<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-throughput-advice-blob-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="SCONE Blob">Throughput Advice Object for SCONE</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-throughput-advice-blob-00"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="21"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 58?>

<t>Traffic exchanged over a network may be subject to rate-limit policies for various operational reasons.
This document specifies a generic object (called, Throughput Advice) that can be used by mechanims for hosts
to dynamically discover these network rate-limit policies. This information is then
passed to applications that might adjust their behaviors accordingly.</t>
      <t>The design of the throughput advice object is independent of the discovery channel (protocol, API, etc.).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Connectivity services are provided by networks to customers via
dedicated terminating points, such as customer edges (CEs) or User Equipment (UE).
To facilitate data transfer via the provider network, it is assumed that appropriate setup
is provisioned over the links that connect customer terminating points and a provider network (usually via a Provider Edge (PE)),
successfully allowing data exchange over these links. The required setup is referred to in this document as network attachments,
while the underlying link is referred to as "bearers".</t>
      <t>The bearer can be a physical or logical link that connects a customer device to a provider network. A bearer can be a wireless or wired link. The same or multiple bearer technologies can be used to establish the bearer (e.g., WLAN or cellular) to graft customer terminating points to a network.</t>
      <t><xref target="ac"/> shows an example of a network that connects CEs and hosts (UE, for example). These CEs are servicing
other (internal) hosts. The identification of these hosts is hidden from the network. The policies enforced at the network
for a network attachment are per-subscriber, not per-host. Typically, if a CE is provided with a /56 IPv6 prefix, policies are enforced
in the network on that /56 not the individual /64s that will be used by internal hosts. A customer terminating point may be serviced with one (e.g., UE#1, CE#1, and CE#3) or multiple network attachments (e.g., CE#2). For the sake of simplicity, <xref target="ac"/> does not show the interconnection with other networks or multi-homed CEs.</t>
      <figure anchor="ac">
        <name>Sample Network Attachments</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 8,208" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 64,208" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,128" fill="none" stroke="black"/>
              <path d="M 120,160 L 120,192" fill="none" stroke="black"/>
              <path d="M 200,80 L 200,224" fill="none" stroke="black"/>
              <path d="M 368,80 L 368,224" fill="none" stroke="black"/>
              <path d="M 448,80 L 448,128" fill="none" stroke="black"/>
              <path d="M 448,176 L 448,208" fill="none" stroke="black"/>
              <path d="M 504,80 L 504,128" fill="none" stroke="black"/>
              <path d="M 504,176 L 504,208" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 200,80 L 368,80" fill="none" stroke="black"/>
              <path d="M 448,80 L 504,80" fill="none" stroke="black"/>
              <path d="M 64,96 L 120,96" fill="none" stroke="black"/>
              <path d="M 368,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 448,96" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 416,112 L 448,112" fill="none" stroke="black"/>
              <path d="M 8,128 L 64,128" fill="none" stroke="black"/>
              <path d="M 120,128 L 144,128" fill="none" stroke="black"/>
              <path d="M 168,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
              <path d="M 120,160 L 144,160" fill="none" stroke="black"/>
              <path d="M 168,160 L 200,160" fill="none" stroke="black"/>
              <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
              <path d="M 64,192 L 120,192" fill="none" stroke="black"/>
              <path d="M 368,192 L 392,192" fill="none" stroke="black"/>
              <path d="M 416,192 L 448,192" fill="none" stroke="black"/>
              <path d="M 8,208 L 64,208" fill="none" stroke="black"/>
              <path d="M 448,208 L 504,208" fill="none" stroke="black"/>
              <path d="M 200,224 L 368,224" fill="none" stroke="black"/>
              <g class="text">
                <text x="472" y="36">Hosts</text>
                <text x="456" y="52">O</text>
                <text x="472" y="52">O</text>
                <text x="488" y="52">O</text>
                <text x="472" y="68">\|/</text>
                <text x="404" y="100">NA</text>
                <text x="36" y="116">UE#1</text>
                <text x="404" y="116">NA</text>
                <text x="476" y="116">CE#2</text>
                <text x="156" y="132">NA</text>
                <text x="272" y="148">Network</text>
                <text x="156" y="164">NA</text>
                <text x="36" y="196">CE#1</text>
                <text x="404" y="196">NA</text>
                <text x="476" y="196">CE#3</text>
                <text x="40" y="228">/|\</text>
                <text x="480" y="228">/|\</text>
                <text x="24" y="244">O</text>
                <text x="40" y="244">O</text>
                <text x="56" y="244">O</text>
                <text x="464" y="244">O</text>
                <text x="480" y="244">O</text>
                <text x="496" y="244">O</text>
                <text x="40" y="260">Hosts</text>
                <text x="480" y="260">Hosts</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                                                        Hosts
                                                        O O O
                                                         \|/
.------.                .--------------------.         .------.
|      +------+         |                    +---NA----+      |
| UE#1 |      |         |                    +---NA----+ CE#2 |
'------'      +---NA----+                    |         '------'
                        |     Network        |
.------.      .---NA----+                    |
|      |      |         |                    |         .------.
| CE#1 +------'         |                    +---NA----+ CE#3 |
'------'                |                    |         '------'
   /|\                  '--------------------'            /|\
  O O O                                                  O O O
  Hosts                                                  Hosts
]]></artwork>
        </artset>
      </figure>
      <t>Customer terminating points are provided with a set of information (e.g., IP address/prefix) to successfully be
able to send and receive traffic over a network attachment. The required set of parameters to provision a network attachment is a function of the connectivity service offering. For example, a very limited set of parameters is required for mass-market service offering while a more elaborated set is required for Enterprise services. A comprehensive list of provisioning parameters that are available on
the PE-side of a network attachment is specified in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>As discussed, e.g., in <xref section="4.2" sectionFormat="of" target="RFC7567"/>, packet dropping by network devices occurs
mainly to protect the network (e.g., congestion-unresponsive flows) and also to ensure fairness over a shared link. These policies may be intentional policies (e.g., enforced as part of the activation
of the network attachment and typically agreed upon service subscription)
or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation). Rate-limits are usually
configured in (ingress) nodes. These rate-limits can be shared with customers when subscribing to a connectivity service (e.g., "A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery" <xref target="RFC8466"/>).</t>
      <t><xref target="sec-blob"/> defines a set parameters that can be used by networks to share the rate-limit policies applied on a network attachment: Throughput Advice. The set of parameters are independent of the address family.</t>
      <t>This document does not assume nor preclude any specific signaling protocol to share the throughput advices. These parameters are independent of the channel that is used by hosts to discover such policies.</t>
      <t>Whether host-to-network, network-to-host, or both policies are included in a throughput advice is deployment specific. All these combinations are supported in this document.</t>
      <t>Also, one or more throughput advice instances may be returned for a given traffic direction. Examples of such instances are discussed in <xref target="sec-ex"/>.</t>
      <t>Sample uses of the advice by applications are listed in <xref target="sec-samples"/>.</t>
      <t>As one can infer from the name, a throughput advice is advisory in nature. The advice is provided solely as a hint.</t>
      <t>In order to ease mapping with specific signaling mechanims, allow for future extensions, and ensure consistent use of the advice, a new IANA registry is created in <xref target="sec-iana"/>.</t>
    </section>
    <section anchor="whats-out">
      <name>What's Out?</name>
      <t>This document does not make any assumption about:</t>
      <ul spacing="normal">
        <li>
          <t>The type of the network (fixed, cellular, etc.) that terminates a network attachment.</t>
        </li>
        <li>
          <t>The services or applications that are delivered over a network attachment. Whether one or multiple services
are bound to the same network attachment is deployment specific.</t>
        </li>
        <li>
          <t>How the throughput advice is computed/set.</t>
        </li>
        <li>
          <t>The protocol machinery for validating, refreshing, detecting stale, and flushing out received advices.</t>
        </li>
        <li>
          <t>How applications running over a host can learn the bitrates associated with a network attachment. Typically, this can be achieved by invoking a dedicated API. However, the exact details of the API is OS-specific and, thus, out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use fo the following term:</t>
      <dl>
        <dt>Rate-limit:</dt>
        <dd>
          <t>Used as a generic term to refer to a policy to restrict the maximum bitrate of a flow.</t>
        </dd>
        <dt/>
        <dd>
          <t>It can be used with or without any traffic classification.</t>
        </dd>
        <dt/>
        <dd>
          <t>A rate-limit can involve limiting the rate and/or burst size.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-uc">
      <name>Sample Deployment Cases</name>
      <t>Some deployment use cases for throughput advice discovery are provided below:</t>
      <dl>
        <dt>Adaptive Application Behavior:</dt>
        <dd>
          <t>Discovery of intentional policy applied on network attachements when such information is not made available during the service activation or when network upgrades are performed. Adaptive applications will use the information to adjust their behavior.</t>
        </dd>
        <dt/>
        <dd>
          <t>Concretely, applications are supposed to have access to all throughput advice instances and would, thus, adjust their behavior as a function of the parameters indicated in a throughput policy.</t>
        </dd>
        <dt/>
        <dd>
          <t>Likewise, a host with multiple network attachments may use the discovered throughput advice instances over each network attachment to decide how to distribute its flows over these network attachments (prefer a network attachment to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policy.</t>
        </dd>
        <dt>Network Assisted Offload:</dt>
        <dd>
          <t>A network may advertize a throughput advice when it is overloaded, including when it is under attack. The rate-limit policy is basically a reactive policy that is meant to adjust the behavior of connected hosts to better control the load during these exceptional events (issue with RAN resources, for example).</t>
        </dd>
        <dt/>
        <dd>
          <t>The mechanism can also be used to enrich the tools that are already available to better handle attack traffic close to the source <xref target="RFC9066"/>.</t>
        </dd>
        <dt>Better Local Services:</dt>
        <dd>
          <t>A user may configure policies on the CE such as securing some resources to a specific internal host used, e.g., for gaming or video streaming. The CE can use the throughput advice to share these rate-limit policies to connected hosts to adjust their forwarding behavior. Controling the load at the source will allow to partition the resources between connected hosts.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-blob">
      <name>Throughput Advice Object</name>
      <section anchor="throughput-parameters">
        <name>Throughput Parameters</name>
        <t>The throughput advice parameters leverage existing technologies for configuring policies in provider networks. <xref target="sec-overview"/> provides a brief overview of how inbound policies are enforced in ingress network nodes. The reader may refer to <xref target="RFC2697"/>, <xref target="RFC2698"/>, and <xref target="RFC4115"/> for examples
of how various combinations of Committed Information Rate (CIR), Committed Burst Size (CBS), Excess Information Rate (EIR), Excess Burst Size (EBS), Peak Information Rate (PIR), and Peak Burst Size (PBS) are used for policing. Typically:</t>
        <ul spacing="normal">
          <li>
            <t>A Single-Rate, Three-Color Marker <xref target="RFC2697"/> uses CIR, CBS, and EBS.</t>
          </li>
          <li>
            <t>A Dual-Rate, Three-Color Marker <xref target="RFC2698"/> uses CIR, CBS, PIR, and PBS. Note that when implemented with <xref target="RFC4115"/>, it allows for a better handling of in-profile traffic (refer to <xref section="1" sectionFormat="of" target="RFC4115"/> for more details).</t>
          </li>
        </ul>
        <t>An implementation example of these variants (and others) can be found at <xref target="VPP"/>.</t>
      </section>
      <section anchor="overall-object-structure">
        <name>Overall Object Structure</name>
        <t>A throughput advice object may include multiple throughput advices (referred to as "throughput advice instances"), each covering a specific match criteria. Each of these instances adheres to the structure defined in <xref target="sec-ins-structure"/>.</t>
        <t>Throughput advice objects are bound to the network interface over which the advice was received.</t>
        <t>The throughput advice object is described in CDDL <xref target="RFC8610"/> format shown in <xref target="cddl"/>. This format is meant to ease mapping with encoding specifics of a given discovery channel that supplies the throughput advice.</t>
        <figure anchor="cddl">
          <name>Throughput Advice Object Format in CDDL</name>
          <sourcecode type="CDDL"><![CDATA[
; Provides information about the rate-limit policy that is
; enforced for a network attachment.
; One or more throughput instances can be present in an advice.

throughput-advice =  [+ throughput-instance]

throughput-instance =  {
  ? optional-parameter-flags => opf,
  ? flow-flags => ff,
  ? traffic-category => category,
  throughput => rate-limit
}

; Controls the presence of optional parameters such as
; excess and peak rates.
; Settting these parameters to false means that excess and
; peak parameters are not supplied in the policy.
; These control bits may not be required for protocols with
; built-in mechanisms to parse objects even with
; optional/variable fields.

opf =  {
  ? excess: bool .default false,
  ? peak: bool .default false
}

; Indicates scope, traffic direction, and reliability type.
; Default value for scope is per subscriber policy.
; Default value for direction is network-to-host direction.
; Default value for reliability is false (i.e., the policy is
; applicable to both reliable and unreliable traffic).
; If any of these parameters is not present, this is equivalent
; to enclosing the parameter with its default value.

ff =  {
  ? scope: &scope-values .default subscriber,
  ? direction: &direction-values .default n2h,
  ? reliability: &reliability-values .default any
}

scope-values = (subscriber: 0, host: 1, flow: 2)
direction-values = (n2h: 0, h2n: 1, bidir: 2)
reliability-values = (any: 0, reliable: 1, unreliable: 2)

; Indicates traffic category to which the policy is bound.
; If the value is set to 0, this means that the policy is
; enforced for all traffic.

category =  {
  ? tc: uint .default 0
}

; Indicates various rates (committed, excess, and peak).
; Only CIR/CBS are mandatory to include.

rate-limit =  {
  cir: uint,          ; Mbps
  cbs: uint .gt 0,    ; bytes
  ? eir: uint,        ; Mbps
  ? ebs: uint .gt 0,  ; bytes
  ? pir: uint,        ; Mbps
  ? pbs: uint .gt 0,  ; bytes
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-ins-structure">
        <name>Throughput Advice Instance Attributes</name>
        <t>This section defines the set of attributes that are included in a throughput advice instance:</t>
        <dl>
          <dt>Optional Parameter Flags (OPF):</dt>
          <dd>
            <t>These flags indicate the presence of some optional parameters. The following flags are defined:
</t>
            <dl>
              <dt>E:</dt>
              <dd>
                <t>When set to "1", this flag indicates the presence of Excess Information Rate (EIR).</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "0", this flag indicates that EIR is not present.</t>
              </dd>
              <dt>P:</dt>
              <dd>
                <t>When set to "1", this flag indicates the presence of Peak Information Rate (PIR).</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "0", this flag indicates that PIR is not present.</t>
              </dd>
              <dt>U:</dt>
              <dd>
                <t>Unassigned bits. See <xref target="sec-iana-opf"/>.</t>
              </dd>
            </dl>
          </dd>
          <dt>Flow flags (FF):</dt>
          <dd>
            <t>These flags are used to express some generic properties of the flow. The following flags are defined:
</t>
            <dl>
              <dt>S (Scope):</dt>
              <dd>
                <t>Indicates the granularity of enforcing policies.</t>
              </dd>
              <dt/>
              <dd>
                <t>This parameter specifies whether the policy is a per-host, per-subscriber, or per-flow policy.</t>
              </dd>
              <dt>D (Direction):</dt>
              <dd>
                <t>Indicates the direction on which to apply the enclosed policy.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "00b", this flag indicates that this policy is for
network-to-host direction.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "01b", this flag indicates that this policy is for
host-to-network direction.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "10b", this flag indicates that this policy is for
both network-to-host and host-to-network directions.</t>
              </dd>
              <dt>R (Reliablity):</dt>
              <dd>
                <t>Indicates the reliability type of traffic on which to apply the enclosed policy.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "00b", this flag indicates that this policy is for both reliable and unreliable traffic.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "01b", this flag indicates that this policy is for unreliable traffic.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "10b", this flag indicates that this policy is for reliable traffic.</t>
              </dd>
              <dt/>
              <dd>
                <t>No meaning is associated with setting the field to "11b". Such value <bcp14>MUST</bcp14> be silently ignored by the receiver.</t>
              </dd>
              <dt>U:</dt>
              <dd>
                <t>Unassigned flags. See <xref target="sec-iana-ff"/>.</t>
              </dd>
            </dl>
          </dd>
          <dt>TC (Traffic Category):</dt>
          <dd>
            <t>Specifies a traffic category to which this policy applies.</t>
          </dd>
          <dt/>
          <dd>
            <t>The following values are supported:
</t>
            <ul spacing="normal">
              <li>
                <t>"0": All traffic. This is the default value.</t>
              </li>
              <li>
                <t>1-63: Unassigned values. See <xref target="sec-iana-tc"/>.</t>
              </li>
            </ul>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>An average rate that specifies the maximum number of bits that a network can
send (or receive) during one second over a network attachment.</t>
          </dd>
          <dt/>
          <dd>
            <t>The CIR value <bcp14>MUST</bcp14> be greater than or equal to 0.</t>
          </dd>
          <dt/>
          <dd>
            <t>If set to 0 (or a very low value), this indicates to the host that alternate paths (if any) should be preferred over this one.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is mandatory.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is mandatory.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if the E flag is set to '1'.</t>
          </dd>
          <dt/>
          <dd>
            <t>An avertage rate that specifies the maximum number of bits that a network can
send (or receive) during one second over a network attachment for a
traffic that is out of profile.</t>
          </dd>
          <dt/>
          <dd>
            <t>The EIR value <bcp14>MUST</bcp14> be greater than or equal to 0, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if EIR is also present.</t>
          </dd>
          <dt/>
          <dd>
            <t>Indicates the maximum excess burst size that is allowed while not complying with the CIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if P flag is set to '1'.</t>
          </dd>
          <dt/>
          <dd>
            <t>Indicates the allowed throughput when there is a peak in traffic. That is, traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
          </dd>
          <dt/>
          <dd>
            <t>The PIR <bcp14>MUST</bcp14> be equal to or greater than the CIR, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if PIR is also present.</t>
          </dd>
          <dt/>
          <dd>
            <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-ex">
      <name>Examples</name>
      <t>For the sake of illustration, <xref target="ex"/> exemplifies the content of a throughput advice using JSON notations. The advice
includes one rate-limit instance that covers network-to-host traffic direction and is applicable to all traffic destined to any host of a subscriber.</t>
      <figure anchor="ex">
        <name>A JSON Example</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "direction": 0,
            "scope": 0,
            "tc": 0,
            "cir": 50,
            "cbs": 10000
        }
    ]
}
]]></sourcecode>
      </figure>
      <t>The advice conveyed in <xref target="ex-2"/> is similar to the advice in <xref target="ex"/>. The only difference is that default values are trimmed in <xref target="ex-2"/>.</t>
      <figure anchor="ex-2">
        <name>A JSON Example with Default Values Trimmed</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "cir": 50,
            "cbs": 10000
        }
    ]
}
]]></sourcecode>
      </figure>
      <t><xref target="ex-3"/> shows the example of an advice that encloses two instances, each for one traffic direction.</t>
      <figure anchor="ex-3">
        <name>A JSON Example with Both Traffic Directions</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "direction": 0,
            "cir": 50,
            "cbs": 10000
        },
        {
            "direction": 1,
            "cir": 30,
            "cbs": 8000
        }
    ]
}
]]></sourcecode>
      </figure>
      <t>If both directions are covered by the same rate-limit policy, then the advice can be supplied as shown in <xref target="ex-4"/></t>
      <figure anchor="ex-4">
        <name>A JSON Example with Single Bidir Rate-Limit Policy</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "direction": 2,
            "cir": 50,
            "cbs": 10000
        }
    ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="sec-samples">
      <name>Sample Uses of the Advice</name>
      <t>It is out of scope of this document to make recommendations about how the advice is consumed by applications/OS/Hosts. A non-exhaustive list is provided hereafter for illustration purposes:</t>
      <ul spacing="normal">
        <li>
          <t>Applications can send/receive data at a rate beyond the CIR up to the PIR when the network is not congested. If network feedback (e.g., packet loss or delay) indicates congestion, the application can scale back to the CIR. Otherwise, it can use the PIR for temporary throughput boosts.</t>
        </li>
        <li>
          <t>Applications can send/receive short-term bursts of data that exceed the committed burst size CBS up to the PBS if there is no congestion. This is useful for scenarios where short, high-throughput bursts are needed.</t>
        </li>
        <li>
          <t>Applications can ensure that their sending rate never exceeds the PIR and that their short-term bursts of traffic never exceeds PBS.</t>
        </li>
        <li>
          <t>Applications can send/receive data at different rates for reliable and unreliable traffic (reliable could map to Queue-Building (QB) and unreliable could map to Non-Queue-Building (NQB)) by mapping reliability flag. One of the ways for application to make reliability markings visible is by following, e.g., the considerations in <xref section="4" sectionFormat="of" target="I-D.ietf-tsvwg-nqb"/>.</t>
        </li>
        <li>
          <t>The throughput advice can feed mechanisms such as <xref section="4.4.2" sectionFormat="of" target="RFC7661"/> or <xref section="7.8" sectionFormat="of" target="RFC9002"/> to control the maximum burst size.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As discussed in <xref target="sec-uc"/>, sharing a throughput advice helps networks mitigate overloads, particularly during periods of high traffic volume.</t>
      <t>An attacker who has the ability to change the throughput advice objects exchanged over a network attachment may:</t>
      <dl>
        <dt>Decrease the bitrate value:</dt>
        <dd>
          <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
        </dd>
        <dt>Increase the bitrate value:</dt>
        <dd>
          <t>The network attachment will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
        </dd>
        <dt>Delete or remove the advice:</dt>
        <dd>
          <t>This is equivalent to deployments where the advice is not shared.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-rlp">
        <name>Rate-Limit Policy Objects Registry Group</name>
        <t>This document requests IANA to create a new registry group entitled "SCONE Rate-Limit Policy Objects".</t>
      </section>
      <section anchor="sec-iana-opf">
        <name>Optional Parameter Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Optional Parameter Flags" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-op-flags"/>.</t>
        <table anchor="iana-op-flags">
          <name>Optional Parameter Flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Label</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">E</td>
              <td align="left">Indicates presence of excess rate/burst</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">P</td>
              <td align="left">Indicates presence of peak rate/burst</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ff">
        <name>Flow Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Flow flags" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-flow-flags"/>.</t>
        <table anchor="iana-flow-flags">
          <name>Flow flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Label</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">S</td>
              <td align="left">Scope</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2-3</td>
              <td align="left">D</td>
              <td align="left">Direction</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">4-5</td>
              <td align="left">R</td>
              <td align="left">Reliability</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">6-8</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-tc">
        <name>Traffic Category Registry</name>
        <t>This document requests IANA to create a new registry entitled "Traffic Category Types" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-tc"/>.</t>
        <table anchor="iana-tc">
          <name>Traffic Category Values</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">All traffic</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">1-63</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-rate">
        <name>Rate Parameters Registry</name>
        <t>This document requests IANA to create a new registry entitled "Rate Parameters" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-rate"/>.</t>
        <table anchor="iana-rate">
          <name>Initial Rate Parameters Values Values</name>
          <thead>
            <tr>
              <th align="left">Parameter</th>
              <th align="left">Description</th>
              <th align="left">Mandatory (Y/N)</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">cir</td>
              <td align="left">Committed Information Rate (CIR)</td>
              <td align="left">Y</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cbs</td>
              <td align="left">Committed Burst Size (CBS)</td>
              <td align="left">Y</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">eir</td>
              <td align="left">Excess Information Rate (EIR)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">ebs</td>
              <td align="left">Excess Burst Size (EBS)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">pir</td>
              <td align="left">Peak Information Rate (PIR)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">pbs</td>
              <td align="left">Peak Burst Size (PBS)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="VPP" target="https://s3-docs.fd.io/vpp/23.06/developer/corefeatures/policer.html">
          <front>
            <title>Policing</title>
            <author>
              <organization>Vector Packet Processor (VPP)</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-14"/>
        </reference>
        <reference anchor="RFC7567">
          <front>
            <title>IETF Recommendations Regarding Active Queue Management</title>
            <author fullname="F. Baker" initials="F." role="editor" surname="Baker"/>
            <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This memo presents recommendations to the Internet community concerning measures to improve and preserve Internet performance. It presents a strong recommendation for testing, standardization, and widespread deployment of active queue management (AQM) in network devices to improve the performance of today's Internet. It also urges a concerted effort of research, measurement, and ultimate deployment of AQM mechanisms to protect the Internet from flows that are not sufficiently responsive to congestion notification.</t>
              <t>Based on 15 years of experience and new research, this document replaces the recommendations of RFC 2309.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="197"/>
          <seriesInfo name="RFC" value="7567"/>
          <seriesInfo name="DOI" value="10.17487/RFC7567"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9066">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document specifies the Denial-of-Service Open Threat Signaling (DOTS) signal channel Call Home, which enables a Call Home DOTS server to initiate a secure connection to a Call Home DOTS client and to receive attack traffic information from the Call Home DOTS client. The Call Home DOTS server in turn uses the attack traffic information to identify compromised devices launching outgoing DDoS attacks and take appropriate mitigation action(s).</t>
              <t>The DOTS signal channel Call Home is not specific to home networks; the solution targets any deployment in which it is required to block DDoS attack traffic closer to the source(s) of a DDoS attack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9066"/>
          <seriesInfo name="DOI" value="10.17487/RFC9066"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="I-D.ietf-tsvwg-nqb">
          <front>
            <title>A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services</title>
            <author fullname="Greg White" initials="G." surname="White">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Ruediger Geib" initials="R." surname="Geib">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="8" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies characteristics of a Non-Queue-Building Per-
   Hop Behavior (NQB PHB).  The NQB PHB provides a shallow-buffered,
   best-effort service as a complement to a Default deep-buffered best-
   effort service for Internet services.  The purpose of this NQB PHB is
   to provide a separate queue that enables smooth (i.e. non-bursty),
   low-data-rate, application-limited traffic microflows, which would
   ordinarily share a queue with bursty and capacity-seeking traffic, to
   avoid the latency, latency variation and loss caused by such traffic.
   This PHB is implemented without prioritization and can be implemented
   without rate policing, making it suitable for environments where the
   use of these features is restricted.  The NQB PHB has been developed
   primarily for use by access network segments, where queuing delays
   and queuing loss caused by Queue-Building protocols are manifested,
   but its use is not limited to such segments.  In particular,
   applications to cable broadband links, Wi-Fi links, and mobile
   network radio and core segments are discussed.  This document
   recommends a specific Differentiated Services Code Point (DSCP) to
   identify Non-Queue-Building microflows, and updates the RFC8325
   guidance on mapping Diffserv to IEEE 802.11 for this codepoint.

   [NOTE (to be removed by RFC-Editor): This document references an ISE
   submission draft (I-D.briscoe-docsis-q-protection) that is approved
   for publication as an RFC.  This draft should be held for publication
   until the queue protection RFC can be referenced.]

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-nqb-27"/>
        </reference>
        <reference anchor="RFC7661">
          <front>
            <title>Updating TCP to Support Rate-Limited Traffic</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="A. Sathiaseelan" initials="A." surname="Sathiaseelan"/>
            <author fullname="R. Secchi" initials="R." surname="Secchi"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document provides a mechanism to address issues that arise when TCP is used for traffic that exhibits periods where the sending rate is limited by the application rather than the congestion window. It provides an experimental update to TCP that allows a TCP sender to restart quickly following a rate-limited interval. This method is expected to benefit applications that send rate-limited traffic using TCP while also providing an appropriate response if congestion is experienced.</t>
              <t>This document also evaluates the Experimental specification of TCP Congestion Window Validation (CWV) defined in RFC 2861 and concludes that RFC 2861 sought to address important issues but failed to deliver a widely used solution. This document therefore reclassifies the status of RFC 2861 from Experimental to Historic. This document obsoletes RFC 2861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7661"/>
          <seriesInfo name="DOI" value="10.17487/RFC7661"/>
        </reference>
        <reference anchor="RFC9002">
          <front>
            <title>QUIC Loss Detection and Congestion Control</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="I. Swett" initials="I." role="editor" surname="Swett"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes loss detection and congestion control mechanisms for QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9002"/>
          <seriesInfo name="DOI" value="10.17487/RFC9002"/>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-ns-ip-mpls">
          <front>
            <title>A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Julian Lucek" initials="J." surname="Lucek">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="11" month="October" year="2024"/>
            <abstract>
              <t>   Slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks.  Realization of 5G
   slicing implies requirements for all mobile domains, including the
   Radio Access Network (RAN), Core Network (CN), and Transport Network
   (TN).

   This document describes a Network Slice realization model for IP/MPLS
   networks with a focus on the Transport Network fulfilling 5G slicing
   connectivity service objectives.  The realization model reuses many
   building blocks currently commonly used in service provider networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-13"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
      </references>
    </references>
    <?line 521?>

<section anchor="sec-overview">
      <name>Overview of Network Rate-Limit Policies</name>
      <t>As discussed, for example in <xref target="I-D.ietf-teas-5g-ns-ip-mpls"/>, a provider network's inbound policy can be implemented using one
of following options:</t>
      <ul spacing="normal">
        <li>
          <t>1r2c (single-rate two-color) rate limiter  </t>
          <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at an ingress intreface a
traffic stream and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the ingress node (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at an ingress node, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
        </li>
        <li>
          <t>2r3c (two-rate three-color) rate limiter  </t>
          <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  The traffic is assigned to one of the these three
categories:  </t>
          <ul spacing="normal">
            <li>
              <t>Green, for traffic under CIR</t>
            </li>
            <li>
              <t>Yellow, for traffic between CIR and PIR</t>
            </li>
            <li>
              <t>Red, for traffic above PIR</t>
            </li>
          </ul>
          <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices or hosts. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green),
de-prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TBC.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
