<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-wang-lsr-network-computing-optimization-00"
     ipr="trust200902">
  <front>
    <title abbrev="IGP based NCCO">IGP based Network Computing Combined
    Optimization</title>

    <author fullname="Aijun Wang" initials="A" surname="Wang">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Zhibo Hu" initials="Z" surname="Hu">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Bld., No.156 Beiqing Rd.</street>

          <city>Beijing</city>

          <code>100095</code>

          <country>China</country>
        </postal>

        <email>huzhibo@huawei.com</email>
      </address>
    </author>

    <author fullname="Changwang" initials="C" surname="Lin">
      <organization>New H3C Technologies</organization>

      <address>
        <postal>
          <street/>

          <city/>

          <code/>

          <country>China</country>
        </postal>

        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>

    <author fullname="Gyan S. Mishra" initials="G" surname="Mishra">
      <organization>Verizon Inc.</organization>

      <address>
        <postal>
          <street>13101 Columbia Pike</street>

          <city>Silver Spring</city>

          <code>MD 20904</code>

          <country>United States of America</country>
        </postal>

        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>

    <date day="15" month="November" year="2024"/>

    <area>RTG Area</area>

    <workgroup>LSR Working Group</workgroup>

    <keyword>RFC</keyword>

    <abstract>
      <t>This document describes the scenario and procedures that can be used
      to accomplish the IGP based network and computing combined optimization
      within the IS-IS or OSPF domain.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>Traditionally, the best path that is used to forward the packet
      within one IGP domain is calculated solely based on the network topology
      and links metric. In some scenario, there is need to select the best
      path based on other information. This document describes the scenario
      and procedures that can be used to accomplish the IGP based network and
      computing combined optimization requirements.</t>
    </section>

    <section title="Conventions used in this document">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119"/>
      .</t>
    </section>

    <section title="Network Computing Combined Optimization Scenario">
      <t>Figure 1 below illustrates the scenario that the necessities of
      integrating the computing and network related information to achieve the
      combined optimization upon the service requirements.</t>

      <t>In the network, R1-R8 are routers that connected each other to form
      one IGP domain. Server Pool A, B and C which are different server pools
      that can provide the same service are connected to the IGP domain via
      R6, R7 and R8 respectively. The capacities and the access bandwidths of
      the Server Pools may be different.</t>

      <t>Image that one customer that is connected to router R1 requires the
      computing capabilities, called X, and the minimum bandwidth C along the
      end to end path. Based on the Short Path First(SPF) algorithm, R1 will
      select the path R1-R4-R6 to access the service. But the bandwidth
      between R6 and Server Pool A is below C and can't meet the requirements.
      The user's service requirement can't be met and the customer experiences
      will be downgraded significantly. Even there is other Server Pools that
      can provide the same service, there is no method for the SPF to select
      them automatically.</t>

      <t><figure>
          <artwork align="center"><![CDATA[+--------------------------------------+
|                                      |
|   +---+                      +---+   |      +-------------+
|   |R1 +---------+       +----+R6 +----------+Server Pool A|
|   +-+-+         |       |    +-+-+   |      +-------------+
|     |         +-+-+     |      |     |
|     |     +---+R4 +-----+      |     |
|     |     |   +-+-+            |     |
|   +-+-+   |     |            +-+-+   |      +-------------+
|   |R2 +---+     +------------+R7 +----------+Server Pool B|
|   +-+-+   |                  +-+-+   |      +-------------+
|     |     |---+---+            |     |
|     |         |R5 +-----+      |     |
|     |         +-+-+     |      |     |
|   +-+-+         |       |    +-+-+   |      +-------------+
|   |R3 +---------+       +----+R8 +----------+Server Pool C|
|   +---+                      +---+   |      +-------------+
|                                      |
|                                      |
|              IGP Domain              |
+--------------------------------------+

  Figure 1: Network Computing Combined Optimization Scenario
]]></artwork>
        </figure></t>

      <t>Then, it is necessary to inject the other information that beyond the
      traditional network related information into the SPF algorithm, to find
      the best path that both satisfy the network and computing capacity
      requirements, which are the key factors in artificial intelligent
      era.</t>
    </section>

    <section title="Network Computing Combined Optimization Procedures">
      <t>The procedures to accomplish the network computing combined
      optimization within one IGP domain are the followings:</t>

      <t>1) Computing Capacity Information Registration.</t>

      <t>The server pool registers its capacity information to the router that
      it connects to, or the configuration of capacity information of the
      server pool on the access router directly.</t>

      <t>2) Computing Capacity Information Encapsulation and Flooding.</t>

      <t>The access router that connects to the server pool encapsulates the
      computing capacity information within one new container and floods the
      computing capacity information within its domain, let other routers
      within the same domain aware the capacity of each server pool.</t>

      <t>3) Computing and Network Information based SPF Optimization
      Algorithm</t>

      <t>Optimize the SPF algorithm, let it find the best path in combination
      both the network related information and computing capacity information,
      build the forward table on each router based on the combined
      optimization results. The router that can't parse the new container can
      still use the traditional SPF that based solely on network related
      information to build the forward table.</t>

      <t>4) Network and Computing Combined Optimization Scheduling</t>

      <t>Forward the customer traffic based on the combined optimization
      results by the routers on the optimized path. In order to achieve the
      incremental deployment of such features within the operator network, the
      entry router should tunnel the customer traffic to the router that
      connected to the preferred server pool. This can avoid the traffic loop
      within the IGP domains when not all of its routers use the same
      algorithm to find the best path.</t>
    </section>

    <section title="Advertisement of Computing Capacity Related Information">
      <t>OSPF<xref target="RFC7684"/> defines the OSPFv2 Extended Link Opaque
      LSA and <xref target="RFC8362"/>defines the E-Link-LSA to carry the
      information about links. These existing LSA can be used to include the
      new container that encapsulates and floods the computing capacity
      related information.</t>

      <t>Based on the above containers, this document defines the Stub-Link
      TLV and some additional sub-TLVs to identify the stub link and transmit
      the associated computing capacity information for OSPF and IS-IS
      respectively.</t>
    </section>

    <section title="OSPF Protocol Extension for Stub Link Attributes">
      <t>The following sections define the protocol extension to indicate the
      stub link and its associated attributes in OSPFv2/v3.</t>

      <section title="OSPF Stub-Link TLV">
        <t>This document defines the Stub-Link TLV to describe stub link of a
        single router. This Stub-Link TLV is only applicable to the OSPFv2
        Extended Link Opaque LSA<xref target="RFC7684"/> and E-Link-LSA LSA
        <xref target="RFC8362"/>. Inclusion in other LSAs MUST be ignored.</t>

        <t>The OSPF Stub-Link TLV which is under the IANA codepoint "OSPFv2
        Extended Link Opaque LSA TLVs" and "OSPFv3 Extended-LSA TLV" has the
        following format:</t>

        <t><figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type(Stub-Link)            |      Length                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Flags                |    Reserved                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                   Stub Link Prefix Sub-TLVs                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
|           Computing Capacity related Sub-TLVs (variable)      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
|                 Existing Sub-TLVs (variable)                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
            Figure 2: OSPF Stub-Link TLV
]]></artwork>
          </figure></t>

        <t>Type: The TLV type. The value is 2(TBD1) for OSPFv2 Extended Link
        Opaque LSA TLVs and 10(TBD2) for OSPFv3 Extended-LSA TLVs.</t>

        <t>Length: Variable, dependent on sub-TLVs</t>

        <t>Flags: Define the type of the stub-link: <list style="symbols">
            <t>bit 0-15: Reserved</t>
          </list></t>

        <t>Stub Link Prefix Sub-TLV: The prefix of the stub-link. It's format
        is defined in <xref target="sectionOSPF-IPv4-Prefix-Sub-TLV"/> and
        <xref target="sectionOSPF-IPv6-Prefix-Sub-TLV"/>.</t>

        <t>Computing Capacity related Sub-TLVs: Sub-TLVs that contains the
        computing capacity information. They can be defined in other document
        and is out of the scope of this document.</t>

        <t>Existing Sub-TLVs: Sub-TLV that defined within "Open Shortest Path
        First (OSPF) Traffic Engineering TLVs" for TE Link TLV(Value 2) can be
        included if necessary.</t>

        <t>If this TLV is advertised multiple times in the same LSA, only the
        first instance of the TLV is used by receiving OSPFv2/v3 routers. This
        situation SHOULD be logged as an error.</t>

        <t>This document creates a registry for Stub-Link attributes in <xref
        target="section7"/>.</t>
      </section>

      <section anchor="sectionOSPF-IPv4-Prefix-Sub-TLV"
               title="OSPF Stub Link IPv4 Prefix Sub-TLV">
        <t>The OSPF Stub Link IPv4 Prefix Sub-TLV has the following
        format:</t>

        <t><figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type                       |           Length              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Prefix Length |           IPv4 Prefix(variable)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Figure 3: OSPF Stub Link IPv4 Prefix Sub-TLV
]]></artwork>
          </figure></t>

        <t>Type: IPv4 Prefix Sub-TLV codepoint. Value is 37(TBD3) for
        OSPF(under "Types for sub-TLVs of TE Link TLV (Value 2)")</t>

        <t>Length: The length of the value portion in octets.</t>

        <t>Prefix Length: the length of the IPv4 Prefix in bits.</t>

        <t>IPv4 Prefix: The IPv4 Prefix value of stub link.</t>
      </section>

      <section anchor="sectionOSPF-IPv6-Prefix-Sub-TLV"
               title="OSPF Stub Link IPv6 Prefix Sub-TLV">
        <t>The OSPF Stub Link IPv6 Prefix Sub-TLV has the following
        format:</t>

        <t><figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Type                       |           Length              |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Prefix Length |           IPv6 Prefix(variable)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       Figure 4: OSPF Stub Link IPv6 Prefix Sub-TLV
]]></artwork>
          </figure></t>

        <t>Type: IPv6 Prefix Sub-TLV codepoint. Value is Value is 38(TBD4) for
        OSPF(under "Types for sub-TLVs of TE Link TLV (Value 2)")</t>

        <t>Length: The length of the value portion in octets.</t>

        <t>IPv6 Prefix: The IPv6 Prefix value of stub link.</t>
      </section>
    </section>

    <section title="IS-IS Protocol Extension for Stub Link Attributes">
      <t>The following sections define the protocol extension to indicate the
      stub link and its associated attributes in IS-IS.</t>

      <section title="IS-IS Stub-link TLV">
        <t>This document defines the IS-IS Stub-Link TLV to describes stub
        link of a single router.</t>

        <t>The IS-IS Stub-Link TLV has the following format:</t>

        <t><figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Type(Stub-Link)|    Length     |         Flags                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Stub Link Prefix Sub-TLV                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      Computing Capacity related Sub-TLVs (variable)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
|                 Existing Sub-TLVs (variable)                  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+              
            Figure 5: IS-IS Stub-Link TLV 
]]></artwork>
          </figure></t>

        <t>Type: IS-IS TLV codepoint. Value is 151 (TBD5) for stub-link
        TLV.</t>

        <t>Length: Variable, dependent on sub-TLVs</t>

        <t>Flags: Define the type of the stub-link: <list style="symbols">
            <t>bit 0-15: Reserved</t>
          </list></t>

        <t>Stub Link Prefix Sub-TLV: The prefix of the stub-link. It's format
        is defined in <xref target="sectionIS-IS-IPv4-Prefix-Sub-TLV"/> and
        <xref target="sectionIS-IS-IPv6-Prefix-Sub-TLV"/>.</t>

        <t>Computing Capacity related Sub-TLVs: Sub-TLVs that contains the
        computing capacity information. They can be defined in other document
        and is out of the scope of this document.</t>

        <t>Existing Sub-TLVs: Sub-TLVs that defined within "IS-IS Sub-TLVs for
        TLVs Advertising Neighbor Information" can be included if
        necessary.</t>
      </section>

      <section anchor="sectionIS-IS-IPv4-Prefix-Sub-TLV"
               title="IS-IS Stub Link IPv4 Prefix Sub-TLV">
        <t>The IS-IS Stub Link IPv4 Prefix Sub-TLV has the following
        format:</t>

        <t><figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      Type     |     Length    |      Reserved   |Prefix Length|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    IPv4 Prefix(Variable)                      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
         Figure 6: IS-IS Stub Link IPv4 Prefix Sub-TLV
]]></artwork>
          </figure></t>

        <t>Type: IPv4 Prefix Sub-TLV codepoint. Value is 46(TBD6) for
        IS-IS(under "IS-IS Sub-TLVs for TLVs Advertising Neighbor
        Information")</t>

        <t>Length: Length: The length of the value portion in octets.</t>

        <t>Prefix Length: the length of the IPv4 Prefix in bits.</t>

        <t>IPv4 Prefix: The IPv4 Prefix value of stub link.</t>
      </section>

      <section anchor="sectionIS-IS-IPv6-Prefix-Sub-TLV"
               title="IS-IS Stub Link IPv6 Prefix Sub-TLV">
        <t>The IS-IS Stub Link IPv6 Prefix Sub-TLV has the following
        format:</t>

        <t><figure>
            <artwork align="center"><![CDATA[ 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      Type     |     Length    |      Reserved   |Prefix Length|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               IPv6 Prefix(Variable)                           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        Figure 7: IS-IS Stub Link IPv6 Prefix Sub-TLV
]]></artwork>
          </figure></t>

        <t>Type: IPv6 Prefix Sub-TLV codepoint. Value is 47(TBD7) for
        IS-IS(under "IS-IS Sub-TLVs for TLVs Advertising Neighbor
        Information")</t>

        <t>Length: Length: The length of the value portion in octets.</t>

        <t>Prefix Length: the length of the IPv6 Prefix in bits.</t>

        <t>IPv6 Prefix: The IPv6 Prefix value of stub link.</t>
      </section>
    </section>

    <section title="Application of the network computing combined optimization">
      <t>The following figure gives the application example of the network
      computing combined optimization.<figure>
          <artwork align="center"><![CDATA[+--------------------------------------+
|                                      |
|   *****                      *****   |      +-------------+
|   *R1 *---------+       +----*R6 *----------+Server Pool A|
|   *****         |       |    *****   |      +-------------+
|     |         +-+-+     |      |     |
|     |     +---+R4 +-----+      |     |
|     |     |   +-+-+            |     |
|   +---+   |     |            *****   |      +-------------+
|   |R2 +---+     +------------*R7 *----------+Server Pool B|
|   +---+   |                  *****   |      +-------------+
|     |     |   *****            |     |
|     |     |---*R5 *-----+      |     |
|     |         *****     |      |     |
|   *****         |       |    *****   |      +-------------+
|   *R3 *---------+       +----*R8 *----------+Server Pool C|
|   *****                      *****   |      +-------------+
|                                      |
|                                      |
|              IGP Domain              |
+--------------------------------------+

  Figure 9: Application of Network Computing Combined Optimization
]]></artwork>
        </figure>Suppose R1, R3, R5,R6,R7 and R8 (identified via the "*"
      signal)are the routers that have been updated to support the parse of
      newly defined Stub Link TLV and the optimized SPF algorithm that depends
      both on the network and computing capacity information. The router R2
      and R4 (identified via the "-" signal are the legacy routers that had
      not been upgraded yet.</t>

      <t>When R6, R7 and R8 knows the computing capacity information of their
      connected server Pool A, B and C( via the automatic registration process
      between the access router and server pool, or the manual configuration
      on the access router, which is out of the scope this document), they
      encapsulation such information within the above Stub Link TLV, and then
      the related LSA (for OSPF) or TLV(for IS-IS), flooding them within the
      IGP domain.</t>

      <t>When upgraded routers receives such information, it can accomplish
      the network computing combined optimized SPF algorithm, to calculate the
      best path to each server pool and build the forwarding table on it. For
      the legacy routers, the forwarding table are built still via the
      traditional SPF algorithm.</t>

      <t>When router R1 receives the customer traffic that requires the
      computing capacity X and minimum bandwidth path of C, it will lookup its
      FIB, make the final decision based on both of these information. If the
      connection between R6 and its associated server Pool A can't meet
      minimum bandwidth requirements, it will check the next candidate within
      its FIB table. If the capacity of Server Pool is less than X, it will be
      passed also. The final result will be Server Pool C, whose access
      bandwidth and the computing capacity can all meet the customer
      requirements.</t>

      <t>Router R1 will encapsulate the customer traffic within one tunnel,
      with the tunnel destination set to the address of R8, which is the
      access router of Server Pool C and tunnel source is the R1 itself. When
      the traffic path through the intermediated router along the path, the
      traffic will be forwarded based on the destination address of R8, which
      is solely based on the traditional SPF algorithm. The tunnelled traffic
      can arrive safely to the tunnel destination without any possibility of
      loop, even they use different algorithm for different prefixes.</t>
    </section>

    <section title="Security Considerations">
      <t>Security concerns for IS-IS are addressed in <xref target="RFC5304"/>
      and<xref target="RFC5310"/></t>

      <t>Security concern for OSPFv3 is addressed in <xref
      target="RFC4552"/></t>

      <t>Advertisement of the additional information defined in this document
      introduces no new security concerns.</t>
    </section>

    <section anchor="section7" title="IANA Considerations">
      <t>IANA is requested to the allocation in following registries:</t>

      <t><figure>
          <artwork><![CDATA[+===========================================+============+===============================+
| Registry                                  | Type       |       Meaning                 |
|                                           |(suggested) |                               |
+===========================================+============+===============================+
|OSPFv2 Extended Link Opaque LSA TLVs       |   TBD1(2)  |OSPFv2 Stub-Link               |
+-------------------------------------------+------------+-------------------------------+
|OSPFv3 Extended-LSA TLVs                   |   TBD2(10) |OSPFv3 Stub-Link               |
+-------------------------------------------+------------+-------------------------------+
|IS-IS Top-Level TLV                        |   TBD5(151)|IS-IS Stub-Link                |
+-------------------------------------------+------------+-------------------------------+
|Types for sub-TLVs of TE Link TLV (Value 2)|   TBD3(37) |OSPF Stub Link IPv4 Prefix     |
+-------------------------------------------+------------+-------------------------------+
|Types for sub-TLVs of TE Link TLV (Value 2)|   TBD4(38) |OSPF Stub Link IPv6 Prefix     |
+-------------------------------------------+------------+-------------------------------+
|IS-IS Sub-TLVs for TLVs                    |            |                               |
|Advertising Neighbor Information           |   TBD6(46) |IS-IS Stub Link IPv4 Prefix    |
+-------------------------------------------+------------+-------------------------------+
|IS-IS Sub-TLVs for TLVs                    |            |                               |
|Advertising Neighbor Information           |   TBD7(47) |IS-IS Stub Link IPv6 Prefix    |
+-------------------------------------------+------------+-------------------------------+
   Figure 10: IANA Allocation for newly defined TLVs and Sub-TLVs
]]></artwork>
        </figure></t>
    </section>

    <section title="Acknowledgement">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.4552"?>

      <?rfc include="reference.RFC.5304"?>

      <?rfc include="reference.RFC.5310"?>

      <?rfc include="reference.RFC.5392"?>

      <?rfc include="reference.RFC.7684"?>

      <?rfc include="reference.RFC.8362"?>

      <?rfc include="reference.RFC.9346"?>
    </references>
  </back>
</rfc>
