<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-pang-v6ops-ipv6-monitoring-deployment-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="IPv6 Network Monitoring Deployment">IPv6 Network Deployment Monitoring and Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-pang-v6ops-ipv6-monitoring-deployment-00"/>
    <author initials="R." surname="Pang" fullname="Ran Pang" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>pangran@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="J." surname="Zhao" fullname="Jing Zhao" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhaoj501@chinaunicom.cn</email>
      </address>
    </author>
    <author initials="M." surname="Jin" fullname="Mingshuang Jin" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jinmingshuang@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Zhang" fullname="Shuai Zhang" role="editor">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhangs366@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Operations and Management Area</area>
    <workgroup>v6ops</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 66?>
<t>This document proposes an IPv6 network end-to-end monitoring and analysis framework. 
The aim is to address key issues existing in current IPv6 deployment monitoring, such as limited coverage, insufficient depth of analysis, and lack of cross-domain collaboration.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The emergence of IPv6 can be traced back to the 1990s, when the development of IPv6 was initiated by the Internet Engineering Task Force (IETF) to solve the problem of IPv4 address exhaustion. In 1998, the IPv6 protocol specification was published. With IPv6 adoption accelerating over the past years, the IPv6 protocol was elevated to be a Internet Standard <xref target="RFC8200"/> in 2017.</t>
      <t>This document proposes an IPv6 end-to-end monitoring and analysis framework. The aim is to address key issues existing in current IPv6 deployment monitoring, such as limited coverage, insufficient depth of analysis, and lack of cross-domain collaboration. Through defining standardized data collection interfaces, multi-dimensional quality assessment metrics, and cross-domain correlation analysis models, this framework enables the assessment of IPv6 deployment quality and problem location across the entire cloud-networ-edge-terminal link.</t>
      <section anchor="current-ipv6-deployment-status">
        <name>Current IPv6 Deployment Status</name>
        <t>In today's digital age, the deployment of IPv6 has become a core driving force for network development. With the continuous expansion of network scale and the emergence of new applications, the vast address space, enhanced security, and improved network performance of IPv6 have made it a key element in network evolution. How to better deploy and promote IPv6 networks has become a widely concerned issue.</t>
        <t>As of 2023, significant strides have been made in the global deployment of IPv6. According to the statistics from the "Global IPv6 Development Report 2024", in 2023 the deployment of IPv6 networks significantly accelerated, breaking through the 30% mark in global coverage for the first time. Among leading countries, the IPv6 coverage rate has reached or approached 70%, and the percentage of IPv6 mobile traffic has surpassed that of IPv4.</t>
        <t><xref target="RFC9386"/> presents the state of IPv6 network deployment in 2022, and its Section 5 lists common challenges, such as transition mechanisms, network management and operation, performance, and customer experience. 'ETSI-GR-IPE-001' also discusses the existing gaps in IPv6-related use cases.</t>
      </section>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>Although current analyses of insufficient IPv6 network deployment often focus on technical gaps, there is a lack of tools that can support end-to-end monitoring and analysis across clouds, networks, edges, and terminals from a practical network perspective. This gap makes it impossible to conduct multidimensional and fine-grained analyses of the shortcomings in IPv6 deployment.</t>
      <t>For example, most network domains are currently managed independently, focusing only on the shortcomings and quality issues of IPv6 deployment within a single management domain. They are unable to directly analyze data correlation between domains, making it difficult to accurately locate network quality issues</t>
      <section anchor="current-approaches-to-monitoring-ipv6-deployment">
        <name>Current Approaches to Monitoring IPv6 Deployment</name>
        <t>Existing IPv6 deployment monitoring approaches include (Maybe not all are covered):</t>
        <ul spacing="normal">
          <li>
            <t>Internet Society Pulse: Curating information about levels of IPv6 adoption in countries and networks around the world.</t>
          </li>
          <li>
            <t>Akamai IPv6 Adoption Visualization: Reviewing IPv6 adoption trends at a country or network level.</t>
          </li>
          <li>
            <t>APNIC IPv6 Measurement: Providing an interactive map that users can click on to see the IPv6 deployment rate in a particular country.</t>
          </li>
          <li>
            <t>Cloudflare IPv6 Adoption Trends: Offering insights into IPv6 adoption across the Internet.</t>
          </li>
          <li>
            <t>Cisco 6lab IPv6: Displaying IPv6 prefix data.</t>
          </li>
          <li>
            <t>Regional or National Monitoring Platforms: Examples include the NZ IPv6, the RIPE NCC IPv6 Statistics, and the USG IPv6 &amp; DNSSEC External Service Deployment Status, among others.</t>
          </li>
        </ul>
        <t>The aforementioned tools are capable of providing effective statistics and visualization of IPv6 support levels.
However, they do not adequately address the key problems that currently exist.
The specific deficiencies are presented in the following five aspects.</t>
        <section anchor="fragmented-monitoring-coverage">
          <name>Fragmented Monitoring Coverage</name>
          <t>Existing monitoring points are concentrated in the backbone network <xref target="RFC7707"/>, lacking fine-grained coverage of terminals and applications.</t>
        </section>
        <section anchor="single-dimensional-evaluation">
          <name>Single-Dimensional Evaluation</name>
          <t>It mainly relies on basic indicators such as connection availability <xref target="RFC9099"/> and address allocation rate, lacking a comprehensive assessment of service continuity, transmission quality, Network Element Readiness, Active IPv6 Connections, etc.</t>
        </section>
        <section anchor="lack-of-cross-domain-correlation">
          <name>Lack of Cross-Domain Correlation</name>
          <t>The monitoring data of each network domain is isolated, making it impossible to conduct correlation analysis of end-to-end traffic paths <xref target="RFC9312"/>.</t>
        </section>
        <section anchor="insufficient-in-depth-analysis">
          <name>Insufficient In-Depth Analysis</name>
          <t>For instance, the IPv6 transformation in some private network applications is not thorough enough, with internal application systems yet to be upgraded.
This results in secondary and tertiary links, as well as multimedia content traffic, still predominantly relying on IPv4. However, there is a lack of effective deep monitoring methods to oversee these connections.</t>
        </section>
        <section anchor="limited-dynamic-prediction">
          <name>Limited Dynamic Prediction</name>
          <t>Existing models find it difficult to quantify the impact of external factors such as policies and regulations, user behavior patterns, and market dynamics on the evolution of IPv6.</t>
        </section>
      </section>
    </section>
    <section anchor="ipv6-network-deployment-end-to-end-monitoring-and-analysis">
      <name>IPv6 Network deployment End to End Monitoring and Analysis</name>
      <t>As a network operator, we specify an architectural framework for IPv6 end-to-end monitoring and analysis systems, defining a standardized methodology for cross-domain data correlation, multidimensional traffic analysis, and quality assessment across cloud-network-edge-device ecosystems.</t>
      <t>The framework establishes key performance indicators (KPIs), monitoring interfaces, and analyzing procedures to address IPv6 deployment challenges in heterogeneous network environments.</t>
      <t>This framework addresses these gaps through standardized data collection methods and multidimensional analysis techniques.</t>
      <section anchor="framework">
        <name>Framework</name>
        <figure anchor="fig-1">
          <name>IPv6 Network End to End Monitoring and Analysis Platform</name>
          <artwork><![CDATA[
                            +-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+
                            |     Monitoring and Analysis platform     |
                            +-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+
                                                    |
           ------------->---------------------->----|----------<-----------------<---------
           |                          |                             |                     |
           |                          |                             |                     |
  +-----------------+         +----------------+        +--------------------+       +--------------+
  | Home Network    |---------| Mobile Network |--------|  IP bearer network |-------|  Application |
  +-----------------+         +----------------+        +--------------------+       +--------------+
   
]]></artwork>
        </figure>
        <section anchor="cross-domain-data-integration">
          <name>Cross-Domain Data Integration</name>
          <t>The framework defines four critical domains. By connecting the monitoring subsystems in various fields of cloud, network, edge, and terminal, end-to-end data integration across multiple links can be achieved.
* Home Network Domain: 
  - Home gateway IPv6 capabilities
  - End-device Protocol Stack Status</t>
          <ul spacing="normal">
            <li>
              <t>Mobile Network Domain:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Network migration flows</t>
                </li>
                <li>
                  <t>Quality</t>
                </li>
                <li>
                  <t>Network migration applications</t>
                </li>
                <li>
                  <t>End-device Protocol Stack Status</t>
                </li>
              </ul>
            </li>
            <li>
              <t>IP bearer network Domain:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Home broadband and mobile network traffic flows</t>
                </li>
                <li>
                  <t>Dedicated line traffic flow direction</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Application Domain:
              </t>
              <ul spacing="normal">
                <li>
                  <t>IPv6 service availability</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>Support multiple data collection methods (e.g., Kafka/ SFTP <xref target="RFC9132"/>, NetFlow <xref target="RFC3954"/> /NetStream <xref target="RFC5130"/>, telemetry <xref target="RFC9232"/>) with protocol-specific configurations.
Additionally, if a real-time traffic collection method is required, the Deploy IPFIX exporters <xref target="RFC7011"/> at strategic nodes for flow data capture.</t>
        </section>
        <section anchor="multidimensional-analysis-methodology">
          <name>Multidimensional Analysis Methodology</name>
          <ul spacing="normal">
            <li>
              <t>Network Traffic Analysis
              </t>
              <ul spacing="normal">
                <li>
                  <t>Flow pattern recognition at critical nodes</t>
                </li>
                <li>
                  <t>IPv6/IPv4 traffic ratio trending</t>
                </li>
                <li>
                  <t>Subsystem-level attribution analysis</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Inter-Network Analysis
              </t>
              <ul spacing="normal">
                <li>
                  <t>Regional traffic matrix construction</t>
                </li>
                <li>
                  <t>Flow direction analysis</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Application-Centric Analysis
              </t>
              <ul spacing="normal">
                <li>
                  <t>Cross-domain service topology mapping</t>
                </li>
                <li>
                  <t>Quality-of-Experience (QoE) analysis</t>
                </li>
                <li>
                  <t>Application-specific traffic distribution</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Restricted Area Analysis
              </t>
              <ul spacing="normal">
                <li>
                  <t>We formulate a multi-dimensional problem identification and discovery program for the network side, user side and application side, and investigate possible influencing factors at each level.</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="application-system-monitoring">
          <name>Application System Monitoring</name>
          <ul spacing="normal">
            <li>
              <t>IPv6 Support Assessment
              </t>
              <ul spacing="normal">
                <li>
                  <t>Multi-layer link accessibility</t>
                </li>
                <li>
                  <t>Secondary and tertiary link support</t>
                </li>
                <li>
                  <t>DNS resolution capability
                  </t>
                  <ul spacing="normal">
                    <li>
                      <t>AAAA record resolution rate</t>
                    </li>
                    <li>
                      <t>Robustness of recursive and iterative query mechanisms</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>Performance Measurement
              </t>
              <ul spacing="normal">
                <li>
                  <t>IPv6 connection establishment time</t>
                </li>
                <li>
                  <t>Application response time under IPv6</t>
                </li>
                <li>
                  <t>Throughput comparison (IPv6 vs IPv4)</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="user-side-monitoring">
          <name>User-Side Monitoring</name>
          <ul spacing="normal">
            <li>
              <t>End-Device Monitoring
              </t>
              <ul spacing="normal">
                <li>
                  <t>IPv6 stack implementation verification</t>
                </li>
                <li>
                  <t>Protocol preference analysis</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Quality of Experience
              </t>
              <ul spacing="normal">
                <li>
                  <t>Application-specific performance metrics</t>
                </li>
                <li>
                  <t>Dual-stack quality differentials</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
        <section anchor="key-performance-indicators">
          <name>Key Performance Indicators</name>
          <ul spacing="normal">
            <li>
              <t>Readiness Indicators
              </t>
              <ul spacing="normal">
                <li>
                  <t>Network Element Readiness</t>
                </li>
                <li>
                  <t>Application Readiness</t>
                </li>
                <li>
                  <t>Infrastructure Readiness</t>
                </li>
                <li>
                  <t>Network Readiness</t>
                </li>
                <li>
                  <t>Cloud Readiness</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Operational Metrics
              </t>
              <ul spacing="normal">
                <li>
                  <t>IPv6 Traffic</t>
                </li>
                <li>
                  <t>Active IPv6 Connections</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Quality Metrics
              </t>
              <ul spacing="normal">
                <li>
                  <t>DNS Resolution Performance</t>
                </li>
                <li>
                  <t>End-to-End Latency</t>
                </li>
                <li>
                  <t>Packet Loss Ratio</t>
                </li>
              </ul>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="function-description">
        <name>Function Description</name>
        <ul spacing="normal">
          <li>
            <t>Quantify IPv6 deployment maturity through composite indices.</t>
          </li>
          <li>
            <t>Perform root-cause analysis across domains.</t>
          </li>
          <li>
            <t>Optimize development mechanisms based on Key Performance Indicators.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use cases</name>
      <t>## User Network Quality Question Positioning
When User A experiences network congestion while playing cloud-based games at home, it affects the gaming experience. 
To identify the cause, it is necessary to collect performance data from each network segment for quality localization. However, current independent management of network domains prevents direct data correlation. 
The network segments are as follows: N1 (terminal device to ONT), N2 (ONT to BRAS), and N3 (BRAS to application side).</t>
      <figure anchor="fig-2">
        <name>Network schematic diagram based on home broadband network access application</name>
        <artwork><![CDATA[
  +-----------------+              +--------------+             +----------------+            +--------------+
  | Terminal device |--------------|      ONT     |-------------|      BRAS      |------------|    APP       |
  +-----------------+              +--------------+             +----------------+            +--------------+
           |<--------------------------->|<---------------------------->|<--------------------------->|
                        N1                             N2                            N3
]]></artwork>
      </figure>
      <t>The end-to-end monitoring capabilities of the platform enable comprehensive data correlation and analysis, allowing for precise localization of issues and significantly enhancing the efficiency and effectiveness of network quality management.
By leveraging an IPv6 end-to-end network monitoring and analysis platform, we collected latency and packet loss data from N1, N2, and N3 network segments. The platform applies a metric model to precisely identify quality issues.
The analysis revealed that the congestion in the critical path of N3 was the root cause of the problem.
Specifically, the CDN content scheduling was switched from a local server to a remote server, which resulted in the transmission path requiring cross-network scheduling.
Due to the high latency and packet loss rate of the inter-network links, the end-to-end latency and packet loss rate increased significantly.</t>
      <section anchor="home-terminals-and-router-traffic-analysis">
        <name>Home terminals and router Traffic Analysis</name>
        <t>Home terminals and routers, as the "last kilometer" for users to access the Internet, play a crucial role in user experience with regard to their IPv6 support.
Take a popular video application as an example. It has a large number of users in both mobile and home network environments. Within the statistical time period, the proportion of IPv6 traffic generated by mobile network users in the application is much higher than that of home network users. After a systematic analysis from multiple dimensions including the user side, network side, and application side, it was found that the IPv6 support of home terminals is insufficient.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The monitoring system must implement:
- Role-based access control
- Anonymization of user-specific data
- Secure data transmission protocols
- Integrity verification for collected metrics</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9386" target="https://www.rfc-editor.org/info/rfc9386" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9386.xml">
          <front>
            <title>IPv6 Deployment Status</title>
            <author fullname="G. Fioccola" initials="G." surname="Fioccola"/>
            <author fullname="P. Volpato" initials="P." surname="Volpato"/>
            <author fullname="J. Palet Martinez" initials="J." surname="Palet Martinez"/>
            <author fullname="G. Mishra" initials="G." surname="Mishra"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>This document provides an overview of the status of IPv6 deployment in 2022. Specifically, it looks at the degree of adoption of IPv6 in the industry, analyzes the remaining challenges, and proposes further investigations in areas where the industry has not yet taken a clear and unified approach in the transition to IPv6. It obsoletes RFC 6036.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9386"/>
          <seriesInfo name="DOI" value="10.17487/RFC9386"/>
        </reference>
        <reference anchor="RFC7707" target="https://www.rfc-editor.org/info/rfc7707" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7707.xml">
          <front>
            <title>Network Reconnaissance in IPv6 Networks</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="T. Chown" initials="T." surname="Chown"/>
            <date month="March" year="2016"/>
            <abstract>
              <t>IPv6 offers a much larger address space than that of its IPv4 counterpart. An IPv6 subnet of size /64 can (in theory) accommodate approximately 1.844 * 10^19 hosts, thus resulting in a much lower host density (#hosts/#addresses) than is typical in IPv4 networks, where a site typically has 65,000 or fewer unique addresses. As a result, it is widely assumed that it would take a tremendous effort to perform address-scanning attacks against IPv6 networks; therefore, IPv6 address-scanning attacks have been considered unfeasible. This document formally obsoletes RFC 5157, which first discussed this assumption, by providing further analysis on how traditional address-scanning techniques apply to IPv6 networks and exploring some additional techniques that can be employed for IPv6 network reconnaissance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7707"/>
          <seriesInfo name="DOI" value="10.17487/RFC7707"/>
        </reference>
        <reference anchor="RFC9099" target="https://www.rfc-editor.org/info/rfc9099" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9099.xml">
          <front>
            <title>Operational Security Considerations for IPv6 Networks</title>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="K. Chittimaneni" initials="K." surname="Chittimaneni"/>
            <author fullname="M. Kaeo" initials="M." surname="Kaeo"/>
            <author fullname="E. Rey" initials="E." surname="Rey"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>Knowledge and experience on how to operate IPv4 networks securely is available, whether the operator is an Internet Service Provider (ISP) or an enterprise internal network. However, IPv6 presents some new security challenges. RFC 4942 describes security issues in the protocol, but network managers also need a more practical, operations-minded document to enumerate advantages and/or disadvantages of certain choices.</t>
              <t>This document analyzes the operational security issues associated with several types of networks and proposes technical and procedural mitigation techniques. This document is only applicable to managed networks, such as enterprise networks, service provider networks, or managed residential networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9099"/>
          <seriesInfo name="DOI" value="10.17487/RFC9099"/>
        </reference>
        <reference anchor="RFC9312" target="https://www.rfc-editor.org/info/rfc9312" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9312.xml">
          <front>
            <title>Manageability of the QUIC Transport Protocol</title>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document discusses manageability of the QUIC transport protocol and focuses on the implications of QUIC's design and wire image on network operations involving QUIC traffic. It is intended as a "user's manual" for the wire image to provide guidance for network operators and equipment vendors who rely on the use of transport-aware network functions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9312"/>
          <seriesInfo name="DOI" value="10.17487/RFC9312"/>
        </reference>
        <reference anchor="RFC9132" target="https://www.rfc-editor.org/info/rfc9132" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9132.xml">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document specifies the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel, a protocol for signaling the need for protection against Distributed Denial-of-Service (DDoS) attacks to a server capable of enabling network traffic mitigation on behalf of the requesting client.</t>
              <t>A companion document defines the DOTS data channel, a separate reliable communication layer for DOTS management and configuration purposes.</t>
              <t>This document obsoletes RFC 8782.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9132"/>
          <seriesInfo name="DOI" value="10.17487/RFC9132"/>
        </reference>
        <reference anchor="RFC3954" target="https://www.rfc-editor.org/info/rfc3954" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3954.xml">
          <front>
            <title>Cisco Systems NetFlow Services Export Version 9</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This document specifies the data export format for version 9 of Cisco Systems' NetFlow services, for use by implementations on the network elements and/or matching collector programs. The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3954"/>
          <seriesInfo name="DOI" value="10.17487/RFC3954"/>
        </reference>
        <reference anchor="RFC5130" target="https://www.rfc-editor.org/info/rfc5130" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5130.xml">
          <front>
            <title>A Policy Control Mechanism in IS-IS Using Administrative Tags</title>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="M. Shand" initials="M." role="editor" surname="Shand"/>
            <author fullname="C. Martin" initials="C." surname="Martin"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>This document describes an extension to the IS-IS protocol to add operational capabilities that allow for ease of management and control over IP prefix distribution within an IS-IS domain. This document enhances the IS-IS protocol by extending the information that an Intermediate System (IS) router can place in Link State Protocol (LSP) Data Units for policy use. This extension will provide operators with a mechanism to control IP prefix distribution throughout multi-level IS-IS domains. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5130"/>
          <seriesInfo name="DOI" value="10.17487/RFC5130"/>
        </reference>
        <reference anchor="RFC9232" target="https://www.rfc-editor.org/info/rfc9232" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9232.xml">
          <front>
            <title>Network Telemetry Framework</title>
            <author fullname="H. Song" initials="H." surname="Song"/>
            <author fullname="F. Qin" initials="F." surname="Qin"/>
            <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
            <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
            <author fullname="A. Wang" initials="A." surname="Wang"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9232"/>
          <seriesInfo name="DOI" value="10.17487/RFC9232"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
