<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-sconepro-rate-policy-discovery-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Rate-Limit Policies Discovery">Discovery of Network Rate-Limit Policies (NRLPs)</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-sconepro-rate-policy-discovery-02"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Gyan Mishra">
      <organization>Verizon Inc</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>gyan.s.mishra@verizon.com</email>
      </address>
    </author>
    <author initials="M." surname="Amend" fullname="Markus Amend">
      <organization>Deutsche Telekom</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>markus.amend@telekom.de</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="03"/>
    <area>wit</area>
    <workgroup>sconepro</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 139?>

<t>Traffic exchanged over a network attachment may be subject to rate-limit policies.
These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription)
or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation).</t>
      <t>Networks already support mechanisms to advertize a set of network properties to hosts using Neighbor Discovery options. Examples of such
properties are link MTU (RFC 4861) and PREFIX64 (RFC 8781). This document complements these tools and specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a new DHCP option is also defined.</t>
      <t>Plenty operational challenges are to be yet evaluated and more experiments conducted to assess the actual benefits (including, identifying under which conditions).
The document discusses these considerations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 151?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="context">
        <name>Context</name>
        <t>Connectivity services are provided by networks to customers via
dedicated terminating points, such as customer edges (CEs) or User Equipment (UE).
To facilitate data transfer via the provider network, it is assumed that appropriate setup
is provisioned over the links that connect customer terminating points and a provider network (usually via a Provider Edge (PE)),
successfully allowing data exchange over these links. The required setup is referred to in this document as network attachments,
while the underlying link is referred to as "bearers".</t>
        <t>The bearer can be a physical or logical link that connects a customer device to a provider network. A bearer can be a wireless or wired link. The same or multiple bearer technologies can be used to establish the bearer (e.g., WLAN, cellular) to graft customer terminating points to a network.</t>
        <ul empty="true">
          <li>
            <t>Network attachment is also known as "Attachment Circuit (AC)" which is an established concept in the industry and also in the IETF (<xref target="RFC4026"/>, <xref target="RFC4664"/>, <xref target="RFC4364"/>, etc.).</t>
          </li>
        </ul>
        <t><xref target="ac"/> shows an example of a network that connects CEs and hosts (UE, for example).These CEs are servicing
other (internal) hosts. The identification of these hosts is hidden from the network. The policies enforced at the network
for an AC are per-subscriber, not per-host. Typically, if a CE is provided with a /56 IPv6 prefix, policies are enforced
on that /56 not the individual /64s that will be used by internal hosts. A customer terminating point may be serviced with one (e.g., UE#1, CE#1, and CE#3) or multiple ACs (e.g., CE#2).</t>
        <figure anchor="ac">
          <name>Sample Network Attachments</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="512" viewBox="0 0 512 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,80 L 8,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 8,208" fill="none" stroke="black"/>
                <path d="M 64,80 L 64,128" fill="none" stroke="black"/>
                <path d="M 64,160 L 64,208" fill="none" stroke="black"/>
                <path d="M 120,96 L 120,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 120,192" fill="none" stroke="black"/>
                <path d="M 200,80 L 200,224" fill="none" stroke="black"/>
                <path d="M 368,80 L 368,224" fill="none" stroke="black"/>
                <path d="M 448,80 L 448,128" fill="none" stroke="black"/>
                <path d="M 448,176 L 448,208" fill="none" stroke="black"/>
                <path d="M 504,80 L 504,128" fill="none" stroke="black"/>
                <path d="M 504,176 L 504,208" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 200,80 L 368,80" fill="none" stroke="black"/>
                <path d="M 448,80 L 504,80" fill="none" stroke="black"/>
                <path d="M 64,96 L 120,96" fill="none" stroke="black"/>
                <path d="M 368,96 L 392,96" fill="none" stroke="black"/>
                <path d="M 416,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 368,112 L 392,112" fill="none" stroke="black"/>
                <path d="M 416,112 L 448,112" fill="none" stroke="black"/>
                <path d="M 8,128 L 64,128" fill="none" stroke="black"/>
                <path d="M 120,128 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,128 L 200,128" fill="none" stroke="black"/>
                <path d="M 448,128 L 504,128" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 120,160 L 144,160" fill="none" stroke="black"/>
                <path d="M 168,160 L 200,160" fill="none" stroke="black"/>
                <path d="M 448,176 L 504,176" fill="none" stroke="black"/>
                <path d="M 64,192 L 120,192" fill="none" stroke="black"/>
                <path d="M 368,192 L 392,192" fill="none" stroke="black"/>
                <path d="M 416,192 L 448,192" fill="none" stroke="black"/>
                <path d="M 8,208 L 64,208" fill="none" stroke="black"/>
                <path d="M 448,208 L 504,208" fill="none" stroke="black"/>
                <path d="M 200,224 L 368,224" fill="none" stroke="black"/>
                <g class="text">
                  <text x="472" y="36">Hosts</text>
                  <text x="456" y="52">O</text>
                  <text x="472" y="52">O</text>
                  <text x="488" y="52">O</text>
                  <text x="472" y="68">\|/</text>
                  <text x="404" y="100">AC</text>
                  <text x="36" y="116">UE#1</text>
                  <text x="404" y="116">AC</text>
                  <text x="476" y="116">CE#2</text>
                  <text x="156" y="132">AC</text>
                  <text x="272" y="148">Network</text>
                  <text x="156" y="164">AC</text>
                  <text x="36" y="196">CE#1</text>
                  <text x="404" y="196">AC</text>
                  <text x="476" y="196">CE#3</text>
                  <text x="40" y="228">/|\</text>
                  <text x="480" y="228">/|\</text>
                  <text x="24" y="244">O</text>
                  <text x="40" y="244">O</text>
                  <text x="56" y="244">O</text>
                  <text x="464" y="244">O</text>
                  <text x="480" y="244">O</text>
                  <text x="496" y="244">O</text>
                  <text x="40" y="260">Hosts</text>
                  <text x="480" y="260">Hosts</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                                                        Hosts
                                                        O O O
                                                         \|/
.------.                .--------------------.         .------.
|      +------+         |                    +---AC----+      |
| UE#1 |      |         |                    +---AC----+ CE#2 |
'------'      +---AC----+                    |         '------'
                        |     Network        |
.------.      .---AC----+                    |
|      |      |         |                    |         .------.
| CE#1 +------'         |                    +---AC----+ CE#3 |
'------'                |                    |         '------'
   /|\                  '--------------------'            /|\
  O O O                                                  O O O
  Hosts                                                  Hosts
]]></artwork>
          </artset>
        </figure>
        <t>Customer terminating points are provided with a set of information (e.g., IP address/prefix) to successfully be
able to send and receive traffic over an AC. A comprehensive list of provisioning parameters that are available on
the PE-side of an AC is documented in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
        <t>The required set of parameters is a function of the service offering. For example, a very limited set of parameters is required for mass-market
service offering while a more elaborated set is required for Enterprise services (e.g., Layer 2 VPN <xref target="RFC9291"/> or Layer 3 VPN <xref target="RFC9182"/>). This document
<strong>leverages access control, authorization, and authentication mechanisms that are already in place for the delivery of services over these ACs</strong>. An example of an AC provided over a 3GPP network is depicted in <xref target="ex-arch"/>. It is out of the scope of this document to describe all involved components. Readers may refer to <xref target="TS-23.501"/> for more details.</t>
        <t><xref target="sec-aaa"/> provides another example of how existing tools can be leveraged for AAA purposes.</t>
        <figure anchor="ex-arch">
          <name>5GS Architecture</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="536" viewBox="0 0 536 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,32 L 24,64" fill="none" stroke="black"/>
                <path d="M 48,64 L 48,96" fill="none" stroke="black"/>
                <path d="M 72,32 L 72,64" fill="none" stroke="black"/>
                <path d="M 96,32 L 96,64" fill="none" stroke="black"/>
                <path d="M 120,64 L 120,96" fill="none" stroke="black"/>
                <path d="M 136,240 L 136,272" fill="none" stroke="black"/>
                <path d="M 144,32 L 144,64" fill="none" stroke="black"/>
                <path d="M 144,96 L 144,128" fill="none" stroke="black"/>
                <path d="M 168,32 L 168,64" fill="none" stroke="black"/>
                <path d="M 168,240 L 168,272" fill="none" stroke="black"/>
                <path d="M 192,64 L 192,96" fill="none" stroke="black"/>
                <path d="M 192,240 L 192,272" fill="none" stroke="black"/>
                <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
                <path d="M 216,96 L 216,128" fill="none" stroke="black"/>
                <path d="M 216,160 L 216,192" fill="none" stroke="black"/>
                <path d="M 256,32 L 256,64" fill="none" stroke="black"/>
                <path d="M 256,240 L 256,272" fill="none" stroke="black"/>
                <path d="M 280,64 L 280,96" fill="none" stroke="black"/>
                <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
                <path d="M 304,240 L 304,272" fill="none" stroke="black"/>
                <path d="M 312,96 L 312,128" fill="none" stroke="black"/>
                <path d="M 328,32 L 328,64" fill="none" stroke="black"/>
                <path d="M 328,160 L 328,192" fill="none" stroke="black"/>
                <path d="M 352,64 L 352,96" fill="none" stroke="black"/>
                <path d="M 352,240 L 352,272" fill="none" stroke="black"/>
                <path d="M 376,32 L 376,64" fill="none" stroke="black"/>
                <path d="M 392,240 L 392,272" fill="none" stroke="black"/>
                <path d="M 400,32 L 400,64" fill="none" stroke="black"/>
                <path d="M 424,64 L 424,96" fill="none" stroke="black"/>
                <path d="M 440,240 L 440,272" fill="none" stroke="black"/>
                <path d="M 448,32 L 448,64" fill="none" stroke="black"/>
                <path d="M 24,32 L 72,32" fill="none" stroke="black"/>
                <path d="M 96,32 L 144,32" fill="none" stroke="black"/>
                <path d="M 168,32 L 216,32" fill="none" stroke="black"/>
                <path d="M 256,32 L 304,32" fill="none" stroke="black"/>
                <path d="M 328,32 L 376,32" fill="none" stroke="black"/>
                <path d="M 400,32 L 448,32" fill="none" stroke="black"/>
                <path d="M 24,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 96,64 L 144,64" fill="none" stroke="black"/>
                <path d="M 168,64 L 216,64" fill="none" stroke="black"/>
                <path d="M 256,64 L 304,64" fill="none" stroke="black"/>
                <path d="M 328,64 L 376,64" fill="none" stroke="black"/>
                <path d="M 400,64 L 448,64" fill="none" stroke="black"/>
                <path d="M 24,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 120,128 L 168,128" fill="none" stroke="black"/>
                <path d="M 192,128 L 240,128" fill="none" stroke="black"/>
                <path d="M 288,128 L 368,128" fill="none" stroke="black"/>
                <path d="M 120,160 L 168,160" fill="none" stroke="black"/>
                <path d="M 192,160 L 240,160" fill="none" stroke="black"/>
                <path d="M 288,160 L 368,160" fill="none" stroke="black"/>
                <path d="M 8,206 L 480,206" fill="none" stroke="black"/>
                <path d="M 8,210 L 480,210" fill="none" stroke="black"/>
                <path d="M 136,240 L 168,240" fill="none" stroke="black"/>
                <path d="M 192,240 L 256,240" fill="none" stroke="black"/>
                <path d="M 304,240 L 352,240" fill="none" stroke="black"/>
                <path d="M 392,240 L 440,240" fill="none" stroke="black"/>
                <path d="M 504,240 L 512,240" fill="none" stroke="black"/>
                <path d="M 168,256 L 192,256" fill="none" stroke="black"/>
                <path d="M 256,256 L 304,256" fill="none" stroke="black"/>
                <path d="M 352,256 L 392,256" fill="none" stroke="black"/>
                <path d="M 440,256 L 488,256" fill="none" stroke="black"/>
                <path d="M 136,272 L 168,272" fill="none" stroke="black"/>
                <path d="M 192,272 L 256,272" fill="none" stroke="black"/>
                <path d="M 304,272 L 352,272" fill="none" stroke="black"/>
                <path d="M 392,272 L 440,272" fill="none" stroke="black"/>
                <path d="M 504,272 L 512,272" fill="none" stroke="black"/>
                <path d="M 168,288 L 216,288" fill="none" stroke="black"/>
                <path d="M 240,288 L 312,288" fill="none" stroke="black"/>
                <path d="M 504,240 C 483.2,240 483.2,272 504,272" fill="none" stroke="black"/>
                <path d="M 512,240 C 532.8,240 532.8,272 512,272" fill="none" stroke="black"/>
                <path d="M 164,232 L 172,216" fill="none" stroke="black"/>
                <path d="M 180,200 L 188,184" fill="none" stroke="black"/>
                <path d="M 188,184 L 196,168" fill="none" stroke="black"/>
                <path d="M 380,168 L 388,184" fill="none" stroke="black"/>
                <path d="M 388,184 L 396,200" fill="none" stroke="black"/>
                <path d="M 404,216 L 412,232" fill="none" stroke="black"/>
                <g class="text">
                  <text x="44" y="52">NSSF</text>
                  <text x="120" y="52">NEF</text>
                  <text x="192" y="52">NRF</text>
                  <text x="280" y="52">PCF</text>
                  <text x="352" y="52">UDM</text>
                  <text x="420" y="52">AF</text>
                  <text x="24" y="84">Nnssf</text>
                  <text x="100" y="84">Nnef</text>
                  <text x="172" y="84">Nnrf</text>
                  <text x="260" y="84">Npcf</text>
                  <text x="332" y="84">Nudm</text>
                  <text x="440" y="84">Naf</text>
                  <text x="120" y="116">Nausf</text>
                  <text x="196" y="116">Namf</text>
                  <text x="292" y="116">Nsmf</text>
                  <text x="136" y="148">│AUSR</text>
                  <text x="168" y="148">│</text>
                  <text x="192" y="148">│</text>
                  <text x="216" y="148">AMF</text>
                  <text x="240" y="148">│</text>
                  <text x="288" y="148">│</text>
                  <text x="328" y="148">SMF</text>
                  <text x="368" y="148">│</text>
                  <text x="32" y="196">Control</text>
                  <text x="88" y="196">Plane</text>
                  <text x="164" y="196">N1</text>
                  <text x="228" y="196">N2</text>
                  <text x="340" y="196">N4</text>
                  <text x="404" y="196">N4</text>
                  <text x="20" y="228">User</text>
                  <text x="64" y="228">Plane</text>
                  <text x="216" y="228">|</text>
                  <text x="328" y="228">│</text>
                  <text x="284" y="244">N3</text>
                  <text x="372" y="244">N9</text>
                  <text x="460" y="244">N6</text>
                  <text x="148" y="260">UE</text>
                  <text x="224" y="260">(R)AN</text>
                  <text x="328" y="260">UPF</text>
                  <text x="416" y="260">UPF</text>
                  <text x="508" y="260">DN</text>
                  <text x="160" y="292">|</text>
                  <text x="228" y="292">AC</text>
                  <text x="320" y="292">|</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
  .-----.  .-----.  .-----.    .-----.  .-----.  .-----.
  |NSSF |  | NEF |  | NRF |    | PCF |  | UDM |  | AF  |
  '--+--'  '--+--'  '--+--'    '--+--'  '--+--'  '--+--'
Nnssf|    Nnef|    Nnrf|      Npcf|    Nudm|        |Naf
  ---+--------+--+-----+--+-------+---+----+--------+---
            Nausf|    Namf|       Nsmf|
              .--+--.  .--+--.     .--+------.
              │AUSR │  │ AMF │     │   SMF   │
              '-----'  '--+--'     '----+----'
                       ╱  |             |      ╲
Control Plane      N1 ╱   |N2           |N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     |             │         ╲
                .---.  .-------.  N3 .--+--. N9 .--+--. N6   .--.
                |UE +--+ (R)AN +-----+ UPF +----+ UPF +-----( DN )
                '---'  '-------'     '-----'    '-----'      '--'
                   |-------AC----------|
]]></artwork>
          </artset>
        </figure>
        <ul empty="true">
          <li>
            <t>The "AC" mention in <xref target="ex-arch"/> is not present in <xref target="TS-23.501"/>. It is added to the figure for the readers' convenience to position an attachment circuit.</t>
          </li>
        </ul>
      </section>
      <section anchor="networks-are-already-sharing-network-properties-with-hosts">
        <name>Networks Are Already Sharing Network Properties with Hosts</name>
        <t>To optimally deliver connectivity services, networks also advertize a set of network properties <xref target="RFC9473"/> to connected hosts such as:</t>
        <dl>
          <dt>Link Maximum Transmission Unit (MTU):</dt>
          <dd>
            <t>For example, the 3GPP <xref target="TS-23.501"/> specifies that "the link MTU size for IPv4 is sent to the UE by including it in the PCO (see TS 24.501). The link MTU size for IPv6 is sent to the UE by including it in the IPv6 Router Advertisement message (see RFC 4861)".</t>
          </dd>
          <dt/>
          <dd>
            <t><xref section="2.10" sectionFormat="of" target="RFC7066"/> indicates that a cellular host should honor the MTU option in the Router Advertisement (<xref section="4.6.4" sectionFormat="of" target="RFC4861"/>) given that the 3GPP system
architecture uses extensive tunneling in its packet core network below the 3GPP link, and this may lead to packet fragmentation issues.</t>
          </dd>
          <dt/>
          <dd>
            <t>MTU is cited as an example of path properties in <xref section="4" sectionFormat="of" target="RFC9473"/>.</t>
          </dd>
          <dt>Prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) <xref target="RFC8781"/>:</dt>
          <dd>
            <t>This option is useful to enable local DNSSEC validation, support networks with no DNS64, support IPv4 address literals on an IPv6-only host, etc.</t>
          </dd>
          <dt/>
          <dd>
            <t>NAT is cited as an example of path properties (see "Service Function" bullet in <xref section="4" sectionFormat="of" target="RFC9473"/>).</t>
          </dd>
          <dt>Encrypted DNS option <xref target="RFC9463"/>:</dt>
          <dd>
            <t>This option is used to discover encrypted DNS resolvers of a network.</t>
          </dd>
        </dl>
      </section>
      <section anchor="whats-in">
        <name>What's In?</name>
        <t><xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> discusses some use cases where it is beneficial to share policies with the hosts. <strong>Given that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/></strong>, this document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate these policies to hosts. For address family parity, a DHCP option <xref target="RFC2132"/> is also defined for IPv4.</t>
        <t>These options are called: Network Rate-Limit Policy (NRLP).</t>
        <t>This document uses the host/network metadata specified in <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        <t>In order to ensure consistent design for both IPv4 and IPv6 ACs, <xref target="sec-blob"/> groups the set of NRLP parameters that are returned independent of the address family. This blob can be leveraged in networks where DHCP is not used and ease the mapping with specific protocols used in these networks. For example, <strong><em>a Protocol Configuration Option (PCO) <xref target="TS-24.008"/> NRLP Information Element can be defined in 3GPP</em></strong>.</t>
        <t>Whether host-to-network, network-to-host, or both policies are returned in an NRLP is deployment specific. All these combinations are supported in this document.</t>
        <t>Also, the design supports returning one more NRLP instances for a given traffic direction.</t>
        <ul empty="true">
          <li>
            <t><xref target="sec-pvd"/> describes a candidate discovery approach using Provisioning Domains (PvDs) <xref target="RFC8801"/>. That approach requires more discussion as PvD is not currently deployed in mobile networks.</t>
          </li>
        </ul>
      </section>
      <section anchor="whats-out">
        <name>What's Out?</name>
        <t>This document does not make any assumption about the type of the network (fixed, cellular, etc.) that terminates an AC.</t>
        <t>Likewise, the document does not make any assumption about the services or applications that are delivered over an AC. Whether one or multiple services
are bound to the same AC is deployment specific.</t>
        <t>Applications will have access to all these NRLPs and will, thus, adjust their behavior as a function of scope and traffic category indicated in a policy (all traffic, streaming, etc.). An application that couples multiple flow types will adjust each flow type to be consistent with the specific policy for the relevant traffic category. Likewise, a host with multiple ACs may use the discovered NRLPs AC to decide how to distribute its flows over these ACs (prefer an AC to place an application session, migrate connection, etc.). That's said, this document does not make any recommendation about how a receiving host uses the discovered policy. Readers should refer, e.g., to <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> for some examples.</t>
        <t>Networks that advertize NLRPs are likely to maintain the policing in place within the network because of the trust model (hosts are not considered as trusted devices). Per-subscriber rate-limit policies are generally recommended to protect nodes against Denial of Service (DoS) attacks (e.g., <xref section="9.3" sectionFormat="of" target="RFC8803"/> or <xref section="8" sectionFormat="of" target="I-D.ietf-masque-quic-proxy"/>). Discussion about conditions under which such a trust model can be relaxed is out of scope of this document.</t>
        <t>This document does not assume nor preclude that other mechanisms, e.g., Low Latency, Low Loss, and Scalable Throughput (L4S) <xref target="RFC9330"/>, are enabled in a bottleneck link. The reader may refer to <xref target="sec-alt"/> for a list of relevant mechanisms. Whether these mechanism as alternative or complementary to explicit host/network signals is to be further assessed.</t>
      </section>
      <section anchor="running-experiments">
        <name>Running Experiments</name>
        <t>The benefits of enabling explicit signals are yet to be backed up with more evidence. Running experiments is thus
   key to assess the benefits under various setups.</t>
      </section>
      <section anchor="design-motivation-rationale">
        <name>Design Motivation &amp; Rationale</name>
        <t>The main motivations for the use of ND for such a discovery are listed in <xref section="3" sectionFormat="of" target="RFC8781"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Fate sharing</t>
          </li>
          <li>
            <t>Atomic configuration</t>
          </li>
          <li>
            <t>Updatability: change the policy at any time</t>
          </li>
          <li>
            <t>Deployability</t>
          </li>
        </ul>
        <t>The solution specified in the document is designed to <strong>ease integration with network management tools</strong> that are used to manage and expose policies. It does so by leveraging the policy structure defined in <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>. That same structure is also used in the context of service activation such as Network Slicing <xref target="RFC9543"/>; see the example depicted in Appendix B.5 of <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>.</t>
        <t>The solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not require any data plane change</strong>.</t>
          </li>
          <li>
            <t><strong>Applicable to any transport protocol</strong>.</t>
          </li>
          <li>
            <t><strong>Does not impact the connection setup delay</strong>.</t>
          </li>
          <li>
            <t><strong>Does not require to reveal the identity of the target server or the application itself</strong> to consume the signal.</t>
          </li>
          <li>
            <t><strong>Supports cascaded environments</strong> where multiple levels to enforce rate-limiting polices is required (e.g., WAN and LAN shown in <xref target="ac-casc"/>). NRLP signals can be coupled or decoupled as a function of the local policy.</t>
          </li>
          <li>
            <t><strong>Supports signaling policies bound to one or both traffic directions</strong>.</t>
          </li>
          <li>
            <t>Is able to <strong>signal whether a policy applies to a specific host or all hosts of a given subscriber</strong>.</t>
          </li>
        </ul>
        <figure anchor="ac-casc">
          <name>Example of Cascaded NRLPs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="424" viewBox="0 0 424 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
                <path d="M 8,112 L 8,160" fill="none" stroke="black"/>
                <path d="M 64,32 L 64,80" fill="none" stroke="black"/>
                <path d="M 64,112 L 64,160" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 96,112 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,48 L 144,144" fill="none" stroke="black"/>
                <path d="M 176,48 L 176,144" fill="none" stroke="black"/>
                <path d="M 248,32 L 248,176" fill="none" stroke="black"/>
                <path d="M 416,32 L 416,176" fill="none" stroke="black"/>
                <path d="M 8,32 L 64,32" fill="none" stroke="black"/>
                <path d="M 248,32 L 416,32" fill="none" stroke="black"/>
                <path d="M 64,48 L 96,48" fill="none" stroke="black"/>
                <path d="M 144,48 L 176,48" fill="none" stroke="black"/>
                <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                <path d="M 96,80 L 144,80" fill="none" stroke="black"/>
                <path d="M 176,96 L 248,96" fill="none" stroke="black"/>
                <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
                <path d="M 96,112 L 144,112" fill="none" stroke="black"/>
                <path d="M 64,144 L 96,144" fill="none" stroke="black"/>
                <path d="M 144,144 L 176,144" fill="none" stroke="black"/>
                <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                <path d="M 248,176 L 416,176" fill="none" stroke="black"/>
                <g class="text">
                  <text x="36" y="52">Host</text>
                  <text x="36" y="68">#1</text>
                  <text x="160" y="84">C</text>
                  <text x="100" y="100">nrlp#2</text>
                  <text x="160" y="100">P</text>
                  <text x="328" y="100">Network</text>
                  <text x="160" y="116">E</text>
                  <text x="212" y="116">nrlp#1</text>
                  <text x="36" y="132">Host</text>
                  <text x="36" y="148">#2</text>
                  <text x="100" y="164">nrlp#3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
.------.                      .--------------------.
| Host +---+     .---.        |                    |
|  #1  |   |     |   |        |                    |
'------'   +-----+ C |        |                    |
         nrlp#2  | P +--------+      Network       |
.------.   .-----+ E | nrlp#1 |                    |
| Host |   |     |   |        |                    |
|  #2  +---'     '---'        |                    |
'------' nrlp#3               |                    |
                              '--------------------'
]]></artwork>
          </artset>
        </figure>
        <t>Compared to a proxy or an encapsulation-based proposal (e.g., <xref target="I-D.ihlar-masque-sconepro-mediabitrate"/>), the solution defined in this document:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Does not impact the MTU tweaking</strong>: No packet overhead is required.</t>
          </li>
          <li>
            <t><strong>Does not suffer from side effects of multi-layer encryption schemes</strong> on the packet processing and overall performance of involved network nodes. Such issues are encountered, e.g., with the tunneled mode or long header packets in the forwarded QUIC proxy mode <xref target="I-D.ietf-masque-quic-proxy"/>.</t>
          </li>
          <li>
            <t><strong>Does not suffer from nested congestion control</strong> for tunneled proxy mode.</t>
          </li>
          <li>
            <t><strong>Does not incur multiple round-trips</strong> in the forwarding mode for the client to start sending Short Header packets.</t>
          </li>
          <li>
            <t><strong>Does not incur the overhead of unauthenticated re-encryption of QUIC packets</strong> in the scramble transform of the forwarding mode.</t>
          </li>
          <li>
            <t><strong>Does not impact the forwarding peformance of network nodes</strong>. For example, the proxy forwarded mode <xref target="I-D.ietf-masque-quic-proxy"/> requires rewriting connection identifiers; that is, the performance degradation will be at least equivalent to NAT.</t>
          </li>
          <li>
            <t><strong>Does not suffer from the complications of IP address sharing <xref target="RFC6269"/></strong>. Such issues are likely to be experienced for proxy-based solutions that multiplex internal connections using one or more external IP addresses.</t>
          </li>
          <li>
            <t><strong>Does not suffer from penalizing the proxy</strong> which could serve both good and bad clients (e.g., launching Layer 7 DDoS attacks).</t>
          </li>
          <li>
            <t><strong>Does not require manipulating extra steering policies on the host</strong> to decide which flows can be forwarded over or outside the proxy connection.</t>
          </li>
          <li>
            <t><strong>Requires a minor change to the network</strong>: For IPv6, upgrade PE nodes to support a new ND option. Note that all IPv6 hosts and networks are required to support Neighbor Discovery <xref target="RFC4861"/>. For IPv4, configure DHCP servers to include a new DHCP option.</t>
          </li>
        </ul>
      </section>
      <section anchor="sample-deployment-cases">
        <name>Sample Deployment Cases</name>
        <t>Some deployment use cases for NRLP are provided below:</t>
        <ul spacing="normal">
          <li>
            <t>A network may advertize an NRLP when it is overloaded, including when it is under attack. The rate-limit policy is basically a reactive policy that is meant to adjust the behavior of connected hosts to better control the load during these exceptional events (issue with RAN resources, for example). The mechanism can also be used to enrich the tools that are already available to better handle attack traffic close to the source <xref target="RFC9066"/>.</t>
          </li>
          <li>
            <t>Discovery of intentional policy applied on ACs (peering links, CE-PE links, etc.) when such information is not made available during the service activation or when network upgrades are performed.</t>
          </li>
          <li>
            <t>A user may configure policies on the CPE such as securing some resources to a specific internal host used for gaming or video streaming. The CPE can use the NRLP option to share these rate-limit policies to connected hosts to adjust their forwarding behavior.</t>
          </li>
        </ul>
        <t>Operational considerations are discussed in <xref target="sec-ops"/>, while deployment incentives are described in <xref target="sec-inc"/>.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the terms defined in <xref section="2" sectionFormat="of" target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="RFC9473"/>.</t>
      <t>Also, this document makes use fo the following terms:</t>
      <dl>
        <dt>Reactive policy:</dt>
        <dd>
          <t>Treatment given to a flow when an exceptional event
occurs, such as diminished throughput to the host caused by radio
interference or weak radio signal, congestion on the network
caused by other users or other applications on the same host.</t>
        </dd>
        <dt>Intentional policy:</dt>
        <dd>
          <t>Configured bandwidth, pps, or similar throughput
constraints applied to a flow, application, host, or subscriber.</t>
        </dd>
        <dt>Rate-limit:</dt>
        <dd>
          <t>Used as a generic term to refer to a policy to restrict the maximum bitrate of a flow.</t>
        </dd>
        <dt/>
        <dd>
          <t>It can be used with or without any traffic classification.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-blob">
      <name>NRLP Blob</name>
      <t>This section defines the set of attributes that are included in an NRLP blob:</t>
      <dl>
        <dt>Optional Parameter Flags (OPF):</dt>
        <dd>
          <t>These flags indicate the presence of some optional parameters. The following flags are defined (from MSB to LSB):
</t>
          <dl>
            <dt>E:</dt>
            <dd>
              <t>When set to "1", this flag indicates the presence of Excess Information Rate (EIR).</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that EIR is not present.</t>
            </dd>
            <dt>P:</dt>
            <dd>
              <t>When set to "1", this flag indicates the presence of Peak Information Rate (PIR).</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that PIR is not present.</t>
            </dd>
            <dt>U:</dt>
            <dd>
              <t>Unassigned bits. See <xref target="sec-iana-opf"/>.</t>
            </dd>
            <dt/>
            <dd>
              <t>Unassigned bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
            </dd>
          </dl>
        </dd>
        <dt>Flow flags (FF):</dt>
        <dd>
          <t>These flags are used to express some generic properties of the flow. The following flags are defined (from MSB to LSB):
</t>
          <dl>
            <dt>S (Scope):</dt>
            <dd>
              <t>1-bit field which specifies whether the policy is per host (when set to "1") or per subscriber (when set to "0).</t>
            </dd>
            <dt>D (Direction):</dt>
            <dd>
              <t>1-bit flag which indicates the direction on which to apply the enclosed policy.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "1", this flag indicates that this policy is for
network-to-host direction.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "0", this flag indicates that this policy is for
host-to-network direction.</t>
            </dd>
            <dt>R (Reliablity):</dt>
            <dd>
              <t>2-bit flag which indicates the reliability type of traffic on which to apply the enclosed policy.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "00b", this flag indicates that this policy is for unreliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "01b", this flag indicates that this policy is for reliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>When set to "10b", this flag indicates that this policy is for both reliable and unreliable traffic.</t>
            </dd>
            <dt/>
            <dd>
              <t>No meaning is associated with setting the field to "11b". Such value <bcp14>MUST</bcp14> be silently ignored by the receiver.</t>
            </dd>
            <dt>U:</dt>
            <dd>
              <t>Unassigned bits. See <xref target="sec-iana-ff"/>.</t>
            </dd>
            <dt/>
            <dd>
              <t>Unassigned bits <bcp14>MUST</bcp14> be set to zero by senders and <bcp14>MUST</bcp14> be ignored by receivers.</t>
            </dd>
          </dl>
        </dd>
        <dt>TC (Traffic Category):</dt>
        <dd>
          <t>6-bit field which specifies a traffic category to which this policy applies.</t>
        </dd>
        <dt/>
        <dd>
          <t>The following values are supported:
</t>
          <ul spacing="normal">
            <li>
              <t>"0": All traffic. This is the default value.</t>
            </li>
            <li>
              <t>"1": Streaming</t>
            </li>
            <li>
              <t>"2": Real-time</t>
            </li>
            <li>
              <t>"3": Bulk traffic</t>
            </li>
            <li>
              <t>4-63: Unassigned values</t>
            </li>
          </ul>
        </dd>
        <dt>Committed Information Rate (CIR) (Mbps):</dt>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an AC for a
traffic category.</t>
        </dd>
        <dt/>
        <dd>
          <t>If set to 0, this indicates to the host that an alternate path (if any) should be preferred over this one.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Committed Burst Size (CBS) (bytes):</dt>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is mandatory.</t>
        </dd>
        <dt>Excess Information Rate (EIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if the E flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum number of bits that a network can receive or
send during one second over an AC for a
traffic category that is out of profile.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Excess Burst Size (EBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if EIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Indicates the maximum excess burst size that is allowed while not complying with the CIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Information Rate (PIR) (Mbps):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if P flag is set to '1'.</t>
        </dd>
        <dt/>
        <dd>
          <t>Traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref section="5.1" sectionFormat="of" target="I-D.rwbr-sconepro-flow-metadata"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>This parameter is optional.</t>
        </dd>
        <dt>Peak Burst Size (PBS) (bytes):</dt>
        <dd>
          <t><bcp14>MUST</bcp14> be present only if PIR is also present.</t>
        </dd>
        <dt/>
        <dd>
          <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
        </dd>
        <dt/>
        <dd>
          <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
        </dd>
      </dl>
      <t>The reader should refer to <xref target="RFC2697"/>, <xref target="RFC2698"/>, and <xref target="RFC4115"/> for examples
of how various combinations of CIR/CBS/EIR/EBS/PIR/PBS are used for policing. Typically:</t>
      <ul spacing="normal">
        <li>
          <t>A Single-Rate, Three-Color Marker <xref target="RFC2697"/> uses CIR, CBS, and EBS.</t>
        </li>
        <li>
          <t>A Dual-Rate, Three-Color Marker <xref target="RFC2698"/> uses CIR, CBS, PIR, and PBS.</t>
        </li>
      </ul>
    </section>
    <section anchor="ipv6-ra-nrlp-option">
      <name>IPv6 RA NRLP Option</name>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The format of the IPv6 RA NRLP option, with only mandatory fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-m-format">
          <name>NRLP Option Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
MSB                                                          LSB
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of the IPv6 RA NRLP option, with optional fields included, is illustrated in <xref target="opt-m-format"/>.</t>
        <figure anchor="opt-format">
          <name>NRLP Option Format with Optional Fields</name>
          <artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |     Length    |  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                Committed Information Rate (CIR)               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Committed Burst Size (CBS)                   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Excess Information Rate (EIR) (Optional)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Excess Burst Size (EBS) (Optional)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               Peak Information Rate (PIR) (Optional)          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                  Peak Burst Size (PBS) (Optional)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The fields of the option shown in <xref target="opt-format"/> are as follows:</t>
        <dl>
          <dt>Type:</dt>
          <dd>
            <t>8-bit identifier of the NRLP option as assigned by IANA (TBD1) (see <xref target="sec-iana-ra"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>8-bit unsigned integer.  The length of the option (including
the Type and Length fields) is in units of 8 octets.</t>
          </dd>
          <dt>OPF (Optional Parameter Flags):</dt>
          <dd>
            <t>4-bit flags which indicates the presence of some optional inforamtion in the option.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-op-flags"/> for current assigned flags.</t>
          </dd>
          <dt>FF (Flow flags):</dt>
          <dd>
            <t>6-bit flags used to express some generic properties of the flow.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-flow-flags"/> for current assigned flags.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
      </section>
      <section anchor="ipv6-host-behavior">
        <name>IPv6 Host Behavior</name>
        <t>The procedure for rate-limit configuration is the same as it is with any
other Neighbor Discovery option <xref target="RFC4861"/>.</t>
        <t>The host <bcp14>MUST</bcp14> be prepared to receive multiple NRLP options
in RAs; each with distinct scope and/or application group.</t>
        <t>If the host receives multiple NRLP options with overlapping scope/TC, the host <bcp14>MUST</bcp14> silently discard all these options.</t>
        <t>If the receiving host has LAN capabilities (e.g., mobile CE or mobile handset with tethering), the following behavior applies:</t>
        <ul spacing="normal">
          <li>
            <t>If an RA NRLP is advertised from the network, and absent local rate-limit policies, the
device should send RAs to the downstream attached LAN devices with the same NRLP values received from the network.</t>
          </li>
          <li>
            <t>If local rate-limit policies are provided to the device, the device may change the scope or values received from the network
to accommodate these policies. The device may decide to not relay received RAs to internal nodes if local policies were
already advertized using RAs and those policies are consistent with the network policies.</t>
          </li>
        </ul>
        <t>Applications running over a host can learn the bitrates associated with a network attachment by invoking a dedicated API. The exact details of the API is OS-specific and, thus, out of scope of this document.</t>
      </section>
    </section>
    <section anchor="dhcp-nrlp-option">
      <name>DHCP NRLP Option</name>
      <ul empty="true">
        <li>
          <t>Note that the base DHCP can only signal a rate policy change when the
  client first joins the network or renews its lease, whereas IPv6 ND
  can update the rate policy at the network's discretion. <xref target="RFC6704"/>
  specifies an approach for forcing reconfiguration of individual hosts
  without suffering from the limitations of the FORCERENEW design in <xref target="RFC3203"/>.</t>
        </li>
      </ul>
      <section anchor="option-format-1">
        <name>Option Format</name>
        <t>The format of the DHCP NRLP option is illustrated in <xref target="dhc-format"/>.</t>
        <figure anchor="dhc-format">
          <name>NRLP DHCP Option Format</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_V4_NRLP|     Length    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~      NRLP Instance Data #1    ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
.              ...              .    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ optional
~      NRLP Instance Data #n    ~    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ---
]]></artwork>
        </figure>
        <t>The fields of the option shown in  <xref target="dhc-format"/> are as follows:</t>
        <dl>
          <dt>Code:</dt>
          <dd>
            <t>OPTION_V4_NRLP (TBD2).  (see <xref target="sec-iana-dhcp"/>).</t>
          </dd>
          <dt>Length:</dt>
          <dd>
            <t>Indicates the length of the enclosed data in octets.</t>
          </dd>
          <dt>NRLP Instance Data:</dt>
          <dd>
            <t>Includes a network rate-limit policy. The format of this field with only mandatory parameters is shown in <xref target="nrlp-m-format"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>When several NRLPs are to be included, the "NRLP Instance Data" field is repeated.</t>
          </dd>
        </dl>
        <figure anchor="nrlp-m-format">
          <name>NRLP Instance Data Format with Mandatory Fields</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The format of this field, with optional parameters included, is shown in <xref target="nrlp-m-format"/>.</t>
        <figure anchor="nrlp-format">
          <name>NRLP Instance Data Format with Optional Fields Included</name>
          <artwork align="center"><![CDATA[
 0                   1
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   NRLP Instance Data Length   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPF  |     FF    |    TC     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Information Rate   |
|              (CIR)            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Committed Burst Size (CBS)   |
|                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
|  Excess Information Rate      |  |
|             (EIR)             |  O
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  P
|    Excess Burst Size (CBS)    |  T
|                               |  I
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  O
|    Peak Information Rate      |  N
|             (PIR)             |  A
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  L
|      Peak Burst Size (PBS)    |  |
|                               |  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ---
]]></artwork>
        </figure>
        <t>The fields shown in <xref target="nrlp-format"/> are as follows:</t>
        <dl>
          <dt>NRLP Instance Data Length:</dt>
          <dd>
            <t>Length of all following data in octets. This field is set to '8' when only the nominal bitrate is provided for an NLRP instance.</t>
          </dd>
          <dt>OPF (Optional Parameter Flags):</dt>
          <dd>
            <t>4-bit flags which indicates the presence of some optional inforamtion in the option.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-op-flags"/> for current assigned flags.</t>
          </dd>
          <dt>FF (Flow flags):</dt>
          <dd>
            <t>6-bit flags used to express some generic properties of the flow.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="sec-blob"/> for the structure of this field.</t>
          </dd>
          <dt/>
          <dd>
            <t>See <xref target="iana-flow-flags"/> for current assigned flags.</t>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>See <xref target="sec-blob"/>. This is an optional field.</t>
          </dd>
        </dl>
        <t>OPTION_V4_NRLP is a concatenation-requiring option. As such, the mechanism specified in <xref target="RFC3396"/> <bcp14>MUST</bcp14> be used if OPTION_V4_NRLP exceeds the maximum DHCP option size of 255 octets.</t>
        <t>OPTION_V4_NRLP is permitted to be included in the RADIUS DHCPv4-Options Attribute <xref target="RFC9445"/>.</t>
      </section>
      <section anchor="dhcpv4-client-behavior">
        <name>DHCPv4 Client Behavior</name>
        <t>To discover a network rate-limit policy, the DHCP client includes OPTION_V4_NRLP in a Parameter Request List option <xref target="RFC2132"/>.</t>
        <t>The DHCP client <bcp14>MUST</bcp14> be prepared to receive multiple "NRLP Instance Data" field entries in the OPTION_V4_NRLP option; each instance is to be treated as a separate network rate-limit policy.</t>
      </section>
    </section>
    <section anchor="sec-ops">
      <name>Operational Considerations</name>
      <section anchor="nrlp-is-complementary-not-replacement-solution">
        <name>NRLP Is Complementary Not Replacement Solution</name>
        <t>Sharing NRLP signals are not intended to replace usual actions to soften bottlenck issues (e.g., adequate network dimensioning and upgrades). However, given that such actions may not be always immediately possible or economically justified, NRLP signals can be considered as complementary mitigations to soften these issues by introducing some collaboration between a host and
its networks to adjust their behaviors.</t>
      </section>
      <section anchor="provisionning-policies">
        <name>Provisionning Policies</name>
        <t>NRLP senders should be configured with instructions about the type of network rate-limit policies to be shared with requesting hosts. These types can be provided using mechanisms such as <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>.</t>
      </section>
      <section anchor="redundant-vs-useful-signal">
        <name>Redundant vs. Useful Signal</name>
        <t>In contexts where the bitrate policies are known during the establishment of the underlying bearer (e.g., GBR PDU Sessions), sending NRLP signals over the AC may be redundant and should thus be disabled.</t>
        <t>In contexts where the (average) bitrate policies provided during the establishment of a bearer cannot be refreshed to echo network-specific conditions (e.g., overload) using bearer-specific mechanisms, sending NRLP signals over the AC would allow control the load at the source.</t>
        <t>When both bearer-specific policies and NRLP signals are communicated to a host, the NRLP signals takes precedence.</t>
      </section>
      <section anchor="fairness">
        <name>Fairness</name>
        <t>Rate-limit policies enforced at the network are assumed to be consistent with the local jurisdictions. For example, <xref target="BEREC"/> says the following:</t>
        <ul empty="true">
          <li>
            <t>ISPs are prohibited from blocking or slowing down of Internet traffic, except where necessary. The exceptions are limited to: traffic management to comply with a legal order, to ensure network integrity and security, and to manage congestion, provided that equivalent categories of traffic are treated equally.</t>
          </li>
        </ul>
      </section>
      <section anchor="architectural-considerations-matter">
        <name>Architectural Considerations Matter</name>
        <t>Approaches based on middleboxes are generally not recommended due to their inherent limitations, in terms of performance, scalability, redundancy, etc. Specifically, if the management and operation of such middleboxes remain unclear, that motivate operational issues and responsibilities.
Furthermore, it is important to note that any middlebox could not necessarily cover an entire service end-to-end, thus <strong>producing only partial observations which could not be sufficiently good at the time of generating appropriate signals</strong>.</t>
        <t>The NRLP solution does not require such middleboxes but the consideration about partial observability applies. That concern can be softened by cascaded NLRP design. However, network integration of such appraoch is to be further elaborated.</t>
      </section>
      <section anchor="service-considerations-application-diversity-realistic-assessment">
        <name>Service Considerations: Application Diversity &amp; Realistic Assessment</name>
        <t>Signals could be generated for multiple services and/or applications. For instance, services providing short video content might require signals different to those based on long videos. This implies the need of defining a generic method suitable for any kind of service and application, avoiding the multiplicity of solutions and the dominance of some applications over others.</t>
        <t>It should be also noted that more experimentation is needed in order to fully understand the implications of the signals in the overall performance of the network. On one hand, the co-existence of multiple flows, some of them using the signals for improving the experience, some others not. For this, more experimentation and datasets are required, so then can be clear that no flows are negatively impacted at all.</t>
        <t>On the other hand, if the experience of the flows improves and depending on the nature of the signals themselves, this might motivate a more intense usage of the network, then requiring to accommodate larger number of flows, and in consequence, reducing the available resources per application. This kind of paradox can be <strong>assessed with more experimental results under realistic conditions (i.e., multiple users and multiple services in the network)</strong>.</t>
      </section>
      <section anchor="operational-guidance-for-signal-enforcement">
        <name>Operational Guidance for Signal Enforcement</name>
        <t>Signals are conceived as indications from the network towards applications. It is not clear the way of enforcing the application to follow the indication, especially in a context where different applications from a user, or multiple users, simultaneously access the network. This can motivate a wastage of resources for generating signals with the risk of not being effective. Furthermore, it might lead to a continuous loop of signal generation because the initial signals being ignored. It is then necessary to define mechanisms to avoid permanent signal generation when ignored.</t>
        <t>Finally, signals could not be required at every moment, but only in situations that can benefit the service. Such situations could be due, for instance, to given levels of congestion, or based on previous information shared by the application (e.g., SLO thresholds) so that signals can be triggered according to service conditions. <strong>Elaborating more operational guidance on intended signal enforcment policy is key</strong>.</t>
      </section>
      <section anchor="signal-estimation">
        <name>Signal Estimation</name>
        <t>The validity of the estimation produced by a network might be questioned by the application. Trust is required in a way that applications can safely follow guidance from a network. Furthermore, whatever estimation should be timely produced, avoiding the generation of aged estimations that could not correspond to the actual service circumstances. Finally, some common guidance is necessary to define a standard way of generating signals, for instance, per-flow or per group of flows.</t>
        <t>An open point is how to deal with adaptive applications, in the sense that signals could not be of value because the self-adaptation nature of these applications.</t>
      </section>
      <section anchor="signal-interference">
        <name>Signal "Interference"</name>
        <t>The network is built on multiple layers. In some cases, different solutions targeting similar objectives (e.g., congestion control or bottleneck mitigation) can be in place. It is then necessary to <strong>assess the simultaneous coexistence of these solutions to avoid contradictory effects or "interferences"</strong>.</t>
      </section>
    </section>
    <section anchor="sec-inc">
      <name>Deployment Incentives</name>
      <section anchor="networks">
        <name>Networks</name>
        <t>There are a set of tradeoffs for networks to deploy NRLP discovery:</t>
        <ul spacing="normal">
          <li>
            <t>Cost vs. benefit</t>
          </li>
          <li>
            <t>Impact on operations vs incentive to deploy</t>
          </li>
          <li>
            <t>Enhanced experience vs. impacts on nominal mode</t>
          </li>
        </ul>
        <t>The procedure defined in the document provides a mechanism to assist networks managing the load at the source and, thus, contribute to better handle network overloads and optimize the use
of resources under non nominal conditions. The mechanism also allows to enhance the quality of experience at the LAN by providing a simple tool to communicate local policies to hosts. A minimal change is required to that aim.</t>
        <t>With the OS support, the following benefits might be considered by networks:</t>
        <dl>
          <dt>Improved Network Performance:</dt>
          <dd>
            <t>The OS can schedule network requests more efficiently, preventing network congestion, and improving overall stability and network performance with NRLP signals.</t>
          </dd>
          <dt>Cost Efficiency:</dt>
          <dd>
            <t>By managing network usage based on known rate limits, the OS can help reduce network-related costs. However, this is difficult to assess.</t>
          </dd>
        </dl>
        <t>Networks that throttle bandwidth for reasons that are not compliant with local jurisdictions, not communicated to customers, etc. are unlikely to share NRLP signals. If these signals are shared, it is unlikely that they will mirror the actual network configuration (e.g., application-specific policies).</t>
      </section>
      <section anchor="sec-app-inc">
        <name>Applications</name>
        <t>Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed
how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals
depends upon:</t>
        <ul spacing="normal">
          <li>
            <t>The extra cost that is required to support both mechanisms at the application layer.</t>
          </li>
          <li>
            <t>The complexity balance between performing the measurements vs. consuming the signal.</t>
          </li>
          <li>
            <t>Whether the measurements ("assessed property" per <xref target="RFC9473"/>) reflect actual network conditions or severely diverge.</t>
          </li>
          <li>
            <t>The availability of the network signals at the first place: it is unlikely that all networks will support sending the signals. Deployment incentives at the network may vary.</t>
          </li>
          <li>
            <t>The host support may be variable.</t>
          </li>
        </ul>
        <t>Applications that don't support (embedded) bandwidth measurement schemes will be enriched with the NRLP signals as this will be exposed by an OS API.</t>
      </section>
      <section anchor="host-os">
        <name>Host OS</name>
        <dl>
          <dt>API to facilitate Application Development:</dt>
          <dd>
            <t>An OS can provide more accurate available bandwidth to applications through the API (as mentioned in <xref target="sec-app-inc"/>), making implementation easier for applications that don't requrie dedicated bandwidth measurement.</t>
          </dd>
          <dt>Prevent Abuse:</dt>
          <dd>
            <t>The OS can allocate network resources more fairly among different processes, with NRLP signals, ensuring that no single process monopolizes the network.</t>
          </dd>
          <dt>Better Resource Management:</dt>
          <dd>
            <t>OS can also optimize resource allocation, by deprioritizing background/inactive applications in the event of high network utilization.</t>
          </dd>
          <dt>Enhanced Security:</dt>
          <dd>
            <t>Awareness of NRLPs can help the OS detect and mitigate network-related security threats, such as denial-of-service (DoS) attacks.</t>
          </dd>
          <dt>Improved User Experience:</dt>
          <dd>
            <t>By avoiding network congestion and ensuring fair resource allocation, the OS can provide a smoother, more responsive user experience.</t>
          </dd>
          <dt>Improved Application Development Efficiency:</dt>
          <dd>
            <t>OS providing rate limits through an API (as mentioned in <xref target="sec-app-inc"/>) can provide the above listed benefits at per application level.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="nd">
        <name>ND</name>
        <t>As discussed in <xref target="RFC8781"/>, because RAs are required in all IPv6 configuration scenarios, RAs must already be secured, e.g., by deploying an RA-Guard <xref target="RFC6105"/>. Providing all configuration in RAs reduces the attack surface to be targeted by malicious attackers trying to provide hosts with invalid configuration, as compared to distributing the configuration through multiple different mechanisms that need to be secured independently.</t>
        <t>RAs are already used in mobile networks to advertize the link MTU. The same security considerations for MTU discovery apply for the NRLP discover.</t>
        <t>An attacker who has access to the RAs exchanged over an AC may:</t>
        <dl>
          <dt>Decrease the bitrate:</dt>
          <dd>
            <t>This may lower the perceived QoS if the host aggressively lowers its transmission rate.</t>
          </dd>
          <dt>Increase the bitrate value:</dt>
          <dd>
            <t>The AC will be overloaded, but still the rate-limit at the network will discard excess traffic.</t>
          </dd>
          <dt>Drop RAs:</dt>
          <dd>
            <t>This is similar to the current operations, where no NRLP RA is shared.</t>
          </dd>
          <dt>Inject fake RAs:</dt>
          <dd>
            <t>The implications are similar to the impacts of tweaking the values of a legitimate RA.</t>
          </dd>
        </dl>
      </section>
      <section anchor="dhcp">
        <name>DHCP</name>
        <t>An attacker who has access to the DHCP exchanged over an AC may do a lot of harm (e.g., prevent access to the network).</t>
        <t>The following mechanisms may be considered to mitigate spoofed or modified DHCP responses:</t>
        <dl>
          <dt>DHCPv6-Shield <xref target="RFC7610"/>:</dt>
          <dd>
            <t>The network access node (e.g., a border router, a CPE, an Access Point (AP)) discards DHCP response messages received from any local endpoint.</t>
          </dd>
          <dt>Source Address Validation Improvement (SAVI) solution for DHCP <xref target="RFC7513"/>:</dt>
          <dd>
            <t>The network access node filters packets with forged source IP addresses.</t>
          </dd>
        </dl>
        <t>The above mechanisms would ensure that the endpoint receives the correct NRLP information, but these mechanisms cannot provide any information about the DHCP server or the entity hosting the DHCP server.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-iana-rlp">
        <name>Rate-Limit Policy Objects Registry Group</name>
        <t>This document requests IANA to create a new registry group entitled "Rate-Limit Policy Objects".</t>
      </section>
      <section anchor="sec-iana-opf">
        <name>Optional Parameter Flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Optional Parameter Flags" under the "Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-op-flags"/>.</t>
        <table anchor="iana-op-flags">
          <name>Optional Parameter Flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">E-flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">P-flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ff">
        <name>Flow flags Registry</name>
        <t>This document requests IANA to create a new registry entitled "Flow flags" under the "Rate-Limit Policy Objects" registry group (<xref target="sec-iana-rlp"/>).</t>
        <t>The initial values of this registry is provided in <xref target="iana-flow-flags"/>.</t>
        <table anchor="iana-flow-flags">
          <name>Flow flags</name>
          <thead>
            <tr>
              <th align="left">Bit Position</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Scope (S) Flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Direction (D) Flag</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">3-4</td>
              <td align="left">Reliability (R) Flags</td>
              <td align="left">This-Document</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">Unassigned</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
        <t>The allocation policy of this new registry is "IETF Review" (<xref section="4.8" sectionFormat="of" target="RFC8126"/>).</t>
      </section>
      <section anchor="sec-iana-ra">
        <name>Neighbor Discovery Option</name>
        <t>This document requests IANA to assign the following new IPv6 Neighbor Discovery Option
type in the "IPv6 Neighbor Discovery Option Formats" sub-registry under the "Internet Control Message Protocol version 6 (ICMPv6)
Parameters" registry maintained at <xref target="IANA-ND"/>.</t>
        <table anchor="iana-new-op">
          <name>Neighbor Discovery NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD1" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-iana-dhcp">
        <name>DHCP Option</name>
        <t>This document requests IANA to assign the following new DHCP Option Code in the "BOOTP Vendor Extensions and DHCP Options" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-new-dhcp">
          <name>DHCP NRLP Option</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left">Data Length</th>
              <th align="left">Meaning</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">N</td>
              <td align="left">NRLP Option</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace all "TBD2" occurrences with the assigned value.</t>
          </li>
        </ul>
      </section>
      <section anchor="dhcp-options-permitted-in-the-radius-dhcpv4-options-attribute">
        <name>DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute</name>
        <t>This document requests IANA to add the following DHCP Option Code to the "DHCP Options Permitted in the RADIUS DHCPv4-Options Attribute" registry maintained at <xref target="IANA-BOOTP"/>.</t>
        <table anchor="iana-radius-dhcp">
          <name>New DHCP Option Permitted in the RADIUS DHCPv4-Options Attribute Registry</name>
          <thead>
            <tr>
              <th align="left">Tag</th>
              <th align="left">Name</th>
              <th align="left"> </th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">OPTION_V4_NRLP</td>
              <td align="left">This-Document</td>
              <td align="left"> </td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
        <reference anchor="RFC2132">
          <front>
            <title>DHCP Options and BOOTP Vendor Extensions</title>
            <author fullname="S. Alexander" initials="S." surname="Alexander"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>This document specifies the current set of DHCP options. Future options will be specified in separate RFCs. The current list of valid options is also available in ftp://ftp.isi.edu/in-notes/iana/assignments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2132"/>
          <seriesInfo name="DOI" value="10.17487/RFC2132"/>
        </reference>
        <reference anchor="I-D.rwbr-sconepro-flow-metadata">
          <front>
            <title>Flow Metadata for Collaborative Host/Network Signaling</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="26" month="June" year="2024"/>
            <abstract>
              <t>   This document defines per-flow and per-packet metadata for both
   network-to-host and host-to-network signaling in Concise Data
   Definition Language (CDDL) which expresses both CBOR and JSON.  The
   common metadata definition allows interworking between signaling
   protocols with high fidelity.  The metadata is also self- describing
   to improve interpretation by network elements and endpoints while
   reducing the need for version negotiation.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-sconepro-flow-metadata-02"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3396">
          <front>
            <title>Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)</title>
            <author fullname="T. Lemon" initials="T." surname="Lemon"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3396"/>
          <seriesInfo name="DOI" value="10.17487/RFC3396"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IANA-ND" target="https://www.iana.org/assignments/icmpv6-parameters/">
          <front>
            <title>IPv6 Neighbor Discovery Option Formats</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="IANA-BOOTP" target="https://www.iana.org/assignments/bootp-dhcp-parameters/">
          <front>
            <title>BOOTP Vendor Extensions and DHCP Options</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
          <front>
            <title>TS 23.501: System architecture for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-23.503" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3334">
          <front>
            <title>TS 23.503: Policy and charging control framework for the 5G System (5GS)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-29.522" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3437">
          <front>
            <title>TS 29.522: 5G System; Network Exposure Function Northbound APIs</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
          <front>
            <title>Bandwidth measurement for QUIC</title>
            <author fullname="Zafer Gurel">
              <organization/>
            </author>
            <author fullname="Ali C. Begen">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="TS-24.008" target="https://www.3gpp.org/DynaReport/24008.htm">
          <front>
            <title>Technical Specification Group Core Network and Terminals; Mobile radio interface Layer 3 specification; Core network protocols; Stage 3 (Release 18)</title>
            <author>
              <organization>3GPP</organization>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="BEREC" target="https://www.berec.europa.eu/en/all-you-need-to-know-about-net-neutrality-rules-in-the-eu-0">
          <front>
            <title>All you need to know about Net Neutrality rules in the EU</title>
            <author>
              <organization>BEREC</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="TR-470" target="https://www.broadband-forum.org/pdfs/tr-470-2-0-0.pdf">
          <front>
            <title>5G Wireless Wireline Convergence Architecture - Issue 2</title>
            <author>
              <organization>BBF</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="RFC4026">
          <front>
            <title>Provider Provisioned Virtual Private Network (VPN) Terminology</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="T. Madsen" initials="T." surname="Madsen"/>
            <date month="March" year="2005"/>
            <abstract>
              <t>The widespread interest in provider-provisioned Virtual Private Network (VPN) solutions lead to memos proposing different and overlapping solutions. The IETF working groups (first Provider Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have discussed these proposals and documented specifications. This has lead to the development of a partially new set of concepts used to describe the set of VPN services.</t>
              <t>To a certain extent, more than one term covers the same concept, and sometimes the same term covers more than one concept. This document seeks to make the terminology in the area clearer and more intuitive. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4026"/>
          <seriesInfo name="DOI" value="10.17487/RFC4026"/>
        </reference>
        <reference anchor="RFC4664">
          <front>
            <title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
            <author fullname="L. Andersson" initials="L." role="editor" surname="Andersson"/>
            <author fullname="E. Rosen" initials="E." role="editor" surname="Rosen"/>
            <date month="September" year="2006"/>
            <abstract>
              <t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs). This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4664"/>
          <seriesInfo name="DOI" value="10.17487/RFC4664"/>
        </reference>
        <reference anchor="RFC4364">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers. This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other. Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="15" month="May" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-11"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9473">
          <front>
            <title>A Vocabulary of Path Properties</title>
            <author fullname="R. Enghardt" initials="R." surname="Enghardt"/>
            <author fullname="C. Krähenbühl" initials="C." surname="Krähenbühl"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>Path properties express information about paths across a network and the services provided via such paths. In a path-aware network, path properties may be fully or partially available to entities such as endpoints. This document defines and categorizes path properties. Furthermore, the document identifies several path properties that might be useful to endpoints or other entities, e.g., for selecting between paths or for invoking some of the provided services. This document is a product of the Path Aware Networking Research Group (PANRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9473"/>
          <seriesInfo name="DOI" value="10.17487/RFC9473"/>
        </reference>
        <reference anchor="RFC7066">
          <front>
            <title>IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts</title>
            <author fullname="J. Korhonen" initials="J." role="editor" surname="Korhonen"/>
            <author fullname="J. Arkko" initials="J." role="editor" surname="Arkko"/>
            <author fullname="T. Savolainen" initials="T." surname="Savolainen"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>As the deployment of third and fourth generation cellular networks progresses, a large number of cellular hosts are being connected to the Internet. Standardization organizations have made the Internet Protocol version 6 (IPv6) mandatory in their specifications. However, the concept of IPv6 covers many aspects and numerous specifications. In addition, the characteristics of cellular links in terms of bandwidth, cost, and delay put special requirements on how IPv6 is used. This document considers IPv6 for cellular hosts that attach to the General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), or Evolved Packet System (EPS) networks (hereafter collectively referred to as Third Generation Partnership Project (3GPP) networks). This document also lists specific IPv6 functionalities that need to be implemented in addition to what is already prescribed in the IPv6 Node Requirements document (RFC 6434). It also discusses some issues related to the use of these components when operating in these networks. This document obsoletes RFC 3316.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7066"/>
          <seriesInfo name="DOI" value="10.17487/RFC7066"/>
        </reference>
        <reference anchor="RFC8781">
          <front>
            <title>Discovering PREF64 in Router Advertisements</title>
            <author fullname="L. Colitti" initials="L." surname="Colitti"/>
            <author fullname="J. Linkova" initials="J." surname="Linkova"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document specifies a Neighbor Discovery option to be used in Router Advertisements (RAs) to communicate prefixes of Network Address and Protocol Translation from IPv6 clients to IPv4 servers (NAT64) to hosts.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8781"/>
          <seriesInfo name="DOI" value="10.17487/RFC8781"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
          <front>
            <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="17" month="March" year="2024"/>
            <abstract>
              <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
        </reference>
        <reference anchor="RFC8801">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="RFC8803">
          <front>
            <title>0-RTT TCP Convert Protocol</title>
            <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Gundavelli" initials="S." surname="Gundavelli"/>
            <author fullname="S. Seo" initials="S." surname="Seo"/>
            <author fullname="B. Hesmans" initials="B." surname="Hesmans"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
              <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
              <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8803"/>
          <seriesInfo name="DOI" value="10.17487/RFC8803"/>
        </reference>
        <reference anchor="I-D.ietf-masque-quic-proxy">
          <front>
            <title>QUIC-Aware Proxying Using HTTP</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Eric Rosenberg" initials="E." surname="Rosenberg">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="David Schinazi" initials="D." surname="Schinazi">
              <organization>Google LLC</organization>
            </author>
            <date day="21" month="May" year="2024"/>
            <abstract>
              <t>   This document defines an extension to UDP Proxying over HTTP that
   adds specific optimizations for proxied QUIC connections.  This
   extension allows a proxy to reuse UDP 4-tuples for multiple
   connections.  It also defines a mode of proxying in which QUIC short
   header packets can be forwarded using an HTTP/3 proxy rather than
   being re-encapsulated and re-encrypted.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-masque-quic-proxy-02"/>
        </reference>
        <reference anchor="I-D.ietf-teas-ietf-network-slice-nbi-yang">
          <front>
            <title>A YANG Data Model for the RFC 9543 Network Slice Service</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Reza Rokui" initials="R." surname="Rokui">
              <organization>Ciena</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="John Mullooly" initials="J." surname="Mullooly">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <date day="9" month="May" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for RFC 9543 Network Slice
   Service.  The model can be used in the Network Slice Service
   interface between a customer and a provider that offers RFC 9543
   Network Slice Services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slice-nbi-yang-13"/>
        </reference>
        <reference anchor="I-D.ihlar-masque-sconepro-mediabitrate">
          <front>
            <title>MASQUE extension for signaling media bitrate</title>
            <author fullname="Marcus Ihlar" initials="M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="February" year="2024"/>
            <abstract>
              <t>   This document specifies a new Capsule (RFC9297) that can be used with
   CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT
   extensions to signal the available bitrate for media traffic that is
   proxied through an HTTP server.  This information can be used by a
   media application to regulate its media bitrate in accordance with a
   network policy, as an alternative to in-network traffic shaping.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ihlar-masque-sconepro-mediabitrate-00"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="P. Roberts" initials="P." surname="Roberts"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber. Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing. These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches. Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on. Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
        <reference anchor="RFC9066">
          <front>
            <title>Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Call Home</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document specifies the Denial-of-Service Open Threat Signaling (DOTS) signal channel Call Home, which enables a Call Home DOTS server to initiate a secure connection to a Call Home DOTS client and to receive attack traffic information from the Call Home DOTS client. The Call Home DOTS server in turn uses the attack traffic information to identify compromised devices launching outgoing DDoS attacks and take appropriate mitigation action(s).</t>
              <t>The DOTS signal channel Call Home is not specific to home networks; the solution targets any deployment in which it is required to block DDoS attack traffic closer to the source(s) of a DDoS attack.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9066"/>
          <seriesInfo name="DOI" value="10.17487/RFC9066"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC6704">
          <front>
            <title>Forcerenew Nonce Authentication</title>
            <author fullname="D. Miles" initials="D." surname="Miles"/>
            <author fullname="W. Dec" initials="W." surname="Dec"/>
            <author fullname="J. Bristow" initials="J." surname="Bristow"/>
            <author fullname="R. Maglione" initials="R." surname="Maglione"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a nonce to the client in the initial DHCP ACK that is used for subsequent validation of a FORCERENEW message. This document updates RFC 3203. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6704"/>
          <seriesInfo name="DOI" value="10.17487/RFC6704"/>
        </reference>
        <reference anchor="RFC3203">
          <front>
            <title>DHCP reconfigure extension</title>
            <author fullname="Y. T'Joens" initials="Y." surname="T'Joens"/>
            <author fullname="C. Hublet" initials="C." surname="Hublet"/>
            <author fullname="P. De Schrijver" initials="P." surname="De Schrijver"/>
            <date month="December" year="2001"/>
            <abstract>
              <t>This document defines extensions to DHCP (Dynamic Host Configuration Protocol) to allow dynamic reconfiguration of a single host triggered by the DHCP server (e.g., a new IP address and/or local configuration parameters). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3203"/>
          <seriesInfo name="DOI" value="10.17487/RFC3203"/>
        </reference>
        <reference anchor="RFC6105">
          <front>
            <title>IPv6 Router Advertisement Guard</title>
            <author fullname="E. Levy-Abegnoli" initials="E." surname="Levy-Abegnoli"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <author fullname="C. Popoviciu" initials="C." surname="Popoviciu"/>
            <author fullname="J. Mohacsi" initials="J." surname="Mohacsi"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Routed protocols are often susceptible to spoof attacks. The canonical solution for IPv6 is Secure Neighbor Discovery (SEND), a solution that is non-trivial to deploy. This document proposes a light-weight alternative and complement to SEND based on filtering in the layer-2 network fabric, using a variety of filtering criteria, including, for example, SEND status. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6105"/>
          <seriesInfo name="DOI" value="10.17487/RFC6105"/>
        </reference>
        <reference anchor="RFC7610">
          <front>
            <title>DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
            <date month="August" year="2015"/>
            <abstract>
              <t>This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="199"/>
          <seriesInfo name="RFC" value="7610"/>
          <seriesInfo name="DOI" value="10.17487/RFC7610"/>
        </reference>
        <reference anchor="RFC7513">
          <front>
            <title>Source Address Validation Improvement (SAVI) Solution for DHCP</title>
            <author fullname="J. Bi" initials="J." surname="Bi"/>
            <author fullname="J. Wu" initials="J." surname="Wu"/>
            <author fullname="G. Yao" initials="G." surname="Yao"/>
            <author fullname="F. Baker" initials="F." surname="Baker"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document specifies the procedure for creating a binding between a DHCPv4/DHCPv6-assigned IP address and a binding anchor on a Source Address Validation Improvement (SAVI) device. The bindings set up by this procedure are used to filter packets with forged source IP addresses. This mechanism complements BCP 38 (RFC 2827) ingress filtering, providing finer-grained source IP address validation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7513"/>
          <seriesInfo name="DOI" value="10.17487/RFC7513"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="I-D.ietf-teas-5g-ns-ip-mpls">
          <front>
            <title>A Realization of Network Slices for 5G Networks Using Current IP/MPLS Technologies</title>
            <author fullname="Krzysztof Grzegorz Szarkowicz" initials="K. G." surname="Szarkowicz">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Julian Lucek" initials="J." surname="Lucek">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="1" month="June" year="2024"/>
            <abstract>
              <t>   Slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks.  Realization of 5G
   slicing implies requirements for all mobile domains, including the
   Radio Access Network (RAN), Core Network (CN), and Transport Network
   (TN).

   This document describes a Network Slice realization model for IP/MPLS
   networks with a focus on the Transport Network fulfilling 5G slicing
   connectivity service objectives.  The realization model reuses many
   building blocks currently commonly used in service provider networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-5g-ns-ip-mpls-08"/>
        </reference>
      </references>
    </references>
    <?line 927?>

<section anchor="sec-pvd">
      <name>Provisioning Domains</name>
      <t>PvD may also be considered as a mechanism to discover NRLP. Typically, the network will configured to set the H-flag so clients can
request PvD Additional Information (<xref section="4.1" sectionFormat="of" target="RFC8801"/>).</t>
      <t><xref target="pvd-ex"/> provides an example of the returned "application/pvd+json" to indicate a network-to-host
NRLP for all subscriber traffic. The NRLP list may include multiple instances if distinct policies
are to be returned for distinct traffic categories.</t>
      <figure anchor="pvd-ex">
        <name>NRLP Example with PvD</name>
        <sourcecode type="json"><![CDATA[
{
   "nrlp":[
      {
         "direction":1,
         "scope":1,
         "tc":0,
         "cir":50,
         "cbs":10000,
         "ebs":20000
      }
   ]
}
]]></sourcecode>
      </figure>
      <t>PvD NRLP object can be extended by defining new attributes (e.g., supply an ADN and locators of a network entity to negotiate advanced features with the network, reachability information of a network API to invoke differentiated forwarding behaviors, a slice identifier <xref target="TS-23.501"/><xref target="RFC9543"/>, etc.).</t>
    </section>
    <section anchor="sec-aaa">
      <name>Example of Authentication, Authorization, and Accounting (AAA)</name>
      <t><xref target="radius-ex"/> provides an example of the exchanges that might occur between a DHCP server
and an Authentication, Authorization, and Accounting (AAA) server to retrieve the per-subscriber NRLPs.</t>
      <t>This example assumes that the Network Access Server (NAS) embeds both Remote Authentication Dial-In User Service
(RADIUS) <xref target="RFC2865"/> client and DHCP server capabilities.</t>
      <figure anchor="radius-ex">
        <name>An Example of RADIUS NRLP Exchanges</name>
        <artwork><![CDATA[
   .-------------.           .-------------.             .-------.
   |    Host     |           |     NAS     |             |  AAA  |
   | DHCP Client |           | DHCP Server |             |Server |
   |             |           |RADIUS Client|             |       |
   '------+------'           '------+------'             '---+---'
          |                         |                        |
          o------DHCPDISCOVER------>|                        |
          |                         o----Access-Request ---->|
          |                         |                        |
          |                         |<----Access-Accept------o
          |                         |     DHCPv4-Options     |
          |<-----DHCPOFFER----------o    (OPTION_V4_NRLP)    |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          o-----DHCPREQUEST-------->|                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |
          |<-------DHCPACK----------o                        |
          |     (OPTION_V4_NRLP)    |                        |
          |                         |                        |

                     DHCP                    RADIUS
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-alt">
      <name>Alternative/Complementary Mechanisms</name>
      <t>In the event of bottlenecks in a network, there are other mechanisms that provide information or help to reserve resources. These can be used within the bottleneck network or, in some cases, across network boundaries. The following sections give examples of such mechanisms and provide background information.</t>
      <section anchor="L4S">
        <name>L4S</name>
        <t>Low Latency, Low Loss, and Scalable Throughput (L4S) is an architecture defined in <xref target="RFC9330"/> to avoid queuing at bottlenecks by capacity-seeking congestion controllers of senders. L4S support addresses the investigated use case of this document, which considers rate limiting, which typically involves queuing discipline at the rate limiting bottleneck. If all involved elements (UE, network, and service) support L4S, the use of Explicit Congestion Notification (ECN) provides the measure used to inform the network protocol and/or service endpoints in use of impending congestion. Congestion detection and reaction may require a few RTTs to adjust to the network forwarding conditions.</t>
        <t>As of 3GPP Rel. 18 (5G Advanced, <xref target="TS-23.501"/>), L4S is also defined for the 5G system (5GS) and can be used by UE and its services, and for external parties of the 5GS by exposure of congestion information.</t>
      </section>
      <section anchor="ns">
        <name>Network Slicing</name>
        <t>One measure for guaranteeing resources in networks is network slicing. This is achieved by configuring certain resources like adequate QoS setup for communication streams, which are taken into account in packet schedulers along the transport path. e.g., the RAN air interface.</t>
        <t>Network slicing is considered by 3GPP for 5G <xref target="TS-23.501"/> (an equivalent can be achieved in 4G by configuring QFI values), by IETF <xref target="RFC9543"/> for transport networks, and by BBF <xref target="TR-470"/> for wireline access. A realization model in transport networks is detailed in <xref target="I-D.ietf-teas-5g-ns-ip-mpls"/>.</t>
        <t>L4S <xref target="L4S"/> can be used for the realization of a network slice. Network slices properties (e.g., throughput) can be retrieved from an operator network or configured by third parties via a network API <xref target="network_api"/> (e.g., 3GPP NEF).</t>
      </section>
      <section anchor="ursp">
        <name>3GPP UE Route Selection Policy</name>
        <t>UE Route Selection Policy (URSP) is a feature specified in 3GPP to match and forward traffic based upon a selection descriptor and a route descriptor as further detailed in <xref target="TS-23.503"/>.</t>
        <t>Specified traffic descriptors may be:</t>
        <ul spacing="normal">
          <li>
            <t>Application</t>
          </li>
          <li>
            <t>IP</t>
          </li>
          <li>
            <t>Domain</t>
          </li>
          <li>
            <t>Non-IP</t>
          </li>
          <li>
            <t>DNN</t>
          </li>
          <li>
            <t>Connection Capabilities</t>
          </li>
          <li>
            <t>Connectivity Group ID</t>
          </li>
        </ul>
        <t>Specified route selection descriptors: must contain PDU Session Type Selection (e.g., IPv4v6 or IPv6) and may contain the following:</t>
        <ul spacing="normal">
          <li>
            <t>SSC Mode</t>
          </li>
          <li>
            <t>Network Slice</t>
          </li>
          <li>
            <t>DNN</t>
          </li>
          <li>
            <t>Non-Seamless Offload indication</t>
          </li>
          <li>
            <t>Access Type preference</t>
          </li>
        </ul>
        <t>URSP rules that contain both descriptors can be announced from the provider network to a UE or preconfigured in the UE, possibly subscription-based. These rules can be used to identify services in the UE and to provide routes with explicit  characteristics. URSP rules might also be triggered by the usage of network APIs <xref target="network_api"/> and combined with network slicing <xref target="ns"/>, for example.</t>
      </section>
      <section anchor="network_api">
        <name>Network APIs</name>
        <t>Network APIs are the interface between the operator network and third-party providers. With 4G, the first methods were introduced to make network capabilities available, which has been greatly improved with the introduction of 5G. To this end, the new Network Exposure Function (NEF) is responsible for 5G, which is specified in <xref target="TS-29.522"/>, which defines a huge list of network capabilites for monitoring and configuration for external consumption.</t>
        <t>For integration into external services, initiatives such as the CAMARA Alliance and GSMA Open Gateway provide abstractions of these exposed network capabilities into service APIs for easy integration by developers.</t>
        <t>The CAMARA API "Network Slice Booking", which is currently under development, would be a way for a service provider to configure the necessary resources in the operator network. In the background, 5G features such as network slicing <xref target="ns"/> , URSP <xref target="ursp"/> and, if necessary, L4S <xref target="L4S"/> could then ensure implementation in the operator network.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
