This document describes the applicability of IPv6 over constrained-node networks (6lo) and provides practical deployment
An Ethernet Virtual Private Network (EVPN) provides a unified control plane that solves the issues of Network Virtualization Edge (NVE)
This document reserves a Top-Level Domain (TLD) label “alt” to be used in non-DNS contexts. It also provides advice and guidance to
The Concise Binary Object Representation (CBOR) data format is designed for small code size and small message size. CBOR Object
Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path
Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates
This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and
It is not uncommon for resource servers to require different authentication strengths or recentness according to the
This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level.
For operational simplification of “sessionless” applications using Bidirectional Forwarding Detection (BFD), in this document, we