<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-mops-network-overlay-impacts-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="NOISV">Network Overlay Impacts to Streaming Video</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-mops-network-overlay-impacts-02"/>
    <author fullname="Glenn Deen">
      <organization>Comcast-NBCUniversal</organization>
      <address>
        <email>glenn_deen@comcast.com</email>
      </address>
    </author>
    <author fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Operations and Management</area>
    <workgroup>Media OPerationS</workgroup>
    <keyword>network policy</keyword>
    <keyword>video streaming</keyword>
    <keyword>streaming</keyword>
    <abstract>
 

<t>This document examines the operational impacts to streaming video applications
caused by changes to network policies by network overlays.  The network policy
changes include IP address assignment, transport protocols, routing, and DNS resolvers,
which in turn affect a variety of important content delivery aspects such as latency,
CDN cache selection, delivery path choices, traffic classification and content access controls.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-mops.github.io/draft-ietf-mops-network-overlay-impacts/draft-ietf--mops-network-overlay-impacts.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-mops-network-overlay-impacts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Media OPerationS Working Group mailing list (<eref target="mailto:mops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-mops/draft-ietf-mops-network-overlay-impacts"/>.</t>
    </note>
  </front>
  <middle>
    <?line 56?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Enhancing the privacy of Internet users has a been significant focus of the IETF since the Snowden revelations and the publication of <xref target="RFC7258"/>.  <xref target="RFC7264"/> explored in greater detail the technical threats identified in RFC7258 along with high level descriptions of mitigations.
Since then the various working groups at the IETF have endeavored to address the specific threats to their respective area and have produced a long list of new RFCs with privacy enhancements deliberately and consciously included.
Protocols like QUIC <xref target="RFC9000"/> are examples of the new generation of IETF protocols with privacy enhancements such as always enabled encryption built directly into their design.</t>
      <t>At the same time that the IETF has been diligently enhancing Internet privacy, Internet video streaming has become a part of daily life for billions of viewers with streaming being for many their primary way of watching sports, entertainment, user generated content (UGC) and news.
This has grown to become the primary data by volume traversing the Internet with an hour of HD video consisting of roughly 1.5-2.5GB of data and streaming is estimated to account for 80-85% of current global Internet traffic.</t>
      <t>The Operational Considerations for Streaming Media <xref target="RFC9317"/> provides a good introduction to the various engineering aspects encountered by streaming platforms in engineering and operating the infrastructure used to meet the global growth in video streaming.</t>
      <t>While early streaming efforts were satisfied with being able to stream a video to a device successfully without consideration for efficiency or scale, the rapid growth in viewership has pushed platforms to develop sophisticated architectures and designs.</t>
      <t>For video that is prerecorded, such as Video On Demand (VOD) TV and Movie content ans User Generated Content (UGC) distributing the recorded and encoded content using Content Delivery Network (CDN) caches is a common technique to meet demand at scale.
The IETF CDNi working group has done significant work on this and SVTA OpenCaching (svta.org) extends upon CDNi to create a robust implementation of CDN architecture for VOD scaling.
VOD and UCG streaming typically place a focus on selecting the best CDN cache with the best responsiveness, the shortest network path and fewest hops to avoid congestion and bandwidth limitations that might limit the quality of the video being delivered.</t>
      <t>The newest frontier in streaming is live streaming, primarily around sports events.   Live streaming, like VOD has significant capacity demands with events that can have viewership levels ranging from tens of thousands to 10-50 million live viewers.
The day of hundreds of millions of live viewers for a single event such as a major global sporting event is on the near horizon as a normal occurence, with no limit in sight on how far growth can go.
Perhaps, one day a significant portion of the global population will live view an event over the Internet.</t>
      <t>Even today, the current viewer levels for large events are pushing the boundaries of video streaming techniques.
Live also comes with new challenges; CDN caching is still used to meet scaling challenges for live events, but unlike VOD it can't be prerecorded and prepositioned on CDN caches ahead of the event.
Live sports streaming also has important low latency requirements - viewers don't want a big goal spoiled by alerts on their phones, or cheering the street before they see it on their own screen.
The video pipeline used to deliver live streamed events with low latency and at high quality is highly optimized and as a result is very sensitive to interference from unexpected network behaviors and conditions.</t>
      <t>The delivery pipelines of VOD, UGC and Live have each been enginered and optimized to deliver the highest quality, in the most efficient manner over the Internet from platform to viewers.
However, increasingly as consumer products have added responses to <xref target="RFC7258"/> and <xref target="RFC7264"/> to consumer devices and services, they have occasionally introduced unexpected and sometimes non-easily detectable changes to the network behavior and the video pipeline in ways that can interfere with and undermine the efficiencies, scaling and low latency engineering that video platforms have spent considerable time, money and talent developing and deploying to meet user video experience expectations.</t>
      <t>The authors readily acknowledge the many challenges and difficulties in improving Internet privacy in an area as complex as the Internet while also maintaining compatibility with the wildly varied applications and uses of the Internet on which users rely upon daily in their lives. This is hard stuff and it's very natural for there to be operational considerations that must be understood and folded back into architectural designs and consumer products.</t>
      <t>This document is intended to document the various impacts that have been observed by streaming applications from a streaming platform operational perspective on the impacts of certain enhanced privacy architecture approaches that have been pursued at the IETF.</t>
    </section>
    <section anchor="internet-privacy-enhancements">
      <name>Internet Privacy Enhancements</name>
      <t>The IETF's work to enhance the privacy of Internet and defend against pervasive monitoring as described in <xref target="RFC7258"/> has employed as series of techniques
starting with encrypting network data flows, typically using TLS.   Other approaches, involve changing things at a policy level such as changing routing, DNS resolver choices so as to further obfuscate and isolate the network and data flows from the underlying base network as means of interfering with pervasive
monitoring.</t>
      <t><xref target="RFC7258"/> from the IAB examines various pervasive montoring approaches while <xref target="RFC7624"/> discusses responses that enhance privacy.  <xref target="RFC9000"/> itself is an excellent example of the applied design approaches and introduces the QUIC transport protocol that is always encrypted.</t>
      <section anchor="network-overlays">
        <name>Network Overlays</name>
        <t>The IETF's privacy enhancement work to address <xref target="RFC72558"/> covers a lot of design choices and policies such as the approach of always-on encryption as shown in the design of QUIC <xref target="RFC9000"/>.   Many of these do not affect video streaming, however those that do impact streaming fall into a class of design choices that can be described as creating a new network overlay, operating as an overlay on top of the underlying native network, but  following one or more different policies than the underlying network or the streaming application would follow on their own.</t>
        <t>The Network Overlays that have been found by video platform operators to impact streaming operations are those that make policy changes in ways that are not directly visible, selectable, or detectable by the video streaming application or streaming platform.  These changes, when made under the covers and out of visibiltiy to the streaming application, often can make unexpected changes to the streaming pipeline in ways that undermine the architecture choices of the streaming application and platform engineers.</t>
        <t>Network Overlay's that cause network connection behavior and properties to differ from what the application expects can lead to situations where the application user and operator assume one set of behaviors of the network data flow to be true while in reality one or more different behaviors may occur. This in turn can lead to unanticipated outcomes that can have operational impacts.</t>
        <t>Protocols such as MASQUE <xref target="RFC9484"/> and services built on it such as Apple's <eref target="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">iCloud Private Relay</eref> are examples of Privacy Enhancing Network Overlays that involve making a number of network policy changes from the open Internet for the connections passed through them.</t>
        <section anchor="emerging-operational-issues-with-network-overlay-policy-changes">
          <name>Emerging Operational Issues with Network Overlay Policy Changes</name>
          <t>Streaming video applications and the streaming platforms delivering content are starting to encounter various operational challenges related to Network Overlays.
Typically the primary problems are encountered when the network overlay has made policy changes that are either unexpected, are difficult or impossible for the streaming platform to detect, or the changes are inconsistently applied.</t>
          <t>There are a variety of impacts but a few common classes of issues have been observed:</t>
        </section>
      </section>
      <section anchor="policy-changes">
        <name>Policy Changes</name>
        <t>Changing the encryption policy from that expected by the streaming application, for example changing HTTP urls in manifests into HTTPS connections can disrupt architectures which involve the network being able to detect video flows.</t>
        <t>Changing routing policy from what is expected by the streaming application can break CDN cache selection logic, resulting in a farther away cache delivering lower quality video at higher latency than the closer cache that would be selected by the CDN cache selection logic might.</t>
        <t>A routing policy change example is illustrated in figure 1 of different policies for a network overlay vs the underlying base network which changes the traffic path from the Network Overlay having a different routing policy from that of the underlying native base network.</t>
        <artwork><![CDATA[
 R  = router
                  <--- non-overlay traffic path --->
 device -- R ---- R ------------- R ------------- R ---- R -- dest-node
            \                                           /
             \                                         /
              \                                       /
               R -- R -- ingest -- egress -- R ------+
                     <--- overlay traffic path --->

 Figure 1:  Network Overlay routing selects traffic via an alternate path
]]></artwork>
        <section anchor="partitioning">
          <name>Partitioning</name>
          <t>Network Overlay policy changes include an alternate routing policy since a fundamental aspect of this design is the tunneling of connections through alternate paths to enhance privacy. The reasons for this approach are discussed in the IAB document <eref target="https://datatracker.ietf.org/doc/draft-iab-privacy-partitioning/">Partitioning as an Architecture for Privacy</eref>.</t>
        </section>
        <section anchor="protocol-policy-changes">
          <name>Protocol Policy Changes</name>
          <t>Network overlays have been seen to make application and transport protocol changes from what is expected. Changes such as HTTP2/tcp into HTTP3/QUIC and HTTP2 into HTTPS2+TLS are performed by some privacy enhancing approaches, converting what is considered an undesirable protocol choice into what is considered a better alternative, hidden under the covers from the application.</t>
          <t>One impact occurs when the protocol change alters the network as seen by the video application.  For instance, a video application may make a test fetch of video in order measure network conditions which will be used to make streaming decisions for the actual content being accessed. If the application test probe uses HTTP2/tcp to test, but the actual content access request over HTTP2/tcp is converted to HTTP3/QUIC then the video platform does not have accurate results from its test probe which can directly lead to erroneous non-optimal choices by the video player algorithm.</t>
        </section>
        <section anchor="encryption-policy">
          <name>Encryption Policy</name>
          <t>Changing the encryption policy applied to video streams either adding where it wasn't originally used or removing if it was originally specified can cause a wide range of operational problems.</t>
          <section anchor="forced-encryption-upgrade">
            <name>Forced Encryption Upgrade</name>
            <t>Changing unencrypted HTTP2 to encrypted HTTP2+TLS connects will prohibit streaming workflows that involve content detection as part of the network delivery.  This
can result in video traffic not being correctly identified and the incorrect network policies being applied to it.  This is particularly problematic in environments
using multicast and in mobile environments.</t>
          </section>
          <section anchor="forced-encryption-downgrade">
            <name>Forced Encryption Downgrade</name>
            <t>Equally so, the removal of encryption applied to the transport stream by a streaming platform would be significantly problematic as such encryption may be part of a content protection and content integrity protections architecture.</t>
          </section>
        </section>
        <section anchor="address-policy-changes">
          <name>Address Policy Changes</name>
          <t>IP address changes such as converting from IPv4 to IPv6 or  IPv6 to IPv4, done unexpectantly unexpectedlyor done invisibly to the application can cause both routing and cache selection issues, as well as cause problems in debugging situations causing engineers to not be using the correct address when examining logs, doing their own test probes etc.</t>
          <t>Source IP Address assignment changes, again when done invisibly to the application can cause significant disruption.  Platform authentication gateways that associate session authorizations with the session's device's IP address can result in service access denial when associated addresses change unexpectedly.  For example, when the device address as seen by the video application is different from the device address seen by the associated streaming platform, this can result in the platform rejecting logins, content access and other service functions from the device.</t>
        </section>
        <section anchor="dns-policy-changes">
          <name>DNS Policy Changes</name>
          <t>Network overlays that change DNS settings have long been an issue for CDN architectures that use DNS as part of their load balancing architecture.</t>
          <section anchor="dns0">
            <name>DNS0</name>
            <t>DNS0 extension information was specifically designed to help CDN cache selection logic by providing more information to the decision making algorithms, so a policy change that changes the DNS resolver for an application to a different resolver that does not support DNS0 can have quite a significant impact to a video application.</t>
          </section>
        </section>
        <section anchor="log-data-changes">
          <name>Log Data Changes</name>
          <t>Logging is often the first tool used to find and diagnose problems.   Network overlays which change policies that result in unexpected and non-understandable log entries on either the user device or the video platform can greatly undermine the use of logs in problem determination and resolution.</t>
        </section>
        <section anchor="geo-location-identification">
          <name>Geo Location &amp; Identification</name>
          <t>Network Overlays that change the apparent location of devices can result in platforms not being able to properly identify the geospatial location of the user. It is very common for CDN caches to apply IP address level geolocation to determine in broad terms, such as identifying the country the user is in.   If an overlay changes the apparent origin addresses of video device to one outside the of the address blocks mapped by location providers, then geolocation can fail and users can be denied access to content they otherwise are able to access.</t>
        </section>
        <section anchor="cdn-interconnection-troubleshooting">
          <name>CDN interconnection troubleshooting</name>
          <t>In a CDN interconnection when two CDN domains have to localize a point of failure, they first determine the delivery path and a point of observation where to take measurements. Then they proceed by dichotomy to determine the domain where the point of failure is. The issue with overlay networking is the following: CDNs use
their request routing information to determine a point of observation on the delivery path where to do the measurement, as their delivery path is overwritten by the re-routing of the overlay networking, the flow can't be observed at the observation point.</t>
        </section>
        <section anchor="routing-changes">
          <name>Routing Changes</name>
          <t>Routing changes which cause connections between video applications and the infrastructure services they use can create a large number of problems.</t>
          <section anchor="end-to-end-problem-discovery">
            <name>End to End Problem Discovery</name>
            <t>A common issue in video delivery is locating where along the delivery path the video transport is encountering problems.   Often such problems are more complex than
the connection not working at but instead involve identifying bottlenecks, lost packets, and congestion issues.   When the routing changes from what is expected or
visible to support tools it becomes an operational trouble spot for users and platform suport to locate and determine the source of the problems.</t>
          </section>
          <section anchor="cdn-edge-cache-selection-due-to-routing">
            <name>CDN Edge Cache Selection due to Routing</name>
            <t>A significant, and often overlooked problem is the addition of network latency compared to edge CDN caches or access network peering connections.  Routing changes which cause bypassing edge CDN caches and instead choosing less optimal caches</t>
            <artwork><![CDATA[
 R  = router
           <--- non-overlay traffic path --->
 device -- R ---- R ---- Edge CDN Cache
            \
             \
              \
               R --- R -- ingest -- R --- R -- egress -- R ------R ---- Less Optimal CDN Cache
                     <--- overlay traffic path --->

 Figure:  Routing Changes altering CDN Cache selection
]]></artwork>
          </section>
          <section anchor="performance-and-problem-determination">
            <name>Performance and Problem determination</name>
            <t>Network overlays often interfere with the tools used in performance and problem determination.   This is due to either the tool and protocols not being able to traverse
the alternative route tunnel impacting service's ability to diagnose connection and performance problems, or the network overlay itself not supporting the tool and
not supporting or carrying the tools functions.</t>
          </section>
          <section anchor="impact-of-changing-network-routing-and-other-policies">
            <name>Impact of Changing Network Routing and other Policies</name>
            <t>The problem for streaming applications occurs when the underlying network properties and policies change from what is expected by the streaming application. In particular when such changes are either hidden or not visible to the streaming application.</t>
            <t>While the open Internet is a dynamic environment, changing of basic network behavior and policies from what is expected as seen from the streaming application,  deviates unexpectedly from what the streaming application expects. This behavior disrupts the optimized streaming delivery architecture for the end-user device.
Changes to Network Policies such as routing, source IP address assigned to the streaming application traffic, DNS resolver choice etc influences this behavior.</t>
            <t>Having a reliable understanding of the delivery path is essential for streaming operators and the introduction
of network overlays like those based on technologies such as MASQUE especially when designed to be undetectable by the applications using them has introduced new technical challenges for streaming operators and network operators as well as for their viewers.</t>
            <t>The core problem occurs when changes to network policies are made often without notification or visibility to applications and
without clear methods of probing to determine and test changed behaviors that affect the streaming application's content
delivery path resulting in increased latency, changes of IP address for the application as seen by either the application
or the streaming service connection, changes to DNS resolvers being queried and the results returned by DNS, and changes to
application transports such as adding or removing outer layer encryption are all problems that have been observed in
production streaming platforms.</t>
          </section>
        </section>
        <section anchor="unintended-content-blocking">
          <name>Unintended Content Blocking</name>
          <t>A strongly undesirable unintended side-effect of network policy changes is the blocking of content to the viewer.   This may be the primary content URLs access
which are blocked, or possibly advertising fetched from a second URL from the main video content.
This can be due to policy changes altering device IP addresses, or changes to routing that run afoul of enforced traffic routing policies.</t>
          <t>Such blocking may be connected to restrictions built upon data feeds used for geofiltering and georestuctions, for example restriction which block
delivery to networks identified as either commercial data-centers or other CDNs service network addresses.
Essentially, running afoul of configurations possibly used to combat security threats that expect streaming viewers to be on home
or possibly mobile networks, but not in commercial data centersor CDN content networks and so block delivery to IP addresses in those unexpected
network blocks.  This is more likely to occur in network overlays that shift egress traffic to commeerical or CDN blocks.</t>
          <t>This is a particularly troublesome problem to determine as it may appear inconsistently from one streaming session to another.    Small changes in
URLs in manifests from on session to another, especially on streaming platforms that make use of multi-CDN delivery and may encounter
different delivery and security protection policies from the different multi-CDN operators invovled.</t>
        </section>
      </section>
    </section>
    <section anchor="policy-changes-hidden-from-applications">
      <name>Policy Changes Hidden from Applications</name>
      <t>One of the central recurring issues with streaming applications running on devices or networks with changed policies due to network overlays is that the changes are often hidden from the applications.</t>
      <t>Applications often find it difficult or even impossible to detect when network policy changes will be active and what they are changing.   For example, a device may have a designated default DNS resolver for the device, but may have a different resolver selected depending on how the streaming application queries the DNS.</t>
      <t>Likewise, a streaming application might find that one application transport protocol such as HTTP queries will have one set of routing policies applied to it but a different application transport like HTTPS may have a different set of routing policies applied.</t>
      <t>Streaming applications that cannot determine the exact behavior to be expected can prevent the streaming application from making good content source decisions and can prevent applications from being able to provide reliable feedback and logs when problems are encountered.</t>
    </section>
    <section anchor="making-it-easy-for-users-by-working-under-the-covers">
      <name>Making It Easy (for Users) by Working Under the Covers</name>
      <t>Historically, incorporating privacy features into consumer-facing products has been complex. This challenge arises from the need to address a wide range of use cases while also offering users easy access to advanced privacy frameworks and taxonomies. Many attempts have been made and very few have achieved finding success with end users.</t>
      <t>Perhaps learning from the lessons of offering too many options, the recent trend in privacy enhancements has steered toward either a very simple "Privacy On or Off" switch or in other cases automatically enabling or "upgrading" to enhance privacy.   Apple's iCloud Private Relay can be easily turned on with a single
settings switch, while privacy features such as Encrypted DNS over HTTP and upgrade from HTTP to HTTPS connections have had a number of deployments that automatically enable them for users when possible.</t>
      <t>Keeping with the motto of "Keep It Simple", users are generally not provided with granular Network Overlay controls permitting the user to select what applications, or what network connections the Network Overlay policies can apply to.</t>
      <t>Adhering to the "Keep It Simple" approach the application itself has very little connection to privacy enhancing Network Overlays.  Applications generally do not have a means to detect when networking policy changes are active. Applications generally do not have a means to access policy change settings or to interact to change them.</t>
    </section>
    <section anchor="streaming-video">
      <name>Streaming Video</name>
      <t>Streaming Video, while just one of the many different Internet applications does standout from other uses in a number of significant ways that perhaps merit some amount of special consideration in understanding and addressing the impacts caused by particular privacy enhancing design and service offering choices.</t>
      <t>Firstly, Streaming video operates at a hard to imagine scale - streaming video is served globally to more than 2 billion user daily currently and continuing to grow in leaps and bounds.</t>
      <t>Secondly, the content types delivered through streaming has evolved from  the pre-recorded low-resolution, low-bit rate, latency tolerant video-on-demand movies, live or pre-recorded TV shows, and user generated videos delivered by pioneering streaming platforms to now including low-latency 4K and 8K live sports events, while
also evolving the pre-recorded content with high-bit rate such as 4K and 8K cinema quality and High Dynamic Range (HDR) lighting.</t>
      <t>Finally, the expectations of streaming video viewers have significantly evolved from the days of settling for being able to watch a movie in a PC browser.  Viewers expect to watch on any device type they want ranging from low-end-streaming sticks that plug into a USB port, to 4K and HDR capable laptops, 4K and 8K HDR TV
screens, gaming consoles, smart phones and many more choices.  Viewers also expect to have the same great viewing experience while at home connected via high-speed wired Internet, high-speed WiFi, or mobile cellular 5G and even satellite Internet connections.</t>
      <t>To meet the growth to billions of users, the growth in content type, quality and speed expectations, and  on-any-device anywhere that I am over any-network-connection expectations of users the Streaming Video technology infrastructure has had to itself evolve significantly.  This video streaming evolution work is being done in the IETF and in the <eref target="https://www.svta.org/">Streaming Video Technology Alliance (SVTA)</eref>, and in a number of other technical and industry groups.</t>
      <t>It's hard to overstate just how much the growth of streaming video has contributed to the growth of the Internet.  Internet connections of multiples of hundreds of megabits and gigabits speeds today are because of the needs of video streaming, the ongoing work on low-latency networking and ultra-low-latency video delivery are both driven by the use of streaming video.</t>
      <section anchor="advances-in-streaming-video-architecture">
        <name>Advances in Streaming Video Architecture</name>
        <t>Internet streaming has greatly matured and diversified from its early days of viewers
watching pre-recorded 320x240, 640x480 standard definition 480p movies to wired PCs connected
to the Internet via high-latency, low-bandwidth DSL as early DOCSIS modems.</t>
        <t>Streaming has grown to the extent that it has become a daily go-to video source worldwide for billions of viewers
and has expanded from pre-recorded movies to encompass every type of video content
imaginable.  This growth to billions of viewers and the addition of low latency sensitive
content and new connectivity options like WiFi, Cellular and Satellite in addition to
high-speed DOCSIS and fiber is the world streaming platforms now provide service in.</t>
        <t>With the large user base and its usage, the Streaming platforms also have significant technical challenges to meet viewer expectations:</t>
        <ul spacing="normal">
          <li>
            <t>(1) Delivery scales that commonly range from hundreds of thousands to many millions of viewers simultaneously, with billions of views globally daily;</t>
          </li>
          <li>
            <t>(2) Low latency demands from live sports, live events and live streamed content;</t>
          </li>
          <li>
            <t>(3) content resolutions and corresponding formats which have jumped from the days of SD-480p to 4K (3840x2160) and 8K (7680x4320) along with bit rates which can had data needs of 10-24+ Mbps for 4K with 8K demanding 40 Mbps under extreme compression and 150-300 Mbps for high quality such as cinema;</t>
          </li>
          <li>
            <t>(4) devices with very diverse capabilities low-cost streaming sticks, to Smart TVs, tablets, phones, and game consoles</t>
          </li>
          <li>
            <t>(5) broad range of connectivity choices including WiFi, Gig speed-low latency DOCSIS, Fiber, satellite, and 5G cellular networks;</t>
          </li>
          <li>
            <t>(6) application transport protocols including MPEG DASH, HLS, HTTP2/TCP, HTTP3/QUIC, WebRTC, Media over QUIC (MoQ) and specialty application transports such as SRT, HESP etc.</t>
          </li>
        </ul>
        <t>To meet these challenges streaming platforms have significantly invested in developing delivery architectures that
are built with detailed understandings of each element in the content delivery pathway, starting from the content capture all the way through to the screen of the viewer.</t>
        <t>Streaming applications are part of an end-to-end architecture that is optimized around achieving the best experience including low latency video delivery to viewing devices.  The open Internet can be unpredictable with temporary issues like packet loss, congestion and other conditions. However, streaming architecture is designed to handle these momentary problems as effectively as possible often through use of dynamic adaptive approaches designed into streaming protocols and platform components.</t>
      </section>
    </section>
    <section anchor="middleboxes-and-learning-from-the-past">
      <name>Middleboxes and learning from the past</name>
      <t>The IETF has discussed this situation in the past, more than 20 years ago in 2002 Middleboxes: Taxonomy and Issues <xref target="RFC3234"/>
was published capturing the issues with Middleboxes in the network and the effects of hidden changes occuring on the network between the sender and receiver.</t>
    </section>
    <section anchor="appendix-a-network-overlays-are-different-than-vpns">
      <name>Appendix A: Network Overlays are different than VPNs</name>
      <t>While conceptually similar in many ways to VPN (Virtual Private Network) technology, the various network overlay
technologies currently being deployed as well as new ones currently being designed by the IETF differ quite
significantly from the older VPN approach they are replacing in a number of ways.</t>
      <t>It is also worth noting that one reason why the issues discussed in this document have not been concern with
regard to VPNs is that largely VPNs have not been a pervasive way to stream video.   First, many VPNs have not had very good or consistent throughput compared to the direct open Internet and so provide a poor viewing experience.  Second, many video platforms block or deny service to VPN connections due to the very common use of VPNs to bypass geofiltering restrictions.</t>
      <t>Whatever the reason, it is worthlooking at how VPNs differ from the Network Overlays being discussed herein.</t>
      <section anchor="vpns-typically">
        <name>VPNs typically:</name>
        <ul spacing="normal">
          <li>
            <t>(1) VPNs typically are detectable by both the video application and often by the streaming platform.</t>
          </li>
          <li>
            <t>(2) VPNs typically work at the network layer of a device, resulting in a wide-range (if not all) transports</t>
          </li>
          <li>
            <t>and protocols from the device flowing through the VPN</t>
          </li>
          <li>
            <t>(3) VPNs typically provide exception options allowing for exclusion from traversing via the VPN based on</t>
          </li>
          <li>
            <t>various criteria such as application, destination IP address, application protocol etc.</t>
          </li>
        </ul>
        <section anchor="network-overlays-typically">
          <name>Network Overlays typically:</name>
          <ul spacing="normal">
            <li>
              <t>(1) Network Overlays are often undetectable by video applications or by the streaming platform, when in use</t>
            </li>
            <li>
              <t>(2) Network Overlays often only apply to specific application transports such as HTTP2/TCP or HTTP3/QUIC while not applying to HTTP2/TCP+TLS on the same device.</t>
            </li>
            <li>
              <t>(3) Network Overlays often only apply to HTTP connections and do not support ICMP, non-HTTP versions of DNS, NTP etc, and various tools used for network measurement, problem determination, and network management that are not HTTP based.</t>
            </li>
            <li>
              <t>(4) Network Overlays do not expose to applications any means for the application to discover the policy changes the overlay will apply to the applications network connections.</t>
            </li>
            <li>
              <t>(5) Network Overlays do not expose mechanisms or APIs for applications to interact with them such as getting or setting options.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9317">
        <front>
          <title>Operational Considerations for Streaming Media</title>
          <author fullname="J. Holland" initials="J." surname="Holland"/>
          <author fullname="A. Begen" initials="A." surname="Begen"/>
          <author fullname="S. Dawkins" initials="S." surname="Dawkins"/>
          <date month="October" year="2022"/>
          <abstract>
            <t>This document provides an overview of operational networking and transport protocol issues that pertain to the quality of experience (QoE) when streaming video and other high-bitrate media over the Internet.</t>
            <t>This document explains the characteristics of streaming media delivery that have surprised network designers or transport experts who lack specific media expertise, since streaming media highlights key differences between common assumptions in existing networking practices and observations of media delivery issues encountered when streaming media over those existing networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9317"/>
        <seriesInfo name="DOI" value="10.17487/RFC9317"/>
      </reference>
      <reference anchor="RFC7264">
        <front>
          <title>An Extension to the REsource LOcation And Discovery (RELOAD) Protocol to Support Relay Peer Routing</title>
          <author fullname="N. Zong" initials="N." surname="Zong"/>
          <author fullname="X. Jiang" initials="X." surname="Jiang"/>
          <author fullname="R. Even" initials="R." surname="Even"/>
          <author fullname="Y. Zhang" initials="Y." surname="Zhang"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>This document defines an optional extension to the REsource LOcation And Discovery (RELOAD) protocol to support the relay peer routing mode. RELOAD recommends symmetric recursive routing for routing messages. The new optional extension provides a shorter route for responses, thereby reducing overhead on intermediate peers. This document also describes potential cases where this extension can be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7264"/>
        <seriesInfo name="DOI" value="10.17487/RFC7264"/>
      </reference>
      <reference anchor="RFC7624">
        <front>
          <title>Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement</title>
          <author fullname="R. Barnes" initials="R." surname="Barnes"/>
          <author fullname="B. Schneier" initials="B." surname="Schneier"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="B. Trammell" initials="B." surname="Trammell"/>
          <author fullname="C. Huitema" initials="C." surname="Huitema"/>
          <author fullname="D. Borkmann" initials="D." surname="Borkmann"/>
          <date month="August" year="2015"/>
          <abstract>
            <t>Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7624"/>
        <seriesInfo name="DOI" value="10.17487/RFC7624"/>
      </reference>
      <reference anchor="RFC72558">
        <front>
          <title>*** BROKEN REFERENCE ***</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
      <reference anchor="RFC9484">
        <front>
          <title>Proxying IP in HTTP</title>
          <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
          <date month="October" year="2023"/>
          <abstract>
            <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9484"/>
        <seriesInfo name="DOI" value="10.17487/RFC9484"/>
      </reference>
      <reference anchor="RFC3234">
        <front>
          <title>Middleboxes: Taxonomy and Issues</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="S. Brim" initials="S." surname="Brim"/>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions. It does not, however, claim to be definitive. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3234"/>
        <seriesInfo name="DOI" value="10.17487/RFC3234"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 394?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge the contributions from the Streaming Video Technology Alliance (SVTA) based on their work studying the impacts of
network overlays on the streaming platforms. In particular, contributions from Brian Paxton have been very helpful.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
