<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-rate-policy-discovery-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-rate-policy-discovery-00"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra">
      <organization>Verizon Inc</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <author initials="M." surname="Amend" fullname="Markus Amend">
      <organization>Deutsche Telekom</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>markus.amend@telekom.de</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="08"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 152?>

<t>Traffic exchanged over a network attachment may be subject to rate-limit policies.
These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription)
or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation). This document specifies a mechanims for hosts to dynamically discover Network Rate-Limit Policies (NRLPs). This information is then passed to applicaitons that might adjust their behaviors accordingly.</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts using Neighbor Discovery options. Examples of such
properties are link MTU (RFC 4861) and PREFIX64 (RFC 8781). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a new DHCP option is also defined. The document also discusses how Provisioning Domains (PvD) can be used to notify hosts with NRLPs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 161?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="context">
        <name>Context</name>
        <t>Connectivity services are provided by networks to customers via
dedicated terminating points, such as customer edges (CEs) or User Equipment (UE).
To facilitate data transfer via the provider network, it is assumed that appropriate setup
is provisioned over the links that connect customer terminating points and a provider network (usually via a Provider Edge (PE)),
successfully allowing data exchange over these links. The required setup is referred to in this document as network attachments,
while the underlying link is referred to as "bearers".</t>
        <t>The bearer can be a physical or logical link that connects a customer device to a provider network. A bearer can be a wireless or wired link. The same or multiple bearer technologies can be used to establish the bearer (e.g., WLAN, cellular) to graft customer terminating points to a network.</t>
        <ul empty="true">
          <li>
            <t>Network attachment is also known as "Attachment Circuit (AC)" which is an established concept in the industry and also in the IETF (<xref target="RFC4026"/>, <xref target="RFC4664"/>, <xref target="RFC4364"/>, etc.).</t>
          </li>
        </ul>
        <t><xref target="ac"/> shows an example of a network that connects CEs and hosts (UE, for example).These CEs are servicing
other (internal) hosts. The identification of these hosts is hidden from the network. The policies enforced at the network
for an AC are per-subscriber, not per-host. Typically, if a CE is provided with a /56 IPv6 prefix, policies are enforced
on that /56 not the individual /64s that will be used by internal hosts. A customer terminating point may be serviced with one (e.g., UE#1, CE#1, and CE#3) or multiple ACs (e.g., CE#2).</t>
        <figure anchor="ac">
          <name>Sample Network Attachments</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,80 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 8,208" fill="none" stroke="black"/>
                <path d="M 64,80 L 64,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 64,208" fill="none" stroke="black"/>
                <path d="M 120,96 L 120,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 120,192" fill="none" stroke="black"/>
                <path d="M 200,80 L 200,224" fill="none" stroke="black"/>
                <path d="M 368,80 L 368,224" fill="none" stroke="black"/>
                <path d="M 448,80 L 448,128" fill="none" stroke="black"/>
                <path d="M 448,176 L 448,208" fill="none" stroke="black"/>
                <path d="M 504,80 L 504,128" fill="none" stroke="black"/>
                <path d="M 504,176 L 504,208" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 200,80 L 368,80" fill="none" stroke="black"/>
                <path d="M 448,80 L 504,80" fill="none" stroke="black"/>
                <path d="M 64,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 368,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 416,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
                <path d="M 416,112 L 448,112" fill="none" stroke="black"/>
                <path d="M 8,128 L 64,128" fill="none" stroke="black"/>
                <path d="M 120,128 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,128 L 200,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 120,160 L 144,160" fill="none" stroke="black"/>
                <path d="M 168,160 L 200,160" fill="none" stroke="black"/>
                <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
                <path d="M 64,192 L 120,192" fill="none" stroke="black"/>
                <path d="M 368,192 L 392,192" fill="none" stroke="black"/>
                <path d="M 416,192 L 448,192" fill="none" stroke="black"/>
                <path d="M 8,208 L 64,208" fill="none" stroke="black"/>
                <path d="M 448,208 L 504,208" fill="none" stroke="black"/>
                <path d="M 200,224 L 368,224" fill="none" stroke="black"/>
                <g class="text">
                  <text x="472" y="36">Hosts</text>
                  <text x="456" y="52">O</text>
                  <text x="472" y="52">O</text>
                  <text x="488" y="52">O</text>
                  <text x="472" y="68">\|/</text>
                  <text x="404" y="100">AC</text>
                  <text x="36" y="116">UE#1</text>
                  <text x="404" y="116">AC</text>
                  <text x="476" y="116">CE#2</text>
                  <text x="156" y="132">AC</text>
                  <text x="272" y="148">Network</text>
                  <text x="156" y="164">AC</text>
                  <text x="36" y="196">CE#1</text>
                  <text x="404" y="196">AC</text>
                  <text x="476" y="196">CE#3</text>
                  <text x="40" y="228">/|\</text>
                  <text x="480" y="228">/|\</text>
                  <text x="24" y="244">O</text>
                  <text x="40" y="244">O</text>
                  <text x="56" y="244">O</text>
                  <text x="464" y="244">O</text>
                  <text x="480" y="244">O</text>
                  <text x="496" y="244">O</text>
                  <text x="40" y="260">Hosts</text>
                  <text x="480" y="260">Hosts</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                                                        Hosts
                                                        O O O
                                                         \|/
.------.                .--------------------.         .------.
|      +------+         |                    +---AC----+      |
| UE#1 |      |         |                    +---AC----+ CE#2 |
'------'      +---AC----+                    |         '------'
                        |     Network        |
.------.      .---AC----+                    |
|      |      |         |                    |         .------.
| CE#1 +------'         |                    +---AC----+ CE#3 |
'------'                |                    |         '------'
   /|\                  '--------------------'            /|\
  O O O                                                  O O O
  Hosts                                                  Hosts
]]></artwork>
          </artset>
        </figure>
        <t>Customer terminating points are provided with a set of information (e.g., IP address/prefix) to successfully be
able to send and receive traffic over an AC. A comprehensive list of provisioning parameters that are available on
the PE-side of an AC is documented in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
        <t>The required set of parameters is a function of the service offering. For example, a very limited set of parameters is required for mass-market
service offering while a more elaborated set is required for Enterprise services (e.g., Layer 2 VPN <xref target="RFC9291"/> or Layer 3 VPN <xref target="RFC9182"/>). This document
<strong>leverages access control, authorization, and authentication mechanisms that are already in place for the delivery of services over these ACs</strong>.</t>
      </section>
      <section anchor="networks-are-already-sharing-network-properties-with-hosts">
        <name>Networks Are Already Sharing Network Properties with Hosts</name>
        <t>To optimally deliver connectivity services via a network attachment, networks also advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
        <dl>
          <dt>Link Maximum Transmission Unit (MTU):</dt>
          <dd>
            <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
          </dd>
          <dt/>
          <dd>
            <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
          </dd>
          <dt/>
          <dd>
            <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
          </dd>
          <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
          <dd>
            <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
          </dd>
          <dt/>
          <dd>
            <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
          </dd>
          <dt>Encrypted DNS option <xref target="RFC9463"/>:</dt>
          <dd>
            <t>This option is used to discover encrypted DNS resolvers of a network.</t>
          </dd>
        </dl>
      </section>
      <section anchor="whats-in">
        <name>What's In?</name>
        <t><strong>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/></strong>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate rate-limit policies to hosts (<xref target="sec-nd"/>). For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4 in <xref target="sec-dhcp"/>. <xref target="sec-pvd"/> describes a discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>.</t>
        <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
        <t>In order to ensure consistent design for both IPv4 and IPv6 ACs, <xref target="sec-blob"/> groups the set of NRLP parameters that are returned independent of the address family. This blob can be leveraged in networks where ND/DHCP/PvD are not used and ease the mapping with specific protocols used in these networks. For example, <strong><em>a Protocol Configuration Option (PCO) <xref target="TS-24.008"/> NRLP Information Element can be defined in 3GPP</em></strong>.</t>
        <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document.</t>
        <t>Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
      </section>
      <section anchor="whats-out">
        <name>What's Out?</name>
        <t>This document does not make any assumption about the type of the network (fixed, cellular, etc.) that terminates an AC.</t>
        <t>Likewise, the document does not make any assumption about the services or applications that are delivered over an AC. Whether one or multiple services
are bound to the same AC is deployment specific.</t>
        <t>Applications will have access to all these NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy (all traffic, streaming, etc.). An application that couples multiple flow types will adjust each flow type to be consistent with the specific policy for the relevant traffic category. Likewise, a host with multiple ACs may use the discovered NRLPs AC to decide how to distribute its flows over these ACs (prefer an AC to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policy.</t>
        <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/> or <xref section="8" sectionFormat="of" target="I-D.ietf-masque-quic-proxy"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
        <t>This document does not assume nor preclude that other mechanisms, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link. The reader may refer to <xref target="sec-alt"/> for a list of relevant mechanisms. Whether these mechanism as alternative or complementary to explicit host/network signals is to be further assessed.</t>
      </section>
      <section anchor="design-motivation-rationale">
        <name>Design Motivation &amp; Rationale</name>
        <t>The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fate sharing</t>
          </li>
          <li>
            <t>Atomic configuration</t>
          </li>
          <li>
            <t>Updatability: change the policy at any time</t>
          </li>
          <li>
            <t>Deployability</t>
          </li>
        </ul>
        <t>The solution specified in the document is designed to <strong>ease integration with network management tools</strong> that are used to manage and expose policies. It does so by leveraging the policy structure defined in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>. That same structure is also used in the context of service activation such as Network Slicing <xref target="RFC9543"/>; see the example depicted in Appendix B.5 of <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
        <t>The solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not require any data plane change</strong>.</t>
          </li>
          <li>
            <t><strong>Applicable to any transport protocol</strong>.</t>
          </li>
          <li>
            <t><strong>Does not impact the connection setup delay</strong>.</t>
          </li>
          <li>
            <t><strong>Does not require to reveal the identity of the target server or the application itself</strong> to consume the signal.</t>
          </li>
          <li>
            <t><strong>Supports cascaded environments</strong> where multiple levels to enforce rate-limiting polices is required (e.g., WAN and LAN shown in <xref target="ac-casc"/>). NRLP signals can be coupled or decoupled as a function of the local policy.</t>
          </li>
          <li>
            <t><strong>Supports signaling policies bound to one or both traffic directions</strong>.</t>
          </li>
          <li>
            <t>Is able to <strong>signal whether a policy applies to a specific host or all hosts of a given subscriber</strong>.</t>
          </li>
        </ul>
        <figure anchor="ac-casc">
          <name>Example of Cascaded NRLPs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="424" viewBox="0 0 424 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
                <path d="M 8,112 L 8,160" fill="none" stroke="black"/>
                <path d="M 64,32 L 64,80" fill="none" stroke="black"/>
                <path d="M 64,112 L 64,160" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 96,112 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,48 L 144,144" fill="none" stroke="black"/>
                <path d="M 176,48 L 176,144" fill="none" stroke="black"/>
                <path d="M 248,32 L 248,176" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,176" fill="none" stroke="black"/>
                <path d="M 8,32 L 64,32" fill="none" stroke="black"/>
                <path d="M 248,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 64,48 L 96,48" fill="none" stroke="black"/>
                <path d="M 144,48 L 176,48" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 96,80 L 144,80" fill="none" stroke="black"/>
                <path d="M 176,96 L 248,96" fill="none" stroke="black"/>
                <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
                <path d="M 96,112 L 144,112" fill="none" stroke="black"/>
                <path d="M 64,144 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 248,176 L 416,176" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Host</text>
                  <text x="36" y="68">#1</text>
                  <text x="160" y="84">C</text>
                  <text x="100" y="100">nrlp#2</text>
                  <text x="160" y="100">P</text>
                  <text x="328" y="100">Network</text>
                  <text x="160" y="116">E</text>
                  <text x="212" y="116">nrlp#1</text>
                  <text x="36" y="132">Host</text>
                  <text x="36" y="148">#2</text>
                  <text x="100" y="164">nrlp#3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.------.                      .--------------------.
| Host +---+     .---.        |                    |
|  #1  |   |     |   |        |                    |
'------'   +-----+ C |        |                    |
         nrlp#2  | P +--------+      Network       |
.------.   .-----+ E | nrlp#1 |                    |
| Host |   |     |   |        |                    |
|  #2  +---'     '---'        |                    |
'------' nrlp#3               |                    |
                              '--------------------'
]]></artwork>
          </artset>
        </figure>
        <t>Compared to a proxy or an encapsulation-based proposal (e.g., <xref target="I-D.ihlar-masque-sconepro-mediabitrate"/>), the solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not impact the MTU tweaking</strong>: No packet overhead is required.</t>
          </li>
          <li>
            <t><strong>Does not suffer from side effects of multi-layer encryption schemes</strong> on the packet processing and overall performance of involved network nodes. Such issues are encountered, e.g., with the tunneled mode or long header packets in the forwarded QUIC proxy mode <xref target="I-D.ietf-masque-quic-proxy"/>.</t>
          </li>
          <li>
            <t><strong>Does not suffer from nested congestion control</strong> for tunneled proxy mode.</t>
          </li>
          <li>
            <t><strong>Does not incur multiple round-trips</strong> in the forwarding mode for the client to start sending Short Header packets.</t>
          </li>
          <li>
            <t><strong>Does not incur the overhead of unauthenticated re-encryption of QUIC packets</strong> in the scramble transform of the forwarding mode.</t>
          </li>
          <li>
            <t><strong>Does not impact the forwarding peformance of network nodes</strong>. For example, the proxy forwarded mode <xref target="I-D.ietf-masque-quic-proxy"/> requires rewriting connection identifiers; that is, the performance degradation will be at least equivalent to NAT.</t>
          </li>
          <li>
            <t><strong>Does not suffer from the complications of IP address sharing <xref target="RFC6269"/></strong>. Such issues are likely to be experienced for proxy-based solutions that multiplex internal connections using one or more external IP addresses.</t>
          </li>
          <li>
            <t><strong>Does not suffer from penalizing the proxy</strong> which could serve both good and bad clients (e.g., launching Layer 7 DDoS attacks).</t>
          </li>
          <li>
            <t><strong>Does not require manipulating extra steering policies on the host</strong> to decide which flows can be forwarded over or outside the proxy connection.</t>
          </li>
          <li>
            <t><strong>Requires a minor change to the network</strong>: For IPv6, upgrade PE nodes to support a new ND option. Note that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>. For IPv4, configure DHCP servers to include a new DHCP option.</t>
          </li>
        </ul>
      </section>
      <section anchor="sample-deployment-cases">
        <name>Sample Deployment Cases</name>
        <t>Some deployment use cases for NRLP are provided below:</t>
        <ul spacing="normal">
          <li>
            <t>A network may advertize an NRLP when it is overloaded, including when it is under attack. The rate-limit policy is basically a reactive policy that is meant to adjust the behavior of connected hosts to better control the load during these exceptional events (issue with RAN resources, for example). The mechanism can also be used to enrich the tools that are already available to better handle attack traffic close to the source <xref target="RFC9066"/>.</t>
          </li>
          <li>
            <t>Discovery of intentional policy applied on ACs (peering links, CE-PE links, etc.) when such information is not made available during the service activation or when network upgrades are performed.</t>
          </li>
          <li>
            <t>A user may configure policies on the CPE such as securing some resources to a specific internal host used for gaming or video streaming. The CPE can use the NRLP option to share these rate-limit policies to connected hosts to adjust their forwarding behavior.</t>
          </li>
        </ul>
        <t>Operational considerations are discussed in <xref target="sec-ops"/>, while deployment incentives are described in <xref target="sec-inc"/>.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref section="2" sectionFormat="of" target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="RFC9473"/>.</t>
      <t>Also, this document makes use fo the following terms:</t>
      <dl>
        <dt>Reactive policy:</dt>
        <dd>
          <t>Treatment given to a flow when an exceptional event
occurs, such as diminished throughput to the host caused by radio
interference or weak radio signal, congestion on the network
caused by other users or other applications on the same host.</t>
        </dd>
        <dt>Intentional policy:</dt>
        <dd>
          <t>Configured bandwidth, pps, or similar throughput
constraints applied to a flow, application, host, or subscriber.</t>
        </dd>
        <dt>Rate-limit:</dt>
        <dd>
          <t>Used as a generic term to refer to a policy to restrict the maximum bitrate of a flow.</t>
        </dd>
        <dt/>
        <dd>
          <t>It can be used with or without any traffic classification.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-blob">
      <name>NRLP Blob</name>
      <t>This section defines the set of attributes that are included in an NRLP blob:</t>
      <dl>
        <dt>Optional Parameter Flags (OPF):</dt>
        <dd>
          <t>These flags indicate the presence of some optional parameters. The following flags are defined (from MSB to LSB):
</t>
          <dl>
            <dt>E:</dt>
            <dd>
              <t>When set to "1", this flag indicates the presence of Excess Information Rate (EIR).</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that EIR is not present.</t>
            </dd>
            <dt>P:</dt>
            <dd>
              <t>When set to "1", this flag indicates the presence of Peak Information Rate (PIR).</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that PIR is not present.</t>
            </dd>
            <dt>U:</dt>
            <dd>
              <t>Unassigned bits. See <xref target="sec-iana-opf"/>.</t>
            </dd>
            <dt/>
            <dd>
              <t>Unassigned bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
            </dd>
          </dl>
        </dd>
        <dt>Flow flags (FF):</dt>
        <dd>
          <t>These flags are used to express some generic properties of the flow. The following flags are defined (from MSB to LSB):
</t>
          <dl>
            <dt>S (Scope):</dt>
            <dd>
              <t>1-bit field which specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0).</t>
            </dd>
            <dt>D (Direction):</dt>
            <dd>
              <t>1-bit flag which indicates the direction on which to apply the enclosed policy.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "1", this flag indicates that this policy is for
network-to-host direction.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that this policy is for
host-to-network direction.</t>
            </dd>
            <dt>R (Reliablity):</dt>
            <dd>
              <t>2-bit flag which indicates the reliability type of traffic on which to apply the enclosed policy.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "00b", this flag indicates that this policy is for unreliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "01b", this flag indicates that this policy is for reliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "10b", this flag indicates that this policy is for both reliable and unreliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>No meaning is associated with setting the field to "11b". Such value <bcp14>MUST</bcp14> be silently ignored by the receiver.</t>
            </dd>
            <dt>U:</dt>
            <dd>
              <t>Unassigned bits. See <xref target="sec-iana-ff"/>.</t>
            </dd>
            <dt/>
            <dd>
              <t>Unassigned bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
            </dd>
          </dl>
        </dd>
        <dt>TC (Traffic Category):</dt>
        <dd>
          <t>6-bit field which specifies a traffic category to which this policy applies.</t>
        </dd>
        <dt/>
        <dd>
          <t>The following values are supported:
</t>
          <ul spacing="normal">
            <li>
              <t>"0": All traffic. This is the default value.</t>
            </li>
            <li>
              <t>"1": Streaming</t>
            </li>
            <li>
              <t>"2": Real-time</t>
            </li>
            <li>
              <t>"3": Bulk traffic</t>
            </li>
            <li>
              <t>4-63: Unassigned values</t>
            </li>
          </ul>
        </dd>
        <dt>Committed Information Rate (CIR) (Mbps):</dt>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an AC for a
traffic category.</t>
        </dd>
        <dt/>
        <dd>
          <t>If set to 0, this indicates to the host that an alternate path (if any) should be preferred over this one.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Committed Burst Size (CBS) (bytes):</dt>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Excess Information Rate (EIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if the E flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an AC for a
traffic category that is out of profile.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Excess Burst Size (EBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if EIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Indicates the maximum excess burst size that is allowed while not complying with the CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Information Rate (PIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if P flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Burst Size (PBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if PIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
      </dl>
      <t>The reader should refer to <xref target="RFC2697"/>, <xref target="RFC2698"/>, and <xref target="RFC4115"/> for examples
of how various combinations of CIR/CBS/EIR/EBS/PIR/PBS are used for policing. Typically:</t>
      <ul spacing="normal">
        <li>
          <t>A Single-Rate, Three-Color Marker <xref target="RFC2697"/> uses CIR, CBS, and EBS.</t>
        </li>
        <li>
          <t>A Dual-Rate, Three-Color Marker <xref target="RFC2698"/> uses CIR, CBS, PIR, and PBS.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-nd">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
MSB                                                          LSB
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of the IPv6 RA NRLP option, with optional fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-format">
          <name>NRLP Option Format with Optional Fields</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Excess Information Rate (EIR) (Optional)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Excess Burst Size (EBS) (Optional)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Peak Information Rate (PIR) (Optional)          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Peak Burst Size (PBS) (Optional)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1) (see <xref target="sec-iana-ra"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
          <dt>OPF (Optional Parameter Flags):</dt>
          <dd>
            <t>4-bit flags which indicates the presence of some optional inforamtion in the option.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-op-flags"/> for current assigned flags.</t>
          </dd>
          <dt>FF (Flow flags):</dt>
          <dd>
            <t>6-bit flags used to express some generic properties of the flow.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-flow-flags"/> for current assigned flags.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="sec-dhcp">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format-1">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).  (see <xref target="sec-iana-dhcp"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of this field, with optional parameters included, is shown in <xref target="nrlp-m-format"/>.</t>
        <figure anchor="nrlp-format">
          <name>NRLP Instance Data Format with Optional Fields Included</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
|  Excess Information Rate      |  |
|             (EIR)             |  O
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  P
|    Excess Burst Size (CBS)    |  T
|                               |  I
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  O
|    Peak Information Rate      |  N
|             (PIR)             |  A
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  L
|      Peak Burst Size (PBS)    |  |
|                               |  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
          <dt>OPF (Optional Parameter Flags):</dt>
          <dd>
            <t>4-bit flags which indicates the presence of some optional inforamtion in the option.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-op-flags"/> for current assigned flags.</t>
          </dd>
          <dt>FF (Flow flags):</dt>
          <dd>
            <t>6-bit flags used to express some generic properties of the flow.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-flow-flags"/> for current assigned flags.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be used as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":1,
         "scope":1,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="sec-ops">
      <name>Operational Considerations</name>
      <section anchor="nrlp-is-complementary-not-replacement-solution">
        <name>NRLP Is Complementary Not Replacement Solution</name>
        <t>Sharing NRLP signals are not intended to replace usual actions to soften bottlenck issues (e.g., adequate network dimensioning and upgrades). However, given that such actions may not be always immediately possible or economically justified, NRLP signals can be considered as complementary mitigations to soften these issues by introducing some collaboration between a host and
its networks to adjust their behaviors.</t>
      </section>
      <section anchor="provisionning-policies">
        <name>Provisionning Policies</name>
        <t>NRLP senders should be configured with instructions about the type of network rate-limit policies to be shared with requesting hosts. These types can be provided using mechanisms such as <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      </section>
      <section anchor="redundant-vs-useful-signal">
        <name>Redundant vs. Useful Signal</name>
        <t>In contexts where the bitrate policies are known during the establishment of the underlying bearer (e.g., GBR PDU Sessions), sending NRLP signals over the AC may be redundant and should thus be disabled.</t>
        <t>In contexts where the (average) bitrate policies provided during the establishment of a bearer cannot be refreshed to echo network-specific conditions (e.g., overload) using bearer-specific mechanisms, sending NRLP signals over the AC would allow control the load at the source.</t>
        <t>When both bearer-specific policies and NRLP signals are communicated to a host, the NRLP signals takes precedence.</t>
      </section>
      <section anchor="fairness">
        <name>Fairness</name>
        <t>Rate-limit policies enforced at the network are assumed to be consistent with the local jurisdictions. For example:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="BEREC"/> states that ISPs are prohibited from blocking or slowing down of Internet traffic, except for legal reasons, network security, or congestion, provided that equivalent categories of traffic are treated equally.</t>
          </li>
          <li>
            <t><xref target="FCC"/> states that net neutrality policies "prohibits internet service providers from blocking, throttling, or engaging in paid prioritization of lawful content". The FCC allows some exceptions, like for security and emergencies.</t>
          </li>
        </ul>
        <t>These regulatory frameworks align with the goals of this document.</t>
      </section>
      <section anchor="architectural-considerations-matter">
        <name>Architectural Considerations Matter</name>
        <t>Approaches based on middleboxes are generally not recommended due to their inherent limitations, in terms of performance, scalability, redundancy, etc. Specifically, if the management and operation of such middleboxes remain unclear, that motivate operational issues and responsibilities.
Furthermore, it is important to note that any middlebox could not necessarily cover an entire service end-to-end, thus <strong>producing only partial observations which could not be sufficiently good at the time of generating appropriate signals</strong>.</t>
        <t>The NRLP solution does not require such middleboxes but the consideration about partial observability applies. That concern can be softened by cascaded NLRP design. However, network integration of such appraoch is to be further elaborated.</t>
      </section>
      <section anchor="service-considerations-application-diversity-realistic-assessment">
        <name>Service Considerations: Application Diversity &amp; Realistic Assessment</name>
        <t>Signals could be generated for multiple services and/or applications. For instance, services providing short video content might require signals different to those based on long videos. This implies the need of defining a generic method suitable for any kind of service and application, avoiding the multiplicity of solutions and the dominance of some applications over others.</t>
        <t>It should be also noted that more experimentation is needed in order to fully understand the implications of the signals in the overall performance of the network. On one hand, the co-existence of multiple flows, some of them using the signals for improving the experience, some others not. For this, more experimentation and datasets are required, so then can be clear that no flows are negatively impacted at all.</t>
        <t>On the other hand, if the experience of the flows improves and depending on the nature of the signals themselves, this might motivate a more intense usage of the network, then requiring to accommodate larger number of flows, and in consequence, reducing the available resources per application. This kind of paradox can be <strong>assessed with more experimental results under realistic conditions (i.e., multiple users and multiple services in the network)</strong>.</t>
      </section>
      <section anchor="operational-guidance-for-signal-enforcement">
        <name>Operational Guidance for Signal Enforcement</name>
        <t>Signals are conceived as indications from the network towards applications. It is not clear the way of enforcing the application to follow the indication, especially in a context where different applications from a user, or multiple users, simultaneously access the network. This can motivate a wastage of resources for generating signals with the risk of not being effective. Furthermore, it might lead to a continuous loop of signal generation because the initial signals being ignored. It is then necessary to define mechanisms to avoid permanent signal generation when ignored.</t>
        <t>Finally, signals could not be required at every moment, but only in situations that can benefit the service. Such situations could be due, for instance, to given levels of congestion, or based on previous information shared by the application (e.g., SLO thresholds) so that signals can be triggered according to service conditions. <strong>Elaborating more operational guidance on intended signal enforcment policy is key</strong>.</t>
      </section>
      <section anchor="signal-estimation">
        <name>Signal Estimation</name>
        <t>The validity of the estimation produced by a network might be questioned by the application. Trust is required in a way that applications can safely follow guidance from a network. Furthermore, whatever estimation should be timely produced, avoiding the generation of aged estimations that could not correspond to the actual service circumstances. Finally, some common guidance is necessary to define a standard way of generating signals, for instance, per-flow or per group of flows.</t>
        <t>An open point is how to deal with adaptive applications, in the sense that signals could not be of value because the self-adaptation nature of these applications.</t>
      </section>
      <section anchor="signal-interference">
        <name>Signal "Interference"</name>
        <t>The network is built on multiple layers. In some cases, different solutions targeting similar objectives (e.g., congestion control or bottleneck mitigation) can be in place. It is then necessary to <strong>assess the simultaneous coexistence of these solutions to avoid contradictory effects or "interferences"</strong>.</t>
      </section>
    </section>
    <section anchor="sec-inc">
      <name>Deployment Incentives</name>
      <section anchor="networks">
        <name>Networks</name>
        <t>There are a set of tradeoffs for networks to deploy NRLP discovery:</t>
        <ul spacing="normal">
          <li>
            <t>Cost vs. benefit</t>
          </li>
          <li>
            <t>Impact on operations vs incentive to deploy</t>
          </li>
          <li>
            <t>Enhanced experience vs. impacts on nominal mode</t>
          </li>
        </ul>
        <t>The procedure defined in the document provides a mechanism to assist networks managing the load at the source and, thus, contribute to better handle network overloads and optimize the use
of resources under non nominal conditions. The mechanism also allows to enhance the quality of experience at the LAN by providing a simple tool to communicate local policies to hosts. A minimal change is required to that aim.</t>
        <t>With the OS support, the following benefits might be considered by networks:</t>
        <dl>
          <dt>Improved Network Performance:</dt>
          <dd>
            <t>The OS can schedule network requests more efficiently, preventing network congestion, and improving overall stability and network performance with NRLP signals.</t>
          </dd>
          <dt>Cost Efficiency:</dt>
          <dd>
            <t>By managing network usage based on known rate limits, the OS can help reduce network-related costs. However, this is difficult to assess.</t>
          </dd>
        </dl>
        <t>Networks that throttle bandwidth for reasons that are not compliant with local jurisdictions, not communicated to customers, etc. are unlikely to share NRLP signals. If these signals are shared, it is unlikely that they will mirror the actual network configuration (e.g., application-specific policies).</t>
      </section>
      <section anchor="sec-app-inc">
        <name>Applications</name>
        <t>Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed
how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals
depends upon:</t>
        <ul spacing="normal">
          <li>
            <t>The extra cost that is required to support both mechanisms at the application layer.</t>
          </li>
          <li>
            <t>The complexity balance between performing the measurements vs. consuming the signal.</t>
          </li>
          <li>
            <t>Whether the measurements ("assessed property" per <xref target="RFC9473"/>) reflect actual network conditions or severely diverge.</t>
          </li>
          <li>
            <t>The availability of the network signals at the first place: it is unlikely that all networks will support sending the signals. Deployment incentives at the network may vary.</t>
          </li>
          <li>
            <t>The host support may be variable.</t>
          </li>
        </ul>
        <t>Applications that don't support (embedded) bandwidth measurement schemes will be enriched with the NRLP signals as this will be exposed by an OS API.</t>
      </section>
      <section anchor="host-os">
        <name>Host OS</name>
        <dl>
          <dt>API to facilitate Application Development:</dt>
          <dd>
            <t>An OS can provide more accurate available bandwidth to applications through the API (as mentioned in <xref target="sec-app-inc"/>), making implementation easier for applications that don't requrie dedicated bandwidth measurement.</t>
          </dd>
          <dt>Prevent Abuse:</dt>
          <dd>
            <t>The OS can allocate network resources more fairly among different processes, with NRLP signals, ensuring that no single process monopolizes the network.</t>
          </dd>
          <dt>Better Resource Management:</dt>
          <dd>
            <t>OS can also optimize resource allocation, by deprioritizing background/inactive applications in the event of high network utilization.</t>
          </dd>
          <dt>Enhanced Security:</dt>
          <dd>
            <t>Awareness of NRLPs can help the OS detect and mitigate network-related security threats, such as denial-of-service (DoS) attacks.</t>
          </dd>
          <dt>Improved User Experience:</dt>
          <dd>
            <t>By avoiding network congestion and ensuring fair resource allocation, the OS can provide a smoother, more responsive user experience.</t>
          </dd>
          <dt>Improved Application Development Efficiency:</dt>
          <dd>
            <t>OS providing rate limits through an API (as mentioned in <xref target="sec-app-inc"/>) can provide the above listed benefits at per application level.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The techniques discussed in the document offer the following security benefit: An OS can identify the type of application (background, foreground, streaming, real-time, etc.) and enforce appropriate network policies, even if a misbehaving application tries
to evade the rate-limit policies. If an application attempts to bypass rate-limiting by changing its 5-tuple or creating multiple flows,
the OS can detect this and manage the application's traffic accordingly.</t>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerations for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an AC may:</t>
        <dl>
          <dt>Decrease the bitrate:</dt>
          <dd>
            <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </dd>
          <dt>Increase the bitrate value:</dt>
          <dd>
            <t>The AC will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </dd>
          <dt>Drop RAs:</dt>
          <dd>
            <t>This is similar to the current operations, where no NRLP RA is shared.</t>
          </dd>
          <dt>Inject fake RAs:</dt>
          <dd>
            <t>The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an AC may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-rlp">
        <name>Rate-Limit Policy Objects Registry Group</name>
        <t>This document requests IANA to create a new registry group entitled "Rate-Limit Policy Objects".</t>
      </section>
      <section anchor="sec-iana-opf">
        <name>Optional Parameter Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Optional Parameter Flags" under the "Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-op-flags"/>.</t>
        <table anchor="iana-op-flags">
          <name>Optional Parameter Flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">E-flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">P-flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ff">
        <name>Flow Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Flow flags" under the "Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-flow-flags"/>.</t>
        <table anchor="iana-flow-flags">
          <name>Flow flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Scope (S) Flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Direction (D) Flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3-4</td>
              <td align="left">Reliability (R) Flags</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ra">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" sub-registry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD1" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-iana-dhcp">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD2" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left"> </th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="provisioning-domains-split-dns-additional-information">
        <name>Provisioning Domains Split DNS Additional Information</name>
        <t>IANA is requested to add the following entry to the "Additional Information PvD Keys"
registry under the "Provisioning Domains (PvDs)" registry group <xref target="IANA-PVD"/>:</t>
        <dl>
          <dt>JSON key:</dt>
          <dd>
            <t>"nrlp"</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>"Network Rate-Limit Policies (NRLPs)"</t>
          </dd>
          <dt>Type:</dt>
          <dd>
            <t>Array of Objects</t>
          </dd>
        </dl>
        <t>Example:</t>
        <artwork><![CDATA[
   {
      "nrlp":[
         {
            "direction":1,
            "scope":1,
            "tc":0,
            "cir":50
         }
      ]
   }
]]></artwork>
        <dl>
          <dt>Reference:</dt>
          <dd>
            <t>This_Document</t>
          </dd>
        </dl>
      </section>
      <section anchor="new-pvd-network-rate-limit-policies-nrlps-registry">
        <name>New PvD Network Rate-Limit Policies (NRLPs) Registry</name>
        <t>IANA is requested to create a new registry "PvD Rate-Limit Policies (NRLPs)" registry,
within the "Provisioning Domains (PvDs)" registry group.</t>
        <t>The initial contents of this registry are as follows:</t>
        <table anchor="iana-pvd-initial">
          <name>Initial PvD Network Rate-Limit Policies (NRLPs) Registry Content</name>
          <thead>
            <tr>
              <th align="left">JSON key</th>
              <th align="left">Description</th>
              <th align="left">Type</th>
              <th align="left">Example</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">direction</td>
              <td align="left">Indicates the traffic direction to which a policy applies. When set to "1", this parameter indicates that this policy is for network-to-host direction. When set to "0", this parameter indicates that this policy is for host-to-network direction.</td>
              <td align="left">Boolean</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">scope</td>
              <td align="left">Specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0)</td>
              <td align="left">Boolean</td>
              <td align="left">1</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">tc</td>
              <td align="left">Specifies a traffic category to which this policy applies. Values are taken from the Rate-Limit Policy Objects Registry <xref target="sec-iana-rlp"/></td>
              <td align="left">Integer</td>
              <td align="left">0</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cir</td>
              <td align="left">Specifies the maximum number of bits that a network can receive or send during one second over an AC for a traffic category.</td>
              <td align="left">Integer</td>
              <td align="left">50</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">xxx</td>
              <td align="left">xxx</td>
              <td align="left">xxx</td>
              <td align="left">xx</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <t>New assignments in the "PvD Network Rate-Limit Policies (NRLPs)" registry
will be administered by IANA through Expert Review policy <xref target="RFC8126"/>.
Experts are requested to ensure that defined keys do not overlap in names
or semantics.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-PVD" target="https://www.iana.org/assignments/pvds/">
          <front>
            <title>Provisioning Domains (PvDs)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-23.503" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3334">
          <front>
            <title>TS 23.503: Policy and charging control framework for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-29.522" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3437">
          <front>
            <title>TS 29.522: 5G System; Network Exposure Function Northbound APIs</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
          <front>
            <title>Bandwidth measurement for QUIC</title>
            <author fullname="Zafer Gurel">
              <organization/>
            </author>
            <author fullname="Ali C. Begen">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-24.008" target="https://www.3gpp.org/DynaReport/24008.htm">
          <front>
            <title>Technical Specification Group Core Network and Terminals; Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (Release 18)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="BEREC" target="https://www.berec.europa.eu/en/all-you-need-to-know-about-net-neutrality-rules-in-the-eu-0">
          <front>
            <title>All you need to know about Net Neutrality rules in the EU</title>
            <author>
              <organization>BEREC</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="FCC" target="https://www.fcc.gov/document/fcc-restores-net-neutrality-0">
          <front>
            <title>FCC Restores Net Neutrality</title>
            <author>
              <organization>FCC</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TR-470" target="https://www.broadband-forum.org/pdfs/tr-470-2-0-0.pdf">
          <front>
            <title>5G Wireless Wireline Convergence Architecture - Issue 2</title>
            <author>
              <organization>BBF</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="5" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-13"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="I-D.ietf-masque-quic-proxy">
          <front>
            <title>QUIC-Aware Proxying Using HTTP</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Rosenberg" initials="E." surname="Rosenberg">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="David Schinazi" initials="D." surname="Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document extends UDP Proxying over HTTP to add optimizations for
   proxied QUIC connections.  Specifically, it allows a proxy to reuse
   UDP 4-tuples for multiple proxied connections, and adds a mode of
   proxying in which QUIC short header packets can be forwarded and
   transformed through a HTTP/3 proxy rather than being fully re-
   encapsulated and re-encrypted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-masque-quic-proxy-03"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="28" month="August" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-16"/>
        </reference>
        <reference anchor="I-D.ihlar-masque-sconepro-mediabitrate">
          <front>
            <title>MASQUE extension for signaling media bitrate</title>
            <author fullname="Marcus Ihlar" initials="M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a new Capsule (RFC9297) that can be used with
   CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT
   extensions to signal the available bitrate for media traffic that is
   proxied through an HTTP server.  This information can be used by a
   media application to regulate its media bitrate in accordance with a
   network policy, as an alternative to in-network traffic shaping.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ihlar-masque-sconepro-mediabitrate-00"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="P. Roberts" initials="P." surname="Roberts"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber. Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing. These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches. Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on. Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
        <reference anchor="RFC9066">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document specifies the Denial-of-Service Open Threat Signaling (DOTS) signal channel Call Home, which enables a Call Home DOTS server to initiate a secure connection to a Call Home DOTS client and to receive attack traffic information from the Call Home DOTS client. The Call Home DOTS server in turn uses the attack traffic information to identify compromised devices launching outgoing DDoS attacks and take appropriate mitigation action(s).</t>
              <t>The DOTS signal channel Call Home is not specific to home networks; the solution targets any deployment in which it is required to block DDoS attack traffic closer to the source(s) of a DDoS attack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9066"/>
          <seriesInfo name="DOI" value="10.17487/RFC9066"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-ns-ip-mpls">
          <front>
            <title>A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Julian Lucek" initials="J." surname="Lucek">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="October" year="2024"/>
            <abstract>
              <t>   Slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks.  Realization of 5G
   slicing implies requirements for all mobile domains, including the
   Radio Access Network (RAN), Core Network (CN), and Transport Network
   (TN).

   This document describes a Network Slice realization model for IP/MPLS
   networks with a focus on the Transport Network fulfilling 5G slicing
   connectivity service objectives.  The realization model reuses many
   building blocks currently commonly used in service provider networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-12"/>
        </reference>
      </references>
    </references>
    <?line 984?>

<section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrieve the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-alt">
      <name>Alternative/Complementary Mechanisms</name>
      <t>In the event of bottlenecks in a network, there are other mechanisms that provide information or help to reserve resources. These can be used within the bottleneck network or, in some cases, across network boundaries. The following sections give examples of such mechanisms and provide background information.</t>
      <section anchor="L4S">
        <name>L4S</name>
        <t>Low Latency, Low Loss, and Scalable Throughput (L4S) is an architecture defined in <xref target="RFC9330"/> to avoid queuing at bottlenecks by capacity-seeking congestion controllers of senders. L4S support addresses the investigated use case of this document, which considers rate limiting, which typically involves queuing discipline at the rate limiting bottleneck. If all involved elements (UE, network, and service) support L4S, the use of Explicit Congestion Notification (ECN) provides the measure used to inform the network protocol and/or service endpoints in use of impending congestion. Congestion detection and reaction may require a few RTTs to adjust to the network forwarding conditions.</t>
        <t>As of 3GPP Rel. 18 (5G Advanced, <xref target="TS-23.501"/>), L4S is also defined for the 5G system (5GS) and can be used by UE and its services, and for external parties of the 5GS by exposure of congestion information.</t>
      </section>
      <section anchor="ns">
        <name>Network Slicing</name>
        <t>One measure for guaranteeing resources in networks is network slicing. This is achieved by configuring certain resources like adequate QoS setup for communication streams, which are taken into account in packet schedulers along the transport path. e.g., the RAN air interface.</t>
        <t>Network slicing is considered by 3GPP for 5G <xref target="TS-23.501"/> (an equivalent can be achieved in 4G by configuring QFI values), by IETF <xref target="RFC9543"/> for transport networks, and by BBF <xref target="TR-470"/> for wireline access. A realization model in transport networks is detailed in <xref target="I-D.ietf-teas-5g-ns-ip-mpls"/>.</t>
        <t>L4S <xref target="L4S"/> can be used for the realization of a network slice. Network slices properties (e.g., throughput) can be retrieved from an operator network or configured by third parties via a network API <xref target="network_api"/> (e.g., 3GPP NEF).</t>
      </section>
      <section anchor="ursp">
        <name>3GPP UE Route Selection Policy</name>
        <t>UE Route Selection Policy (URSP) is a feature specified in 3GPP to match and forward traffic based upon a selection descriptor and a route descriptor as further detailed in <xref target="TS-23.503"/>.</t>
        <t>Specified traffic descriptors may be:</t>
        <ul spacing="normal">
          <li>
            <t>Application</t>
          </li>
          <li>
            <t>IP</t>
          </li>
          <li>
            <t>Domain</t>
          </li>
          <li>
            <t>Non-IP</t>
          </li>
          <li>
            <t>DNN</t>
          </li>
          <li>
            <t>Connection Capabilities</t>
          </li>
          <li>
            <t>Connectivity Group ID</t>
          </li>
        </ul>
        <t>Specified route selection descriptors: must contain PDU Session Type Selection (e.g., IPv4v6 or IPv6) and may contain the following:</t>
        <ul spacing="normal">
          <li>
            <t>SSC Mode</t>
          </li>
          <li>
            <t>Network Slice</t>
          </li>
          <li>
            <t>DNN</t>
          </li>
          <li>
            <t>Non-Seamless Offload indication</t>
          </li>
          <li>
            <t>Access Type preference</t>
          </li>
        </ul>
        <t>URSP rules that contain both descriptors can be announced from the provider network to a UE or preconfigured in the UE, possibly subscription-based. These rules can be used to identify services in the UE and to provide routes with explicit  characteristics. URSP rules might also be triggered by the usage of network APIs <xref target="network_api"/> and combined with network slicing <xref target="ns"/>, for example.</t>
      </section>
      <section anchor="network_api">
        <name>Network APIs</name>
        <t>Network APIs are the interface between the operator network and third-party providers. With 4G, the first methods were introduced to make network capabilities available, which has been greatly improved with the introduction of 5G. To this end, the new Network Exposure Function (NEF) is responsible for 5G, which is specified in <xref target="TS-29.522"/>, which defines a huge list of network capabilites for monitoring and configuration for external consumption.</t>
        <t>For integration into external services, initiatives such as the CAMARA Alliance and GSMA Open Gateway provide abstractions of these exposed network capabilities into service APIs for easy integration by developers.</t>
        <t>The CAMARA API "Network Slice Booking", which is currently under development, would be a way for a service provider to configure the necessary resources in the operator network. In the background, 5G features such as network slicing <xref target="ns"/> , URSP <xref target="ursp"/> and, if necessary, L4S <xref target="L4S"/> could then ensure implementation in the operator network.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Tommy Pauly for the comment on PvD.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
