<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kwbdgrr-tsvwg-net-collab-rqmts-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Network Collaboration Requirements">Requirements for Network Collaboration Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-02"/>
    <author initials="J." surname="Kaippallimalil" fullname="John Kaippallimalil">
      <organization>Futurewei</organization>
      <address>
        <email>john.kaippallimalil@futurewei.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco</organization>
      <address>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajagopalan" fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>Sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Dawkins" fullname="Spencer Dawkins">
      <organization>Tencent America LLC</organization>
      <address>
        <email>spencerdawkins.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="22"/>
    <area>Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>Media</keyword>
    <keyword>Low Latency</keyword>
    <keyword>Wireless Links</keyword>
    <keyword>Bandwidth constraints</keyword>
    <keyword>Policy</keyword>
    <keyword>Operational Considerations</keyword>
    <abstract>
      <?line 94?>

<t>Wireless networks (e.g., cellular or WLAN) experience significant but transient variations in link quality and have policy constraints (e.g., bandwidth) that affect user experience.
Collaborative signaling (e.g., host-to-network and server-to-network) can improve the user experience by informing the network about the nature and relative importance of packets (frames, streams, etc.) without having to disclose the content of the packets. Moreover, the collaborative signalling may be enabled so that hosts are aware of the network's treatment of incoming packets. Also, host-to-network collaboration can be put in place without revealing the identity of the remote servers. This collaboration allows for differentiated services at the network (e.g., packet discard preference), the sender (e.g., adaptive transmission), or through cooperation of server / host and the network.</t>
      <t>This document lists some use cases that illustrate the need for a mechanism to share metadata and outlines requirements for both host-to-network (and vice versa) and server-to-network (and vice versa). The document focuses on intra-flow or flows bound to the same user.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-kwbdgrr-tsvwg-net-collab-rqmts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TSVWG Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 101?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Wireless networks inherently experience large variations in link quality due to several factors.
These include the change in wireless channel conditions, interference between proximate cells and channels or because of the end user movement.
These variations in link quality can be in the order of a millisecond or less <xref target="_5G-Lumos"/> while congestion control takes several tens of milliseconds (more than one round-trip time (RTT)) to estimate data rate.
End-to-end congestion control algorithms are far from optimal when the link quality is highly variable in sub-RTT timeframes and the application demands both low latency and high bandwidth (e.g., <xref section="2.1" sectionFormat="of" target="RFC6077"/>).</t>
      <t>It is also not practical to convey sub-RTT link changes using an end-to-end feedback signal.
As a consequence, applications settling for a lower throughput when latency is prioritized or achieving higher throughput at the expense of much higher delays.</t>
      <t>With not fully encrypted packets, networks may use some heuristics to build an "implicit signal" derived from the contents of a packet to prioritize or otherwise shape flows.
Implicit signals are not desirable as they lead to ossification of protocols as result of introducing unintended dependencies <xref target="RFC9419"/>.
When packet contents are encrypted, the approach of using implicit signals is no longer viable.</t>
      <t>Bandwidth constraints exist most predominantly at the access network (e.g., radio access networks).
Users who are serviced via these networks use hosts which run various application clients; each having different connectivity needs for an optimal user experience.
These needs are not frozen but change over time depending on the application and even depending on how an application is used (e.g., user's preferences).
An explicit signal to the host can help to manage the use of available bandwidth better and better share it with requesting applications.</t>
      <t>Other applications like interactive media can demand both high throughput and low latency and, in some cases, carry different media streams (e.g., audio and video) in a single transport connection (e.g., WebRTC <xref target="RFC8825"/>).
There may be preferences that an application may wish to convey, such as a higher priority for audio over video (or the opposite) in congested networks or importance of certain packets (e.g., video key frames).
With RTP <xref target="RFC3550"/>, the type of media could be examined and used as an implicit signal for determining relative priority. However, <xref target="RFC9335"/> defines a new mechanism that completely encrypts RTP header extensions and Contributing sources (CSRCs). Furthermore, a full encrypted transport (e.g., QUIC <xref target="RFC9000"/>) does not expose any media header information that on-path network elements can use for forwarding.</t>
      <t>As mobile networks primarily service battery-operated devices, the same information is useful to those
networks even without network congestion, as the information can inform the base station to aggregate
packet transmission to allow the mobile device to briefly power down (sleep) its radio.</t>
      <t>Also, traffic patterns in some emerging applications can vary significantly during the session. For example, live media or AI-generated content can have significant dynamic variations and potentially aperiodic frames.
Information gleaned from unencrypted media packets and headers that wireless networks used in the past to optimize traffic shaping and scheduling are not exposed in encrypted communications.</t>
      <figure anchor="Figure-e2e">
        <artwork><![CDATA[
                     |
       3GPP/mobile network
+--------------------|----------------------+
|+-- ---+            |   +-----+    +-----+ |
||client+-----------(B)--+radio+----+ UPF | |
|+------+            |   +-----+    +--+--+ |
+--------------------|-----------------|----+
                     |                 |
       Wireless home/ISP network       |
+--------------------|-----------+     |    |          |
|+--- --+    +----+  |  +------+ | +---+--+ | +------+ | +------+
||client+-(B)+WLAN+-(B)-+router+---+router+---+router+---+server|
|+------+    +----+  |  +------+ | +------+ | +------+ | +------+
+--------------------|-----------+          |          |
                     |                      |          |
                     |                      | Transit  |  Content
 User device/Network |    MNO/ISP Network   | Network  |  Network
]]></artwork>
      </figure>
      <t><xref target="Figure-e2e"/> shows where such bandwidth and performance constraints usually exist with a "B" (for Bottleneck) in 3GPP/mobile networks and WLAN/ISP networks.
When a bottleneck exists temporarily, the network has no choice but to discard or delay packets -- which can harm certain flows and, thus, lead to suboptimal perceived experience.
In this document, this is termed 'reactive policy'.</t>
      <t>A network attachment represents the communication link between hosts (client) and network (router) over which a connection policy (including QoS) is applied to flows within that network attachment.</t>
      <t>A network attachment may be established using control plane signaling between the client and the network (access) router and is out of scope of this document.
Transport flows over a network attachment may consist of multiple streams such as video or audio. <xref target="Figure-conn-flow"/> shows a high level view of network attachments, flows, and QoS/policy discussed in <xref target="metadata-req"/>.</t>
      <t>The requirements in <xref target="metadata-req"/> apply to data units like frames within a flow, but not between flows. Specifically, this document does not discuss flows of distinct hosts/users.</t>
      <figure anchor="Figure-conn-flow">
        <artwork><![CDATA[
+----------+          +-----------------+
|+----+    |          | +-------------+ |
|| A1 |--+ |          | | QoS, Policy | |
|+-+--+A2| |          | +---+-----+---+ |          +------+
|  |+-+--+ |  Network |     |     |     |          |srv-A2|
|  |  |    |attachment|     v     |     |          +--+---+
|  |  |  *************************|**** |             |
|  |  +------------- flow-x2 -----|-------------------+   +------+
|  +------------ flow-x1 ---------|-----------------------+srv-A1|
|        *************************|**** |                 +--+---+
+-Client-1-+          |           |     |                    |
                      |           |     |                    |
+----------+  Network attachment  V     |                    |
|+----+  ****************************** |                    |
|| A1 +------------ flow-x3 ---------------------------------+
|+----+  ****************************** |
+----------+          +-----------------+
  Client-2                  Router
]]></artwork>
      </figure>
      <t><xref target="Figure-conn-flow"/> shows "Client-1" and "Client-2" that negotiate  connection policy (e.g., QoS) and other aspects like mobility handling, charging applied to flows in that network attachment.
"Client-1" has "flow-x1" and "flow-x2" over its network attachment while "Client-2" has "flow-x3".
The requirements in this document focuses on on-path collaboration signals that apply to data units such as media frames within flows like "flow-x1/x2/x3" but not between them.</t>
      <t>In summary, the rapid variation of wireless link quality and/or bandwidth limitations in networks along with interactive applications that demand low latency and high throughput can lead to suboptimal user experience. <xref target="uc"/> outlines use cases to illustrate the issues and the need for additional information per flow to allow the network to optimize its handling.</t>
      <t>Some of the complications that are induced by the phenomena discussed above may be eliminated by
   adequate dimensioning and upgrades.  However, such upgrades may not
   be always (immediately) possible or justified. Complementary mitigations are thus needed to soften these complications by introducing some collaboration between endpoints and networks to adjust their behaviors.</t>
      <t><xref target="operational"/> provides operational constraints in the network and <xref target="metadata-req"/> describes the requirements for on-path media collaboration signals.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Discard preference:</dt>
        <dd>
          <t>Is an indication of drop preference within a flow when there are no sufficient network resources to handle all competing packets of that same flow.</t>
        </dd>
        <dt>Intentional Management:</dt>
        <dd>
          <t>Network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>Network reactions to congestion events or protection polices under attacks, with very short to very long durations (e.g., varying wireless and mobile air interface conditions).</t>
        </dd>
        <dt>Traffic shaping:</dt>
        <dd>
          <t>Refers in this document to QoS management at the wireless/access router to delay or discard packets of lower priority to achieve bounded latency and high throughput.</t>
        </dd>
        <dt>User Plane Function (UPF):</dt>
        <dd>
          <t>Refers to a 3GPP element that is located between the mobile infrastructure and the Data Network (DN) as shown in <xref target="Figure-3gpp"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>For a definitive description of 3GPP network architectures, the reader should refer to the 3GPP's TR 23.501 <xref target="TR.23.501-3GPP"/>.</t>
        </dd>
      </dl>
      <figure anchor="Figure-3gpp">
        <name>5GS Architecture</name>
        <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
      </figure>
    </section>
    <section anchor="uc">
      <name>Use Cases</name>
      <section anchor="uc-streaming">
        <name>Media Streaming</name>
        <t>Streaming video contains the occasional key frame ("I-frame") containing a full video frame.
These frames are necessary to rebuild receiver state after loss of delta frames.
The key frames are therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Streaming video also contains audio frames which can be encoded
separately and, thus, can be signaled separately (requirement:
REQ-MEDIA-KEYFRAME).</t>
        <t>Audio is more critical than video for many applications, but its
importance (relative to other packets in the flow) is still an
application decision (requirements: REQ-MEDIA-AV-SEPARATE,
REQ-MEDIA-CLIENT-DECIDES). For example, the ability of the receiver to change the priority by communicating to the network -- without cooperation of the sender -- gives a hearing-impaired user the ability to adjust video above audio.</t>
        <t>Especially with media over QUIC, the server (or relay) sends the same
stream to many receivers, including the same metadata.  Thus, when a
client needs different prioritization (e.g., video over audio or the other way around), this
is only achievable by signaling that priority inversion from the
client to the ISP router (requirement: REQ-CLIENT-DECIDES).</t>
        <t>Examples: live broadcast, on-demand video streaming</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-MEDIA-KEYFRAME:</dt>
          <dd>
            <t>Video contains partial frames and full frames, which need to be distinguished so that
full frames can be indicated to the network.</t>
          </dd>
          <dt>REQ-MEDIA-AV-SEPARATE:</dt>
          <dd>
            <t>Audio can be prioritized differently than video.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>In loss-prone networks or during reactive policy events, retransmissions cause long delays. All packets being treated the same can have challenges in efficiently handling/forwarding data. Today, there is no way to identify packets which are less important and/or loss-tolerant to prioritize packets in challenging networks and/or during reactive events.</t>
          </li>
          <li>
            <t>Some media frames may be able to tolerate more delay over the wire than others (e.g., live media frames require very low latency while a background image for augmented reality may be delivered with more delay tolerance).  Even when the media payload is not encrypted, the network has no means to distinguish these different requirements.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-interactive">
        <name>Interactive Media</name>
        <t>Interactive media includes content that a user can actively engage with and results in input and response actions that can be highly delay-sensitive.</t>
        <t>Examples: VoIP (Peer-to-Peer (P2P), group conferencing), gaming, eXtended Reality (XR).</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PACKET-NATURE:</dt>
          <dd>
            <t>The receiver indicates that a flow can be allowed to be delayed/buffered (bulk data transfer) or not (interactive traffic) and requests that the network honors the incoming flow's per-packet signals, which prevents denial of service of mis-marked incoming flows.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>A mobile/roaming user prioritizes audio over video during a VoIP call to have a seamless meeting experience.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-accommodate-delay">
        <name>Accommodate-Delay Traffic</name>
        <t>Accommodate-Delay traffic includes content that is more resilient to buffering and delays (e.g., file copy, file download) compared to interactive traffic. This traffic can be buffered in favor of improved interactivity, without significant impact to the user experience. It is least sensitive to buffer bloating.</t>
        <t>Requirement: REQ-PACKET-NATURE as defined previously.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>A remote desktop user prioritizes graphics update over an on-going file copy operation.</t>
          </li>
          <li>
            <t>User application in foreground is given priority over downloading software updates.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-preferences">
        <name>User Preferences</name>
        <t>A game or VoIP application may want to signal different metadata for the same type of packet in each direction.
For example, for a game, video in the server-to-client direction might be more important than audio, whereas input devices (e.g., keystrokes) might be more important than audio.  Each user can have varied preferences for the same type of data originating from the server.</t>
        <t>Determination of such preferences is outside of the scope of this document.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-CLIENT-DECIDES:</dt>
          <dd>
            <t>The receiving client determines importance of packets it receives, as the client may have changing needs over time.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Dynamic changes to priority based on user activity is not possible today. For example, audio packets having the same priority when a user mutes the audio locally, or change in priority during times of emergency where video streaming applications share the same priority as SOS signals.</t>
          </li>
          <li>
            <t>A user prioritizing video over audio while playing an interactive game.</t>
          </li>
          <li>
            <t>User's foreground application should receive priority over background tasks. For example, a user is typing in a document while playing a media in the background within the same session.</t>
          </li>
        </ol>
      </section>
      <section anchor="mixed-traffic">
        <name>Mixed Traffic</name>
        <t>Mixed traffic can contain multiple types of data flowing through the same 5-tuple connection. They may include digital models of the real world, multimedia content, virtualized desktop/apps, and interactive engagement.</t>
        <t>In cases where the wireless network has to drop or delay processing, all packets of the media frame or stream are treated in the same manner.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PACKET-RELIABILITY:</dt>
          <dd>
            <t>Indicate if a packet is treated as reliable or unreliable by the application.</t>
          </dd>
          <dt>REQ-PACKET-NATURE:</dt>
          <dd>
            <t>Indicate if a packet belongs to bulk traffic or interactive traffic.</t>
          </dd>
        </dl>
        <t>Examples: Virtual Apps and Desktops.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Document being printed/saved while being edited. The interactive traffic has higher priority over bulk traffic).</t>
          </li>
          <li>
            <t>File download while intearacting with the webpage. With QUIC, this could occur with the same webserver. Interactive activity performed with the webpage higher priority over file download.</t>
          </li>
          <li>
            <t>In graphics remoting, Critical Glyphs (Reliable) has more priority over Smoothing Glyphs (unreliable) during reactive events.</t>
          </li>
          <li>
            <t>During reactive policy events, the network can choose to drop the packets marked unreliable by the application, thereby prioritizing reliable packets to avoid retransmissions and performance degradation.</t>
          </li>
        </ol>
      </section>
      <section anchor="honoring-of-metadata-for-servers-behind-a-gateway">
        <name>Honoring of Metadata for Servers Behind a Gateway</name>
        <t>In enterprise networks and remote desktop use case, a server can host multiple connections with varying type of traffic. These servers are often exposed to the Internet through some sort of a gateway-proxy and the signaling (like DSCP bits) from these servers are often ignored by the access/transit networks.</t>
        <t>Requirement: REQ-CLIENT-DECIDES as defined previously.</t>
      </section>
    </section>
    <section anchor="operational">
      <name>Operational Considerations</name>
      <t>Traffic policing and shaping are enforced in ingress/egress network points for various reasons (protect the network against attacks, ensure conformance with a trafic profile, etc.). Out-of-profile trafic may be discarded or assigned another class (e.g., using Lower Effort Per-Domain Behavior (LE PDB) <xref target="RFC3662"/>) a bandwidth limit among others. The exact behavior is policy-based and deployment-specific.</t>
      <t>The entire set of operations to manage traffic is beyond the scope of this document.
This section focuses on operational constraints that impact  server – network, and host – network modes of sending metadata.</t>
      <section anchor="policy">
        <name>Policy Enforcement</name>
        <t>Some metadata requires the network to share some hints with a host to adjust its behavior for some specific flows.
However, that metadata may have a dependency on the service offering that is subscribed by a user.</t>
        <t>Let us consider the example of a bitrate for an optimized video delivery. <em>Such bitrate may not be computed system-wide</em> given that flows from users with distinct service offerings (and connectivity SLOs) may be serviced by the same network nodes. Instead, the network needs to dynamically adjust the bitrate based on each user's service package and connectivity SLOs to ensure optimal delivery for all users (REQ-METADATA-ACCURACY).</t>
        <t>Requirement:  REQ-METADATA-ACCURACY.</t>
      </section>
      <section anchor="classification">
        <name>Redundant Functions and Classification Complications</name>
        <t>If distinct channels are used to share the metadata between a host and a network, a network that engages in the collaborative signaling approach will require sophisticated features to classify flows and decide which channel is used to share metadata so that it can consume that information.</t>
        <t>Likewise, the network will require to implement redundant functions; for each signaling interface.</t>
        <t><em>As such, application- and protocol-specific signaling channels are suboptimal.</em> (REQ-SINGLE-CHANNEL)</t>
        <t>Requirement:  REQ-SINGLE-CHANNEL is preferred.</t>
      </section>
      <section anchor="metadata-scope">
        <name>Metadata Scope</name>
        <t>An operational challenge for sharing resource-quota like metadata (e.g., maximum bitrate) is that the network is generally not entitled to allocate quota per-application, per-flow, per-stream, etc. that delivered as part of an Internet connectivity service.  However, the network has a visibility about the overall network attachment (e.g. inbound/outbound bandwidth discussed in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>).</t>
        <t>As such, hints about resource-like metadata is bound by default to the overall network attachment, not specific to a given application or flow.</t>
        <t>Most importantly, the metadata can be used by the network to prioritize traffic within a single 5-tuple connection and metadata cannot be leveraged for prioritization between different flows.</t>
        <t>It is out of the scope of this document to discuss setups (e.g., 3GPP PDU Sessions) where network attachments with Guaranteed Bit Rate (GBR) for specific flows is provided.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-SCOPED-METADATA:</dt>
          <dd>
            <t>Means to characterize the scope of a shared metadata for the sake of better interoperability should be supported.</t>
          </dd>
        </dl>
      </section>
      <section anchor="metadata-granularity">
        <name>Metadata Granularity</name>
        <t>The packet requirements mentioned above can be broadly classified into 2 catagories.</t>
        <section anchor="application-metadata">
          <name>Application Metadata</name>
          <t>Application metadata comprise of fields in metadata that specifies how the application will treat the packet. This information, when available to the network, can be useful in deciding how to handle packets during reactive events. This level of granularity cannot be simply replaced by another bit added to the priority field as evidenced by the use-case below.</t>
          <t>Requirements:
  Packet information such as REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined above.</t>
          <t>Use-case:</t>
          <ol spacing="normal" type="1"><li>
              <t>In an interactive gaming session, the traffic can be of multiple types such as critical and smoothening glyph updates for graphics traffic, haptic feedback traffic, audio traffic while the game is being saved (bulk data). In terms of priority, haptic feedback gets the highest priority and is often transmitted unreliably, since getting the feedback late is of minimal use. While considering only priority levels, during an uneventful session, haptic feedback would assume highest priority while the smoothening glyphs get the lower priority along with bulk data. Although, in a loss-prone network, haptic feedback can be dropped since it is unreliable while critical glyph and bulk data are expected to be delivered reliably and can result in retranmissions if lost. This distinction is not feasible with an addition to the priority level but can be done by defining more granular metadata. Information about application's treatment of the packet is used by the network in deciding how to handle certain types of packets over the other.</t>
            </li>
          </ol>
        </section>
        <section anchor="network-metadata">
          <name>Network Metadata</name>
          <t>Network metadata comprise of fields in metadata that specifies how the network should treat the packet. This dictates how the network should prioritize the packet and has no bearing on the nature of the packet itself.</t>
          <t>Requirement: Packet handling information such as REQ-PACKET-SELF.</t>
          <t>Use-case:</t>
          <ol spacing="normal" type="1"><li>
              <t>In a VoIP session where audio is prioritized over video, both traffic has the same nature (reliability and interactivity) and differ only in how the packet needs to be prioritized by the network to ensure audio reaches more reliably, faster and coherently than video. This is solely the way application wants the network to prioritize the packet and not the nature of the packet itself.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="multiple-bottlenecks">
        <name>Multiple Bottlenecks</name>
        <t>Whereas models often show a single bottleneck, there are frequently
two (or more) bottlenecks: the ISP network and within the subscriber
network (e.g., Wi-Fi link).  As such, all bottlenecks near the
subscriber should be able to benefit from network/host collaboration.</t>
        <t>Requirement: REQ-MULTIPLE-BOTTLENECKS should be supported.</t>
      </section>
      <section anchor="app-interference">
        <name>Application Interference</name>
        <t>Applications that have access to a resource-quota information may adopt an aggressive behavior (compared to those that don't have access) if they assumed that a resource-quota like metadata is for the application, not for the host that runs the applications.</t>
        <t>This is challenging for home networks where multiple hosts may be running behind the same CPE, with each of them running a video application. The same challenge may apply when tethering is enabled.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-SIGNAL-EXPOSURE-FAIRNESS:</dt>
          <dd>
            <t>Means to expose the signal independent of the application should be considered. An example of such exposure is OS APIs.</t>
          </dd>
        </dl>
      </section>
      <section anchor="exposure-handling">
        <name>Exposure Handling</name>
        <t>Signaling to the network (<xref target="host-network"/>, <xref target="server-network"/>) and consuming the signals from the network (<xref target="network-host"/>) will need to be facilitated by Application Programming Interfaces (APIs) for any application to use them. Signaling and retrieval of the signals may not be performed at a single layer (although not encouraged). Hence, a framework is required to abstract the underlying protocol(s) and allow the application(s) to retrieve/send signals using a single or a set of API(s) independent of the channels that are used to convey the signals.  The API framework is required even if one single channel is used so that any application can consume the signals.</t>
        <t>There might be many channels to signal the metadata such as (non-exhaustive list):</t>
        <ul spacing="normal">
          <li>
            <t>Application layer</t>
          </li>
          <li>
            <t>TCP options <xref target="RFC9293"/></t>
          </li>
          <li>
            <t>UDP Options <xref target="I-D.ietf-tsvwg-udp-options"/></t>
          </li>
          <li>
            <t>IPv6 Hop-by-Hop Options (<xref section="4.3" sectionFormat="of" target="RFC8200"/>)</t>
          </li>
          <li>
            <t>QUIC CID mapping</t>
          </li>
          <li>
            <t>ICMP messages</t>
          </li>
        </ul>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-API-FRAMEWORK:</dt>
          <dd>
            <t>API framework to facilitate signaling for applications.</t>
          </dd>
        </dl>
      </section>
      <section anchor="privacy">
        <name>Privacy Considerations</name>
        <t>Encrypted media payloads along with temporary IPv6 addresses between a server and user (client) provide a measure of privacy for the content and the identity of the user.
It should, however, be noted that media flows (e.g., encrypted video payloads in SRTP) exhibit a pattern of bursts and intervals that amounts to a signature and is vulnerable to frequency analysis.
To avoid this kind of frequency analysis, media sent by the server would need to be scheduled or multiplexed differently to each user/recipient.
This may be possible in transports like QUIC which allows flexibility in scheduling each stream.
Transports like QUIC also fully encrypt the entire stream and, therefore, no media headers are observable on-path either.
The security aspects of the media payload / transport are not in the scope of this document and is described here only to provide context for metadata privacy.</t>
        <t>Some metadata (e.g., the size of a burst of packets, sequence number, and timestamp) can be readily observed or inferred by entities
along the network path. However, it is essential to recognize that while sequence numbers and timestamps are typically visible in
the clear-text headers of protocols (e.g., TCP, RTP, or SRTP) they are not directly observable in encrypted protocols such as QUIC. All metadata sent
from the server to the network, including these elements and others, are vulnerable to modification while in transit. Only an
on-path attacker can modify on-path metadata. Such an attacker could engage in other malicious activities, like corrupting the checksum or
completely dropping the packet. For instance, an active attacker could alter the metadata to mislabel packets containing video key-frames
as unimportant, but such changes are detectable by the receiver.</t>
        <t>It is recommended to encrypt or obfuscate the metadata information so it is only available to hosts and to authorized network elements. The method of encryption or obfuscation is not described in this document but rather in other documents describing how this metadata is encoded and exchanged amongst hosts and network elements. The privacy implications of revealing metadata to network elements need to be thoroughly analyzed. This analysis should ensure that any exposure of metadata does not compromise user privacy or allow unauthorized entities to infer sensitive information about the data being transmitted while maintaining minimal resource consumption.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PRIVACY-ADDITIONAL:</dt>
          <dd>
            <t>An on-path observer obtains no additional information about the IP packet.</t>
          </dd>
          <dt>REQ-SIGNALING-AVOIDANCE:</dt>
          <dd>
            <t>Leveraging previous experience <xref target="RFC9049"/>, the folliwing is not required to make use of the collaborative signaling:
</t>
            <ul spacing="normal">
              <li>
                <t>Reveal the application identity.</t>
              </li>
              <li>
                <t>Expose the application cause (or 'reason') to signal metadata.</t>
              </li>
              <li>
                <t>Reveal server identity.</t>
              </li>
              <li>
                <t>Inspect client-to-server encrypted payload by network elements.</t>
              </li>
            </ul>
          </dd>
        </dl>
      </section>
      <section anchor="scalability">
        <name>Scalability</name>
        <t>There may be a large number of media flows handled by the server and wireless/access router.</t>
        <t>Per flow information (state) at a wireless router for optimizing the flow can negate the advantages offered as the number of flows handled increases.</t>
        <t>The metadata and other state information that a router has to maintain for each additional media flow it handles should be kept to a minimum or eliminated altogether.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-ISP-SCALE:</dt>
          <dd>
            <t>The metadata other state information that a wireless router has to maintain for each additional media flow it handles should be very low or none.</t>
          </dd>
        </dl>
      </section>
      <section anchor="continuity">
        <name>Session Continuity</name>
        <t>The general trend in wireless networks is to deploy the wireless router closer to the user.
This can help with low link latency but can result in more frequent handovers as the user moves between routers.
The frequency of handovers increases when a user moves faster or when the media session lasts longer.</t>
        <t>During handovers, there should be minimal delay incurred during handover in configuring/setting up the metadata of a media session in progress.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-CONTINUITY:</dt>
          <dd>
            <t>Handover from one radio or router to another should continue to provide same service level.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abuse">
        <name>Abuse and Constraints</name>
        <t>It is important that not every flow be prioritized; otherwise, the network devolves into the best-effort network that existed prior to metadata signaling. It is a requirement that mechanisms exist to prevent this occurrence.</t>
        <t>Such a mechanism might be simple, for example, a cellular network might allow one flow from a subscriber to declare itself as important; other flows with that subscriber are denied attempts to prioritize themselves. However, the network cannot identify whether the prioritized flow is legitimate or malicious.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-SIGNAL-VALIDATION:</dt>
          <dd>
            <t>The network/OS needs to ensure that the user/client signaling of priority (if any) does not associate the same priority level with all traffic types within the same flow, thereby avoiding prioritizing of all the streams/traffic the same way.</t>
          </dd>
          <dt>REQ-CLIENT-VALIDATION:</dt>
          <dd>
            <t>The network needs to ensure the signal is coming from the same user/client that is part of the 5-tuple flow. This is to ensure no other application influences the priority of another application's flow.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="metadata-req">
      <name>On-path Metadata Requirements</name>
      <t>There are various approaches for collaborative signaling between the server/host and network including out-of-band signaling, client-centric metadata sharing and proxied connections.
The requirements here focus on proxied metadata connections on path with the data traffic.</t>
      <t>The path signals below should follow the principles of intentional distribution, protection of information, minimization and limiting impact as described in <xref target="RFC9419"/> and <xref target="RFC8558"/>.
Leveraging previous experience (<xref target="RFC9049"/>), the metadata signals does not need application identity, application cause (or 'reason'), server identity or the inspection of client(host)-to-server encrypted payload.</t>
      <t>The metadata connections may be between server and network (in either direction) or between host and network (in either direction).</t>
      <t>Some use cases benefit from server – network metadata exchanges (<xref target="server-network"/>) and others need client involvement (<xref target="host-network"/>).</t>
      <t>For the requirements that follow, the assumption is that the client agrees to the exchange of metadata between the server and network, or between the client and network.</t>
      <t>Requirement:</t>
      <dl>
        <dt>REQ-PACKET-SELF:</dt>
        <dd>
          <t>Packet importance is indicated by the packet itself.</t>
        </dd>
      </dl>
      <t>Note REQ-PACKET-SELF should meet the requirements of <xref target="privacy"/> especially REQ-PRIVACY-ADDITIONAL.</t>
      <section anchor="host-network">
        <name>Host-Network Metadata</name>
        <section anchor="interflow-priority">
          <name>Priority between Flows (Inter-flow)</name>
          <t>Certain flows being received by a host (or by an application on a host) are less or more important than other flows of <em>the same host</em>.
For example, a host downloading a software update is generally considered less important than another host doing interactive audio/video or gaming.</t>
          <t>By signaling the relative importance of flows to a network element, the network element can (de-)prioritize those flows to best accommodate the needs of the various applications on a same host.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark packets that interfere with the desires of the receiving host -- making their flows more important than what the receiving host considers more important.
This eventually causes all flows to be marked as important, or -- more likely -- such priority markings to be ignored.</t>
          <t>However, prioritizing between flows, even for the same user/subscriber, presents the following challenges:</t>
          <ol spacing="normal" type="1"><li>
              <t>Identification and authentication of legitimate applications on the host. The remote peers can also be malicious and benign.</t>
            </li>
            <li>
              <t>Identifying whether the traffic belongs to a single user or multiple users from a single network attachment (e.g., tethering or LAN connected to a CPE). The network will enforce per-subscriber policies, not per-host.</t>
            </li>
            <li>
              <t>Enforcing fairness to all the flows belonging to a single host. For example, it is a challenge to prevent a platform from marking certain flows as low priority at platform layer, bypassing the application, to (de)prioritize certain applications over all the other applications on the same host. Such unfairness can be revealed during certification or public benchmark efforts, though.</t>
            </li>
          </ol>
          <t>Taking into account these challenges, and despite the use case is described in the document, inter-flow (de)prioritization requirements are out of the scope of this document.</t>
          <ul empty="true">
            <li>
              <t>Future versions of the document may re-consider this conclusion as a function of the comments received from the TSVWG.</t>
            </li>
          </ul>
        </section>
        <section anchor="intra-flow-priority">
          <name>Priority within a Flow (Intra-Flow)</name>
          <t>Interactive Audio/Video has long been using <xref target="RFC3550"/> which runs over UDP.  As described in Section 2.3.7.2 of <xref target="RFC7478"/>, there is value in differentiating between voice, video and data.
Today's video streaming is exclusively over TCP but will migrate to QUIC and eventually is likely to support unreliable transport (<xref target="RFC9221"/>, <xref target="I-D.ietf-moq-transport"/>).  With unreliable transport of video in RTP or QUIC, it is beneficial to differentiate the important video keyframes from other video frames.</t>
          <t>Other applications, as mentioned in <xref target="uc"/>, such as gaming and remote desktop also benefit from differentiating their packets to the network.</t>
          <t>Many of these flows do not originate from a content provider's network -- rather, they originate from a peer (e.g., VoIP, interactive video, peer-to-peer gaming, Remote Desktop, and CDN). Thus, the flows originate from an IP address that is not known before connection establishment, so there needs to be a way for the client to authorize the network elements to receive and hopefully to honor the metadata of those packets from a remote peer.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark every packet of a flow as important, causing much the same problem as the previous use case.
Eventually, when all packets of every flow are marked as important, there is no differentiation between packets within a flow, rendering the network unable to improve reactive policy decisions.</t>
          <t>Requirements: The requirements vary based on use case and user preference. The requirements listed in <xref target="uc"/> are applicable here.</t>
        </section>
      </section>
      <section anchor="network-host">
        <name>Network-Host Metadata</name>
        <section anchor="assisted-offload">
          <name>Assisted Offload</name>
          <t>There are cases (crisis) where "normal" network resources cannot be
used at maximum and, thus, a network would seek to reduce or offload
some of the traffic during these events -- often called 'reactive
traffic policy'.  An example of such use case is cellular networks
that are overly used (and radio resources exhausted) such as a large
collection of people (e.g., parade, sporting event), or such as a
partial radio network outage (e.g., tower power outage).  During such
a condition, an alternative network attachment may be available to
the host (e.g., Wi-Fi).</t>
          <t>Network-to-host signals are useful to put in place adequate traffic
distribution policies on the host (e.g., prefer the use of alternate paths,
offload a network) (REQ-NETWORK-SEEKS-LOAD-DOWN).</t>
        </section>
        <section anchor="nrlp">
          <name>Network Bandwidth &amp; Network Rate Limiting Policies</name>
          <t>Bandwidth constraints exist most predominantly at the access network. This can be constraints in the network itself or a result of rate limiting due to various reasons.</t>
          <t>Also, traffic exchanged over a network attachment may be subject to rate-limit policies. These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription) or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation).</t>
          <t>Requirements:</t>
          <dl>
            <dt>REQ-NETWORK-THROUGHPUT:</dt>
            <dd>
              <t>A mechanism to signal the available network throughput to interested hosts, including changes to throughput.</t>
            </dd>
            <dt>REQ-NRLP:</dt>
            <dd>
              <t>The network shall inform the host of the Rate limiting policies</t>
            </dd>
          </dl>
          <t>Use cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>Performance Optimization: Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals will improve overall network performance and can help optimize the data transfer. Signaling bandwidth availability allows hosts to avoid contributing to network congestion.</t>
            </li>
            <li>
              <t>Dynamic Adaptation: When the network informs the host about available bandwidth, the host can dynamically adjust its data transmission rate.</t>
            </li>
            <li>
              <t>Efficient Resource Utilization: Knowing available bandwidth helps the host allocate resources efficiently.</t>
            </li>
            <li>
              <t>Auto-Scaling Applications: Cloud-based applications can auto-scale based on available bandwidth.</t>
            </li>
            <li>
              <t>Rate Limiting: Monthly data quotas on cellular networks can be easily exceeded by video streaming, in particular, if the client chooses excessively high quality or routinely abandons watching videos that were downloaded. The network can assist the client by informing the client of the network's bandwidth policy.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="server-network">
        <name>Server-Network Metadata</name>
        <section anchor="mdu-stream-id">
          <name>Identification of Media Frames and Streams</name>
          <t>Feedback provided by ECN/L4S to the server (UDP sender) is not fast enough to adjust the sending rate when available wireless capacity changes significantly in very short periods of time (~ 1 millisecond).
Differentiating using multiple DSCP codes does not provide the resolution required to classify media frames or streams and adapt to changes in coding due to dynamic content or resulting from network conditions.</t>
          <t>Relative priority and tolerance to delay of media frames or streams can be used to optimize traffic shaping at the wireless router.
The application can provide information to detect the start, end and set of packets that belong to a media frame.
Alternatively, the application may provide information to identify one stream of the flow from another.
The application provides information to identify either media frames or streams in a flow but not both.</t>
          <t>In cases where the wireless network has to drop or delay processing, all packets of the media frame or stream are treated in the same manner.</t>
          <t>Requirements:</t>
          <dl>
            <dt>REQ-FRAME-ASSOCIATED:</dt>
            <dd>
              <t>Identify all packets belonging to the same media frame, so they can receive equal drop/forward treatment.</t>
            </dd>
          </dl>
        </section>
        <section anchor="TrafficType">
          <name>Identification of Traffic Type without Disclosure of the Application</name>
          <t>Different nature/types of traffic can be part of the same 5-tuple flow. This could be reliable/loss-tolerant <xref target="RFC9221"/>, bulk/interactive traffic. The type of traffic can be used to prioritize/buffer packets as needed and deprioritize/discard appropriate packets during reactive events, thereby optimizing performance. The application may provide information to identify the type of traffic in per-packet metadata.</t>
          <t>Requirements: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in <xref target="mixed-traffic"/>.</t>
        </section>
        <section anchor="relative-priority">
          <name>Relative Priority</name>
          <t>Relative importance of a media frame provides the priority level of one media frame over another media frame within a stream.
The application server determines the importance based on the media encoded in the media frame (e.g., a base layer video I-frame has higher priority than an enhanced layer P-frame).
Importance may be used to determine drop priority of a media frame in cases of extreme congestion in the wireless network.</t>
          <t>Relative importance of a media stream  is the priority level of one media stream over another stream in the flow (with the same IP 5-tuple).
As with media frames, importance may be used to determine drop priority in cases of extreme congestion in the wireless network.</t>
          <t>There is no requirement associated with this use case.</t>
        </section>
        <section anchor="delay">
          <name>Tolerance to Delay</name>
          <t>Some media frames may be able to tolerate more delay over the wire than others (e.g., live media frames require very low latency while a background image for augmented reality may be delivered with more delay tolerance).
Similarly, some media streams can tolerate more delay over the wire than others (e.g., a stream carrying a background image may tolerate more delay).
ams may be able to tolerate more delay over the wire than others (e.g., a stream carrying a background image for augmented reality may be delivered with more delay tolerance).
Even when the media payload is not encrypted, the network has no means to distinguish these different requirements.</t>
          <t>If the application can indicate that a media frame or stream can tolerate high delay the wireless router can opt to delay packets rather than drop during transient congestion periods.</t>
          <t>Requirements:</t>
          <t>REQ-DELAY-TOLERANCE: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in <xref target="mixed-traffic"/>.</t>
        </section>
        <section anchor="burst">
          <name>Burst Indication</name>
          <t>Media flows can have large and unexpected variations in packet bursts due to dynamic changes in content, server estimation of network conditions and pacing behavior.
Encoding of live video, and multimodal media can only increase the burst size that a server has to contend with sending out in a relative smoothed out manner.
The burst size is observable on the wire, but can only be determined by the end of the burst of packets.
Wireless networks on the other hand cannot reserve resources for the maximum burst size allowed as that will likely lead to poor utilization of radio resources or tail drops.</t>
          <t>The server may provide burst size at the beginning of the burst to allow the scheduler to reserve sufficient resources (and avoid having too few resources that may lead to a tail drop).
The server may also signal end of burst that provides information for the radio to go into sleep mode (Connected Mode Discontinuous Reception, C-DRX) if there is no paging message.</t>
          <dl>
            <dt>REQ-BURST-INDICATOR:</dt>
            <dd>
              <t>Client indicates this flow's maximum burst to the service provider network, and network agrees it can handle that burst size.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="non-req">
      <name>Non-Requirements</name>
      <t>Application feedback with measurements of packets lost and delay incurred may affect the sending rate and other behavior of the application.
The requirements and specification to mitigate these aspects are not in the scope of this document.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Security aspects for the metadata are discussed in <xref target="privacy"/>.
The principles outlined in <xref target="RFC8558"/>, <xref target="RFC9049"/> and <xref target="RFC9419"/> contain security considerations and are referenced in <xref target="metadata-req"/>.</t>
      <t>This document has no other security considerations.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a merge of <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> and <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>.</t>
      <t>T. Reddy contributed text and ideas to this document.</t>
      <dl>
        <dt>Acknowledgments from <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>:</dt>
        <dd>
          <t>Xavier De Foy and the authors of this draft have discussed the similarities and differences of this draft with the MoQ draft for carrying media metadata.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors wish to thank Mike Heard, Sebastian Moeller and Tom Herbert for discussions on metadata fields, fragmentation and various transport aspects.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors appreciate input from Marcus Ilhar and Magnus Westerlund on the need to address privacy in general and Dan Druta to consider a common transport across various host to network signaling when possible.
Ruediger Geib suggested that limiting the amount of state information that a wireless router has to keep for a flow should be minimized.</t>
        </dd>
        <dt/>
        <dd>
          <t>Ingemar Johansson's suggestions on fast fading (which L4S handles) and dramatic drops in wireless accesses have been helpful to identify the issues.
Thanks to Hang Shi for the review and comments on host-to-network signaling.
Thanks to Luis Miguel Contreras and Colin Kahn for their review and comments.</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="TR.23.501-3GPP">
        <front>
          <title>3rd Generation Partnership Project; Technical Specification Group Servies and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="TR.23.700-60-3GPP">
        <front>
          <title>Study on XR (Extended Reality) and media services (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="_5G-Lumos">
        <front>
          <title>Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput, Arvind Narayanan et al., ACM Internet Measurement Conference (IMC '20), https://dl.acm.org/doi/10.1145/3419394.3423629</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
        <front>
          <title>Bandwidth measurement for QUIC</title>
          <author fullname="Zafer Gurel">
            <organization/>
          </author>
          <author fullname="Ali C. Begen">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="RFC6077">
        <front>
          <title>Open Research Issues in Internet Congestion Control</title>
          <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
          <author fullname="M. Welzl" initials="M." surname="Welzl"/>
          <author fullname="M. Scharf" initials="M." surname="Scharf"/>
          <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
          <date month="February" year="2011"/>
          <abstract>
            <t>This document describes some of the open problems in Internet congestion control that are known today. This includes several new challenges that are becoming important as the network grows, as well as some issues that have been known for many years. These challenges are generally considered to be open research topics that may require more study or application of innovative techniques before Internet-scale solutions can be confidently engineered and deployed. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6077"/>
        <seriesInfo name="DOI" value="10.17487/RFC6077"/>
      </reference>
      <reference anchor="RFC9419">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RFC8825">
        <front>
          <title>Overview: Real-Time Protocols for Browser-Based Applications</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>This document gives an overview and context of a protocol suite intended for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web".</t>
            <t>It intends to serve as a starting and coordination point to make sure that (1) all the parts that are needed to achieve this goal are findable and (2) the parts that belong in the Internet protocol suite are fully specified and on the right publication track.</t>
            <t>This document is an applicability statement -- it does not itself specify any protocol, but it specifies which other specifications implementations are supposed to follow to be compliant with Web Real-Time Communication (WebRTC).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8825"/>
        <seriesInfo name="DOI" value="10.17487/RFC8825"/>
      </reference>
      <reference anchor="RFC3550">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC9335">
        <front>
          <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
          <author fullname="J. Uberti" initials="J." surname="Uberti"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="S. Murillo" initials="S." surname="Murillo"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations.</t>
            <t>This document updates RFC 3711, the SRTP specification, and defines Cryptex as a new mechanism that completely encrypts header extensions and CSRCs and uses simpler Session Description Protocol (SDP) signaling with the goal of facilitating deployment.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9335"/>
        <seriesInfo name="DOI" value="10.17487/RFC9335"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC3662">
        <front>
          <title>A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <author fullname="K. Nichols" initials="K." surname="Nichols"/>
          <author fullname="K. Wehrle" initials="K." surname="Wehrle"/>
          <date month="December" year="2003"/>
          <abstract>
            <t>This document proposes a differentiated services per-domain behavior (PDB) whose traffic may be "starved" (although starvation is not strictly required) in a properly functioning network. This is in contrast to the Internet's "best-effort" or "normal Internet traffic" model, where prolonged starvation indicates network problems. In this sense, the proposed PDB's traffic is forwarded with a "lower" priority than the normal "best-effort" Internet traffic, thus the PDB is called "Lower Effort" (LE). Use of this PDB permits a network operator to strictly limit the effect of its traffic on "best-effort"/"normal" or all other Internet traffic. This document gives some example uses, but does not propose constraining the PDB's use to any particular type of traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3662"/>
        <seriesInfo name="DOI" value="10.17487/RFC3662"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="29" month="May" year="2024"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-13"/>
      </reference>
      <reference anchor="RFC9293">
        <front>
          <title>Transmission Control Protocol (TCP)</title>
          <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="9293"/>
        <seriesInfo name="DOI" value="10.17487/RFC9293"/>
      </reference>
      <reference anchor="I-D.ietf-tsvwg-udp-options">
        <front>
          <title>Transport Options for UDP</title>
          <author fullname="Dr. Joseph D. Touch" initials="J. D." surname="Touch">
            <organization>Independent Consultant</organization>
          </author>
          <date day="21" month="March" year="2024"/>
          <abstract>
            <t>   Transport protocols are extended through the use of transport header
   options. This document updates RFC 768 (UDP) by indicating the
   location, syntax, and semantics for UDP transport layer options
   within the surplus area after the end of the UDP user data but
   before the end of the IP length.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-udp-options-32"/>
      </reference>
      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering"/>
          <author fullname="R. Hinden" initials="R." surname="Hinden"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals. For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear. Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements. In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels. Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.ietf-moq-transport">
        <front>
          <title>Media over QUIC Transport</title>
          <author fullname="Luke Curley" initials="L." surname="Curley">
            <organization>Discord</organization>
          </author>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Meta</organization>
          </author>
          <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
            <organization>Cisco</organization>
          </author>
          <author fullname="Victor Vasiliev" initials="V." surname="Vasiliev">
            <organization>Google</organization>
          </author>
          <author fullname="Ian Swett" initials="I." surname="Swett">
            <organization>Google</organization>
          </author>
          <date day="8" month="July" year="2024"/>
          <abstract>
            <t>   This document defines the core behavior for Media over QUIC Transport
   (MOQT), a media transport protocol designed to operate over QUIC and
   WebTransport, which have similar functionality.  MOQT allows a
   producer of media to publish data and have it consumed via
   subscription by a multiplicity of endpoints.  It supports
   intermediate content distribution networks and is designed for high
   scale and low latency distribution.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-moq-transport-05"/>
      </reference>
      <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
        <front>
          <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
          <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Dan Wing" initials="D." surname="Wing">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="14" month="February" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
