<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mops-network-overlay-impacts-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="NOISV">Network Overlay Impacts to Streaming Video</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mops-network-overlay-impacts-01"/>
    <author fullname="Glenn Deen">
      <organization>Comcast-NBCUniversal</organization>
      <address>
        <email>glenn_deen@comcast.com</email>
      </address>
    </author>
    <author fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Operations and Management</area>
    <workgroup>Media OPerationS</workgroup>
    <keyword>network policy</keyword>
    <keyword>video streaming</keyword>
    <keyword>streaming</keyword>
    <abstract>
      <?line 48?>

<t>This document examines the operational impacts to streaming video applications
caused by changes to network policies by network overlays.  The network policy
changes include IP address assignment, transport protocols, routing, DNS resolver
which in turn affect a variety of important content delivery aspects such as latency,
CDN cache selection, delivery path choices, traffic classification and content access controls.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-mops.github.io/draft-ietf-mops-network-overlay-impacts/draft-ieft--mops-network-overlay-impacts.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mops-network-overlay-impacts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Media OPerationS Working Group mailing list (<eref target="mailto:mops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-mops/draft-ietf-mops-network-overlay-impacts"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Enhancing the privacy of Internet users has a been significant focus of the IETF since the Snowden revelations and the publication of <xref target="RFC7258"/>.  <xref target="RFC7264"/> explored in greater detail the technical threats identified in RFC7258 along with high level descriptions of mitigations.
Since then the various working groups at the IETF have endeavored to address the specific threats to their respective area and have produced a long list of new RFCs with privacy enhancements deliberately and consciously included.
Protocols like QUIC <xref target="RFC9000"/> are examples of the new generation of IETF protocols with privacy enhancements such as always enabled encryption built directly into their design.</t>
      <t>At the same time that the IETF has been diligently enhancing Internet privacy, Internet video streaming has become a part of daily life for billions of viewers with streaming being for many their primary way of watching sports, entertainment, user generated content (UGC) and news.
This has grown to become the primary data by volume traversing the Internet with an hour of HD video consisting of roughly 1.5-2.5GB of data and streaming is estimated to account for 80-85% of current global Internet traffic.</t>
      <t>The Operational Considerations for Streaming Media <xref target="RFC9317"/> provides a good introduction to the various engineering aspects encountered by streaming platforms in engineering and operating the infrastructure used to meet the global growth in video streaming.</t>
      <t>While early streaming efforts were satisfied with being able to stream a video to a device successfully without consideration for efficiency or scale, the rapid growth in viewership has pushed platforms to develop sophisticated architectures and designs.</t>
      <t>For video that is prerecorded, such as Video On Demand (VOD) TV and Movie content ans User Generated Content (UGC) distributing the recorded and encoded content using Content Delivery Network (CDN) caches is a common technique to meet demand at scale.
The IETF CDNi working group has done significant work on this and SVTA OpenCaching (svta.org) extends upon CDNi to create a robust implementation of CDN architecture for VOD scaling.
VOD \&amp; UCG streaming typically place a focus on selecting the best CDN cache with the best responsiveness, the shortest network path and fewest of hops to avoid congestion and bandwidth limitations that might limit the quality of the video being delivered.</t>
      <t>The newest frontier in streaming is live streaming, primarily around sports events.   Live streaming, like VOD has significant capacity demands with events that can have viewership levels ranging from tens of thousands to 10-50 million live viewers.
The day of hundreds of millions of live viewers for a single event such as a major global sporting event is on the near horizon, with no limit in sight on how far growth can go.
Perhaps, one day a significant portion of the global population will live view an event over the Internet.</t>
      <t>Even today, the current viewers levels for large events are pushing the boundaries of video streaming techniques.
Live also comes with new challenges; CDN caching is still used to meet scaling challenges for live events, but unlike VOD it can't be prerecorded and prepositioned on CDN caches ahead of the event.
Live sports streaming also has important low latency requirements - viewers don't want a big goal spoiled by alerts on their phones, or cheering the street before they see it on their own screen.
The video pipeline used to deliver live streamed events with low latency and at high quality is very optimized and as a result is very sensitive to interference from unexpected network behaviors and conditions.</t>
      <t>The delivery pipelines of VOD, UGC and Live have each been engineering and optimized to deliver the highest quality, in the most efficient manner over the Internet from platform to viewers.
However, increasingly as consumer products have added responses to <xref target="RFC7258"/> and <xref target="RFC7264"/> to consumer devices and services, they have occasionally introduced unexpected and sometimes non-easily detectable changes to the network behavior and the video pipeline in ways that can interfere with and undermine the efficiencies, scaling and low latency engineering that video platforms have spent considerable time, money and talent developing and deploying to meet user video experience expectations.</t>
      <t>The authors readily acknowledge the many challenges and difficulties in improving Internet privacy in an area as complex as the Internet while also maintaining compatibility with the wildly varied applications and uses of the Internet on which users rely upon daily in their lives. This is hard stuff and it's very natural for there to be operational considerations that must be understood and folded back into architectural designs and consumer products.</t>
      <t>This document is intended to document the various impacts that have been observed by streaming applications from a streaming platform operational perspective on the impacts of certain enhanced privacy architecture approaches that have been pursued at the IETF.</t>
    </section>
    <section anchor="internet-privacy-enhancements">
      <name>Internet Privacy Enhancements</name>
      <t>The IETF's work to enhance the privacy of Internet and defend against pervasive monitoring as described in <xref target="RFC7258"/> has employed as series of techniques
starting with encrypting network data flows, typically using TLS.   Other approaches, involve changing things at a policy level such as changing routing, DNS resolver choices so as to further obfuscate and isolate the network and data flows from the underlying base network as means of interfering with pervasive
monitoring.</t>
      <t><xref target="RFC7258"/> from the IAB examines various pervasive montoring approaches while <xref target="RFC7624"/> discusses responses that enhance privacy.  <xref target="RFC9000"/> itself is an excellent example of the applied design approaches and introduces the QUIC transport protocol that is always encrypted.</t>
      <section anchor="network-overlays">
        <name>Network Overlays</name>
        <t>The IETF's privacy enhancement work to address <xref target="RFC72558"/> covers a lot of design choices and policies such as the approach of always-on encryption as shown in the design of QUIC <xref target="RFC9000"/>.   Many of these do not affect video streaming, however those that do impact streaming fall into a class of design choices that can be described as creating a new network overlay, operating as an overlay on top of the underlying native network, but  following one or more different policies than the underlying network or the streaming application would follow on their own.</t>
        <t>The Network Overlays that have been found by video platform operators to impact streaming operations are those that make policy changes in ways that are not directly visible, selectable, or detectable by the video streaming application or streaming platform.  These changes, when made under the covers and out of visibiltiy to the streaming application, often can make unexpected changes to the streaming pipeline in ways that undermine the architecture choices of the streaming application and platform engineers.</t>
        <t>Network Overlay's that cause network connection behavior and properties to differ from what the application expects can lead to situations where the application user and operator assume one set of behaviors of the network data flow to be true while in reality one or more different behaviors may occur. This in turn can lead to unanticipated outcomes that can have operational impacts.</t>
        <t>Protocols such as MASQUE <xref target="RFC9484"/> and services built on it such as Apple's <eref target="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">iCloud Private Relay</eref> are examples of Privacy Enhancing Network Overlays that involve making a number of network policy changes from the open Internet for the connections passed through them.</t>
        <section anchor="emerging-operational-issues-with-network-overlay-policy-changes">
          <name>Emerging Operational Issues with Network Overlay Policy Changes</name>
          <t>Streaming video applications and the streaming platforms delivering content are starting to encounter various operational challenges related to Network Overlays.
Typically the primary problems are encountered when the network overlay has made policy changes that are either unexpected, are difficult or impossible for the streaming platform to detect, or the changes are inconsistently applied.</t>
          <t>There are a variety of impacts but a few common classes of issues have been observed:</t>
        </section>
      </section>
      <section anchor="policy-changes">
        <name>Policy Changes</name>
        <t>Changing the encryption policy from that expected by the streaming application, for example changing HTTP urls in manifests into HTTPS connections can disrupt architectures which involve the network being able to detect video flows.</t>
        <t>Changing routing policy from what is expect by the streaming application can break CDN cache selection logic, resulting in a farther away cache deliverying lower qualify video at higher latency than the closer cache that would be selected by the CDN cache selection logic might.</t>
        <t>An routing policy change example is illustated in figure 1 of different policies for a network overlay vs the underlying base network which the changes the traffic path from the Network Overlay having a different routing policy from that of the underlying native base network.</t>
        <artwork><![CDATA[
 R  = router
                  <--- non-overlay traffic path --->
 device -- R ---- R ------------- R ------------- R ---- R -- dest-node
            \                                           /
             \                                         /
              \                                       /
               R -- R -- ingest -- egress -- R ------+
                     <--- overlay traffic path --->

 Figure 1:  Network Overlay routing select traffic via an alternate path
]]></artwork>
        <section anchor="partitioning">
          <name>Partitioning</name>
          <t>Network Overlay policy changes includes an alternate routing policy since a fundamental aspect of this design is the tunneling of connections through alternate paths to enhance privacy. The reasons for this approach are discussed in the IAB document <eref target="https://datatracker.ietf.org/doc/draft-iab-privacy-partitioning/">Partitioning as an Architecture for Privacy</eref>.</t>
        </section>
        <section anchor="procotol-policy-changes">
          <name>Procotol Policy Changes</name>
          <t>Network overlays have been seen to make application and transport protocol changes from what is expected. Such changes such as HTTP2/tcp into HTTP3/QUIC and HTTP2 into HTTPS2+TLS are performed by some privacy enhancing approaches, converting what is considered an undersirable protocol choice into what is considered a better alternative, hidden under the covers from the application.</t>
          <t>One impact occurs when the protocol change alters the network as seen by the video application.  For instance, a video application may make a test fetch of video inorder to test measure network conditions which will be use to make streaming decisions for the actual content being accessed. If the application test probe uses HTTP2/tcp to test, but the actual content access request over HTTP2/tcp is converted to HTTP3/QUIC then the video platform does not have accurate results from it test probe which can directly lead to eroneous non-optimal choices by the video player algorithm.</t>
        </section>
        <section anchor="encryption-policy">
          <name>Encryption Policy</name>
          <t>Changing the encryption policy applied to video streams either adding where it wasn't orginally used or removing if it was originally specified can cause a wide range of operational problems.</t>
          <section anchor="forced-encryption-upgrade">
            <name>Forced Encryption Upgrade</name>
            <t>Changing unencrytped HTTP2 to encrypted HTTP2+TLS connects will prohibit streaming workflows that involve content detection as part of the network delivery.  This
can result in video traffic not being correctly identified and the incorrect network policies being applied to it.  This is particularly problematic in environments
using multicast and in mobile environments.</t>
          </section>
          <section anchor="forced-encryption-downgrade">
            <name>Forced Encryption Downgrade</name>
            <t>Equally so, removing of encryption applied to the transport stream by a streaming platform would be significantly problematic as such encryption may be part of a content protection and content integrity protections architecture.</t>
          </section>
        </section>
        <section anchor="address-policy-changes">
          <name>Address Policy Changes</name>
          <t>IP address changes such as converting from IPv4 to IPv6 or  IPv6 to IPv4, done unexpectantly or done invisibly to the application can cause both routing and cache selection issues, as well as cause problems in debugging situations causing engineers to not be using the correct address when examining logs, doing their own test probes etc.</t>
          <t>Source IP Address assignment changes, again when done invisibly to the application can cause significant disruption.  Platform authentication gateways that associate session authorizations with the sessions devices IP address can result in service access denial when associated addresses change unexpectedly.  For example, when the device address as seen by the video application is different from the device address seen by the associated streaming platform, this can result in the platform rejecting logins, content access and other service functions from the device.</t>
        </section>
        <section anchor="dns-policy-changes">
          <name>DNS Policy Changes</name>
          <t>Network overlays that change DNS setting have long been an issue for CDN architectures that use DNS as part of their load balancing architecture.</t>
          <section anchor="dns0">
            <name>DNS0</name>
            <t>DNS0 extension information was specifically designed to help CDN cache selection logic by providing more information to the decision making algorithms, so a policy change that changes the DNS resolver for an appliction to a different resolver that does not support DNS0 can have quite a significant impact to a video application.</t>
          </section>
        </section>
        <section anchor="log-data-changes">
          <name>Log Data Changes</name>
          <t>Logging is often the first tool used to find and diagnose problems.   Network overlays which change policies that result in unexpected and non-understandable log entries on either the user device or the video platform can greatly undermine the use of logs in problem determination and resolution.</t>
        </section>
        <section anchor="geo-location-identification">
          <name>Geo Location &amp; Identification</name>
          <t>Network Overlays that change the apparent location of devices can result in platforms from not being able to properly identify the geospatial location of the user. It is very common for CDN caches to apply IP address level geolocation to determine in broad terms, such as identifying the country the user is in.   If an overlay changes the apparent origin addresses of video device to one outside the of the address blocks mapped by location providers, then geolocation can fail and users can be denied access to content they otherwise are able to access.</t>
        </section>
        <section anchor="cdn-interconnection-troubleshooting">
          <name>CDN interconnection troubleshooting</name>
          <t>In a CDN interconnection When 2 CDN domains have to localize a point of failure, they first determine the delivery path and a point of observation where to do measurement. Then they proceed by dichotomy to determine the domain where the point of failure is. The issue with overlay networking is the Following : CDNs use
their request routing information to determine a point of observation on the delivery path where to do the measurement, as their delivery path is overwritten by the re-routing of the overlay networking, the flow can't be observed at the observation point.</t>
        </section>
        <section anchor="routing-changes">
          <name>Routing Changes</name>
          <t>Routing changes which cause connections between video applications and the infrastructure servcices they use can create a large number of problems.</t>
          <section anchor="end-to-end-problem-discovery">
            <name>End to End Problem Discovery</name>
            <t>A common issue in video delivery is locating where along the delivery path the video transport is encountering problems.   Often such problems are more complex than
the connection not working at but instead involve identifying bottleneck, lost packets, congestion issues.   When the routing changes from what is expected or
visible to support tools it becomes an operational trouble spot for users and platform suport to location and determine the source of the problems.</t>
          </section>
          <section anchor="cdn-edge-cache-selection-due-to-routing">
            <name>CDN Edge Cache Selection due to Routing</name>
            <t>A significant, and often overlooked problem is the addition of network latency compared to edge CDN caches or access network peering connections.  Routing changes which cause bypassing edge CDN caches and instead choosing less optimal caches</t>
            <artwork><![CDATA[
 R  = router
           <--- non-overlay traffic path --->
 device -- R ---- R ---- Edge CDN Cache
            \
             \
              \
               R --- R -- ingest -- R --- R -- egress -- R ------R ---- Less Optimal CDN Cache
                     <--- overlay traffic path --->

 Figure:  Routing Changes alering CDN Cache selection
]]></artwork>
          </section>
          <section anchor="performance-and-problem-determination">
            <name>Performance and Problem determination</name>
            <t>Network overlays often interfere with the tools used in performance and problem determination.   This is due to either the tool and protocols not able to traverse
the alternative route tunnel impacting services ability to diagnose connection and performance problems, or the network overlay itself not supporting the tool and
not supporting or carrying the tools functions.</t>
          </section>
          <section anchor="impact-of-changing-network-routing-and-other-policies">
            <name>Impact of Changing Network Routing and other Policies</name>
            <t>The problem for streaming applications occurs when the underlying network properties and policies change from what is expected by the streaming application. In particular when such changes are either hidden or not visible to the streaming application.</t>
            <t>While the open Internet is a dynamic environment, changing of basic network behavior and policies from what is expected as seen from the streaming application,  deviate unexpectedly from what the streaming application expects. This behavior disrupts the optimized streaming delivery architecture for the end-user device.
Changes to Network Policies such the routing, source IP address assigned to the streaming application traffic, DNS resolver choice etc influences this behavior.</t>
            <t>Having a reliable understanding of the delivery path is essential for streaming operators and the introduction
of network overlays like those based on technologies such as MASQUE especially when designed to be undetectable by the applications using them has introduced new technical challenges for streaming operators and network operators as well as for their viewers.</t>
            <t>The core problem occurs when changes to network policies are made, often without notification or visibilty to applications and
without clear methods of probing to determine and test changed behaviors that affect the streaming application's content
delivery path resulting in increased latency, changes of IP address for the application as seen by either the application
or the streaming service connection, changes to DNS resolvers being queried and the results returned by DNS, and changes to
application transports such as adding or removing outer layer encryption are all problems that have been observed in
production streaming platforms.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="policy-changes-hidden-from-applications">
      <name>Policy Changes Hidden from Applications</name>
      <t>One of the central recurring issues with streaming applications running on devices or networks with changed policies due to network overlays is that the changes are often hidden from the applications.</t>
      <t>Applications often find it difficult or even impossible to detect when network policy changes will be active and what they are changing.   For example, a device may have a desingated default DNS resolver for the device, but may have a different resolver selected depending on how the streaming application queries the DNS.</t>
      <t>Likewise, a streaming application might find that one application transport protocol such as HTTP queries will have one set of routing policies applied to it but a different application transport like HTTPS may have a different set of routing policies applied.</t>
      <t>Streaming applications that cannot determine the exact behavior to be expected can prevent the streaming application from making good content source decisions and can prevent appllications from being able to provide reliable feedback and logs when problems are encountered.</t>
    </section>
    <section anchor="making-it-easy-for-users-by-working-under-the-covers">
      <name>Making It Easy (for Users) by Working Under the Covers</name>
      <t>Historically, incorporating privacy features into consumer-facing products has been complex. This challenge arises from the need to address a wide range of use cases while also offering users easy access to advanced privacy frameworks and taxonomies. Many attempts have been made and very few have achieved finding success with end users.</t>
      <t>Perhaps learning from the lessons of offering too many options, the recent trend in privacy enhancements has steered toward either a very simple "Privacy On or Off" switch or in other cases automatically enabling or "upgrading" to enhance privacy.   Apple's iCloud Private Relay can be easily turned on with a single
settings switch, while privacy features such as Encrypted DNS over HTTP and upgrade from HTTP to HTTPS connections have had a number of deployments that automatically enable them for users when possible.</t>
      <t>Keeping with the motto of "Keep It Simple", users are generally not provided with granular Network Overlay controls permitting the user to select what applications, or what network connections the Network Overlay's policies can apply to.</t>
      <t>Adhering to the "Keep It Simple" approach the application itself has very little connection to privacy enhancing Network Overlays.  Applications generally do not have a means to detect when networking policy changes are active. Applications generally do not have a means to access policy change settings or to interact to change them.</t>
    </section>
    <section anchor="streaming-video">
      <name>Streaming Video</name>
      <t>Streaming Video, while just one of the many different Internet applications does standout from other uses in a number of significant ways that perhaps merit some amount of special consideration in understanding and addressing the impacts caused by particular privacy enhancing design and service offering choices.</t>
      <t>Firstly, Streaming video operates at a hard to imagine scale - streaming video is served globally to more than 2 billion user daily currently and continuing to grow in leaps and bounds.</t>
      <t>Secondly, the content types delivered through streaming has evolved from  the pre-recorded low-resolution, low-bit rate, latency tolerant video-on-demand movies, live or pre-recorded TV shows, and user generated videos delivered by pioneering streaming platforms to now including low-latency 4K and 8K live sports events, while
also evolving the pre-recorded content with high-bit rate such as 4K and 8K cinema quality and High Dynamic Range (HDR) lighting.</t>
      <t>Finally, the expectations of streaming video viewers have significantly evolved from the days of settling for being able to watch a movie in a PC browser.  Viewers expect to watch on any device type they want ranging from low-end-streaming sticks that plug into a USB port, to 4K and HDR capable laptops, 4K and 8K HDR TV
screens, gaming consoles, smart phones and many more choices.  Viewers also expect to have the same great viewing experience while at home connected via high-speed wired Internet, high-speed WiFi, or mobile cellular 5G and even satellite Internet connections.</t>
      <t>To meet the growth to billions of users, the growth in content type, quality and speed expectations, and  on-any-device anywhere that I am over any-network-connection expectations of users the Streaming Video technology infrastructure has had to itself evolve significantly.  This video streaming evolution work is being done in the IETF and in the <eref target="https://www.svta.org/">Streaming Video Technology Alliance (SVTA)</eref>, and in a number of other technical and industry groups.</t>
      <t>It's hard to overstate just how much the growth of streaming video has contributed to the growth of the Internet.  Internet connections of multiples of hundred megabits and gigabits speeds today are because of the needs of video streaming, the ongoing work on low-latency networking and ultra-low-latency video delivery are both driven by the use of streaming video.</t>
      <section anchor="advances-in-streaming-video-architecture">
        <name>Advances in Streaming Video Architecture</name>
        <t>Internet streaming has greatly matured and diversified from its early days of viewers
watching pre-recorded 320x240, 640x480 standard definition 480p movies to wired PCs connected
to the Internet via high-latency, low-bandwidth DSL as early DOCSIS modems.</t>
        <t>Streaming has grown to the extent that it has become a daily go-to video source world wide for billions of viewers
and has expanded from pre-recorded movies to encompass every type of video content
imaginable.  This growth to billions of viewers and the addition of low latency sensitive
content and new connectivity options like WiFi, Cellular and Satellite in addition to
high-speed DOCSIS and fiber is the world streaming platforms now provide service in.</t>
        <t>With the large user base and its usage, the Streaming platforms also have significant technical challenges to meet viewer expectations:</t>
        <ul spacing="normal">
          <li>
            <t>(1) Delivery scales that commonly range from hundreds of thousands to many millions of viewers simultaneously, with billions of views globally daily;</t>
          </li>
          <li>
            <t>(2) Low latency demands from live sports, live events and live streamed content;</t>
          </li>
          <li>
            <t>(3) content resolutions and corresponding formats which have jumped from the days of SD-480p to 4K (3840x2160) and 8K (7680x4320) along with bit rates which can had data needs of 10-24+ Mbps for 4K with 8K demanding 40 Mbps under extreme compression and 150-300 Mbps for high quality such as cinema;</t>
          </li>
          <li>
            <t>(4) devices with very diverse capabilities low-cost streaming sticks, to Smart TVs, tablets, phones, and game consoles</t>
          </li>
          <li>
            <t>(5) broad range of connectivity choices including WiFi, Gig speed-low latency DOCSIS, Fiber, satellite, and 5G cellular networks;</t>
          </li>
          <li>
            <t>(6) application transport protocols including MPEG DASH, HLS, HTTP2/TCP, HTTP3/QUIC, WebRTC, Media over QUIC (MoQ) and specialty application transports such as SRT, HESP etc.</t>
          </li>
        </ul>
        <t>To meet these challenges streaming platforms have significantly invested in developing delivery architectures that
are built with detailed understandings of each element in the content delivery pathway starting from the content capture all the way through to the screen of the viewer.</t>
        <t>Streaming applications are part of an end-to-end architecture that is optimized around achieving the best experience including low latency video delivery to viewing devices.  The open Internet can be unpredictable with temporary issues like packet loss, congestion and other conditions. However, streaming architecture is designed to handle these momentary problems as effectively as possible often through use of dynamic adaptive approaches designed into streaming protocols and platform components.</t>
      </section>
    </section>
    <section anchor="middleboxes-and-learning-from-the-past">
      <name>Middleboxes and learning from the past</name>
      <t>The IETF has discussed this situation in the past, more than 20 years ago in 2002 Middleboxes: Taxonomy and Issues <xref target="RFC3234"/>
was published capturing the issues with Middleboxes in the network and the affects of hidden changes occuring on the network between the sender and receiver.</t>
    </section>
    <section anchor="appendix-a-network-overlays-are-different-than-vpns">
      <name>Appendix A: Network Overlays are different than VPNs</name>
      <t>While conceptually similar in many ways to VPN (Virtual Private Network) technology, the various network overlay
technologies currently being deployed as well as new ones currently being designed by the IETF differ quite
siginificanlty from the older VPN approach they are replacing in a number of ways.</t>
      <t>It is also worth noting that one reason why the issues discussed in this document have not been concerned with
regard to VPNs is that largely VPNs have not been a pervasive way to stream video.   First, many VPNs have not had very good or consistent throughput compared to the direct open Internet and so provide a poor viewing experience.  Second, many video platforms block or deny service to VPN connections due to the very common use of VPNs to bypass geofiltering restrictions.</t>
      <t>Whatever the reason, it's work looking at how VPNs differ from the Network Overlays being discussed herein.</t>
      <section anchor="vpns-typically">
        <name>VPNs typically:</name>
        <ul spacing="normal">
          <li>
            <t>(1) VPNs typically are detectable by both the video application and often by the streaming platform.</t>
          </li>
          <li>
            <t>(2) VPNs typically work at the network layer of a device, resulting in a wide-range (if not all) transports</t>
          </li>
          <li>
            <t>and protocols from the device flowing through the VPN</t>
          </li>
          <li>
            <t>(3) VPNs typically provide exception options allowing for exclusion from traversing via the VPN based on</t>
          </li>
          <li>
            <t>various criteria such as application, destination IP address, application protocol etc.</t>
          </li>
        </ul>
        <section anchor="network-overlays-typically">
          <name>Network Overlays typically:</name>
          <ul spacing="normal">
            <li>
              <t>(1) Network Overlays are often undetectable by video applications or by the streaming platform, when in use</t>
            </li>
            <li>
              <t>(2) Network Overlays often only apply to specific application transports such as HTTP2/TCP or HTTP3/QUIC while not applying to HTTP2/TCP+TLS on the same device.</t>
            </li>
            <li>
              <t>(3) Network Overlays often only apply to HTTP connections and do not support ICMP, non-http versions of DNS, NTP etc, and various tools used for network measurement, problem determination, and network management that are not http based.</t>
            </li>
            <li>
              <t>(4) Network Overlays do not expose to applications any means for the application to discover the policy changes the overlay will apply to the applications network connections.</t>
            </li>
            <li>
              <t>(5) Network Overlays do not expose mechanisms or APIs for applications to interact with them such as getting or setting options.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9317">
        <front>
          <title>Operational Considerations for Streaming Media</title>
          <author fullname="J. Holland" initials="J." surname="Holland"/>
          <author fullname="A. Begen" initials="A." surname="Begen"/>
          <author fullname="S. Dawkins" initials="S." surname="Dawkins"/>
          <date month="October" year="2022"/>
          <abstract>
            <t>This document provides an overview of operational networking and transport protocol issues that pertain to the quality of experience (QoE) when streaming video and other high-bitrate media over the Internet.</t>
            <t>This document explains the characteristics of streaming media delivery that have surprised network designers or transport experts who lack specific media expertise, since streaming media highlights key differences between common assumptions in existing networking practices and observations of media delivery issues encountered when streaming media over those existing networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9317"/>
        <seriesInfo name="DOI" value="10.17487/RFC9317"/>
      </reference>
      <reference anchor="RFC7264">
        <front>
          <title>An Extension to the REsource LOcation And Discovery (RELOAD) Protocol to Support Relay Peer Routing</title>
          <author fullname="N. Zong" initials="N." surname="Zong"/>
          <author fullname="X. Jiang" initials="X." surname="Jiang"/>
          <author fullname="R. Even" initials="R." surname="Even"/>
          <author fullname="Y. Zhang" initials="Y." surname="Zhang"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>This document defines an optional extension to the REsource LOcation And Discovery (RELOAD) protocol to support the relay peer routing mode. RELOAD recommends symmetric recursive routing for routing messages. The new optional extension provides a shorter route for responses, thereby reducing overhead on intermediate peers. This document also describes potential cases where this extension can be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7264"/>
        <seriesInfo name="DOI" value="10.17487/RFC7264"/>
      </reference>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC72558">
        <front>
          <title>*** BROKEN REFERENCE ***</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="RFC9484">
        <front>
          <title>Proxying IP in HTTP</title>
          <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
          <date month="October" year="2023"/>
          <abstract>
            <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9484"/>
        <seriesInfo name="DOI" value="10.17487/RFC9484"/>
      </reference>
      <reference anchor="RFC3234">
        <front>
          <title>Middleboxes: Taxonomy and Issues</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="S. Brim" initials="S." surname="Brim"/>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions. It does not, however, claim to be definitive. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3234"/>
        <seriesInfo name="DOI" value="10.17487/RFC3234"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 378?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge to the contributions from the Streaming Video Technology Alliance (SVTA) based on their work studying the impacts of
network overlays on the streaming platforms. In particular, contributions from Brian Paxton have been very helpful.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
