots (GAS): The maximum number of concurrent clients a service site is willing and able to serve for a specific CS-ID at a given time.</t>
        </li>
      <li><t>CS-ID (CATS Service ID): An identifier for a service. It is used as a stable lookup key in the C-PS Computing Service Table.</t></li><li><t>CSCI-ID (CATS Service Contact Instance ID): An identifier for a service contact instance. In this document, it is interpreted operationally as a locator, such as an IP address and port number, used to establish the data tunnel.</t></li></ul>
    </section>
    <section anchor="sect-3">
      <name>Motivation and Problem Statement</name>
      <t>The CATS working group has made significant progress in defining how computing metrics should be collected and distributed. In particular, existing works introduce a comprehensive framework that categorizes computing metrics into Raw Metrics (Level 0) and Normalized Metrics (Level 1 and Level 2). However, a critical gap remains: how exactly to use these hardware-centric metrics to effectively steer traffic in operational networks.</t>
      <t>This document does not negate the value of L1/L2 normalized metrics; rather, it identifies that relying solely on the normalization of raw hardware metrics poses operational challenges during routing execution:</t>
      <ol spacing="normal" type="1">
        <li>
          <t>The Implementation Gap (HOW to normalize?): In a real-world multi-vendor network, computing resources are highly heterogeneous. It is extremely difficult to establish a unified mathematical model that fairly normalizes a GPU's capacity and a CPU's capacity into the same 0-10 score.</t>
        </li>
        <li>
          <t>The Information Loss Gap (WHY disseminate raw features?): Normalizing diverse hardware capabilities into a single unitless score results in the loss of actionable information. A normalized compute score of "7" cannot explicitly guarantee a client's &lt;10 ms delay requirement.</t>
        </li>
        <li>
          <t>The Routing Mechanism Gap (WHO uses this data?): Routers (C-PS) do not need to know whether a service is backed by a CPU or a GPU. They only care about routing parameters: "Is there capacity?", "How long will it take?", and "Where is the destination?".</t>
        </li>
      </ol>
      <t>To bridge this gap, CATS requires a Service-Oriented Abstraction. We explicitly divide the required service information into Mandatory Computing Service Metrics and Optional Extension Metrics to support executable traffic-steering policies.</t>
    </section>
    <section anchor="sect-4">
      <name>Service Information and Metrics Definition</name>
      <t>This section defines the service information used by CATS control-plane components. Some fields are identifiers or locators, while others are service-oriented metrics. Metric examples follow the structural guidelines specified in Section 4 of <xref target="I-D.ietf-cats-metric-definition-07"/>. Encoding details are intentionally left as TBD until the working group has a stable representation to reference.</t>
      <section anchor="sect-4.1">
        <name>Mandatory Computing Service Information</name>
        <t>These fields are essential for the C-PS to make fundamental traffic steering decisions. CS-ID and CSCI-ID are identifiers, while GAS and Computing Time are service-oriented metrics.</t>
        <section anchor="sect-4.1.1">
          <name>Global Available Slots (GAS)</name>
          <t>GAS is the core contribution of this metric framework. It represents the maximum number of concurrent clients a service site can serve for a specific CS-ID.</t>
          <t>Crucially, GAS acts as a direct abstraction layer (a "lid") over the complex and fluctuating raw computing metrics (CPU, GPU, Memory, Storage) and status metrics (load and health). Instead of exposing highly dynamic raw metrics to the network, the service site absorbs these variations internally. The site initially provides a GAS value based on its fixed resource allocation.</t>
          <t>As the number of concurrent users increases, the GAS value naturally decreases. Furthermore, the site monitoring system dynamically reduces the GAS value upon detecting abnormal status metrics, such as:</t>
          <ul spacing="normal">
            <li>
              <t>Load changes: Sudden increase in internal resources occupied by local users or tasks.</t>
            </li>
            <li>
              <t>Health changes: Sudden performance drop, possibly due to a cyber attack.</t>
            </li>
            <li>
              <t>Reachability: The site crashes or becomes unresponsive.</t>
            </li>
          </ul>
          <t>Note: The C-SMA proactively reports significant adjustments to the control plane according to local policy, thresholds, or aggregation intervals. Small per-session changes do not necessarily need to be reported immediately. When GAS drops to 0, it means the instance cannot allocate any more resources, and no new requests will be steered to it.</t>
          <artwork>
Basic fields:
  Metric Type: gas
  Level: L0/TBD
  Value: 500
  Source: estimation

Encoding details, including field length and wire format, are TBD.
</artwork>
        </section>
        <section anchor="sect-4.1.4">
          <name>Computing Time</name>
          <t>The time required for the site to perform one service request. The service site dynamically adjusts this metric based on real-time load.</t>
          <artwork>
Basic fields:
  Metric Type: comp_time
  Level: L0/TBD
  Unit: ms
  Value: 5
  Source: estimation

Encoding details, including field length and wire format, are TBD.
</artwork>
        </section>
      </section>
      <section anchor="sect-4.2">
        <name>Optional Extension Metrics</name>
        <t>To accommodate advanced traffic-steering scenarios and maintain backward compatibility, the following optional fields are defined.</t>
        <section anchor="sect-4.2.1">
          <name>Cost</name>
          <t>Self-defined by the service site to apply administrative or economic billing policies.</t>
          <artwork>
Basic fields:
  Metric Type: cost
  Level: L0/TBD
  Value: 100
  Source: nominal

Encoding details, including field length and wire format, are TBD.
</artwork>
        </section>
        <section anchor="sect-4.2.2">
          <name>Reputation</name>
          <t>A dynamic quality score based on user feedback. Upon completion, if a user experiences long delays or inaccurate results, feedback is returned to the C-PS *along with the resource release message*.</t>
          <artwork>
Basic fields:
  Metric Type: reputation
  Level: L0/TBD
  Value: 8
  Source: estimation (user feedback)

Encoding details, including field length and wire format, are TBD.
</artwork>
        </section>
        <section anchor="sect-4.2.3">
          <name>Security Label</name>
          <t>The Security Label reflects the security status of a service site. A higher score indicates a more secure site.</t>
          <t>Score range: 0-10 (0 indicates the poorest security; 10 indicates optimal security).</t>
          <artwork>
Basic fields:
  Metric Type: security_label
  Level: L0/TBD
  Value: 9
  Source: estimation

Encoding details, including field length and wire format, are TBD.
</artwork>
        </section>
        <section anchor="sect-4.2.4">
          <name>Capability (L1/L2 Compatibility)</name>
          <t>To maintain compatibility with L1/L2 normalized metrics, this optional field represents the overall computing and storage capability allocated by the site. It can correspond to a Level 1 or Level 2 overall capability score when such a normalized value is available.</t>
          <artwork>
Basic fields:
  Metric Type: site_cap
  Level: L1/L2/TBD
  Value: 7
  Source: normalization

Encoding details, including field length and wire format, are TBD.
</artwork>
        </section>
      </section>
    </section>
    <section anchor="sect-5">
      <name>Operation under CATS Framework</name>
      <section anchor="sect-5.1">
        <name>Dynamic Metric Reporting</name>
        <t>Service sites proactively monitor their internal instances. When capacity drops, available slots cross a configured threshold, or latency spikes, the site reports updated metrics to the local C-SMA. The C-SMA may aggregate small per-session changes and synchronize only significant updates with the control plane.</t>
        <t>Choosing appropriate protocols for conveying CATS metrics is important. For distributed systems, existing routing protocols such as BGP extensions<xref target="RFC4760"/> and GRASP <xref target="RFC8990"/> may serve as a baseline. However, considering that the CATS working group focuses on single-domain models, centralized approaches are highly suitable. In an SDN context <xref target="RFC7149"/> <xref target="RFC7426"/>, the metric agent acts as an application that uses a RESTful API via the northbound interface to report CATS metrics directly to the centralized C-PS (or SDN controller) for centralized decision-making.</t>
      </section>
      <section anchor="sect-5.2">
        <name>Information Collection and Routing Policies</name>
        <t>To ensure separation of concerns between computing resources and network states, the C-PS maintains two distinct data structures. Network metrics do not need to be normalized or redefined in CATS; they rely on existing network mechanisms.</t>
        <ul spacing="normal">
          <li>
            <t>Computing Service Table: Formed by the C-SMA. It gathers service identifiers and service-oriented metrics (GAS, Computing Time, etc.) and is indexed by CS-ID.</t>
          </li>
          <li>
            <t>Network Service Table (e.g., TEDB in SDN controller): Formed by the C-NMA. C-NMA leverages existing techniques (e.g.,<xref target="RFC7471"/>, <xref target="RFC8570"/>, and <xref target="RFC8571"/>) to generate it. The Network Service Table contains network topology and link information (including delay, jitter, bandwidth, and availability). As an example, when the C-PS is implemented using an SDN Controller, the Network Service Table corresponds to the TEDB in the SDN control plane.</t>
          </li>
        </ul>
        <t>When a user request arrives, the C-PS combines the Computing Service Table and the Network Service Table (e.g., TEDB in SDN controller). The routing policy works by first querying the Computing Service Table to find candidate CSCI-IDs that meet the service requirements. Then, it queries the Network Service Table to determine the path and delay from the user's Ingress CATS-Forwarder to the candidate Egress CATS-Forwarder. The service node may be outside the ingress domain, so this document does not require measuring delay directly from the ingress to the service node. Finally, the C-PS selects the optimal CSCI-ID by minimizing the total service time, i.e., computing time plus ingress-to-egress network delay.</t>
        <artwork>
+-------------------------+      +-------------------------+
| Computing Service Table |      |  Network Service Table  |
| (CS-ID, CSCI-ID, GAS,   |      | (Ingress, Egress,       |
|  Comp Time)             |      |  delay, jitter, bw)     |
+-----------+-------------+      +-----------+-------------+
            |                                |
            v                                v
+----------------------------------------------------------+
|                           C-PS                           |
|   1. Query Computing Service Table for candidates        |
|   2. Query Network Service Table for ingress-egress path |
|   3. Select CSCI-ID by computing time plus network delay |
+----------------------------------------------------------+
</artwork>
        <t>Figure 1: Service Selection Process Combining Computing and Network Metrics</t>
      </section>
    </section>
    <section anchor="sect-6">
      <name>Use Case Example</name>
      <t>To illustrate the integrated routing logic of Service Metrics, consider a scenario where the C-PS combines both computing and network information. In this example, the C-PS filters candidates based on CS-ID and Computing Time, and combines that with the network delay between the Ingress and Egress CATS-Forwarders.</t>
      <section anchor="sect-6.1">
        <name>Service Distribution and Table Formation</name>
        <t>Multiple service sites deploy various instances (e.g., AR1, AR2, LLM1). The C-SMA at each site pushes its local service information to the C-PS in the message format (CS-ID, CSCI-ID, Computing Time, GAS, [Optional Metrics]), forming the following unified Computing Service Table:</t>
        <t>Figure 2 illustrates the metric dissemination process across the network:</t>
        <artwork>         AR1, 188.3.67.3:67, 5ms, 400, cost=10
         AR2, 188.3.67.3:68, 15ms, 100, cost=20

                :&lt;----------------------:
                :                       :               +---------+
                :                       :               |  AR1    |
                :                       :            .--|CSCI-ID 1|
                :              +----------------+    |  +---------+
                :              |    C-SMA       |----|   Service Site 2
                :              +----------------+    |  +---------+
                :              |CATS-Forwarder 2|    '--|  AR2    |
+--------+      :              +----------------+       |CSCI-ID 2|
| Client |      :                        |              +---------+
+--------+      :  Network +----------------------+
     |          :  delay   | +-------+            |
     |          : :&lt;---------| C-NMA |            |
     |          : :        | +-------+            |
+---------------------+    |                      |
|CATS-Forwarder 1|C-PS|----|                      |
+---------------------+    |       Underlay       |
                :Computing |     Infrastructure   |     +---------+
                :Service   |                      |     |  AR1    |
                :Table     +----------------------+ .---|CSCI-ID 3|
                :                    |              |   +---------+
                :          +----------------+  +------+
                :          |CATS-Forwarder 3|--|C-SMA | Service Site 3
                :          +----------------+  +------+
                :                                :  |
                :                                :  |   +-----------+
                :                                :  '---|  LLM1     |
                :&lt;-------------------------------:      |CSCI-ID 4  |
         AR1, 188.3.67.4:69, 6ms, 600, cost=5           +-----------+
         LLM1, 188.3.67.4:70, 12ms, 300, cost=15</artwork>
        <t>Figure 2: An Example of Service Metric Dissemination under CATS</t>
        <t>The C-PS stores the C-SMA reports in the Computing Service Table:</t>
        <table>
          <thead>
            <tr>
              <th>CS-ID</th>
              <th>CSCI-ID (IP:Port)</th>
              <th>GAS</th>
              <th>Comp Time(ms)</th>
              <th>Cost (Optional)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>AR1</td>
              <td>188.3.67.3:67</td>
              <td>400</td>
              <td>5</td>
              <td>10</td>
            </tr>
            <tr>
              <td>AR2</td>
              <td>188.3.67.3:68</td>
              <td>100</td>
              <td>15</td>
              <td>20</td>
            </tr>
            <tr>
              <td>AR1</td>
              <td>188.3.67.4:69</td>
              <td>600</td>
              <td>6</td>
              <td>5</td>
            </tr>
            <tr>
              <td>LLM1</td>
              <td>188.3.67.4:70</td>
              <td>300</td>
              <td>12</td>
              <td>15</td>
            </tr>
          </tbody>
        </table>
        <t>The C-PS also maintains the Network Service Table (e.g., TEDB in an SDN controller) for network path information. An example subset relevant to the Ingress CATS-Forwarder is shown below:</t>
        <table>
          <thead>
            <tr>
              <th>Ingress CATS-Forwarder</th>
              <th>Egress CATS-Forwarder</th>
              <th>Network Delay (ms)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td>10.0.0.1</td>
              <td>188.3.67.3</td>
              <td>8</td>
            </tr>
            <tr>
              <td>10.0.0.1</td>
              <td>188.3.67.4</td>
              <td>6</td>
            </tr>
          </tbody>
        </table>
        <t>Network delay information is maintained in the Network Service Table rather than being merged into the Computing Service Table. In this example, network delay refers to the Ingress-to-Egress delay.</t>
      </section>
      <section anchor="sect-6.2">
        <name>Service Consumption and Resource Allocation</name>
        <t>A client requests the AR1 service with a requirement for the shortest total service time (computing time plus Ingress-to-Egress network delay). Cost is omitted in this example to focus on the combined metric.</t>
        <ol spacing="normal" type="1">
          <li>
            <t>Match CS-ID (Control Plane): The C-PS scans the Computing Service Table and isolates entries matching CS-ID = AR1. Candidates: 188.3.67.3:67 (Comp Time = 5ms) and 188.3.67.4:69 (Comp Time = 6ms).</t>
          </li>
          <li>
            <t>Query Network Service Table for Network Delay: The C-PS queries the Network Service Table (e.g., TEDB in an SDN controller) using the user's Ingress CATS-Forwarder and each candidate Egress CATS-Forwarder: path to the egress attached to 188.3.67.3 has a network delay of 8 ms; path to the egress attached to 188.3.67.4 has a network delay of 6 ms.</t>
          </li>
          <li>
            <t>Calculate Total Service Time: The C-PS sums computing time and Ingress-to-Egress network delay for each candidate: candidate 188.3.67.3:67 has 5 ms + 8 ms = 13 ms; candidate 188.3.67.4:69 has 6 ms + 6 ms = 12 ms. The C-PS selects 188.3.67.4:69 because it offers the shortest total service time (12 ms), even though its computing time is slightly higher than candidate 67.</t>
          </li>
          <li>
            <t>Allocate (Minus-one operation): The selected service site or its C-SMA updates the local GAS counter for 188.3.67.4:69 from 600 to 599. The C-SMA does not need to report every single decrement to the C-PS when the change is operationally insignificant; it may report aggregated or threshold-based updates.</t>
          </li>
          <li>
            <t>Return Contact IP (Control Plane): The C-PS sends the selected contact IP (188.3.67.4:69) to the Ingress CATS-Forwarder (CATS-Forwarder 1). The Ingress CATS-Forwarder then forwards this information to the client. The internal metrics (computing time, network delay, cost, etc.) are shielded from the user.</t>
          </li>
          <li>
            <t>Data Plane Establishment: The client sends the concrete service data to the Ingress CATS-Forwarder (CATS-Forwarder 1). The Ingress CATS-Forwarder encapsulates the packets and forwards them over the CATS-computed path to the selected Egress CATS-Forwarder (e.g., CATS-Forwarder 2 or 3). The Egress CATS-Forwarder decapsulates the packets and sends them to the target service site. After processing, the service site returns the response to the same Egress CATS-Forwarder, which forwards it back to the Ingress CATS-Forwarder and then to the client.</t>
          </li>
          <li>
            <t>Release (Plus-one operation): Once the service session is completed, the selected service site or its C-SMA increments the local GAS counter back to 600. The updated value is synchronized to the C-PS according to the same local reporting policy, threshold, or aggregation interval.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="sect-7">
      <name>Security Considerations</name>
      <t>The dynamic reporting of Service Metrics introduces potential attack vectors. Authentication mechanisms between service sites and C-SMAs MUST be enforced. The Security Label (<xref target="sect-4.2.3"/>) can be utilized by the C-PS to prevent routing sensitive traffic to compromised sites.</t>
    </section>
    <section anchor="sect-8">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions at this time.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-cats-framework-24" target="https://datatracker.ietf.org/doc/html/draft-ietf-cats-framework-24">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author initials="C." surname="Li" fullname="C. Li">
              <organization/>
            </author>
            <author initials="Z." surname="Du" fullname="Z. Du">
              <organization/>
            </author>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization/>
            </author>
            <author initials="L. M." surname="Contreras" fullname="L. M. Contreras">
              <organization/>
            </author>
            <author initials="J." surname="Drake" fullname="J. Drake">
              <organization/>
            </author>
            <date year="2026" month="April"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-cats-metric-definition-07" target="https://datatracker.ietf.org/doc/html/draft-ietf-cats-metric-definition-07">
          <front>
            <title>CATS Metrics Definition</title><author initials="Y." surname="Kehan" fullname="Y. Kehan"><organization/></author><author initials="C." surname="Li" fullname="C. Li"><organization/></author><author initials="L. M." surname="Contreras" fullname="L. M. Contreras"><organization/></author><author initials="J." surname="Ros-Giralt" fullname="J. Ros-Giralt"><organization/></author><author initials="G." surname="Zeng" fullname="G. Zeng"><organization/></author><date year="2026" month="May" day="8"/></front>
        </reference>
        <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author initials="T." surname="Bates" fullname="T. Bates">
              <organization/>
            </author>
            <author initials="R." surname="Chandra" fullname="R. Chandra">
              <organization/>
            </author>
            <author initials="D." surname="Katz" fullname="D. Katz">
              <organization/>
            </author>
            <author initials="Y." surname="Rekhter" fullname="Y. Rekhter">
              <organization/>
            </author>
            <date year="2007" month="01"/>
          </front>
        </reference>
        <reference anchor="RFC8990" target="https://www.rfc-editor.org/info/rfc8990">
          <front>
            <title>GeneRic Autonomic Signaling Protocol (GRASP)</title>
            <author initials="C." surname="Bormann" fullname="Carsten Bormann">
              <organization/>
            </author>
            <author initials="B." surname="Carpenter" fullname="Brian Carpenter" role="editor">
              <organization/>
            </author>
            <author initials="B." surname="Liu" fullname="Bing Liu" role="editor">
              <organization/>
            </author>
            <date year="2021" month="03"/>
          </front>
        </reference>
        <reference anchor="RFC7471" target="https://www.rfc-editor.org/info/rfc7471">
          <front>
            <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
            <author initials="S." surname="Giacalone" fullname="S. Giacalone">
              <organization/>
            </author>
            <author initials="D." surname="Ward" fullname="D. Ward">
              <organization/>
            </author>
            <author initials="J." surname="Drake" fullname="J. Drake">
              <organization/>
            </author>
            <author initials="A." surname="Atlas" fullname="A. Atlas">
              <organization/>
            </author>
            <author initials="S." surname="Previdi" fullname="S. Previdi">
              <organization/>
            </author>
            <date year="2015" month="03"/>
          </front>
        </reference>
        <reference anchor="RFC8570" target="https://www.rfc-editor.org/info/rfc8570">
          <front>
            <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
            <author initials="L." surname="Ginsberg" fullname="Les Ginsberg" role="editor">
              <organization/>
            </author>
            <author initials="S." surname="Previdi" fullname="Stefano Previdi" role="editor">
              <organization/>
            </author>
            <author initials="S." surname="Giacalone" fullname="Spencer Giacalone">
              <organization/>
            </author>
            <author initials="D." surname="Ward" fullname="David Ward">
              <organization/>
            </author>
            <author initials="J." surname="Drake" fullname="John Drake">
              <organization/>
            </author>
            <author initials="Q." surname="Wu" fullname="Qin Wu">
              <organization/>
            </author>
            <date year="2019" month="03"/>
          </front>
        </reference>
        <reference anchor="RFC8571" target="https://www.rfc-editor.org/info/rfc8571">
          <front>
            <title>BGP - Link State (BGP-LS) Advertisement of IGP Traffic Engineering Performance Metric Extensions</title>
            <author initials="L." surname="Ginsberg" fullname="Les Ginsberg" role="editor">
              <organization/>
            </author>
            <author initials="S." surname="Previdi" fullname="Stefano Previdi">
              <organization/>
            </author>
            <author initials="Q." surname="Wu" fullname="Qin Wu">
              <organization/>
            </author>
            <author initials="J." surname="Tantsura" fullname="Jeff Tantsura">
              <organization/>
            </author>
            <author initials="C." surname="Filsfils" fullname="Clarence Filsfils">
              <organization/>
            </author>
            <date year="2019" month="03"/>
          </front>
        </reference>
        <reference anchor="RFC7149" target="https://www.rfc-editor.org/info/rfc7149">
          <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author initials="M." surname="Boucadair" fullname="M. Boucadair">
              <organization/>
            </author>
            <author initials="C." surname="Jacquenet" fullname="C. Jacquenet">
              <organization/>
            </author>
            <date year="2014" month="03"/>
          </front>
        </reference>
        <reference anchor="RFC7426" target="https://www.rfc-editor.org/info/rfc7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author initials="E." surname="Haleplidis" fullname="E. Haleplidis" role="editor">
              <organization/>
            </author>
            <author initials="K." surname="Pentikousis" fullname="K. Pentikousis" role="editor">
              <organization/>
            </author>
            <author initials="S." surname="Denazis" fullname="S. Denazis">
              <organization/>
            </author>
            <author initials="J. H." surname="Salim" fullname="J. H. Salim">
              <organization/>
            </author>
            <author initials="D." surname="Meyer" fullname="D. Meyer">
              <organization/>
            </author>
            <author initials="O." surname="Koufopavlou" fullname="O. Koufopavlou">
              <organization/>
            </author>
            <date year="2015" month="01"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
</rfc>
