<?xml version='1.0' encoding='UTF-8'?>

<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="exp" docName="draft-ietf-6man-comp-rtg-hdr-10" number="9631" consensus="true" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="true" version="3">
  <front>
    <title abbrev="IPv6 Compact Routing Header">The IPv6 Compact Routing
    Header (CRH)</title>
    <seriesInfo name="RFC" value="9631"/>
    <author fullname="Ron Bonica" initials="R." surname="Bonica">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <street>2251 Corporate Park Drive</street>
          <city>Herndon</city>
          <code>20171</code>
          <region>VA</region>
          <country>United States of America</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <author fullname="Yuji Kamite" initials="Y. " surname="Kamite">
      <organization>NTT Communications Corporation</organization>
      <address>
        <postal>
          <street>3-4-1 Shibaura, Minato-ku</street>
          <region>Tokyo</region>
          <code>108-8118</code>
          <country>Japan</country>
        </postal>
        <email>y.kamite@ntt.com</email>
      </address>
    </author>
    <author fullname="Andrew Alston" initials="A." surname="Alston">
      <organization>Alston Networks</organization>
      <address>
        <postal>
          <city>Nairobi</city>
          <country>Kenya</country>
        </postal>
        <email>aa@alstonnetworks.net</email>
      </address>
    </author>
    <author fullname="Daniam Henriques" initials="D." surname="Henriques">
      <organization>Liquid Telecom</organization>
      <address>
        <postal>
          <city>Johannesburg</city>
          <country>South Africa</country>
        </postal>
        <email>daniam.henriques@liquidtelecom.com</email>
      </address>
    </author>
    <author fullname="Luay Jalil" initials="L." surname="Jalil">
      <organization>Verizon</organization>
      <address>
        <postal>
          <city>Richardson</city>
          <region>TX</region>
          <country>United States of America</country>
        </postal>
        <email>luay.jalil@one.verizon.com</email>
      </address>
    </author>
    <date month="August" year="2024"/>
    <area>INT</area>
    <workgroup>6man</workgroup>
    <keyword>IPv6</keyword>
    <keyword>Routing header</keyword>
    <abstract>
      <t>This document describes an experiment in which two new IPv6 Routing
      headers are implemented and deployed. Collectively, they are called the
      Compact Routing Header (CRH). Individually, they are called CRH-16 and
      CRH-32.</t>
      <t>One purpose of this experiment is to demonstrate that the CRH can be
      implemented and deployed in a production network. Another purpose is to
      demonstrate that the security considerations described in this
      document can be addressed with Access Control Lists (ACLs). Finally, this
      document encourages replication of the experiment.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="Intro" numbered="true" toc="default">
      <name>Introduction</name>
      <t>IPv6 <xref target="RFC8200" format="default"></xref> source nodes use Routing headers
      to specify the path that a packet takes to its destination(s). The IETF has
      defined several Routing Types; see <xref target="IANA-RT" format="default"></xref>. This
      document defines two new Routing Types. Collectively, they are
      called the Compact Routing Header (CRH). Individually, they are called
      CRH-16 and CRH-32.</t>
      <t>The CRH allows IPv6 source nodes to specify the path that a packet
      takes to its destination. The CRH can be encoded in relatively few
      bytes. The following are reasons for encoding the CRH in as few bytes as
      possible:</t>
      <ul spacing="normal">

        <li>
          <t> Many forwarders based on Application-Specific Integrated
          Circuits (ASICs) copy headers from buffer memory to on-chip
          memory. As header sizes increase, so does the cost of this copy.</t>
        </li>
        <li>
          <t>Because Path MTU Discovery (PMTUD) <xref target="RFC8201"
          format="default"></xref> is not entirely reliable, many IPv6 hosts
          refrain from sending packets larger than the IPv6 minimum link MTU
          (i.e., 1280 bytes).  When packets are small, the overhead imposed by
          large Routing headers is excessive.</t>
        </li>
      </ul>
      <t>This document describes an experiment with the following purposes:</t>
      <ul spacing="normal">
        <li>
          <t>To demonstrate that the CRH can be implemented and deployed</t>
        </li>
        <li>
          <t>To demonstrate that the security considerations described in
          this document can be addressed with ACLs</t>
        </li>
        <li>
          <t>To encourage replication of the experiment</t>
        </li>
      </ul>
    </section>
    <section anchor="ReqLang" numbered="true" toc="default">
      <name>Requirements Language</name>
        <t>
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
    NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
    </section>
    <section numbered="true" toc="default">
      <name>The Compact Routing Header (CRH)</name>
      <t>Both CRH versions (i.e., CRH-16 and CRH-32) contain the following
      fields:</t>
      <ul spacing="normal">
          <li>Next Header, as defined in <xref target="RFC8200"
          format="default"/></li>
          <li>Hdr Ext Len, as defined in <xref target="RFC8200"
          format="default"/></li>
          <li>Routing Type, as defined in <xref target="RFC8200"
          format="default"/> (CRH-16 value is 5, and CRH-32 value is 6.)</li>
          <li>Segments Left, as defined in <xref target="RFC8200"
          format="default"/></li>
          <li>type-specific data, as described in <xref target="RFC8200" format="default"/></li>
      </ul>
      <t>In the CRH, the type-specific data field contains a list of CRH Segment
      Identifiers (CRH SIDs). Each CRH SID identifies an entry in the CRH Forwarding Information Base (CRH-FIB) (<xref target="crh-fib" format="default"></xref>). Each
      CRH-FIB entry identifies an interface on the path that the packet takes
      to its destination.</t>
      <t>CRH SIDs are listed in reverse order. So, the first CRH SID in the list
      represents the final interface in the path. Because CRH SIDs are listed
      in reverse order, the Segments Left field can be used as an index into
      the CRH SID list. In this document, the "current CRH SID" is the CRH SID list entry
      referenced by the Segments Left field.</t>
      <t>The first CRH SID in the path is omitted from the list unless there
      is some reason to preserve it. See <xref target="Examples"
      format="default"> </xref> for an example.</t>
      <t>In the CRH-16 (<xref target="CRHFig16" format="default"></xref>),
      each CRH SID is encoded in 16 bits. In the CRH-32 (<xref
      target="CRHFig32" format="default"></xref>), each CRH SID is encoded in
      32 bits.</t>
      <t>In all cases, the CRH <bcp14>MUST</bcp14> end on a 64-bit boundary. So, the type-specific data field <bcp14>MUST</bcp14> be padded with zeros if the CRH would otherwise
      not end on a 64-bit boundary.</t>
      <figure anchor="CRHFig16">
        <name>CRH-16</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |  Next Header  |  Hdr Ext Len  | Routing Type  | Segments Left |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |             SID[0]            |          SID[1]               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
  |                          .........
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
]]></artwork>
      </figure>
      <figure anchor="CRHFig32">
        <name>CRH-32</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |  Next Header  |  Hdr Ext Len  | Routing Type  | Segments Left |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  +                             SID[0]                            +
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  +                             SID[1]                            +
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                          .........
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-  
]]></artwork>
      </figure>
    </section>
    <section anchor="crh-fib" numbered="true" toc="default">
      <name>The CRH  Forwarding Information Base (CRH-FIB)</name>
      <t>Each CRH SID identifies a CRH-FIB entry.</t>
      <t>Each CRH-FIB entry contains:</t>
      <ul spacing="normal">
        <li>
          <t>An IPv6 address</t>
        </li>
        <li>
          <t>A topological function</t>
        </li>
        <li>
          <t>Arguments for the topological function (optional)</t>
        </li>
      </ul>
      <t>The IPv6 address can be a Global Unicast Address (GUA), a Link-Local Unicast (LLU) address, or
      a Unique Local Address (ULA). When the IPv6 address is the final address in a path, it 
      can also be a multicast address.</t>
      <t>The topological function specifies how the processing node forwards
      the packet to the interface identified by the IPv6 address. The
      following are examples:</t>
      <ul spacing="normal">
        <li>
          <t>Forward the packet through the least-cost path to the interface
          identified by the IPv6 address (i.e., loose source routing).</t>
        </li>
        <li>
          <t>Forward the packet through a specified interface to the interface
          identified by the IPv6 address (i.e., strict source routing).</t>
        </li>
      </ul>
      <t>Some topological functions require parameters. For example, a
      topological function might require a parameter that identifies the
      interface through which the packet is forwarded.</t>
      <t>The CRH-FIB can be populated by:</t>
      <ul spacing="normal">
        <li>
          <t>An operator, using a Command Line Interface (CLI)</t>
        </li>
        <li>
          <t>A controller, using the Path
          Computation Element Communication Protocol (PCEP) <xref target="RFC5440" format="default"></xref> or
          the Network Configuration Protocol
          (NETCONF) <xref target="RFC6241" format="default"></xref></t>
        </li>
        <li>
          <t>A distributed routing protocol, such as those defined in <xref target="ISO10589-Second-Edition" format="default"/>, <xref target="RFC5340" format="default"/>, and <xref target="RFC4271" format="default"/></t>
        </li>
      </ul>
      <t>The above-mentioned mechanisms are not defined here and are beyond the scope of this document.</t>
    </section>
    <section numbered="true" toc="default">
      <name>Processing Rules</name>
      <t>The following rules describe CRH processing:</t>
      <ul spacing="normal">
        <li>
          <t>If Hdr Ext Len indicates that the CRH is larger than the
          implementation can process, discard the packet and send an ICMPv6
          <xref target="RFC4443" format="default"></xref> Parameter Problem,
          Code 0, message to the Source Address, pointing to the Hdr Ext Len
          field.</t>
        </li>
        <li>
          <t>Compute L, the minimum CRH length (<xref target="SLLeng" format="default">
            </xref>).</t>
        </li>
        <li>
          <t>If L is greater than Hdr Ext Len, discard the packet and send an
          ICMPv6 Parameter Problem, Code 6, message to the Source Address,
          pointing to the Segments Left field.</t>
        </li>
        <li>
          <t>Decrement Segments Left.</t>
        </li>
        <li>
          <t>Search for the current CRH SID in the CRH-FIB. In this document, the
          "current CRH SID" is the CRH SID list entry referenced by the Segments Left
          field.</t>
        </li>
        <li>
          <t>If the search does not return a CRH-FIB entry, discard the packet
          and send an ICMPv6 Parameter Problem, Code 0, message to the Source
          Address, pointing to the current SID.</t>
        </li>
        <li>
          <t>If Segments Left is greater than 0 and the CRH-FIB entry contains
          a multicast address, discard the packet and send an ICMPv6 Parameter
          Problem, Code 0, message to the Source Address, pointing to the
          current SID. (This prevents packet storms.)</t>
        </li>
        <li>
          <t>Copy the IPv6 address from the CRH-FIB entry to the Destination
          Address field in the IPv6 header.</t>
        </li>
        <li>
          <t>Submit the packet, its topological function, and its parameters to
          the IPv6 module.</t>
        </li>
      </ul>

      <aside><t>NOTE: By default, the IPv6 module determines the next hop and
      forwards the packet. However, the topological function may elicit
      another behavior. For example, the IPv6 module may forward the packet
      through a specified interface.</t>
      </aside>
      <section anchor="SLLeng" numbered="true" toc="default">
        <name>Computing Minimum CRH Length</name>
        <t>The algorithm described in this section accepts the following CRH
        fields as its input parameters:</t>
        <ul spacing="normal">
          <li>
            <t>Routing Type (i.e., CRH-16 or CRH-32)</t>
          </li>
          <li>
            <t>Segments Left</t>
          </li>
        </ul>
        <t>It yields L, the minimum CRH length. The minimum CRH length is
        measured in 8-octet units, not including the first 8 octets.</t>

        <sourcecode name="" type="pseudocode" markers="true"><![CDATA[
switch(Routing Type) {
    case CRH-16:
        if (Segments Left <= 2)
            return(0)
        sidsBeyondFirstWord = Segments Left - 2;
        sidPerWord = 4;
    case CRH-32:
        if (Segments Left <= 1)
            return(0)
        sidsBeyondFirstWord = Segments Left - 1;
        sidsPerWord = 2;
    case default:
        return(0xFF);
    }

words = sidsBeyondFirstWord div sidsPerWord;
if (sidsBeyondFirstWord mod sidsPerWord)
    words++;

return(words)
]]></sourcecode>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Mutability</name>
      <t>In the CRH, the Segments Left field is mutable. All remaining fields
      are immutable.</t>
    </section>
    <section numbered="true" toc="default">

      <name>Applications and CRH SIDs</name>
      <t>A CRH contains one or more CRH SIDs. Each CRH SID is processed by exactly one CRH-configured 
      router whose one address matches the packet Destination Address.</t>

      <t>Therefore, a CRH SID is not required to have domain-wide
      significance.  Applications can allocate CRH SIDs so that they have
      either domain-wide or node-local significance.</t>

    </section>
    <section numbered="true" toc="default">
      <name>Operational Considerations</name>
      <t>PING and Traceroute <xref target="RFC2151" format="default"></xref> both operate
      correctly in the presence of the CRH. TCPDUMP and Wireshark have been
      extended to support the CRH.</t>
      <t>PING and Traceroute report 16-bit CRH SIDs for CRH-16 and
    32-bit CRH SIDs for CRH-32.  It is recommended that the
    experimental versions of PING use the textual representations
    described in <xref target="TR" format="default"> </xref>.</t>
    </section>
    <section anchor="TR" numbered="true" toc="default">
      <name>Textual Representations</name>
      <t>A 16-bit CRH SID can be represented by four lowercase hexadecimal digits. Leading
      zeros <bcp14>SHOULD</bcp14> be omitted. However, the all-zeros CRH SID <bcp14>MUST</bcp14> be represented
      by a single 0. The following are examples:</t>
      <ul spacing="normal">
        <li>
          <t>beef</t>
        </li>
        <li>
          <t>eef</t>
        </li>
        <li>
          <t>0</t>
        </li>
      </ul>
      <t>A 16-bit CRH SID also can be represented in dotted-decimal notation. The
      following are examples:</t>
      <ul spacing="normal">
        <li>
          <t>192.0</t>
        </li>
        <li>
          <t>192.51</t>
        </li>
      </ul>
      <t>A 32-bit CRH SID can be represented by four lowercase hexadecimal digits, a colon
      (:), and another four lowercase hexadecimal digits. Leading zeros <bcp14>MUST</bcp14> be omitted.
      The following are examples:</t>
      <ul spacing="normal">
        <li>
          <t>dead:beef</t>
        </li>
        <li>
          <t>ead:eef</t>
        </li>
        <li>
          <t>:beef</t>
        </li>
        <li>
          <t>beef:</t>
        </li>
        <li>
          <t>:</t>
        </li>
      </ul>
      <t>A 32-bit CRH SID can also be represented in dotted-decimal notation.
      The following are examples:</t>
      <ul spacing="normal">
        <li>
          <t>192.0.2.1</t>
        </li>
        <li>
          <t>192.0.2.2</t>
        </li>
        <li>
          <t>192.0.2.3</t>
        </li>
      </ul>
    </section>
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>In this document, one node trusts another only if both nodes are
      operated by the same party. A node determines whether it trusts another
      node by examining its IP address. In many networks, operators number their nodes
      using a small number of prefixes. This facilitates identification of trusted nodes.</t>
      <t>A node can encounter security vulnerabilities when it processes a Routing header that 
      originated on an untrusted node <xref target="RFC5095" format="default"/>. Therefore, nodes <bcp14>MUST</bcp14> deploy ACLs that discard packets containing the
      CRH when both of the following conditions are true:</t>
      <ul spacing="normal">
        <li>
          <t>The Source Address does not identify an interface on a trusted
          node.</t>
        </li>
        <li>
          <t>The Destination Address identifies an interface on the local
          node.</t>
        </li>
      </ul>
      <t>The above-mentioned ACLs do not protect the node from attack packets
      that contain a forged (i.e., spoofed) Source Address. In order to
      mitigate this risk, nodes <bcp14>MAY</bcp14> also discard packets containing the CRH
      when all of the following conditions are true:</t>
      <ul spacing="normal">
        <li>
          <t>The Source Address identifies an interface on a trusted node.</t>
        </li>
        <li>
          <t>The Destination Address identifies an interface on the local
          node.</t>
        </li>
        <li>

          <t>The packet does not pass an Enhanced
          Feasible-Path Unicast Reverse Path Forwarding (EFP-uRPF) <xref target="RFC8704" format="default"></xref> check.</t>
        </li>
      </ul>
      <t>The EFP-uRPF check eliminates some, but not all, packets with forged
      Source Addresses. Therefore, a network operator that deploys CRH <bcp14>MUST</bcp14>
      implement ACLs on each of its edge nodes. The ACL
      discards packets whose Source Address identifies an interface on a
      trusted node.</t>
      <t>The CRH is compatible with end-to-end IPv6 Authentication Header (AH) 
    <xref target="RFC4302" format="default"/> processing.  This is because the source node calculates
    the Integrity Check Value (ICV) over the packet as it arrives at the
    destination node.</t>
    </section>

    <section numbered="true" toc="default">
      <name>Experimental Results</name>
      <t>Parties participating in this experiment should publish experimental
      results within one year of the publication of this document.
      Experimental results should address the following:</t>
      <ul spacing="normal">
        <li>
          <t>Effort required to deploy</t>
          <ul spacing="normal">
            <li>
              <t>Was deployment incremental or network-wide?</t>
            </li>
            <li>
              <t>Was there a need to synchronize configurations at each node,
              or could nodes be configured independently?</t>
            </li>
            <li>
              <t>Did the deployment require a hardware upgrade?</t>
            </li>
            <li>
              <t>Did the CRH SIDs have domain-wide or node-local significance?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effort required to secure</t>
        </li>
        <li>
          <t>Performance impact</t>
        </li>
        <li>
          <t>Effectiveness of risk mitigation with ACLs</t>
        </li>
        <li>
          <t>Cost of risk mitigation with ACLs</t>
        </li>
        <li>
          <t>Mechanism used to populate the CRH-FIB</t>
        </li>
        <li>
          <t>Scale of deployment</t>
        </li>
        <li>
          <t>Interoperability</t>
          <ul spacing="normal">
            <li>
              <t>Did you deploy two interoperable implementations?</t>
            </li>
            <li>
              <t>Did you experience interoperability problems?</t>
            </li>
            <li>
              <t>Did implementations generally implement the same topological
              functions with identical arguments?</t>
            </li>
            <li>
              <t>Were topological function semantics identical on each
              implementation?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effectiveness and sufficiency of Operations, Administration, and
Maintenance (OAM) mechanisms</t>
          <ul spacing="normal">
            <li>
              <t>Did PING work?</t>
            </li>
            <li>
              <t>Did Traceroute work?</t>
            </li>
            <li>
              <t>Did Wireshark work?</t>
            </li>
            <li>
              <t>Did TCPDUMP work?</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section numbered="true" toc="default">
      <name>IANA Considerations</name>

      <t>IANA has registered the following in the "Routing Types"
      subregistry within the "Internet Protocol Version 6 (IPv6) Parameters"
      registry:</t>
<table anchor="iana-table">
  <name></name>    
  <thead>
    <tr>
      <th>Value</th>    
      <th>Description</th>
      <th>Reference</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>5</td>
      <td>CRH-16</td>
      <td>RFC 9631</td>
    </tr>
    <tr>
      <td>6</td>
      <td>CRH-32 </td>
      <td>RFC 9631</td>
    </tr>
  </tbody>
</table>

    </section>

  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8200.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4443.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5095.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4302.xml"/>
      </references>
      <references>
        <name>Informative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2151.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5440.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5340.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8201.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8704.xml"/>

        <reference anchor="IANA-RT" target="https://www.iana.org/assignments/ipv6-parameters">
          <front>
            <title>Routing Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>

        <reference anchor="ISO10589-Second-Edition" target="https://www.iso.org/standard/30932.html">
          <front>
            <title>Information technology - Telecommunications and information exchange between systems - Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service (ISO 8473)</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date month="November" year="2002"/>
          </front>
          <refcontent>Second Edition</refcontent>
          <seriesInfo name="ISO/IEC" value="10589:2002"/>
        </reference>

      </references>
    </references>
    <section anchor="Examples" numbered="true" toc="default">
      <name>CRH Processing Examples</name>

      <t>This appendix demonstrates CRH processing in the following
      scenarios:</t>
      <ul spacing="normal">
        <li>
          <t>The CRH SID list contains one entry for each segment in the path
          (<xref target="LSRP" format="default"></xref>).</t>
        </li>
        <li>
          <t>The CRH SID list omits the first entry in the path (<xref
          target="LSR" format="default"></xref>).</t>
        </li>
      </ul>
            <t><xref target="RefTopo" format="default"/> provides a reference
            topology that is used in all examples, and <xref target="lsid"
            format="default"/> describes two entries that appear in each
            node's CRH-FIB.</t>

      <figure anchor="RefTopo">
        <name>Reference Topology</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
 -----------                 -----------                 -----------                    
|Node: S    |               |Node: I1   |               |Node: I2   |      
|Loopback:  |---------------|Loopback:  |---------------|Loopback:  |                          
|2001:db8::a|               |2001:db8::1|               |2001:db8::2|               
 -----------                 -----------                 -----------                     
      |                                                       | 
      |                      -----------                      |
      |                     |Node: D    |                     |
       ---------------------|Loopback:  |---------------------
                            |2001:db8::b| 
                             -----------
]]></artwork>
      </figure>
      <table anchor="lsid" align="center">
        <name>Node SIDs</name>
        <thead>
          <tr>
            <th align="left">SID</th>
            <th align="left">IPv6 Address</th>
            <th align="left">Forwarding Method</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">2</td>
            <td align="left">2001:db8::2</td>
            <td align="left">Least-cost path</td>
          </tr>
          <tr>
            <td align="left">11</td>
            <td align="left">2001:db8::b</td>
            <td align="left">Least-cost path</td>
          </tr>
        </tbody>
      </table>
      <section anchor="LSRP" numbered="true" toc="default">
        <name>The CRH SID list contains one entry for each segment in the path.</name>

        <t>In this example, Node S sends a packet to Node D via I2, and
        I2 appears in the CRH segment list.</t>
        <table align="center">
	  <name>Packet Travels from S to I2</name>
          <tbody>
            <tr>
              <td align="left">Source Address = 2001:db8::a</td>
              <td align="left">Segments Left = 1</td>
            </tr>
            <tr>
              <td align="left">Destination Address = 2001:db8::2</td>
              <td align="left">SID[0] = 11</td>
            </tr>
            <tr>
              <td align="left"/>
              <td align="left">SID[1] = 2</td>
            </tr>
          </tbody>
        </table>
        <table align="center">
	  <name>Packet Travels from I2 to D</name>
          <tbody>
            <tr>
              <td align="left">Source Address = 2001:db8::a</td>
              <td align="left">Segments Left = 0</td>
            </tr>
            <tr>
              <td align="left">Destination Address = 2001:db8::b</td>
              <td align="left">SID[0] = 11</td>
            </tr>
            <tr>
              <td align="left"/>
              <td align="left">SID[1] = 2</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="LSR" numbered="true" toc="default">
        <name>The CRH SID list omits the first entry in the path.</name>
        <t>In this example, Node S sends a packet to Node D via I2, and
        I2 does not appear in the CRH segment list.</t>
        <table align="center">
	  <name>Packet Travels from S to I2</name>
          <tbody>
            <tr>
              <td align="left">Source Address = 2001:db8::a</td>
              <td align="left">Segments Left = 1</td>
            </tr>
            <tr>
              <td align="left">Destination Address = 2001:db8::2</td>
              <td align="left">SID[0] = 11</td>
            </tr>
          </tbody>
        </table>

        <table align="center">
	  <name>Packet Travels from I2 to D</name>
          <tbody>
            <tr>
              <td align="left">Source Address = 2001:db8::a</td>
              <td align="left">Segments Left = 0</td>
            </tr>
            <tr>
              <td align="left">Destination Address = 2001:db8::b</td>
              <td align="left">SID[0] = 11</td>
            </tr>
          </tbody>
        </table>

      </section>
    </section>

    <section anchor="Acknowledgements" numbered="false" toc="default">
      <name>Acknowledgements</name>
      <t>Thanks to <contact fullname="Dr. Vanessa Ameen"/>, <contact
      fullname="Dale Carder"/>, <contact fullname="Brian Carpenter"/>,
      <contact fullname="Adrian Farrel"/>, <contact fullname="Fernando
      Gont"/>, <contact fullname="Joel Halpern"/>, <contact fullname="Naveen
      Kottapalli"/>, <contact fullname="Tony Li"/>, <contact fullname="Xing
      Li"/>, <contact fullname="Gerald Schmidt"/>, <contact fullname="Nancy
      Shaw"/>, <contact fullname="Mark Smith"/>, <contact fullname="Ketan
      Talaulikar"/>, <contact fullname="Reji Thomas"/>, and <contact
      fullname="Chandra Venkatraman"/> for their contributions to this
      document.</t>
    </section>
    <section numbered="false" toc="default">
      <name>Contributors</name>
      <contact fullname="Gang Chen" >
        <organization>Baidu</organization>
        <address>
          <postal>
            <street>No.10 Xibeiwang East Road</street>
            <city>Beijing</city>
	    <cityarea>Haidian District</cityarea>
            <region></region><code>100193</code>
            <country>China</country>
          </postal>
          <email>phdgang@gmail.com</email>
        </address>
      </contact>
      <contact fullname="Yifeng Zhou" >
        <organization>ByteDance</organization>
        <address>
          <postal>
            <street>43 N 3rd Ring W Rd</street>
	    <extaddr>Building 1, AVIC Plaza</extaddr>
	    <cityarea>Haidian District</cityarea>
            <city>Beijing</city>
            <region></region><code>100000</code>
            <country>China</country>
          </postal>
          <email>yifeng.zhou@bytedance.com</email>
        </address>
      </contact>
      <contact fullname="Gyan Mishra" >
        <organization>Verizon</organization>
        <address>
          <postal>
            <street></street>
            <city>Silver Spring</city>
            <region>MD</region><code></code>
            <country>United States of America</country>
          </postal>
          <email>hayabusagsm@gmail.com</email>
        </address>
      </contact>

    </section>
  </back>
</rfc>
