<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-throughput-advice-blob-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="SCONE Blob">Throughput Advice Object for SCONE</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-throughput-advice-blob-01"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="03"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 58?>

<t>Traffic exchanged over a network may be subject to rate-limit policies for various operational reasons.
This document specifies a generic object (called, Throughput Advice) that can be used by mechanisms for hosts
to dynamically discover these network rate-limit policies. This information is then
passed to applications that might adjust their behaviors accordingly.</t>
      <t>The design of the throughput advice object is independent of the discovery channel (protocol, API, etc.).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Connectivity services are provided by networks to customers via
dedicated terminating points, such as customer edges (CEs) or User Equipment (UE).
To facilitate data transfer via the provider network, it is assumed that appropriate setup
is provisioned over the links that connect customer terminating points and a provider network (usually via a Provider Edge (PE)),
successfully allowing data exchange over these links. The required setup is referred to in this document as network attachments,
while the underlying link is referred to as "bearers".</t>
      <t>The bearer can be a physical or logical link that connects a customer device to a provider network. A bearer can be a wireless or wired link. The same or multiple bearer technologies can be used to establish the bearer (e.g., WLAN or cellular) to graft customer terminating points to a network.</t>
      <t><xref target="ac"/> shows an example of a network that connects CEs and hosts (UE, for example). These CEs are servicing
other (internal) hosts. The identification of these hosts is hidden from the network. The policies enforced at the network
for a network attachment are per-subscriber, not per-host. Typically, if a CE is provided with a /56 IPv6 prefix, policies are enforced
in the network on that /56 not the individual /64s that will be used by internal hosts. A customer terminating point may be serviced with one (e.g., UE#1, CE#1, and CE#3) or multiple network attachments (e.g., CE#2). For the sake of simplicity, <xref target="ac"/> does not show the interconnection with other networks or multi-homed CEs.</t>
      <figure anchor="ac">
        <name>Sample Network Attachments</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 8,208" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,128" fill="none" stroke="black"/>
              <path d="M 64,160 L 64,208" fill="none" stroke="black"/>
              <path d="M 120,96 L 120,128" fill="none" stroke="black"/>
              <path d="M 120,160 L 120,192" fill="none" stroke="black"/>
              <path d="M 200,80 L 200,224" fill="none" stroke="black"/>
              <path d="M 368,80 L 368,224" fill="none" stroke="black"/>
              <path d="M 448,80 L 448,128" fill="none" stroke="black"/>
              <path d="M 448,176 L 448,208" fill="none" stroke="black"/>
              <path d="M 504,80 L 504,128" fill="none" stroke="black"/>
              <path d="M 504,176 L 504,208" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 200,80 L 368,80" fill="none" stroke="black"/>
              <path d="M 448,80 L 504,80" fill="none" stroke="black"/>
              <path d="M 64,96 L 120,96" fill="none" stroke="black"/>
              <path d="M 368,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 416,96 L 448,96" fill="none" stroke="black"/>
              <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 416,112 L 448,112" fill="none" stroke="black"/>
              <path d="M 8,128 L 64,128" fill="none" stroke="black"/>
              <path d="M 120,128 L 144,128" fill="none" stroke="black"/>
              <path d="M 168,128 L 200,128" fill="none" stroke="black"/>
              <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
              <path d="M 120,160 L 144,160" fill="none" stroke="black"/>
              <path d="M 168,160 L 200,160" fill="none" stroke="black"/>
              <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
              <path d="M 64,192 L 120,192" fill="none" stroke="black"/>
              <path d="M 368,192 L 392,192" fill="none" stroke="black"/>
              <path d="M 416,192 L 448,192" fill="none" stroke="black"/>
              <path d="M 8,208 L 64,208" fill="none" stroke="black"/>
              <path d="M 448,208 L 504,208" fill="none" stroke="black"/>
              <path d="M 200,224 L 368,224" fill="none" stroke="black"/>
              <g class="text">
                <text x="472" y="36">Hosts</text>
                <text x="456" y="52">O</text>
                <text x="472" y="52">O</text>
                <text x="488" y="52">O</text>
                <text x="472" y="68">\|/</text>
                <text x="404" y="100">NA</text>
                <text x="36" y="116">UE#1</text>
                <text x="404" y="116">NA</text>
                <text x="476" y="116">CE#2</text>
                <text x="156" y="132">NA</text>
                <text x="272" y="148">Network</text>
                <text x="156" y="164">NA</text>
                <text x="36" y="196">CE#1</text>
                <text x="404" y="196">NA</text>
                <text x="476" y="196">CE#3</text>
                <text x="40" y="228">/|\</text>
                <text x="480" y="228">/|\</text>
                <text x="24" y="244">O</text>
                <text x="40" y="244">O</text>
                <text x="56" y="244">O</text>
                <text x="464" y="244">O</text>
                <text x="480" y="244">O</text>
                <text x="496" y="244">O</text>
                <text x="40" y="260">Hosts</text>
                <text x="480" y="260">Hosts</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
                                                        Hosts
                                                        O O O
                                                         \|/
.------.                .--------------------.         .------.
|      +------+         |                    +---NA----+      |
| UE#1 |      |         |                    +---NA----+ CE#2 |
'------'      +---NA----+                    |         '------'
                        |     Network        |
.------.      .---NA----+                    |
|      |      |         |                    |         .------.
| CE#1 +------'         |                    +---NA----+ CE#3 |
'------'                |                    |         '------'
   /|\                  '--------------------'            /|\
  O O O                                                  O O O
  Hosts                                                  Hosts
]]></artwork>
        </artset>
      </figure>
      <t>Customer terminating points are provided with a set of information (e.g., IP address/prefix) to successfully be
able to send and receive traffic over a network attachment. The required set of parameters to provision a network attachment is a function of the connectivity service offering. For example, a very limited set of parameters is required for mass-market service offering while a more elaborated set is required for Enterprise services. A comprehensive list of provisioning parameters that are available on
the PE-side of a network attachment is specified in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      <t>As discussed, e.g., in <xref section="4.2" sectionFormat="of" target="RFC7567"/>, packet dropping by network devices occurs
mainly to protect the network (e.g., congestion-unresponsive flows) and also to ensure fairness over a shared link. These policies may be intentional policies (e.g., enforced as part of the activation
of the network attachment and typically agreed upon service subscription)
or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation). Rate-limits are usually
configured in (ingress) nodes. These rate-limits can be shared with customers when subscribing to a connectivity service (e.g., "A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery" <xref target="RFC8466"/>).</t>
      <t><xref target="sec-blob"/> defines a set of parameters that can be used by networks to share the rate-limit policies applied on a network attachment: Throughput Advice. The set of parameters are independent of the address family.</t>
      <t>This document does not assume nor preclude any specific signaling protocol to share the throughput advices. These parameters are independent of the channel that is used by hosts to discover such policies.</t>
      <t>Whether host-to-network, network-to-host, or both policies are included in throughput advice is deployment specific. All these combinations are supported in this document.</t>
      <t>Also, one or more throughput advice instances may be returned for a given traffic direction. Examples of such instances are discussed in <xref target="sec-ex"/>.</t>
      <t>Sample uses of the advice by applications are listed in <xref target="sec-samples"/>.</t>
      <t>As one can infer from the name, a throughput advice is advisory in nature. The advice is provided solely as a hint.</t>
      <t>In order to ease mapping with specific signaling mechanisms, allow for future extensions, and ensure consistent use of the advice, a new IANA registry is created in <xref target="sec-iana"/>.</t>
    </section>
    <section anchor="whats-out">
      <name>What's Out?</name>
      <t>This document does not make any assumption about:</t>
      <ul spacing="normal">
        <li>
          <t>The type of network (fixed, cellular, etc.) that terminates a network attachment.</t>
        </li>
        <li>
          <t>The services or applications that are delivered over a network attachment. Whether one or multiple services
are bound to the same network attachment is deployment specific.</t>
        </li>
        <li>
          <t>How the throughput advice is computed/set.</t>
        </li>
        <li>
          <t>The protocol machinery for validating, refreshing, detecting stale, and flushing out received advices.</t>
        </li>
        <li>
          <t>How applications running over a host can learn the bitrates associated with a network attachment. Typically, this can be achieved by invoking a dedicated API. However, the exact details of the API(s) is OS-specific and, thus, out of scope of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the following term:</t>
      <dl>
        <dt>Rate-limit:</dt>
        <dd>
          <t>Used as a generic term to refer to a policy to restrict the maximum bitrate over a network attachment.</t>
        </dd>
        <dt/>
        <dd>
          <t>It can be used with or without any traffic classification.</t>
        </dd>
        <dt/>
        <dd>
          <t>A rate-limit can involve limiting the rate and/or burst size.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-uc">
      <name>Sample Deployment Cases</name>
      <t>Some deployment use cases for throughput advice discovery are provided below:</t>
      <dl>
        <dt>Adaptive Application Behavior:</dt>
        <dd>
          <t>Discovery of intentional policy applied on network attachments when such information is not made available during the service activation or when network upgrades are performed. Adaptive applications will use the information to adjust their behavior.</t>
        </dd>
        <dt/>
        <dd>
          <t>Concretely, applications are supposed to have access to all throughput advice instances and would, thus, adjust their behavior as a function of the parameters indicated in a throughput policy.</t>
        </dd>
        <dt/>
        <dd>
          <t>Likewise, a host with multiple network attachments may use the discovered throughput advice instances over each network attachment to decide how to distribute its flows over these network attachments (prefer a network attachment to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policy.</t>
        </dd>
        <dt>Network Assisted Offload:</dt>
        <dd>
          <t>A network may advertize a throughput advice when it is overloaded, including when it is under attack. The rate-limit policy is basically a reactive policy that is meant to adjust the behavior of connected hosts to better control the load during these exceptional events (issue with RAN resources, for example).</t>
        </dd>
        <dt/>
        <dd>
          <t>The mechanism can also be used to enrich the tools that are already available to better handle attack traffic close to the source <xref target="RFC9066"/>.</t>
        </dd>
        <dt>Better Local Services:</dt>
        <dd>
          <t>A user may configure policies on the CE such as securing some resources to a specific internal host used, e.g., for gaming or video streaming. The CE can use the throughput advice to share these rate-limit policies to connected hosts to adjust their forwarding behavior. Controlling the load at the source will allow to partition the resources between connected hosts.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-blob">
      <name>Throughput Advice Object</name>
      <section anchor="throughput-parameters">
        <name>Throughput Parameters</name>
        <t>The throughput advice parameters leverage existing technologies for configuring policies in provider networks. <xref target="sec-overview"/> provides a brief overview of how inbound policies are enforced in ingress network nodes. The reader may refer to <xref target="RFC2697"/>, <xref target="RFC2698"/>, and <xref target="RFC4115"/> for examples
of how various combinations of Committed Information Rate (CIR), Committed Burst Size (CBS), Excess Information Rate (EIR), Excess Burst Size (EBS), Peak Information Rate (PIR), and Peak Burst Size (PBS) are used for policing. Typically:</t>
        <ul spacing="normal">
          <li>
            <t>A Single-Rate, Three-Color Marker <xref target="RFC2697"/> uses CIR, CBS, and EBS.</t>
          </li>
          <li>
            <t>A Dual-Rate, Three-Color Marker <xref target="RFC2698"/> uses CIR, CBS, PIR, and PBS. Note that when implemented with <xref target="RFC4115"/>, it allows for a better handling of in-profile traffic (refer to <xref section="1" sectionFormat="of" target="RFC4115"/> for more details).</t>
          </li>
        </ul>
        <t>An implementation example of these variants (and others) can be found at <xref target="VPP"/>.</t>
      </section>
      <section anchor="overall-object-structure">
        <name>Overall Object Structure</name>
        <t>A throughput advice object may include multiple throughput advices (referred to as "throughput advice instances"), each covering a specific match criteria. Each of these instances adheres to the structure defined in <xref target="sec-ins-structure"/>.</t>
        <t>Throughput advice objects are bound to the network interface over which the advice was received.</t>
        <t>The throughput advice object is described in CDDL <xref target="RFC8610"/> format shown in <xref target="cddl"/>. This format is meant to ease mapping with encoding specifics of a given discovery channel that supplies the throughput advice.</t>
        <figure anchor="cddl">
          <name>Throughput Advice Object Format in CDDL</name>
          <sourcecode type="CDDL"><![CDATA[
; Provides information about the rate-limit policy that is
; enforced for a network attachment.
; One or more throughput instances can be present in an advice.

throughput-advice =  [+ throughput-instance]

throughput-instance =  {
  ? optional-parameter-flags => opf,
  ? flow-flags => ff,
  ? traffic-category => category,
  throughput => rate-limit
}

; Controls the presence of optional parameters such as
; excess and peak rates.
; Setting these parameters to false means that excess and
; peak parameters are not supplied in the policy.
; These control bits may not be required for protocols with
; built-in mechanisms to parse objects even with
; optional/variable fields.

opf =  {
  ? excess: bool .default false,
  ? peak: bool .default false
}

; Indicates scope, traffic direction, and reliability type.
; Default value for scope is per subscriber policy.
; Default value for direction is network-to-host direction.
; Default value for reliability is false (i.e., the policy is
; applicable to both reliable and unreliable traffic).
; If any of these parameters is not present, this is equivalent
; to enclosing the parameter with its default value.

ff =  {
  ? scope: &scope-values .default subscriber,
  ? direction: &direction-values .default n2h,
  ? reliability: &reliability-values .default any
}

scope-values = (subscriber: 0, host: 1, flow: 2)
direction-values = (n2h: 0, h2n: 1, bidir: 2)
reliability-values = (any: 0, reliable: 1, unreliable: 2)

; Indicates traffic category to which the policy is bound.
; If the value is set to 0, this means that the policy is
; enforced for all traffic.

category =  {
  ? tc: uint .default 0
}

; Indicates the rate and burst limits.
; Only CIR/CBS are mandatory to include.
; A rate-limit may also include an excess or peak limits.

rate-limit = (
  group-a/ group-b
)

group-a = {
  cir: uint,          ; Mbps
  cbs: uint .gt 0,    ; bytes
  ? eir: uint,        ; Mbps
  ? ebs: uint .gt 0,  ; bytes
}

group-b = {
  cir: uint,          ; Mbps
  cbs: uint .gt 0,    ; bytes
  ? pir: uint,        ; Mbps
  ? pbs: uint .gt 0,  ; bytes
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-ins-structure">
        <name>Throughput Advice Instance Attributes</name>
        <t>This section defines the set of attributes that are included in a throughput advice instance:</t>
        <dl>
          <dt>Optional Parameter Flags (OPF):</dt>
          <dd>
            <t>These flags indicate the presence of some optional parameters. The following flags are defined:
</t>
            <dl>
              <dt>E:</dt>
              <dd>
                <t>When set to "1", this flag indicates the presence of excess information.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "0", this flag indicates that excess information is not present.</t>
              </dd>
              <dt>P:</dt>
              <dd>
                <t>When set to "1", this flag indicates the presence of peak information.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "0", this flag indicates that peak information is not present.</t>
              </dd>
              <dt>U:</dt>
              <dd>
                <t>Unassigned values. See <xref target="sec-iana-opf"/>.</t>
              </dd>
            </dl>
          </dd>
          <dt>Flow flags (FF):</dt>
          <dd>
            <t>These flags are used to express some generic properties of the flow. The following flags are defined:
</t>
            <dl>
              <dt>S (Scope):</dt>
              <dd>
                <t>Indicates the granularity of enforcing policies.</t>
              </dd>
              <dt/>
              <dd>
                <t>This parameter specifies whether the policy is a per-subscriber, per-host, or per-flow policy.</t>
              </dd>
              <dt>D (Direction):</dt>
              <dd>
                <t>Indicates the direction on which to apply the enclosed policy.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "00b", this flag indicates that this policy is for
network-to-host direction.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "01b", this flag indicates that this policy is for
host-to-network direction.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "10b", this flag indicates that this policy is for
both network-to-host and host-to-network directions.</t>
              </dd>
              <dt>R (Reliability):</dt>
              <dd>
                <t>Indicates the reliability type of traffic on which to apply the enclosed policy.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "00b", this flag indicates that this policy is for both reliable and unreliable traffic.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "01b", this flag indicates that this policy is for unreliable traffic.</t>
              </dd>
              <dt/>
              <dd>
                <t>When set to "10b", this flag indicates that this policy is for reliable traffic.</t>
              </dd>
              <dt/>
              <dd>
                <t>No meaning is associated with setting the field to "11b". Such value <bcp14>MUST</bcp14> be silently ignored by the receiver.</t>
              </dd>
              <dt>U:</dt>
              <dd>
                <t>Unassigned flags. See <xref target="sec-iana-ff"/>.</t>
              </dd>
            </dl>
          </dd>
          <dt>TC (Traffic Category):</dt>
          <dd>
            <t>Specifies a traffic category to which this policy applies.</t>
          </dd>
          <dt/>
          <dd>
            <t>The following values are supported:
</t>
            <ul spacing="normal">
              <li>
                <t>"0": All traffic. This is the default value.</t>
              </li>
              <li>
                <t>1-63: Unassigned values. See <xref target="sec-iana-tc"/>.</t>
              </li>
            </ul>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>An average rate that specifies the maximum number of bits that a network can
send (or receive) during one second over a network attachment.</t>
          </dd>
          <dt/>
          <dd>
            <t>The CIR value <bcp14>MUST</bcp14> be greater than or equal to 0.</t>
          </dd>
          <dt/>
          <dd>
            <t>If set to 0 (or a very low value), this indicates to the host that alternate paths (if any) should be preferred over this one.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is mandatory.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is mandatory.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if the E flag is set to '1'.</t>
          </dd>
          <dt/>
          <dd>
            <t>An average rate that specifies the maximum number of bits that a network can
send (or receive) during one second over a network attachment for a
traffic that is out of profile.</t>
          </dd>
          <dt/>
          <dd>
            <t>The EIR value <bcp14>MUST</bcp14> be greater than or equal to 0, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if EIR is also present.</t>
          </dd>
          <dt/>
          <dd>
            <t>Indicates the maximum excess burst size that is allowed while not complying with the CIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if P flag is set to '1'.</t>
          </dd>
          <dt/>
          <dd>
            <t>Indicates the allowed throughput when there is a peak in traffic. That is, traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
          </dd>
          <dt/>
          <dd>
            <t>The PIR <bcp14>MUST</bcp14> be equal to or greater than the CIR, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t><bcp14>MUST</bcp14> be present if PIR is also present.</t>
          </dd>
          <dt/>
          <dd>
            <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="sec-ex">
      <name>Examples</name>
      <t>For the sake of illustration, <xref target="ex"/> exemplifies the content of a throughput advice using JSON notations. The advice
includes one rate-limit instance that covers network-to-host traffic direction and is applicable to all traffic destined to any host of a subscriber.</t>
      <figure anchor="ex">
        <name>A JSON Example</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "direction": 0,
            "scope": 0,
            "tc": 0,
            "cir": 50,
            "cbs": 10000
        }
    ]
}
]]></sourcecode>
      </figure>
      <t>The advice conveyed in <xref target="ex-2"/> is similar to the advice in <xref target="ex"/>. The only difference is that default values are trimmed in <xref target="ex-2"/>.</t>
      <figure anchor="ex-2">
        <name>A JSON Example with Default Values Trimmed</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "cir": 50,
            "cbs": 10000
        }
    ]
}
]]></sourcecode>
      </figure>
      <t><xref target="ex-3"/> shows the example of an advice that encloses two instances, each for one traffic direction.</t>
      <figure anchor="ex-3">
        <name>A JSON Example with Both Traffic Directions</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "direction": 0,
            "cir": 50,
            "cbs": 10000
        },
        {
            "direction": 1,
            "cir": 30,
            "cbs": 8000
        }
    ]
}
]]></sourcecode>
      </figure>
      <t>If both directions are covered by the same rate-limit policy, then the advice can be supplied as shown in <xref target="ex-4"/></t>
      <figure anchor="ex-4">
        <name>A JSON Example with Single Bidir Rate-Limit Policy</name>
        <sourcecode type="json"><![CDATA[
{
    "throughput-advice": [
        {
            "direction": 2,
            "cir": 50,
            "cbs": 10000
        }
    ]
}
]]></sourcecode>
      </figure>
    </section>
    <section anchor="sec-samples">
      <name>Sample Uses of the Advice</name>
      <t>It is out of scope of this document to make recommendations about how the advice is consumed by applications/OS/Hosts. A non-exhaustive list is provided hereafter for illustration purposes:</t>
      <ul spacing="normal">
        <li>
          <t>Applications can send/receive data at a rate beyond the CIR up to the PIR when the network is not congested. If network feedback (e.g., packet loss or delay) indicates congestion, the application can scale back to the CIR. Otherwise, it can use the PIR for temporary throughput boosts.</t>
        </li>
        <li>
          <t>Applications can send/receive short-term bursts of data that exceed the committed burst size CBS up to the PBS if there is no congestion. This is useful for scenarios where short, high-throughput bursts are needed.</t>
        </li>
        <li>
          <t>Applications can ensure that their sending rate never exceeds the PIR and that their short-term bursts of traffic never exceeds PBS.</t>
        </li>
        <li>
          <t>Applications can send/receive data at different rates for reliable and unreliable traffic (reliable could map to Queue-Building (QB) and unreliable could map to Non-Queue-Building (NQB)) by mapping reliability flag. One of the ways for application to make reliability markings visible is by following, e.g., the considerations in <xref section="4" sectionFormat="of" target="I-D.ietf-tsvwg-nqb"/>.</t>
        </li>
        <li>
          <t>The throughput advice can feed mechanisms such as <xref section="4.4.2" sectionFormat="of" target="RFC7661"/> or <xref section="7.8" sectionFormat="of" target="RFC9002"/> to control the maximum burst size.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As discussed in <xref target="sec-uc"/>, sharing a throughput advice helps networks mitigate overloads, particularly during periods of high traffic volume.</t>
      <t>An attacker who has the ability to change the throughput advice objects exchanged over a network attachment may:</t>
      <dl>
        <dt>Decrease the bitrate value:</dt>
        <dd>
          <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
        </dd>
        <dt>Increase the bitrate value:</dt>
        <dd>
          <t>The network attachment will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
        </dd>
        <dt>Delete or remove the advice:</dt>
        <dd>
          <t>This is equivalent to deployments where the advice is not shared.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-rlp">
        <name>Rate-Limit Policy Objects Registry Group</name>
        <t>This document requests IANA to create a new registry group entitled "SCONE Rate-Limit Policy Objects".</t>
      </section>
      <section anchor="sec-iana-opf">
        <name>Optional Parameter Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Optional Parameter Flags" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-op-flags"/>.</t>
        <table anchor="iana-op-flags">
          <name>Optional Parameter Flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Label</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">E</td>
              <td align="left">Indicates presence of excess rate/burst</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">P</td>
              <td align="left">Indicates presence of peak rate/burst</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ff">
        <name>Flow Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Flow flags" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-flow-flags"/>.</t>
        <table anchor="iana-flow-flags">
          <name>Flow flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Label</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">S</td>
              <td align="left">Scope</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2-3</td>
              <td align="left">D</td>
              <td align="left">Direction</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">4-5</td>
              <td align="left">R</td>
              <td align="left">Reliability</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">6-8</td>
              <td align="left"> </td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-tc">
        <name>Traffic Category Registry</name>
        <t>This document requests IANA to create a new registry entitled "Traffic Category Types" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-tc"/>.</t>
        <table anchor="iana-tc">
          <name>Traffic Category Values</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">All traffic</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">1-63</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-rate">
        <name>Rate Parameters Registry</name>
        <t>This document requests IANA to create a new registry entitled "Rate Parameters" under the "SCONE Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-rate"/>.</t>
        <table anchor="iana-rate">
          <name>Initial Rate Parameters Values Values</name>
          <thead>
            <tr>
              <th align="left">Parameter</th>
              <th align="left">Description</th>
              <th align="left">Mandatory (Y/N)</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">cir</td>
              <td align="left">Committed Information Rate (CIR)</td>
              <td align="left">Y</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">cbs</td>
              <td align="left">Committed Burst Size (CBS)</td>
              <td align="left">Y</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">eir</td>
              <td align="left">Excess Information Rate (EIR)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">ebs</td>
              <td align="left">Excess Burst Size (EBS)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">pir</td>
              <td align="left">Peak Information Rate (PIR)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">pbs</td>
              <td align="left">Peak Burst Size (PBS)</td>
              <td align="left">N</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="VPP" target="https://s3-docs.fd.io/vpp/23.06/developer/corefeatures/policer.html">
          <front>
            <title>Policing</title>
            <author>
              <organization>Vector Packet Processor (VPP)</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-14"/>
        </reference>
        <reference anchor="RFC7567">
          <front>
            <title>IETF Recommendations Regarding Active Queue Management</title>
            <author fullname="F. Baker" initials="F." role="editor" surname="Baker"/>
            <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This memo presents recommendations to the Internet community concerning measures to improve and preserve Internet performance. It presents a strong recommendation for testing, standardization, and widespread deployment of active queue management (AQM) in network devices to improve the performance of today's Internet. It also urges a concerted effort of research, measurement, and ultimate deployment of AQM mechanisms to protect the Internet from flows that are not sufficiently responsive to congestion notification.</t>
              <t>Based on 15 years of experience and new research, this document replaces the recommendations of RFC 2309.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="197"/>
          <seriesInfo name="RFC" value="7567"/>
          <seriesInfo name="DOI" value="10.17487/RFC7567"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC9066">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document specifies the Denial-of-Service Open Threat Signaling (DOTS) signal channel Call Home, which enables a Call Home DOTS server to initiate a secure connection to a Call Home DOTS client and to receive attack traffic information from the Call Home DOTS client. The Call Home DOTS server in turn uses the attack traffic information to identify compromised devices launching outgoing DDoS attacks and take appropriate mitigation action(s).</t>
              <t>The DOTS signal channel Call Home is not specific to home networks; the solution targets any deployment in which it is required to block DDoS attack traffic closer to the source(s) of a DDoS attack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9066"/>
          <seriesInfo name="DOI" value="10.17487/RFC9066"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="I-D.ietf-tsvwg-nqb">
          <front>
            <title>A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services</title>
            <author fullname="Greg White" initials="G." surname="White">
              <organization>CableLabs</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Ruediger Geib" initials="R." surname="Geib">
              <organization>Deutsche Telekom</organization>
            </author>
            <date day="8" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies characteristics of a Non-Queue-Building Per-
   Hop Behavior (NQB PHB).  The NQB PHB provides a shallow-buffered,
   best-effort service as a complement to a Default deep-buffered best-
   effort service for Internet services.  The purpose of this NQB PHB is
   to provide a separate queue that enables smooth (i.e. non-bursty),
   low-data-rate, application-limited traffic microflows, which would
   ordinarily share a queue with bursty and capacity-seeking traffic, to
   avoid the latency, latency variation and loss caused by such traffic.
   This PHB is implemented without prioritization and can be implemented
   without rate policing, making it suitable for environments where the
   use of these features is restricted.  The NQB PHB has been developed
   primarily for use by access network segments, where queuing delays
   and queuing loss caused by Queue-Building protocols are manifested,
   but its use is not limited to such segments.  In particular,
   applications to cable broadband links, Wi-Fi links, and mobile
   network radio and core segments are discussed.  This document
   recommends a specific Differentiated Services Code Point (DSCP) to
   identify Non-Queue-Building microflows, and updates the RFC8325
   guidance on mapping Diffserv to IEEE 802.11 for this codepoint.

   [NOTE (to be removed by RFC-Editor): This document references an ISE
   submission draft (I-D.briscoe-docsis-q-protection) that is approved
   for publication as an RFC.  This draft should be held for publication
   until the queue protection RFC can be referenced.]

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-nqb-27"/>
        </reference>
        <reference anchor="RFC7661">
          <front>
            <title>Updating TCP to Support Rate-Limited Traffic</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="A. Sathiaseelan" initials="A." surname="Sathiaseelan"/>
            <author fullname="R. Secchi" initials="R." surname="Secchi"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document provides a mechanism to address issues that arise when TCP is used for traffic that exhibits periods where the sending rate is limited by the application rather than the congestion window. It provides an experimental update to TCP that allows a TCP sender to restart quickly following a rate-limited interval. This method is expected to benefit applications that send rate-limited traffic using TCP while also providing an appropriate response if congestion is experienced.</t>
              <t>This document also evaluates the Experimental specification of TCP Congestion Window Validation (CWV) defined in RFC 2861 and concludes that RFC 2861 sought to address important issues but failed to deliver a widely used solution. This document therefore reclassifies the status of RFC 2861 from Experimental to Historic. This document obsoletes RFC 2861.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7661"/>
          <seriesInfo name="DOI" value="10.17487/RFC7661"/>
        </reference>
        <reference anchor="RFC9002">
          <front>
            <title>QUIC Loss Detection and Congestion Control</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="I. Swett" initials="I." role="editor" surname="Swett"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes loss detection and congestion control mechanisms for QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9002"/>
          <seriesInfo name="DOI" value="10.17487/RFC9002"/>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-ns-ip-mpls">
          <front>
            <title>A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Julian Lucek" initials="J." surname="Lucek">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="11" month="October" year="2024"/>
            <abstract>
              <t>   Slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks.  Realization of 5G
   slicing implies requirements for all mobile domains, including the
   Radio Access Network (RAN), Core Network (CN), and Transport Network
   (TN).

   This document describes a Network Slice realization model for IP/MPLS
   networks with a focus on the Transport Network fulfilling 5G slicing
   connectivity service objectives.  The realization model reuses many
   building blocks currently commonly used in service provider networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-13"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
      </references>
    </references>
    <?line 531?>

<section anchor="sec-overview">
      <name>Overview of Network Rate-Limit Policies</name>
      <t>As discussed, for example in <xref target="I-D.ietf-teas-5g-ns-ip-mpls"/>, a provider network's inbound policy can be implemented using one
of following options:</t>
      <ul spacing="normal">
        <li>
          <t>1r2c (single-rate two-color) rate limiter  </t>
          <t>
This is the most basic rate limiter, described in <xref section="2.3" sectionFormat="of" target="RFC2475"/>.
It meters at an ingress interface a
traffic stream and marks its packets as in-profile
(below CIR being enforced) or out-of-profile (above CIR being enforced).
In-profile packets are accepted and forwarded.  Out-of profile
packets are either dropped right at the ingress node (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at an ingress node, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
        </li>
        <li>
          <t>2r3c (two-rate three-color) rate limiter  </t>
          <t>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  The traffic is assigned to one of the these three
categories:  </t>
          <ul spacing="normal">
            <li>
              <t>Green, for traffic under CIR</t>
            </li>
            <li>
              <t>Yellow, for traffic between CIR and PIR</t>
            </li>
            <li>
              <t>Red, for traffic above PIR</t>
            </li>
          </ul>
          <t>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices or hosts. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green),
de-prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Eduard Vasilenko for the comments.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81d63bbRpL+j6fopc9ZkxOCsmTHcZjxJLIkT7RHlhhLdk7O
zPxoAk0SMQhw0IBkxtY8yz7LPtnWpbvRuIiyk8ycaHcdCehLdXV11VeXxoZh
GJRJmaqpGFytirxarjZVKQ7j6yRS4mL+s4pKscgLcXl0cX4yCOR8XqhraEx/
ixdpPh8EkSzVMi+2U6HLOAjiPMrkGkaMC7kow3lxE+ooz1RYuglCSROEc+gf
PtoPdDVfJ1oneVZuN9Dz9OTqZZBV67kqpkEMw08DGEGrTFd6KsqiUgEQ8TiQ
hZJTcZOUwU1evFvC8BsgAicL3qktPIungQhFlKepnOeFLJNrJTJVYuskW+I7
GcsNPZabTZrAUoCIIJBVucoL7BwI+FlUacprepWv4L+xeJFXEXRNCnqfF0uZ
Jb9Q56m4KGS2VPRCrWWSTsWae03mttd3ObWZRPm6O8exzMSPRF5n6KM0r2Jx
mS/KG1i7+CuuWHyfpzE012NxmkUT6mX3qa89NYjyKitxy95kSQnruSyBy1rk
C3G4VgXwwSc/ltkNTPDdEv/sp/kqKaq1TJWGecRrFcfbHurP83eJbE5/msVJ
Y653eRaXwKAdc10WSbySwEDxWv4sl/lGpjL7wzBroC15k2VSJHpVL2Vg15Jk
IMZnE3EEAl+oQmp6yqs7qxItXrXfwcqAySpVizyzEzqyLjcyyXwaUhhjnSwr
hdOaYdZVkaRp/l3pBiHuBllerOlgTIMgyRb1X0K8nc2mNKwwOmKWwxGxkinc
IcEfXlhnDwZvQYOA/pjJ6J0qxazII6U1PBjC4KOBGV0WS1VOxaosN3q6t6cf
h6BE9GQRT5J873qz2Tt4PHn0dC9W1yrNN6rYi/JCLZQsq0LpvQ1SpYrJqlyn
PCCpDLGQqVZBEIZwyue6LGRUBsEVKKVFEgn1PlrhEYxFfq0KIa1aEGu5FXMl
QCWR8itzAXpDhWmyTkpBUyWw96gTr2WR5BXIAVBEy5WpAIWkQVNNgqsVbCOs
olqrrBR6o6JkgR2lWKoMhUbkPMEwkmmq4rHo6N+RKFeyFBEIOhBUaaB1vhVr
hYTD/jIRq1yXOgAq4y3IT4KDbUWcgBLEZZUrpZ3G61vIRBChbuPzTMCf0C0L
NlLjlDC0pxo10wTCtSpBd/5c6RJbJwWQuJLXSV7AEiPYHjxk6XYCDF8pESud
LDM8MNBW1HZAsB2wrCBCYrVR8A8wzTS3i9kKXHimUjHcFHmZg1Yfi8PZ6Vio
MpqMJrzT6ySOU9j1B3C+yyKPq4g1OhynDOZIrpNyK7QqcF4gFc45DHadxMxc
wymNq45gbTmcby2uQUVBA2QBMkQV6yQDbmRLYGOSlaBLdBWthNSuj1DxEoYf
Hp3oEZwI8QZmFCf/rJINicPwzQnQe5WDiEZJmqA6QZmVYNpkphfQFqakxRvi
CkvZWCTEJ9ibCu0Q7QbsT5FvigSH0aoErQUtqCeaVCviOFyaZO/MFkbMkJrk
7rqEzGIQ2DYNYljpiuQMqZR4qPn9CSxaDGcno9EYTHqEJx219lZA4xwtCC/S
Hj3hiSgRhsKo4AgBnwqgmpaCi8WzXhQsi0kGPfyjBVy3dMmylNEKn+pxcLNK
UkWLrkCcinSL8+M07RFhgMFcgSQUemDklf+0Jw84sNpqPFq4lWm+pF9pKJ+T
eLYdM0FVoWDj8B3+TcRhZ4YbWDFYT40z3NDqcXxmiAa7gM/XVVomm9SRV4Im
yHKkB0TN1xIwq9KlnKdgfYgDpsNQTZaTsfjx7PAcx4tUmlapLEbYYYlgbacw
0FrsEoLgwwcZ3d4KvcpvUFBgV+UaiYNTWyvTJn/gNJBIkc7CQzAmFWZ6jmi1
IAvUrFDmlKK5yWERQD6QoQrQsiMegbmToK4A3cr6ySgNGIUngb1egUZQmVgU
+ZqY4XYBezuFrlADRsA8WfqtAiRQ9kgYqw5VhGAodFQkAFXHIstLeoZzw/jb
DetjOLTIlKMTYc8lqhuAraAzxN6XT8Xp7PopvFCL5P24JglnsGQFJPe1Ks8z
5i32xlnxHehOUG8xHE2x9/SJOeY3YPR982F5aFl4uGPPnS1kdWlIBo1iJenN
yYP9MawL/8WNhd8ejxqi2nM0bWdofAB7/jJn1aTlOxIenazR2oCaHgsjY3EO
3MBVorCZpQKxRq5w15kwkhKnwi0ZsBuoKUGqQGr/BT9S6uulhSuf/fM9Gdxf
2/sC/+dX9xZ//7gXTEL6mbTfmefNn0n79ST4yH9/wX9/4Rp87JsQW50feg0/
Qn/cdtu87nVvf9xw6P+QJ354xwTNn3pQ2+1O5nHTcyNw9mGLXZN7pguay7pn
dfVDj7t4HCx3H+7u3+LO4w53+qbqfehzZ+/j37tNH/ZJR2MW6BYYAe2ba/eP
lWs6HZ/fnQ8VHs7gw1Q8kBF7HM8Hl2xU7K4e1mpkAPqRHoYyBXD5fBApVAqD
W8B6uyCNj/iMCgaggZrHB8FGR53OAKLG4GSAl0HqmWxlA9vMVQCWlky9VoiX
4P8KFSmMKZTG2Wi5GLUy7CIeJGQD3uNalQg9YVQH5PrtEIJBcI6zyDN/1uQ2
0C68A9ADrGCda6wuKG5B4Jr8gl4aCC8ZCtEcrgF8hmtZoEPXHlsw7JJinaP1
MmEXM2x7oBPcMMCt2pkYNkj5GpgNLohGHgKIYYIsG2gzPQ4RAobJ5DX4vrQV
gPeRCbOTUMM2NxFJk3PWL4sRV3748O1peDxJVLkI842WN8swK2/CukcYJUVU
JeXtLViSQ02eSYVOErggJC40yKWxSU8mBzj1t69fHn315dOvbm/BtLMXHANa
3+Ayao/DAEawWlFUFToAPz4D4eLtL8kR9ay/kU7YZfAycLKwykBINzmzbAFo
G/wOQu+pzgkPZhp8ZfA3kiIjmMkSqVeygTW1h4iM8UdTmxnv1r0zBNSgSeOW
OJdNouhxKM086QNQQF5pIZKQy0LBQBWswQmVgVYbHGgU5OhjooMdUbzuTlpK
td6A0BUJ828tMwm+BiBUXHOayxiRQVyRtEpxfJxfMlXg+idlsiSyAZe8ds4y
Kw3j82AgcpEsq4JlBjDpEtXDCPBJzO40MrHwOhtkblhNKqd2LW9AzO0650gR
oeze42vWOTgUPx2e/1Ucoyv1CiZN6SydyS3s6IF4mxQlIsBZgTtQa87h2cHb
2flIXJrRjlWa4LkfoNiDiD578vTp7e2IgL1WEYVmEXqB0ssobNGjm3qiE74D
TSum3e+LoFBQAX3Tfr027cZDjDfUoQNn6YkbGMUNMr9OTCTC9xsdqGRXGn4t
EIJHaRWjtGytbogExi7AxqDaMXGH5uo68QwnBvcTaUMaxEsgz/KRvRcM69hQ
DoUYXNgmCH5cKcK72DIs89AFCMwv+AzfjVHc54CNm45FktFKY3ao2wEZZJTa
pPnWj15FoJzT1LhXoKTnZFoxJkTeWrWBY1faET1Wo7IENTQmzwHtR170BYGS
DHzWLKo1TwH+f5EZWyHFEuQ1cyY1BitCenYiTtiSUUCWuFSPhIQ5Lc3qGYVb
vScVbsAF8FzXQkO0wA40gl44DhoifxDNs1pjgIvDwwAoAnal9jZBANDG9vIY
f9N5gV4ZNMRoJst43cJBFZ2nCtUkHsVVQkw9BZVWYFwB9buEPVlLNiukY3rE
tw4djjkkQ5xdVDgx4IESLS6sln05YzEw74ILBzEAPjXZNKaTeyNOD88PYbeW
0A7XAioPtHSDVwkoYWLUA/EjSPpDLS6q8ts7j+QafUE8g3Q2Sf8LQBJVOQ2C
PxGHME+ExDiLCNgM7bCNaZigIJ8rCwNJj/WAMDOmiwqiuHVCniRKrDS7QWMf
0dmDaaXdusJ2eMxawYGsMgrUlDbA0w9Q+k4hkPu98YN7pQrxUwXs3wNVadfm
NNcaBgeNDvvEIew0iQkfjzEmBvpyRb/HCjEHygycJAKJQO0irei1gI2wEDd2
Ks9Q1WBcUWUE1wy3UB3RGUmVLDieMU/KgjdG6zxKSGoMKu9Fy3VIhVSMjZ/B
mtS1DXBc5+/Yttcx28PZ6QTJg0bFmCYG+AugCtYJoNGdfmg2BFMOA19chu4A
wdqxTwUHA1eOWibKN+YsNPXcA0zbXDNe4ljXMRrQhP7m2OI7tRWYmdRi8OrN
5dVgzP8V5xf0++uTH96cvj45xt8vvz88O3O/BKbF5fcXb86O69/qnkcXr16d
nB9zZ3gqGo+CwavDnwa8lYOL2dXpxfnh2aAnoFqQM2OgH+BzVRLCCwDfUKCL
zvWLo9n//e/+Ezjf/wXo4WB//2tAC/zHs/2vnsAfCG14thyhLP8JXN4GICMg
ADgKbCXs4SYBIUO1oynCkwk4Pgq4+ae/IWf+MRV/nkeb/Sd/MQ9wwY2HlmeN
h8Sz7pNOZ2Ziz6OeaRw3G89bnG7Se/hT42/Ld+/hn78F5axEuP/s278EbZWI
mlD7mneR21g6ajXQhzVOnQZTTDTEbCRsmgmbURYLQ94mII1AYMsPQWUnxrtY
y/fJulrbM7lDx8FEp03oxwG4gv6LhwSVtzXVUQqH20VosfOhjwjZaF7nKTl7
iMFxcQY1ovzsIYABpwhUYPKLolNmLPdxrR2PJFrxDw/Q2lTRLRh3ANi++kQe
RtRoQRHHtuKs00zNpJACdgObD22dwGGt4MQLk/NCzh+7/hRKaDlNWx/v9gVF
jSNA6KWRi2N7GPv+rXFeytpmeR4X7QIOZmepNssC+msbscbRVQxYrqfyQXO8
GHnFYdaaFJScvnwf7icovQjVBOrlDm4iYGjSEtAFacXoCQ1IcPJuIIjK4yav
Uqd/eylgeW+HQPwARmbtAKocf0beG1zCWfJO3SSaMA3ZKZLonXFshKmWU1Z6
KCV394LoSIEHu+oz94j2weTEmLu4MdgfTuccbLlAR5LcetGT120E1zd80Hsj
HhhOSGVE3rC3TyBFVHwzxrwunbo6tG6zq4AiCLdpmcTjlsXo4jZAB/ka3sWy
xm60KmmAA8ovsZnAd4uDdlcCF/bTmsH3xWKBHvyUdIifsQdOq6IE9dALtek8
cOLUBgEQLLIPxFEr14CyhSYiYMJzLe+VIO5cahu5aMUkts6ZWyvJTK/FthZa
EFPDZRXX7t5clSXmBbFqI085Z4shi/rIa8QukdoY7aKuedsTQMqKhfb14Tkq
9rwqQORaKbZgSktyngBpXwoS+cnDDGwCZw7LPE/9GFsKa423ni6qaYYBYwz9
cSylVv65Vg7oEk0m4vD1I4w4wC6/4P5nOaZVTXxC8xZXmDfH/XVRl9qLzRlB
Hp247DvofmaTRt3vWMBGz8G5RgaM1mzDd8ippVwTYsUUfKzAzS9hxWuKml7x
bMgxe+y7ouZHBnR/5ANrC7o731BtQMmNpBqKWs9yRRCYf6v7STBMutJwlrQ3
u3Z41iUcCVbeK58fsGE3CgS+RQVZ1jurANm0UlgI2jUazpyqZYjb5YqnjFPE
4BiRU+/hTDOQ8fLYuAd2szlsb7gGqrudSNcT417iob5O1A2gTtMGLcK8SNRC
2Hd44FADJRn7Xr1pVpzFRPSceqkDe3jQYyOQDk6xMB88/ZoivO6vZ/gX2i9+
8mR//0ugzjuLOjAE2TKiRkQF3h2BBk1K3J1Tzwwj3BPDo9PXo7HX4gXBo0vU
f8OjF5fw7uQ9Gdlu1xPqal77/U6o30zJdz29ZtQL10MN/H4z6GcipCZWszFl
Yp6/Ro77IfTIlqkKcUwqeFIqPIKdL8QrTCcUDWayaYCVwkJfXPLkQOOEBjqu
ZPoJwzzrDjPD32ghMJY4z0tlEuVkAnBn0KZZSOvvHtXe0OHSJiTlaz7SGoj8
QhDBBdWeGBU49GTFJgf2bWrAEwyKixmPFAOxhx49vBdejQWrF5QdSfqf/CyM
O4D/aoD5guQclvbhw9vZjMMvD8QFHj/QEuZYX5ZFFWEACOa7uzILJd5EDGtM
1I17mqV6hTU7wNAABIqgEJl99tidkgbhwzdFAvxN5EScYEO3bA8hxugramdg
7GpM4NoPQWU6dK+JGVd3rJZVQiNCY3UB2Y4FIiiCYTcrayct0JDaRUYmdynD
utqt4VEfHR+fWQ/66f4jFgrgg/GJaSFRHKdAOxftmdc+0OiGAVUW5WRHLGs1
58M4mtqtraOzgJA9TQww6yzAlFEQwcE3tvyrWUTIiK8v9u/gEXR1aveuKpsJ
NLrojxrXMmDEHYCvpqhZRvDWktqpOhfPhfjbF95QoR3qH43W9im2/xAI8a3I
DegKnTkLF6lcavH8L/BuMaZGiNLrxwvz1OiC0NbK4zv7O7bwFgZvap4FYGy/
sZZfm5JAXCflXB1FvoE1aAjZy0oeVcMGtTZF2pCll6C3ajjZTDdT1SxJlMF9
9SjQk8ZppTWoMqcy7q2pU7IQ/huTCbGAdp4Yxwk7zVUzH2yDlJpEF/rOqyTF
jfCLXhnX6PqwIgK2HSw/9kgxIj5dJCqNEdrABtU7yWuawiEHmiagKyQoNV46
7xeus/c1b8ip8Sg1hwLH3bTE2BQCpEAGlnhuKWSNDDk2w13LtFK0bg4nYrSf
8jy2nsxjYrePm4hiBM2Uj5cc6e3rU4V6hHZ8mEzUZOxtHh9R4yZaqI95JO6e
UmxGYOLZ/Gl4MMJJTxfkBzqN3SwnoDo5Pq7Gl4T/RUkAGuEZ9CcvBH0HC3bd
AKzWUIxif2Gwwwtvg4mlU/Hf9N+QWuh6J72aPWrt+AU93O+dXtnBipt7/IMO
3l+dLsADFJgGFc/FsJ5/Kh6NCX1Pxf6YdMdUHIyCDhHQCabn1gcZNZ4n0Ipa
91DwHBHBltrb/aFO9XZRz4YoO5fN6ijYhNrCea4vWkazyfiGBQurKRQZoUdm
Tz0d0paqpuLHKBDPDbtYa0i7l2U0FRWWIzq2PmqfQj9caGKFnH1nAwJeOgDA
PcB/pLDWEgMTZoUG1mDDRliSogroGFvcQzWukanRJT1opwi8bsB4IJquIoVy
z/wyD4DV5hm0wGVFuHe4qnFdBfWNeDXfYG1hNNd2ycsS+Ukv51tYKquvTmfX
FV52Otuut5aI+e9BxGYXEZsdRLgyL0QzttDrTr/zpUE5DJAGHefTtD611vqw
NDEzGw1uAj8TYNdGedr6hrKuLJD1AC7u4WfLe3O5ZnZwcy6sSXZesXhJaGB4
MXs5mnIARmORDj60ocmOZacQRo95Z0e0zgLwMLJGvEAC7sUJ38uZYjoysydz
sD8wZxO7ucm7uMIIuofoJn3DPbpzuBo39ISzjeqfMKWz30QpHcTfRGd7hH4q
31gq32SYzViib8G6dgJwSnl57hCQBvkXLynDznv/srv1zmVGW/d+QzEH2nWb
ucFLHRjUrKsT0D58qgBciuElmp2RJbypLZeFzDBRjhgAN5wUsh9wsYyk41Jb
3/om043JczeNg+wUxduC+DHrTcTMwBcX48VZjsXw2Fq8O+it8Q6We7NV4ptJ
W87nElrwgsd9YvBovksQ6EW9EmCIqTXeAa/6Ztn/dbO0CnnumWX/V66FEFx7
QfZSRu/02mzSazF8XQONO7apDXhJcm0V7H9u4z4JqP4+u/epA3/2hom7hj3P
CVrhYU26hRO69u3Y+eHZYVmgqNA1ZLhGiXQsS0wQccNegErLCy6h4I2kKEax
Q/2R5ulovwUrv6sjMbR3LY8MpCMVeOldhdyFOGt2cOZU29xFrfoM1m1Un5H2
+wJV/pSr1QzvzD1Ho0yangN22A+fPv4U5V5GtLz7grNiiFCIFnwIkMGEvAtp
o421GvUz73zlHc8M+ckMP1xYJKJbzlRkPiTxoB0a2dwQ1hsBmXm2qzrJ8BBI
bMnBkkq2UJtLSiGDNyapzvERZfsXDtzT3LZmnMLXMMzIunG1UHPgjNQLryOl
tEuJrly5wowVuYgjDG9VaWwiOCZ6aJKcCZXVMdENK4TehQXxjd1oB8LFkFBn
S/Ia1Q6uskD4Ba10E9MMCk+BYUhGL7d+UUV+P407A/KeuNgpXDiLTf+J0RrO
y3q4/3DyB5Mu9uYwmmXOtU2EmrIpExi3QnjyGUJIV+gcIuvjtcXKNavbyQ1f
Fnq4jOSgPkWfz5upad8sLw24bQsP9YdTgcqYLkIgkMR6PL5+Sgq65PO3U5w+
a7k7Uja75Wp2h0w1l2wX5Hk9lCtB8Kcs5CMI7StbYsa4KQnINBVrywG+AYC/
g19O8YJSmdQBXd9gHl3xr45+JxOYrPX5Zkb9fNZ1klm75WTWLye/RbvMfk9x
eFAXRLMDrN6D19u+ZpmkaYXfROBY5YcPWBING6Tw8qVbBUZtTbF6n9dbUXTu
fy4vzlHOOXPpFzAHxm3m4mgvSOJC6+Z+8DXGBdugtBNSJXlJdCsk6UWPMJ9S
UtYHn2dcRc/E1w6JyV7862edZ8EHQjWDTo4AwMPf3EXDD40rhwNHzwDDa813
FOjreV5GPQ+jpICnX3YezzU83n8EP+7FLf32DxM84eiJem9jJ4e8B2bbB7ec
eDKbFGFB6tZmwtT78AA2Go887AT4f/a0uUCGkQXeR6rcjBO83EUOd2LMRgNA
MQIri2S9bk7zm1n9mzkUHvTziDWxjYy/5VVc8QqQf7SCx+56uykYdvfbM1ft
QWqNPRhodpPXaSmT3ESTiNLfvbfw75TDz2Hc+FMm2O+d4HH/BM8+YWMe79qY
F+i9We/BRQY07gwgUfLtaveUpM+WjhnvhSrqO5lHym5kvrjbu1k2e+UqkK0U
P7m9/T336eD3VgHhk1185HIL8QIzBXyh7YzYQd/x2VIs1ZbSvvEuwZiQKlsP
e80FWO9juf4SeL5w9061CgC1VwHoKxtN10voQyatGzd7F5d739svFGR5BkZs
JcFguRuh/t0YBCJygZYQT5tv2cSmKrD4VHP9iV+ailuPaHfPXtalb5MQJCYg
PVfb3OITsPjVxsMlDgDVhQHaQD26kYnltaf15ZQFoJ45FsWZK3zmGigoDcol
xCqV4AfVvlN9r5PzcX6pJpEdSfwKCJXZ5Q5PigtEZFzDasqqbZkakkxVz+Zq
5NY35vOci7/u4w8cjKIMqZycUA2JC3+1pgZ3BjZYd8yDPwjyPCYi5FvUGDLL
vVXXzjosYFGlJkmqMqyUosBjYcgZi1WyXIX+apg0yksDPViG0bMwc7nJ5qbg
dOBSEc3Q3meK6nQ9uDpzcLXu0ccPq+abI8xM2dInyZ81tyXn65uhoP5IFtbd
mCcROdNrSZz+oVKVCl9UCX3zTAx/eDFqj9Bofw4Hrd3nHDqN6MNTpqzED/Gh
/zDhCg1WHTdya4qjPJmtlULdE++P43fYBF7qRkIwsbitgzu2JtPAULzIXRjO
NW9ZUyGVu7dd6mu8tv3POaIPc1Wsg1uR9Xgm/bICW0Pq39/2b3A/fboPcCAv
vAZfTZ7Z118/eoSwiis7XeVu1wkAo48ql+pUgQlHjYU175TXlUtVhLVnWFXK
RVLdBa1UunEAWtt7zMoVO+sx14JGGPFHRGdqKxWcp5jkFo+Rk6brPAWdzBVo
XM5LtU5Yvm9cQhvhzYX5lFN/Mawr0bjrY2te7GAtsUjwWOHdQaO27EUUQplT
6/dgYhY9UpN5UIW5iPZDblUK4365pDpOeJeaDprKBozvRRXvdMToKuXuaXuv
59lP6/gl5XNYPOgwvibrI5DmZ4W4L+61LGIbTKhz4McqVSVVPRVqnV8rz2g6
NjQqJvjugL3rYlVk09TyB3TwEjo5iXRpsymANmGKlzUpzdqBDCYpq8Vre9uT
v6pYdwyLdHPbvsWEVT4KNSRNilJDHq65PupujlJyWuDFGUA0sf3I6J1EDExB
410JV0ejRx3m5n4ldTVdd804MJcHkO/3Et9e9tALMiMP6S7+FV3CgeMMkxlf
y0Iu/76tQ0KkM8xCuQiNvLCPL2h+TcXgH8/kXKX86Zhj5T6wIPp/qN1rZRzA
j8HH/cbLE/y3jhf15JDxDOyRBvyIbA+PDdthqIPGULO7h3LVazwQtGsP9bhN
MvzrBfN3/DQ/rANDPfndhkKI3tgMi9XvFCDruoMRNLbT5EDsrjckEv4e4Kdy
YX+wwn2AMlRbLzJOfB/zwHzaAU4LJaXvPh+L3+F41HnvP9KBqOsyP+dI3CP+
l/wv+UKNve+IevjY63bM/7rA1p3dnoRfet1e878eirqj29Pw2SeI8J3i6pWw
GoH1tvTfL6LttGGvoJbRbxfUzkRX2436QwmtyTZ+pAhVRz75gS+dj3hfvcRn
r3xgsrMrEnfKQ+k+x9XhGIfO/gNCQTmN+qJRr0yghfjtUtGa6Y8kDrRAEghH
3/12/OMrV+44/GnvfNSVmgi8WSMB9+W1P/7UGrwhWmg+o7nuDtZJy3KLnYPB
WKombHf6FFqc3zdWTddd+UHX976xNjVdu5JvnzZWTVd/Nsrre89Y7sByJpiP
7KmRtPYBMkHv/8wBxi8zY7wKHY8L70KeveDbPlGJS165q33tL655V+naH28r
wZULv1yGmQ6TTQgtNF3G69wffKibtwG3Nh7sXwPjJBf+vxQAeuvaE064aS62
+5MQ+8VBJIaa77cx/2/yMMJbaSMOKvEH9orARHT9epQ1+qt0o7jRdNy8IFTz
+GDy2EYeDp589SWqBB70tBT2YgZWdbm7jPW9JWlaWvPA91spKoQhGXaROUCJ
tUXefTbTcUhfRKCY6FwhJ2wtN334Na/KMF+4K3BDOUf3taexo7i+L+dmLfgb
ARvKjmaxvQ2LUVX8blBYlxKYQfyeKqGqRPrGHvQv+Evl9gu55mpnHgNtK/S9
a37Dy5GNw7PnjZcJYzGkUHodlXs1O7sUV0fY5vjyaCauzl0wC78OaUZAu5os
tuIhVzJxxLcudbHkmesyiwQPPd3Nx1yv3aM6w14HRx+ClOWLsk244E+Lsaxi
T1vvh/KLa/bPc/e74hPcCU6dcJEHfipjzEUMbSa7LUV2u71pSRyymD/3Yuqz
3Of0SRDMmJYN9nN82dZbKd9t53G35sMF9npRm3x7DA+Kx3AM8eiZahi8G3rf
KbwhOSc1icEx/+Zg+zYvng7QDjA9lojBQcNvHPJQrj1f6ZwIjj6ac8aVegy2
sHihDpnyBRmi1IxkyuESZdQL/YRC/BWaZKz57LCMTWAzGg1/Uqimmi3tpW9b
eDFr9XltlartwPvsNcP7qEZdEptN8cHuK7NY/CK5qsMM02QqBvTwZt9D9xnq
BSw8i9PtQ1I//HWJ7GGJE+Xasgj0jFHcYDN5r/VKmvg0XSnjQBhmTPxv8uMn
+UdW+OwnNwv7Mex6WRRlpkJsMJ14V9IVZSxS9T6x4W++tNb8Oj5OY2Yw2s7g
0KW50c+6zdZouhA+fgAzcxooVqAXExCCMvmFjwYaKfqqDEup/YaoP0aecXQT
uUYnygpUfaaGW5KNEVVjkwbsHWlYkI4Gc30YvcvyG0DGS+IogAyuI1Px8wHd
HGPsIDP+6ONJXOGgbyUVlr7Lzdd2OCmEA0yC/wf/ZdRzdWgAAA==

-->

</rfc>
