<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fu-cats-oam-fw-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Computing-Aware Traffic Steering (CATS) Operations, Administration, and                     Maintenance (OAM) Framework ">Computing-Aware Traffic Steering (CATS) Operations, Administration, and Maintenance (OAM) Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-fu-cats-oam-fw-05"/>
    <author initials="H." surname="Fu" fullname="Huakai Fu">
      <organization>ZTE Corporation</organization>
      <address>
        <email>fu.huakai@zte.com.cn</email>
      </address>
    </author>
    <author initials="Q." surname="Xiong" fullname="Quan Xiong">
      <organization>ZTE Corporation</organization>
      <address>
        <email>xiong.quan@zte.com.cn</email>
      </address>
    </author>
    <author initials="B." surname="Liu" fullname="Bo Liu">
      <organization>China Mobile</organization>
      <address>
        <email>liubo@chinamobile.com</email>
      </address>
    </author>
    <author initials="Z." surname="Li" fullname="Zhenqiang Li">
      <organization>China Mobile</organization>
      <address>
        <email>lizhenqiang@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="27"/>
    <workgroup>CATS</workgroup>
    <abstract>
      <?line 54?>

<t>This document describes the Operations, Administration, and Maintenance (OAM) framework and requirements for Computing-Aware Traffic Steering (CATS). The framework defines the CATS OAM layering model and functional components. It also specifies the requirements to enable fault management and performance monitoring for CATS end-to-end connections encompassing clients, network paths, and service instances.</t>
    </abstract>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As described in <xref target="I-D.ietf-cats-usecases-requirements"/>, edge computing provides lower response time and higher transmission rate than cloud computing by moving computing resources to the network edge. To meet the requirements of users that are highly distributive, service providers deploy the same type of service instances at multiple edge sites, which involves steering traffic from clients to the most appropriate computing instance.</t>
      <t>Computing-Aware Traffic Steering (CATS) <xref target="I-D.ldbc-cats-framework"/> provides a traffic engineering approach <xref target="I-D.ietf-teas-rfc3272bis"/> that incorporates the dynamic states of both computing and network resources to optimize service instance selection. While such policies rely on multi-dimensional metrics to achieve service assurance, existing network-centric OAM technologies are insufficient as they focus solely on infrastructure-layer maintenance and fail to provide end-to-end visibility from the client to the service instance. Consequently, a dedicated CATS OAM framework is required to bridge the gap between network reachability and service availability, transforming CATS from a theoretical steering logic into a manageable, carrier-grade service capable of sustaining performance in distributed computing environments.</t>
      <t>To this end, and aligned with the architecture defined in <xref target="I-D.ldbc-cats-framework"/>, this document specifies the OAM framework and functional requirements for CATS. It establishes a layered OAM model and defines the necessary functional components to monitor the system. Furthermore, it outlines the requirements for fault management and performance monitoring across the entire CATS service chain, covering the connection from the client through the network to the final service instance.</t>
    </section>
    <section anchor="Language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
   capitals, as shown here.</t>
    </section>
    <section anchor="Terminology">
      <name>Terminology</name>
      <t>This document makes use of the terms defined in [I-D.ietf-cats-
   framework].</t>
      <ul spacing="normal">
        <li>
          <t>FM: Fault Management.</t>
        </li>
        <li>
          <t>PM: Performance Monitoring.</t>
        </li>
        <li>
          <t>SI-OAM: Service Instance OAM.</t>
        </li>
        <li>
          <t>SVC-OAM: Service OAM.</t>
        </li>
      </ul>
    </section>
    <section anchor="Motivation">
      <name>Motivation and Problem Statement</name>
      <t>Existing Operations, Administration, and Maintenance (OAM) mechanisms, such as those defined in <xref target="RFC7276"/>, are primarily optimized for network-layer connectivity verification and path-level performance monitoring. However, the emergence of Computing-Aware Traffic Steering (CATS) <xref target="I-D.ldbc-cats-framework"/> introduces a multidimensional decision-making process. This necessitates an OAM framework capable of perceiving both network transport characteristics and service-level operational capabilities.</t>
      <t>The primary objective of a CATS-specific OAM framework is to ensure that traffic steering decisions are aligned with the real-time operational status of distributed computing resources. This is critical to preventing "service black-holing," a condition where traffic is steered to a service instance that remains reachable at the network layer but is functionally unresponsive or degraded at the application level.</t>
      <t>In the absence of a dedicated OAM framework for CATS, several critical gaps persist:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Reachability without Serviceability</strong>：Traditional network-layer OAM protocols (e.g., Bidirectional Forwarding Detection (BFD) <xref target="RFC5880"/>, Internet Control Message Protocol(ICMP) <xref target="RFC4443"/>) verify the liveness of the routing path and the node's IP interface. They lack the granularity to detect the health of the service instance hosted on that node. Consequently, a CATS Path Selector (C-PS) may continue to steer traffic to a node where the application process has crashed, deadlocked, or exceeded its resource limits, despite the node remaining network-reachable.</t>
        </li>
        <li>
          <t><strong>Temporal Staleness of Computing Metrics</strong>:Computing metrics (e.g., CPU utilization, active thread counts, and task queue depths) exhibit significantly higher volatility compared to network topology changes. Standard control-plane advertisement or polling mechanisms often lack the necessary frequency to capture these micro-bursts, resulting in "stale" telemetry. This synchronization latency leads to sub-optimal steering decisions, potential traffic flapping, and inconsistent client experiences.</t>
        </li>
        <li>
          <t><strong>Lack of Cross-Layer Fault Demarcation</strong>：When end-to-end (E2E) service degradation occurs (e.g., increased response latency), current OAM tools cannot natively distinguish between network-induced bottlenecks (e.g., path congestion) and compute-induced bottlenecks (e.g., resource exhaustion at the SI). This ambiguity hampers rapid fault localization, significantly increases the Mean Time to Repair (MTTR), and complicates Service Level Agreement (SLA) enforcement in multi-domain or multi-vendor environments.</t>
        </li>
        <li>
          <t><strong>Incommensurability of Heterogeneous Metrics</strong>: Since network metrics (e.g., one-way delay, jitter, packet loss) and computing metrics (e.g., instructions per second, memory watermark) characterize distinct dimensions of service delivery, they are often collected via disjoint protocols and lack unified correlation mechanisms, such as high-precision synchronized timestamps. Without a consolidated OAM framework to harmonize these data points, the CATS Path Selector (C-PS) cannot accurately calculate the composite cost, defined as C_{total} = f(C_{network}, C_{computing}), thereby undermining the deterministic nature of path computation and steering efficiency.</t>
        </li>
      </ul>
    </section>
    <section anchor="Framework">
      <name>CATS OAM Framework</name>
      <section anchor="cats-oam-layering-model">
        <name>CATS OAM Layering Model</name>
        <t>The CATS OAM hierarchical model leverages the principles of Maintenance Domain (MD) levels, as defined in IEEE 802.1ag and ITU-T Y.1731, to extend traditional connectivity and performance management into the computing domain. This framework enables CATS-Forwarders and underlying network nodes to perform integrated anomaly detection and performance monitoring.</t>
        <t>Based on the scope of awareness and functional granularity, the CATS OAM mechanisms are organized into four distinct layers: Link OAM, Path OAM, Instance OAM, and Service OAM. The architecture is illustrated in Figure 1.</t>
        <artwork><![CDATA[
      +------+ +--+--------+    +---+----+   +--------+--+ +--------+
      |client+-+  CATS-    +----+underlay+---+  CATS-    +-+service |
      |      | |Forwarder 1|    |  node  |   |Forwarder 2| |instance|
      +------+ +-----------+    +--------+   +-----------+ +----+---+
               o-------------------- Service OAM -------------------o

                                             o---- Instance OAM ----o

               o------------- Path OAM -----------o

                          o----o         o----o       o----o Link OAM

              Figure 1: CATS OAM Layering Model
]]></artwork>
        <ul spacing="normal">
          <li>
            <t><strong>Link OAM</strong>: This layer is directed at the detection of physical links or single-hop IP interfaces, representing the foundational underlay infrastructure in CATS framework <xref target="I-D.ldbc-cats-framework"/>. It encompasses both the internal links within the operator's infrastructure and the external interfaces interconnecting the network and computing domains. The primary objective is to monitor the operational status between two adjacent devices to ensure fundamental IP reachability. The existing detection tools include IEEE 802.3ah, ICMP <xref target="RFC4443"/>, and single-hop BFD <xref target="RFC5881"/>.</t>
          </li>
          <li>
            <t><strong>Path OAM</strong>: This layer focuses on the monitoring of transport paths between an ingress CATS-Forwarder and an egress CATS-Forwarder in CATS framework <xref target="I-D.ldbc-cats-framework"/>. As an aggregate transport path typically carries multiple services, Path OAM is critical for ensuring that network-layer faults or resource contention from traffic multiplexing do not degrade specific service performance. Fault detection and performance monitoring are executed at the Label Switched Path (LSP) or Segment Routing (SR) path layer <xref target="RFC8402"/> to facilitate rapid service protection. The existing detection mechanisms include ITU-T Y.1711, MPLS Loss and Delay Measurement (LM-DM) <xref target="RFC6374"/>, and BFD for LSP.</t>
          </li>
          <li>
            <t><strong>Instance OAM</strong>: This layer is dedicated to the monitoring of status of computing resource and the operational health of service instances in CATS framework <xref target="I-D.ldbc-cats-framework"/>. The metrics collected at this layer, such as CPU load and memory availability, are defined in <xref target="I-D.ietf-cats-metric-definition"/>. Monitoring mechanisms MUST support flexible implementation modes, including a "Push" mode, where computing nodes report dynamic load status in real-time, and a "Pull" mode, where the egress CATS-Forwarder proactively retrieves computing metrics by extending the existing OAM mechanisms.</t>
          </li>
          <li>
            <t><strong>Service OAM</strong>: This layer provides either end-to-end or segmented visibility into the connectivity and performance between the Ingress CATS-Forwarder and the target Service Instance (SI), as defined in the CATS framework <xref target="I-D.ldbc-cats-framework"/>. Beyond basic reachability verification, SVC-OAM is responsible for monitoring service-specific liveness, transaction success rates, and application-layer latency to ensure consistent end-to-end Quality of Experience (QoE). The supported detection mechanisms include, but are not limited to, the Two-Way Active Measurement Protocol (TWAMP) <xref target="RFC5357"/>, application-aware probing, and HTTP-based health checks, with extensibility to accommodate emerging application-specific requirements.</t>
          </li>
        </ul>
      </section>
      <section anchor="cats-oam-components">
        <name>CATS OAM Components</name>
        <t>In accordance with Section 5.2 of the CATS framework<xref target="I-D.ldbc-cats-framework"/>, the CATS OAM layering model is designed to flexibly accommodate diverse OAM detection mechanisms. Consequently, this document proposes the following two new components including SI-OAM, and SVC-OAM as Figure 2 shown.</t>
        <artwork><![CDATA[
      +------+ +--+--------+    +---+----+   +--------+--+ +--------+
      |client+-+  CATS-    +----+underlay+---+  CATS-    +-+service |
      |      | |Forwarder 1|    |  node  |   |Forwarder 2| |instance|
      +------+ +-----------+    +--------+   +-----------+ +----+---+
                  ^                                   ^         |
                  |                                   |         |
                  |                               +---+----+    |
                  |                               | SI_OAM |<-->|
               +--+-----+                         +--------+    |
               | SVC_OAM |<------------------------------------->|
               +--+-----+                                       |
    


             Figure 2: CATS OAM Functional Components
]]></artwork>
        <section anchor="si-oam-component">
          <name>SI-OAM Component</name>
          <t>The SI-OAM component is responsible for monitoring the operational status and computing capabilities of individual service instances. It facilitates the granular perception of service instances availability and performance. Its key functions include:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Status Monitoring</strong>: The mechanism for periodically verifying the availability and operational state (e.g., active, inactive, or maintenance mode) of a specific service instance. This process is executed between an Egress CATS-Forwarder and its associated service instance to ensure real-time reachability and prevent traffic from being steered to an unavailable or degraded target.</t>
            </li>
            <li>
              <t><strong>Computing Metric Collection</strong>: The process of gathering real-time computing resource telemetry from the service instance or its hosting environment. Relevant metrics include, but are not limited to, processing capacity, memory watermark, and internal queuing delay, which characterize the instantaneous capability of the instance.</t>
            </li>
            <li>
              <t><strong>Metric Reporting</strong>: The capability to provide normalized computing telemetry to the CATS Service Metric Agent (C-SMA). This function ensures that raw resource data is translated into a consistent format to support the dynamic update of computing-aware traffic steering policies within the CATS control plane.</t>
            </li>
          </ul>
        </section>
        <section anchor="srv-oam-component">
          <name>SRV-OAM Component</name>
          <t>The SVC-OAM component provides end-to-end (E2E) visibility and performance assessment for a CATS service across the entire delivery path, originating from an Ingress CATS-Forwarder to the target service instances. Its key functions include:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Policy Verification</strong>: Ensuring that the actual traffic forwarding path from the Ingress CATS-Router to the selected Service Instance aligns with the steering decisions made by the CATS Path Selector (C-PS).</t>
            </li>
            <li>
              <t><strong>Joint Performance Measurement</strong>: Measuring E2E performance metrics, such as total latency (the sum of network transport time and service processing time) and jitter, to verify Service Level Agreement (SLA) compliance.</t>
            </li>
            <li>
              <t><strong>Multi-Domain Fault Isolation</strong>: Correlating Link OAM, Path OAM, Instance OAM, and Service OAM to differentiate whether service degradation is caused by network congestion or computing resource exhaustion.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="Requirements">
      <name>CATS OAM Requirements</name>
      <t>This section specifies the OAM requirements for CATS, adhering to the operational and management guidelines defined in <xref target="I-D.draft-opsarea-rfc5706bis"/>. CATS OAM must bridge the gap between traditional network connectivity checks and the awareness of computing resource availability.</t>
      <section anchor="operation">
        <name>Operation</name>
        <t>The operational layer is responsible for generating and collecting metrics, as well as the real-time reporting of the combined network and computing status.</t>
        <ul spacing="normal">
          <li>
            <t>O-REQ-1: Multi-Dimensional Status Awareness. The system MUST support the collection of both network metrics (latency, jitter, packet loss) and computing metrics ( e.g., processing capacity, load, and availability) defined in <xref target="I-D.ietf-cats-metric-definition"/>. To balance precision and control plane overhead, the system SHOULD support both periodic and threshold-triggered reporting.</t>
          </li>
          <li>
            <t>O-REQ-2: Service ID and Location Mapping. The OAM component MUST maintain the binding between a Service ID (representing the service instance) and its specific network location (Egress CATS-Forwarder). OAM probes MUST be able to target specific service instances to verify that the traffic steering policy correctly reaches the intended destination.</t>
          </li>
          <li>
            <t>O-REQ-3: Telemetry Integration with C-SMA. All collected computing metrics SHOULD be reported to the CATS Service Metric Agent (C-SMA). This ensures that the CATS Path Selector (C-PS) has access to synchronized telemetry to perform real-time path computation and selection.</t>
          </li>
        </ul>
      </section>
      <section anchor="administration">
        <name>Administration</name>
        <t>The administrative layer focuses on policy definition, security boundaries, and the configuration of steering behaviors.</t>
        <ul spacing="normal">
          <li>
            <t>A-REQ-1: Policy-Based Steering Configuration. The system MUST allow administrators to define CATS-specific policies, such as weighting factors for network vs. computing metrics. These policies dictate how the C-PS interprets raw telemetry when calculating the "best" service instance.</t>
          </li>
          <li>
            <t>A-REQ-2: Differentiated Monitoring Intensity. Based on the Service Level Agreement (SLA), the system SHOULD support variable OAM intensities. High-priority services (e.g., autonomous driving or remote surgery) may require millisecond-level BFD-like monitoring, while standard web services use lower-frequency heartbeats.</t>
          </li>
          <li>
            <t>A-REQ-3: Security and Metric Integrity. Reporting of computing and network metrics MUST be protected via encryption and authentication. This prevents malicious actors from injecting "fake" high-performance metrics to attract and intercept traffic (sinkhole attacks) or triggering oscillations in the CATS-Forwarder.</t>
          </li>
        </ul>
      </section>
      <section anchor="maintenance">
        <name>Maintenance</name>
        <t>The maintenance layer focuses on fault isolation, performance backtracking, and ensuring the consistency of the steering state.</t>
        <ul spacing="normal">
          <li>
            <t>M-REQ-1: Joint Fault Demarcation. The system MUST be able to distinguish whether a service failure is caused by a network-layer issue (e.g., connectivity loss between CATS-Forwarders) or computing resource exhaustion at the Service Instance. This requires the correlation of multi-layer OAM data, including Link OAM, Path OAM, Instance OAM, and Service OAM, to accurately isolate the fault domain.</t>
          </li>
          <li>
            <t>M-REQ-2: Historical Traceability. The OAM system SHOULD record historical snapshots of both network paths and computing status. This is critical for post-mortem analysis of "flapping" steering decisions where traffic frequently oscillates between different service instances.</t>
          </li>
          <li>
            <t>M-REQ-3: Forwarding Plane Consistency Check. The system MUST provide mechanisms to verify that the actual traffic path taken by a packet matches the decision made by the C-PS. Any inconsistency between the intended steering policy and the actual forwarding state MUST trigger an immediate alarm and re-synchronization.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>To be discussed in future versions of this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>To be added upon contributions, comments and suggestions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
            <author fullname="B. Decraene" initials="B." surname="Decraene"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="R. Shakir" initials="R." surname="Shakir"/>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC7276">
          <front>
            <title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="N. Sprecher" initials="N." surname="Sprecher"/>
            <author fullname="E. Bellagamba" initials="E." surname="Bellagamba"/>
            <author fullname="Y. Weingarten" initials="Y." surname="Weingarten"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over the years, various OAM tools have been defined for various layers in the protocol stack.</t>
              <t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t>
              <t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools defined in the IETF. At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7276"/>
          <seriesInfo name="DOI" value="10.17487/RFC7276"/>
        </reference>
        <reference anchor="RFC9378">
          <front>
            <title>In Situ Operations, Administration, and Maintenance (IOAM) Deployment</title>
            <author fullname="F. Brockners" initials="F." role="editor" surname="Brockners"/>
            <author fullname="S. Bhandari" initials="S." role="editor" surname="Bhandari"/>
            <author fullname="D. Bernier" initials="D." surname="Bernier"/>
            <author fullname="T. Mizrahi" initials="T." role="editor" surname="Mizrahi"/>
            <date month="April" year="2023"/>
            <abstract>
              <t>In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document provides a framework for IOAM deployment and provides IOAM deployment considerations and guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9378"/>
          <seriesInfo name="DOI" value="10.17487/RFC9378"/>
        </reference>
        <reference anchor="RFC4656">
          <front>
            <title>A One-way Active Measurement Protocol (OWAMP)</title>
            <author fullname="S. Shalunov" initials="S." surname="Shalunov"/>
            <author fullname="B. Teitelbaum" initials="B." surname="Teitelbaum"/>
            <author fullname="A. Karp" initials="A." surname="Karp"/>
            <author fullname="J. Boote" initials="J." surname="Boote"/>
            <author fullname="M. Zekauskas" initials="M." surname="Zekauskas"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>The One-Way Active Measurement Protocol (OWAMP) measures unidirectional characteristics such as one-way delay and one-way loss. High-precision measurement of these one-way IP performance metrics became possible with wider availability of good time sources (such as GPS and CDMA). OWAMP enables the interoperability of these measurements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4656"/>
          <seriesInfo name="DOI" value="10.17487/RFC4656"/>
        </reference>
        <reference anchor="I-D.ldbc-cats-framework">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Zongpeng Du" initials="Z." surname="Du">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="John Drake" initials="J." surname="Drake">
              <organization>Juniper Networks, Inc.</organization>
            </author>
            <date day="8" month="February" year="2024"/>
            <abstract>
              <t>   This document describes a framework for Computing-Aware Traffic
   Steering (CATS).  Particularly, the document identifies a set of CATS
   components, describes their interactions, and exemplifies the
   workflow of the control and data planes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ldbc-cats-framework-06"/>
        </reference>
        <reference anchor="I-D.draft-opsarea-rfc5706bis">
          <front>
            <title>Guidelines for Considering Operations and Management in IETF Specifications</title>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Everything OPS</organization>
            </author>
            <author fullname="Joe Clarke" initials="J." surname="Clarke">
              <organization>Cisco</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
              <organization>Blue Fern Consulting</organization>
            </author>
            <author fullname="Ran Chen" initials="R." surname="Chen">
              <organization>ZTE</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   New Protocols or Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage them.
   Retrofitting operations and management considerations is suboptimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when defining New Protocols or Protocol Extensions.

   This document obsoletes RFC 5706, replacing it completely and
   updating it with new operational and management techniques and
   mechanisms.  It also introduces a requirement to include an
   "Operational Considerations" section in new RFCs in the IETF Stream.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-opsarea-rfc5706bis-06"/>
        </reference>
        <reference anchor="I-D.ietf-cats-metric-definition">
          <front>
            <title>CATS Metrics Definition</title>
            <author fullname="Kehan Yao" initials="K." surname="Yao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Cheng Li" initials="C." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Jordi Ros-Giralt" initials="J." surname="Ros-Giralt">
              <organization>Qualcomm Europe, Inc.</organization>
            </author>
            <author fullname="Hang Shi" initials="H." surname="Shi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   Computing-Aware Traffic Steering (CATS) is a traffic engineering
   approach that optimizes the steering of traffic to a given service
   instance by considering the dynamic nature of computing and network
   resources.  In order to consider the computing and network resources,
   a system needs to share information (metrics) that describes the
   state of the resources.  Metrics from network domain have been in use
   in network systems for a long time.  This document defines a set of
   metrics from the computing domain used for CATS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cats-metric-definition-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-cats-usecases-requirements">
          <front>
            <title>Computing-Aware Traffic Steering (CATS) Problem Statement, Use Cases, and Requirements</title>
            <author fullname="Kehan Yao" initials="K." surname="Yao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Hang Shi" initials="H." surname="Shi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Shuai Zhang" initials="S." surname="Zhang">
              <organization>China Unicom</organization>
            </author>
            <author fullname="Qing An" initials="Q." surname="An">
              <organization>Alibaba Group</organization>
            </author>
            <date day="12" month="January" year="2026"/>
            <abstract>
              <t>   Distributed computing is a computing pattern that service providers
   can follow and use to achieve better service response time and
   optimized energy consumption.  In such a distributed computing
   environment, compute intensive and delay sensitive services can be
   improved by utilizing computing resources hosted in various computing
   facilities.  Ideally, compute services are balanced across servers
   and network resources to enable higher throughput and lower response
   time.  To achieve this, the choice of server and network resources
   should consider metrics that are oriented towards compute
   capabilities and resources instead of simply dispatching the service
   requests in a static way or optimizing solely on connectivity
   metrics.  The process of selecting servers or service instance
   locations, and of directing traffic to them on chosen network
   resources is called "Computing-Aware Traffic Steering" (CATS).

   This document provides the problem statement and the typical
   scenarios for CATS, which shows the necessity of considering more
   factors when steering traffic to the appropriate computing resource
   to better meet the customer's expectations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cats-usecases-requirements-12"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc3272bis">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <date day="12" month="August" year="2023"/>
            <abstract>
              <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc3272bis-27"/>
        </reference>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC5880">
          <front>
            <title>Bidirectional Forwarding Detection (BFD)</title>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes a protocol intended to detect faults in the bidirectional path between two forwarding engines, including interfaces, data link(s), and to the extent possible the forwarding engines themselves, with potentially very low latency. It operates independently of media, data protocols, and routing protocols. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5880"/>
          <seriesInfo name="DOI" value="10.17487/RFC5880"/>
        </reference>
        <reference anchor="RFC5881">
          <front>
            <title>Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)</title>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="D. Ward" initials="D." surname="Ward"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes the use of the Bidirectional Forwarding Detection (BFD) protocol over IPv4 and IPv6 for single IP hops. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5881"/>
          <seriesInfo name="DOI" value="10.17487/RFC5881"/>
        </reference>
        <reference anchor="RFC6374">
          <front>
            <title>Packet Loss and Delay Measurement for MPLS Networks</title>
            <author fullname="D. Frost" initials="D." surname="Frost"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>Many service provider service level agreements (SLAs) depend on the ability to measure and monitor performance metrics for packet loss and one-way and two-way delay, as well as related metrics such as delay variation and channel throughput. This measurement capability also provides operators with greater visibility into the performance characteristics of their networks, thereby facilitating planning, troubleshooting, and network performance evaluation. This document specifies protocol mechanisms to enable the efficient and accurate measurement of these performance metrics in MPLS networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6374"/>
          <seriesInfo name="DOI" value="10.17487/RFC6374"/>
        </reference>
        <reference anchor="RFC5357">
          <front>
            <title>A Two-Way Active Measurement Protocol (TWAMP)</title>
            <author fullname="K. Hedayat" initials="K." surname="Hedayat"/>
            <author fullname="R. Krzanowski" initials="R." surname="Krzanowski"/>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <author fullname="K. Yum" initials="K." surname="Yum"/>
            <author fullname="J. Babiarz" initials="J." surname="Babiarz"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>The One-way Active Measurement Protocol (OWAMP), specified in RFC 4656, provides a common protocol for measuring one-way metrics between network devices. OWAMP can be used bi-directionally to measure one-way metrics in both directions between two network elements. However, it does not accommodate round-trip or two-way measurements. This memo specifies a Two-Way Active Measurement Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip measurement capabilities. The TWAMP measurement architecture is usually comprised of two hosts with specific roles, and this allows for some protocol simplifications, making it an attractive alternative in some circumstances. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5357"/>
          <seriesInfo name="DOI" value="10.17487/RFC5357"/>
        </reference>
      </references>
    </references>
    <?line 211?>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
    <contact initials="D." surname="Huang" fullname="Daniel Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <email>huang.guangping@zte.com.cn</email>
      </address>
    </contact>
    <contact initials="C." surname="Huang" fullname="Cheng Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <email>huang.cheng13@zte.com.cn</email>
      </address>
    </contact>
    <contact initials="W." surname="Duan" fullname="Wei Duan">
      <organization>ZTE Corporation</organization>
      <address>
        <email>duan.wei1@zte.com.cn</email>
      </address>
    </contact>   

    </section>


  </back>
  <!-- ##markdown-source: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-->

</rfc>
