<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="exp" docName="draft-ietf-6man-comp-rtg-hdr-07"
     ipr="trust200902">
  <front>
    <title abbrev="IPv6 Compact Routing Header">The IPv6 Compact Routing
    Header (CRH)</title>

    <author fullname="Ron Bonica" initials="R." surname="Bonica">
      <organization>Juniper Networks</organization>

      <address>
        <postal>
          <street>2251 Corporate Park Drive</street>

          <city>Herndon</city>

          <code>20171</code>

          <region>Virginia</region>

          <country>USA</country>
        </postal>

        <email>rbonica@juniper.net</email>
      </address>
    </author>

    <author fullname="Yuji Kamite" initials="Y. " surname="Kamite">
      <organization>NTT Communications Corporation</organization>

      <address>
        <postal>
          <street>3-4-1 Shibaura, Minato-ku</street>

          <city>Tokyo</city>

          <code>108-8118</code>

          <country>Japan</country>
        </postal>

        <email>y.kamite@ntt.com</email>
      </address>
    </author>

    <author fullname="Andrew Alston" initials="A." surname="Alston">
      <organization>Liquid Telecom</organization>

      <address>
        <postal>
          <street/>

          <city>Nairobi</city>

          <country>Kenya</country>
        </postal>

        <email>Andrew.Alston@liquidtelecom.com</email>
      </address>
    </author>

    <author fullname="Daniam Henriques" initials="D." surname="Henriques">
      <organization>Liquid Telecom</organization>

      <address>
        <postal>
          <street/>

          <city>Johannesburg</city>

          <country>South Africa</country>
        </postal>

        <email>daniam.henriques@liquidtelecom.com</email>
      </address>
    </author>

    <author fullname="Luay Jalil" initials="L." surname="Jalil">
      <organization>Verizon</organization>

      <address>
        <postal>
          <street/>

          <city>Richardson</city>

          <region>Texas</region>

          <country>USA</country>
        </postal>

        <email>luay.jalil@one.verizon.com</email>
      </address>
    </author>

    <date day="24" month="May" year="2024"/>

    <area>INT Area</area>

    <workgroup>6man</workgroup>

    <keyword>IPv6</keyword>

    <keyword>Routing header</keyword>

    <abstract>
      <t>This document describes an experiment in which two new IPv6 Routing
      headers are implemented and deployed. Collectively, they are called the
      Compact Routing Headers (CRH). Individually, they are called CRH-16 and
      CRH-32.</t>

      <t>One purpose of this experiment is to demonstrate that the CRH can be
      implemented and deployed in a production network. Another purpose is to
      demonstrate that the security considerations, described in this
      document, can be addressed with access control lists. Finally, this
      document encourages replication of the experiment.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="Intro" title="Introduction">
      <t><xref target="RFC8200">IPv6 </xref> source nodes use Routing headers
      to specify the path that a packet takes to its destination. The IETF has
      defined several <xref target="IANA-RH">Routing header types</xref>. This
      document defines two new Routing header types. Collectively, they are
      called the Compact Routing Headers (CRH). Individually, they are called
      CRH-16 and CRH-32.</t>

      <t>The CRH allows IPv6 source nodes to specify the path that a packet
      takes to its destination. The CRH can be encoded in relatively few
      bytes. The following are reasons for encoding the CRH in as few bytes as
      possible:</t>

      <t><list style="symbols">
          <t>Many ASIC-based forwarders copy headers from buffer memory to
          on-chip memory. As header sizes increase, so does the cost of this
          copy.</t>

          <t>Because <xref target="RFC8201">Path MTU Discovery (PMTUD)</xref>
          is not entirely reliable, many IPv6 hosts refrain from sending
          packets larger than the IPv6 minimum link MTU (i.e., 1280 bytes).
          When packets are small, the overhead imposed by large Routing
          Headers is excessive.</t>
        </list>This document describes an experiment whose purposes are:</t>

      <t><list style="symbols">
          <t>To demonstrate that the CRH can be implemented and deployed.</t>

          <t>To demonstrate that the security considerations, described in
          this document, can be addressed with access control lists.</t>

          <t>To encourage replication of the experiment.</t>
        </list></t>
    </section>

    <section anchor="ReqLang" title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in <xref
      target="RFC2119">BCP 14</xref> <xref target="RFC8174"/> when, and only
      when, they appear in all capitals, as shown here.</t>
    </section>

    <section title="The Compact Routing Headers (CRH)">
      <t>Both CRH versions (i.e., CRH-16 and CRH-32) contain the following
      fields:</t>

      <t><list style="symbols">
          <t>Next Header - Defined in <xref target="RFC8200"/>.</t>

          <t>Hdr Ext Len - Defined in <xref target="RFC8200"/>.</t>

          <t>Routing Type - Defined in <xref target="RFC8200"/>. (CRH-16 value
          is 5. CRH-32 value is 6).</t>

          <t>Segments Left - Defined in <xref target="RFC8200"/>.</t>

          <t>Type-specific Data - Described in <xref target="RFC8200"/>.</t>
        </list></t>

      <t>In the CRH, the Type-specific data field contains a list of CRH Segment
      Identifiers (CRH SIDs). Each CRH SID identifies an entry in the <xref
      target="crh-fib">CRH Forwarding Information Base (CRH-FIB) </xref>. Each
      CRH-FIB entry identifies an interface on the path that the packet takes
      to its destination.</t>

      <t>CRH SIDs are listed in reverse order. So, the first CRH SID in the list
      represents the final interface in the path. Because CRH SIDs are listed
      in reverse order, the Segments Left field can be used as an index into
      the CRH SID list. In this document, the "current CRH SID" is the CRH SID list entry
      referenced by the Segments Left field.</t>

      <t>The first CRH SID in the path can be omitted from the list. See <xref
      target="Examples"> </xref> for an example.</t>

      <t>In the <xref target="CRHFig16">CRH-16</xref>, each CRH SID is encoded in
      16-bits. In the <xref target="CRHFig32">CRH-32</xref>, each CRH SID is
      encoded in 32-bits.</t>

      <t>In all cases, the CRH MUST end on a 64-bit boundary. So, the Type-
      specific data field MUST be padded with zeros if the CRH would otherwise
      not end on a 64-bit boundary.</t>

      <figure align="left" anchor="CRHFig16" title="CRH-16">
        <artwork><![CDATA[   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |  Next Header  |  Hdr Ext Len  | Routing Type  | Segments Left |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |             SID[0]            |          SID[1]               |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
  |                          .........
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
   

]]></artwork>
      </figure>

      <figure align="left" anchor="CRHFig32" title="CRH-32">
        <artwork><![CDATA[   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |  Next Header  |  Hdr Ext Len  | Routing Type  | Segments Left |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  +                             SID[0]                            +
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  +                             SID[1]                            +
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  //                                                              //
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  +                             SID[n]                            +
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   

]]></artwork>
      </figure>
    </section>

    <section anchor="crh-fib"
             title="The CRH  Forwarding Information Base (CRH-FIB)">
      <t>Each CRH SID identifies a CRH-FIB entry.</t>

      <t>Each CRH-FIB entry contains:</t>

      <t><list style="symbols">
          <t>An IPv6 address.</t>

          <t>A topological function.</t>

          <t>Arguments for the topological function. (Optional).</t>
        </list></t>

      <t>The topological function specifies how the processing node forwards
      the packet to the interface identified by the IPv6 address. The
      following are examples:</t>

      <t><list style="symbols">
          <t>Forward the packet through the least-cost path to the interface
          identified by the IPv6 address (i.e., loose source routing).</t>

          <t>Forward the packet through a specified interface to the interface
          identified by the IPv6 address (i.e.,strict source routing)</t>
        </list></t>

      <t>Some topological functions require parameters. For example, a
      topological function might require a parameter that identifies the
      interface through which the packet is forwarded.</t>

      <t>The CRH-FIB can be populated:</t>

      <t><list style="symbols">
          <t>By an operator, using a Command Line Interface (CLI).</t>

          <t>By a controller, using the <xref target="RFC5440">Path
          Computation Element (PCE) Communication Protocol (PCEP) </xref> or
          the <xref target="RFC6241">Network Configuration Protocol
          (NETCONF)</xref>.</t>

          <t>By a distributed routing protocol <xref
          target="ISO10589-Second-Edition"/>, <xref target="RFC5340"/>, <xref
          target="RFC4271"/>.</t>
        </list></t>

	<t>The above-mentoned mechanisms are not defined here and are beyond the scope of this document</t>
    </section>

    <section title="Processing Rules">
      <t>The following rules describe CRH processing:<list style="symbols">
          <t>If Segments Left equals 0, skip over the CRH and process the next
          header in the packet. The IPv6 address in the IPv6 Header's Destination Address field is that of the ultimate recipient.</t>

          <t>If Hdr Ext Len indicates that the CRH is larger than the
          implementation can process, discard the packet and send an <xref
          target="RFC4443">ICMPv6 </xref> Parameter Problem, Code 0, message
          to the Source Address, pointing to the Hdr Ext Len field.</t>

          <t>Compute L, the minimum CRH length ( <xref target="SLLeng">
          </xref>).</t>

          <t>If L is greater than Hdr Ext Len, discard the packet and send an
          ICMPv6 Parameter Problem, Code 0, message to the Source Address,
          pointing to the Segments Left field.</t>

          <t>Decrement Segments Left.</t>

          <t>Search for the current CRH SID in the CRH-FIB. In this document, the
          "current CRH SID" is the CRH SID list entry referenced by the Segments Left
          field.</t>

          <t>If the search does not return a CRH-FIB entry, discard the packet
          and send an ICMPv6 Parameter Problem, Code 0, message to the Source
          Address, pointing to the current SID.</t>

          <t>If Segments Left is greater than 0 and the CRH-FIB entry contains
          a multicast address, discard the packet and send an ICMPv6 Parameter
          Problem, Code 0, message to the Source Address, pointing to the
          current SID.</t>

          <t>Copy the IPv6 address from the CRH-FIB entry to the Destination
          Address field in the IPv6 header.</t>

          <t>Decrement the IPv6 Hop Limit.</t>

          <t>Submit the packet, its topological function and its parameters to
          the IPv6 module. See NOTE.</t>

        </list>NOTE: By default, the IPv6 module determines the next-hop and
      forwards the packet. However, the topological function may elicit
      another behavior. For example, the IPv6 module may forward the packet
      through a specified interface.</t>

      <section anchor="SLLeng" title="Computing Minimum CRH Length">
        <t>The algorithm described in this section accepts the following CRH
        fields as its input parameters:</t>

        <t><list style="symbols">
            <t>Routing Type (i.e., CRH-16 or CRH-32).</t>

            <t>Segments Left.</t>
          </list></t>

        <t>It yields L, the minimum CRH length. The minimum CRH length is
        measured in 8-octet units, not including the first 8 octets.</t>

        <figure>
          <artwork align="center"><![CDATA[<CODE BEGINS>

switch(Routing Type) {
    case CRH-16:
        if (Segments Left <= 2)
            return(0)
        sidsBeyondFirstWord = Segments Left - 2;
        sidPerWord = 4;
    case CRH-32:
        if (Segments Left <= 1)
            return(0)
        sidsBeyondFirstWord = Segments Left - 1;
        sidsPerWord = 2;
    case default:
        return(0xFF);
    }

words = sidsBeyondFirstWord div sidsPerWord;
if (sidsBeyondFirstWord mod sidsPerWord)
    words++;

return(words)


<CODE ENDS>

]]></artwork>
        </figure>
      </section>
    </section>

    <section title="Mutability">
      <t>In the CRH, the Segments Left field is mutable. All remaining fields
      are immutable.</t>
    </section>

    <section title="Destination Address Transparency">
      <t>When a packet containing the CRH header leaves its source, it does
      not include its final destination address. The final destination address
      is not added to the packet until the final CRH SID is resolved.</t>

      <t>While destination address transparency enhances privacy, it prevents
      intermediate nodes from verifying transport layer checksums.</t>

    </section>

    <section title="Applications And SIDs">
      <t>A CRH contains one or more CRH SIDs. Each CRH SID is processed by exactly one
      node.</t>

      <t>Therefore, a CRH SID is not required to have domain-wide significance.
      Applications can:<list style="symbols">
          <t>Allocate CRH SIDs so that they have domain-wide significance.</t>

          <t>Allocate CRH SIDs so that they have node-local significance.</t>
        </list></t>
    </section>

    <section title="Management Considerations">
      <t><xref target="RFC2151">PING and TRACEROUTE </xref> both operate
      correctly in the presence of the CRH. TCPDUMP and Wireshark have been
      extended to support the CRH.</t>

<t>PING and TRACEROUTE report 16-bit CRH SIDs for CRH-16, and
    32-bit CRH sidsPerWord for CRH-32.  It is recommended that the
    experimental versions of PING use the text representations
    described herein.</t>
    </section>

   <section title="ICMPv6 Considerations">
      <t>A node can emit ICMPv6 messages when processing a packet that contains the CRH.
	The following are ICMPv6 considerations:</t>

        <t><list style="symbols">
            <t>ICMPv6 messages are subject to rate limits.</t>
		<t>ICMPv6 message delivery is not reliable.</t>
 		<t>ICMPv6 messages are easily forged.</t>
            <t>Most ICMPv6 implementations process all ICMPv6 Parameter Problem messages identically, regardless of the pointer value.</t>
          </list></t>


    </section>


    <section title="Textual Representation">
      <t>A 16-bit CRH SID can be represented by four hexadecimal digits. Leading
      zeros SHOULD be omitted. However, the all-zeros CRH SID MUST be represented
      by a single 0. The following are examples:</t>

      <t><list style="symbols">
          <t>beef</t>

          <t>eef</t>

          <t>0</t>
        </list></t>

      <t>A 16-bit CRH SID also can be represented in dotted-decimal notation. The
      following are examples:<list style="symbols">
          <t>192.0</t>

          <t>192.51</t>
        </list></t>

      <t>A 32-bit CRH SID can be represented by four hexadecimal digits, a colon
      (:), and another four hexadecimal digits. Leading zeros MUST be omitted.
      The following are examples:</t>

      <t><list style="symbols">
          <t>dead:beef</t>

          <t>ead:eef</t>

          <t>:beef</t>

          <t>beef:</t>

          <t>:</t>
        </list>A 32-bit CRH SID can also be represent in dotted-decimal notation.
      The following are examples:<list style="symbols">
          <t>192.0.2.1</t>

          <t>192.0.2.2</t>

          <t>192.0.2.3</t>
        </list></t>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>In this document, one node trusts another only if both nodes are
      operated by the same party.</t>

      <t>A node can encounter security vulnerabilities by indiscriminately
      processing packets that contain Routing Headers <xref
      target="RFC5095"/>. Therefore, nodes MUST discard packets containing the
      CRH when both of the following conditions are true:</t>

      <t><list style="symbols">
          <t>The Source Address does not identify an interface on a trusted
          node.</t>

          <t>The Destination Address identifies an interface on the local
          node.</t>
        </list></t>

      <t>The above-state rule does not protect the node from attack packets
      that contain a forged (i.e., spoofed) Source Address. In order to
      mitigate this risk, nodes MAY also discard packets containing the CRH
      when all of the following conditions are true:</t>


      <t><list style="symbols">
          <t>The Source Address identifies an interface on a trusted node.</t>

          <t>The Destination Address identifies an interface on the local
          node.</t>

          <t>The packet does not pass an <xref target="RFC8704">Enhanced
          Feasible-Path Unicast Reverse Path Forwarding (RPF) </xref>,</t>
        </list>The RPF check eliminates some, but not all packets with forged
      source addresses. Therefore, a network operator that deploys CRH MUST
      implement Access Control Lists (ACL) on each of its edge nodes. The ACL
      discards packets whose source address identifies an interface on a
      trusted node.</t>

	<t>The CRH is compatible with end-to-end <xref target="RFC4302">IPv6 Authentication Header (AH)</xref> processing. This is becasue the source node MUST calculate the Integrity Check Value (ICV) over the packet as it arrives at the destination node. The CRH is not compatibile with AH processing at intermediate nodes.
 </t>

    </section>

    <section title="Implementation and Deployment Status">
      <t>Juniper Networks has produced experimental implementations of the CRH
      on the MX-series (ASIC-based) router</t>

      <t>Liquid Telecom has produced experimental implementations of the CRH
      on software based routers.</t>

      <t>The CRH has carried non-production traffic in CERNET and Liquid
      Telecom.</t>

      <t>Interoperability among these implementations has not yet been demonstrated.</t>


    </section>

    <section title="Experimental Results">
      <t>Parties participating in this experiment should publish experimental
      results within one year of the publication of this document.
      Experimental results should address the following:</t>

      <t><list style="symbols">
          <t>Effort required to deploy<list style="symbols">
              <t>Was deployment incremental or network-wide?</t>

              <t>Was there a need to synchronize configurations at each node
              or could nodes be configured independently</t>

              <t>Did the deployment require hardware upgrade?</t>

              <t>Did the CRH SIDs have domain-wide or node-local significance?</t>
            </list></t>

          <t>Effort required to secure</t>

          <t>Performance impact</t>

          <t>Effectiveness of risk mitigation with ACLs</t>

          <t>Cost of risk mitigation with ACLs</t>

          <t>Mechanism used to populate the FIB</t>

          <t>Scale of deployment</t>

          <t>Interoperability<list style="symbols">
              <t>Did you deploy two inter-operable implementations?</t>

              <t>Did you experience interoperability problems?</t>

              <t>Did implementations generally implement the same topological
              functions with identical arguments?</t>

              <t>Were topological function semantics identical on each
              implementation?</t>
            </list></t>

          <t>Effectiveness and sufficiency of OAM mechanism<list
              style="symbols">
              <t>Did PING work?</t>

              <t>Did TRACEROUTE work?</t>

              <t>Did Wireshark work?</t>

              <t>Did TCPDUMP work?</t>
            </list></t>
        </list></t>
    </section>

    <section title="IANA Considerations">
      <t>This document makes the following registrations in the "Internet
      Protocol Version 6 (IPv6) Parameters" "Routing Types" subregistry
      maintained by IANA:</t>

      <figure>
        <artwork><![CDATA[         +-------+------------------------------+---------------+
         | Value | Description                  | Reference     |
         +=======+==============================+===============+
         | 5     | CRH-16                       | This document |
         +-------+------------------------------+---------------+
         | 6     | CRH-32                       | This document |
         +-------+------------------------------+---------------+
]]></artwork>
      </figure>

      <t/>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>Thanks to Dr. Vanessa Ameen, Dale Carder, Brian Carpenter, Adrian
      Farrel, Fernando Gont, Naveen Kottapalli, Joel Halpern, Mark Smith, Reji
      Thomas, Tony Li, Xing Li, Gerald Schmidt, Nancy Shaw, Ketan Talaulikar,
      and Chandra Venkatraman for their contributions to this document.</t>
    </section>

    <section title="Contributors">
      <t><list style="empty">
          <t>Gang Chen</t>

          <t>Baidu</t>

          <t>No.10 Xibeiwang East Road Haidian District</t>

          <t>Beijing 100193 P.R. China</t>

          <t>Email: phdgang@gmail.com</t>
        </list><list style="empty">
          <t/>
        </list><list style="empty">
          <t>Yifeng Zhou</t>

          <t>ByteDance</t>

          <t>Building 1, AVIC Plaza, 43 N 3rd Ring W Rd Haidian District</t>

          <t>Beijing 100000 P.R. China</t>

          <t>Email: yifeng.zhou@bytedance.com</t>
        </list><list style="empty">
          <t/>
        </list><list style="empty">
          <t>Gyan Mishra</t>

          <t>Verizon</t>

          <t>Silver Spring, Maryland, USA</t>

          <t>Email: hayabusagsm@gmail.com</t>
        </list></t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include='reference.RFC.8174'?>

      <?rfc include='reference.RFC.8200'?>

      <?rfc include='reference.RFC.4443'?>

      <?rfc include='reference.RFC.5095'?>


      <?rfc include='reference.RFC.4302'?>


      <?rfc ?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.RFC.2151'?>

      <?rfc include='reference.RFC.5440'?>

      <?rfc include='reference.RFC.6241'?>

      <?rfc include='reference.RFC.5340'?>

      <?rfc include='reference.RFC.4271'?>

      <?rfc include='reference.RFC.8201'?>

    <?rfc include='reference.RFC.8704'?>



      <?rfc ?>

      <reference anchor="IANA-RH"
                 target="https://www.iana.org/assignments/ipv6-parameters/ipv6-parameters.xhtml#ipv6-parameters-3">
        <front>
          <title>Routing Headers</title>

          <author fullname="" initials="" surname="">
            <organization>IANA</organization>
          </author>

          <date month="" year=""/>
        </front>
      </reference>

      <reference anchor="ISO10589-Second-Edition" target="">
        <front>
          <title>"Intermediate system to Intermediate system intra-domain
          routeing information exchange protocol for use in conjunction with
          the protocol for providing the connectionless-mode Network Service
          (ISO 8473)", ISO/IEC 10589:2002, Second Edition,</title>

          <author fullname="" initials="" surname="">
            <organization>International Organization for
            Standardization</organization>
          </author>

          <date month="November" year="2001"/>
        </front>
      </reference>
    </references>

    <section anchor="Examples" title="CRH Processing Examples">
      <t>This appendix demonstrates CRH processing in the following
      scenarios:</t>

      <t><list style="symbols">
          <t><xref target="LSRP">The CRH SID list contains one entry for each
          segment in the path </xref>.</t>

          <t><xref target="LSR">The CRH SID list omits the first entry in the path
          </xref>.</t>
        </list></t>

      <figure align="center" anchor="RefTopo" title="Reference Topology">
        <artwork><![CDATA[
 -----------                 -----------                 -----------                    
|Node: S    |               |Node: I1   |               |Node: I2   |      
|Loopback:  |---------------|Loopback:  |---------------|Loopback:  |                          
|2001:db8::a|               |2001:db8::1|               |2001:db8::2|               
 -----------                 -----------                 -----------                     
      |                                                       | 
      |                      -----------                      |
      |                     |Node: D    |                     |
       ---------------------|Loopback:  |---------------------
                            |2001:db8::b| 
                             -----------
]]></artwork>
      </figure>

      <t/>

      <t><xref target="RefTopo"/> provides a reference topology that is used
      in all examples.</t>

      <texttable anchor="lsid" title="Node SIDs">
        <ttcol>SID</ttcol>

        <ttcol>IPv6 Address</ttcol>

        <ttcol>Forwarding Method</ttcol>

        <c>2</c>

        <c>2001:db8::2</c>

        <c>Least-cost path</c>

        <c>11</c>

        <c>2001:db8::b</c>

        <c>Least-cost path</c>
      </texttable>

      <t><xref target="lsid"/> describes two entries that appear in each
      node's CRH-FIB.</t>

      <t/>

      <section anchor="LSRP"
               title="The CRH SID List Contains One Entry For Each Segment In The Path">
        <t>In this example, Node S sends a packet to Node D, via I2. In this
        example, I2 appears in the CRH segment list.</t>

        <texttable>
          <ttcol>As the packet travels from S to I2:</ttcol>

          <ttcol/>

          <c>Source Address = 2001:db8::a</c>

          <c>Segments Left = 1</c>

          <c>Destination Address = 2001:db8::2</c>

          <c>SID[0] = 11</c>

          <c/>

          <c>SID[1] = 2</c>
        </texttable>

        <texttable>
          <ttcol>As the packet travels from I2 to D:</ttcol>

          <ttcol/>

          <c>Source Address = 2001:db8::a</c>

          <c>Segments Left = 0</c>

          <c>Destination Address = 2001:db8::b</c>

          <c>SID[0] = 11</c>

          <c/>

          <c>SID[1] = 2</c>
        </texttable>
      </section>

      <section anchor="LSR"
               title="The CRH SID List Omits The First Entry In The Path ">
        <t>In this example, Node S sends a packet to Node D, via I2. In this
        example, I2 does not appear in the CRH segment list.</t>

        <texttable>
          <ttcol>As the packet travels from S to I2:</ttcol>

          <ttcol/>

          <c>Source Address = 2001:db8::a</c>

          <c>Segments Left = 1</c>

          <c>Destination Address = 2001:db8::2</c>

          <c>SID[0] = 11</c>
        </texttable>

        <t/>

        <texttable>
          <ttcol>As the packet travels from I2 to D:</ttcol>

          <ttcol/>

          <c>Source Address = 2001:db8::a</c>

          <c>Segments Left = 0</c>

          <c>Destination Address = 2001:db8::b</c>

          <c>SID[0] = 11</c>
        </texttable>

        <t/>
      </section>
    </section>
  </back>
</rfc>
