<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rwbr-tsvwg-signaling-use-cases-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Collaborative Host/Network Signaling: Use Cases">Signaling Use Cases for Collaborative Traffic Differentiation</title>
    <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-01"/>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Web and Internet Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>user experience</keyword>
    <keyword>bandwidth</keyword>
    <keyword>priority</keyword>
    <keyword>enriched feedback</keyword>
    <keyword>media streaming</keyword>
    <keyword>realtime media</keyword>
    <keyword>QoS</keyword>
    <keyword>5G</keyword>
    <keyword>Wi-Fi</keyword>
    <keyword>WiFi</keyword>
    <keyword>diffserv</keyword>
    <abstract>
      <?line 70?>

<t>Host-to-network (and vice versa) signaling can improve the user experience by informing
the network which flows are more important and which packets within a
flow are more important without having to disclose the content of the packets being delivered. The differentiated service may be provided
at the network (e.g., packet discard preference), the sender (e.g.,
adaptive transmission or session migration), or through cooperation of both the host
and the network.</t>
      <t>This document outlines a set of use-cases that highlight the need for a mechanism
to share metadata about flows between a host and its network in order to enable different traffic treatment.
Such a mechanism is typically implemented using a signaling protocol between the host and
a set of trusted netwrok elements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/signaling-use-cases/draft-wing-tsvwg-signaling-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rwbr-tsvwg-signaling-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport and Services Working Group Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/signaling-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Bandwidth constraints exist most predominantly at the access network (e.g., radio access networks).
Users who are serviced via these networks use various hosts which run various
applications; each having different connectivity needs for an optimal user
experience. These needs are not frozen but change over time
depending on the application and even depending on how an application
is used (e.g., user's preferences).</t>
      <t>The simple network diagram below shows where such bandwidth and
performance constraints usually exist with a "B" (for Bottleneck).
Other network bottlenecks may be experienced in other segments not shown
in the figure, such as interconnection links or the infrastructure that hosts the service (e.g.,
flash crowds). A bottleneck may be limited in time, present or not regular patters, etc.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="520" viewBox="0 0 520 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,48 L 8,80" fill="none" stroke="black"/>
            <path d="M 48,48 L 48,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
            <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
            <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
            <path d="M 176,80 L 176,128" fill="none" stroke="black"/>
            <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
            <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,48 L 280,80" fill="none" stroke="black"/>
            <path d="M 336,48 L 336,80" fill="none" stroke="black"/>
            <path d="M 352,32 L 352,56" fill="none" stroke="black"/>
            <path d="M 352,72 L 352,128" fill="none" stroke="black"/>
            <path d="M 368,48 L 368,80" fill="none" stroke="black"/>
            <path d="M 424,48 L 424,80" fill="none" stroke="black"/>
            <path d="M 440,32 L 440,56" fill="none" stroke="black"/>
            <path d="M 440,72 L 440,128" fill="none" stroke="black"/>
            <path d="M 456,48 L 456,80" fill="none" stroke="black"/>
            <path d="M 496,48 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 152,32" fill="none" stroke="black"/>
            <path d="M 8,48 L 48,48" fill="none" stroke="black"/>
            <path d="M 200,48 L 256,48" fill="none" stroke="black"/>
            <path d="M 280,48 L 336,48" fill="none" stroke="black"/>
            <path d="M 368,48 L 424,48" fill="none" stroke="black"/>
            <path d="M 456,48 L 496,48" fill="none" stroke="black"/>
            <path d="M 48,64 L 64,64" fill="none" stroke="black"/>
            <path d="M 80,64 L 96,64" fill="none" stroke="black"/>
            <path d="M 152,64 L 168,64" fill="none" stroke="black"/>
            <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
            <path d="M 256,64 L 280,64" fill="none" stroke="black"/>
            <path d="M 336,64 L 368,64" fill="none" stroke="black"/>
            <path d="M 424,64 L 456,64" fill="none" stroke="black"/>
            <path d="M 8,80 L 48,80" fill="none" stroke="black"/>
            <path d="M 200,80 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,80 L 336,80" fill="none" stroke="black"/>
            <path d="M 368,80 L 424,80" fill="none" stroke="black"/>
            <path d="M 456,80 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,96 L 152,96" fill="none" stroke="black"/>
            <g class="text">
              <text x="116" y="52">WLAN</text>
              <text x="28" y="68">host</text>
              <text x="72" y="68">B</text>
              <text x="124" y="68">access</text>
              <text x="176" y="68">B</text>
              <text x="228" y="68">router</text>
              <text x="308" y="68">router</text>
              <text x="396" y="68">router</text>
              <text x="476" y="68">host</text>
              <text x="120" y="84">point</text>
              <text x="392" y="116">Transit</text>
              <text x="488" y="116">Content</text>
              <text x="44" y="132">User</text>
              <text x="96" y="132">Network</text>
              <text x="224" y="132">ISP</text>
              <text x="272" y="132">Network</text>
              <text x="392" y="132">Network</text>
              <text x="488" y="132">Network</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
           +------+  |                     |          |
+----+     |WLAN  |  |  +------+  +------+ | +------+ | +----+
|host+--B--+access+--B--+router+--+router+---+router+---+host|
+----+     |point |  |  +------+  +------+ | +------+ | +----+
           +------+  |                     |          |
                     |                     | Transit  |  Content
   User Network      |    ISP Network      | Network  |  Network
]]></artwork>
      </artset>
      <t>Complications that are induced by such phenomena may be eliminated by
adequate dimensioning and upgrades. However, such upgrades may not
be always immediately possible or economically justified.</t>
      <t>Complementary mitigations are thus needed to soften these complications
by introducing some collaboration between hosts and networks to adjust
their behaviors.</t>
      <t>For traffic sent in either direction, the network network elements
that terminate a bandwidth constraining link (or located few hops next to that element) can be fed
with flow metadata. Such augmentation allows those network elements
to make autonomous decisions to prioritize, delay, or drop packets,
especially when performing reactive resource management. Absent such metadata,
these network elements have no means to guide the enforcement of the reactive
resource policy.</t>
      <t>There are several challenges with this metadata augmentation:</t>
      <ul spacing="normal">
        <li>
          <t>for hosts: which data to share without privacy breach or lowering confidentiality.</t>
        </li>
        <li>
          <t>for network elements:  </t>
          <ul spacing="normal">
            <li>
              <t>Deciding which metadata to trust</t>
            </li>
            <li>
              <t>Tradeoff between the extra cost (including processing) vs. expected benefits</t>
            </li>
            <li>
              <t>Impact on the network operations</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>The metadata signals from a content provider are more likely to be
authentic (if adequate authorization/validation are in place) but the metadata signals from other hosts may be "wrong",
undesired by the peer host, or maliciously contain improper metadata.
Attempts to automate identification of content providers have included
HTTP "Host" header inspection and TLS SNI inspection which are
expected to fail as encrypted SNI and privacy-enhancing proxies
become more prevalent. Another mechanism to authorize metadata
signals from a content provider is to configure the ISP equipment
with the content network's source IP addresses (or other labels that
may be visible on the packets) and provide a differentiated service
to the traffic that match these criteria. However, such an arrangement
may have scalability issues. An approach to mitigate these issues is to limit
the target contents networks and networks that would put in place these arrangements.
Such limitations would benefit large players (large ISPs and large content network) and
disadvantages small players (and new players).  A more egalitarian
approach would provide the same benefit to all parties -- large and
small -- and also provide richer signaling to further improve user
experience and metadata interoperability. This would allow all parties
to become part of the "Internet fast lane".</t>
      <t>The authorization problem exists with technologies as relatively
simple as DiffServ and the problem persists with many other
recently discussed metadata signaling mechanisms, including
embedding information in the UDP payload
(<xref target="I-D.trammell-plus-spec"/>), UDP options
(<xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>), overloading
the IPv6 Flow Label (<xref target="I-D.cc-v6ops-wlcg-flow-label-marking"/>,
and Hop-by-Hop Options.  One mechanism suggested occasionally is
to encrypt or integrity protect the metadata with a key; such a key
could be established using a signaling protocol, see <xref target="key"/>.</t>
      <t>There is some consensus that applications can benefit by collaborative signaling
the network (<xref target="IAB"/>, <xref target="ATIS"/>).  This document provides
use-cases to further detail the need of such signaling.</t>
    </section>
    <section anchor="scope-running-experiments">
      <name>Scope &amp; Running Experiments</name>
      <t>This document does not intend to define any signaling protocol
nor call whether a new signaling protocol, a new extension, one or more
signaling protocols are needed.</t>
      <t>However, this document provides a reference to digest the intended
benefits for enabling collaborating between hosts and networks. These
benefits are yet to be backed up with more evidence. Some experimental
work would be reasonable to be endorsed by the IETF to solicit more
feedback and collect assess the benefits under various setups.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <dl>
        <dt>Intentional Management:</dt>
        <dd>
          <t>network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>network reactions to congestion events, with very short to very long
durations  (e.g., varying wireless and mobile air
interface conditions).</t>
        </dd>
      </dl>
    </section>
    <section anchor="various-approaches-for-collaborative-signaling">
      <name>Various Approaches for Collaborative Signaling</name>
      <t><xref target="design-approaches"/> depicts examples of approaches to establish channels to convey
and share metadata between hosts, networks, and servers.</t>
      <t>Metadata exchanges can occur in one single direction or both directions of a flows.</t>
      <figure anchor="design-approaches">
        <name>Candidate Signaling Approaches</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="672" width="552" viewBox="0 0 552 672" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,112" fill="none" stroke="black"/>
              <path d="M 8,272 L 8,304" fill="none" stroke="black"/>
              <path d="M 8,512 L 8,544" fill="none" stroke="black"/>
              <path d="M 40,112 L 40,192" fill="none" stroke="black"/>
              <path d="M 40,304 L 40,432" fill="none" stroke="black"/>
              <path d="M 40,544 L 40,656" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,112" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,304" fill="none" stroke="black"/>
              <path d="M 64,512 L 64,544" fill="none" stroke="black"/>
              <path d="M 184,64 L 184,88" fill="none" stroke="black"/>
              <path d="M 184,104 L 184,112" fill="none" stroke="black"/>
              <path d="M 192,256 L 192,280" fill="none" stroke="black"/>
              <path d="M 192,296 L 192,304" fill="none" stroke="black"/>
              <path d="M 208,496 L 208,520" fill="none" stroke="black"/>
              <path d="M 208,536 L 208,544" fill="none" stroke="black"/>
              <path d="M 256,128 L 256,192" fill="none" stroke="black"/>
              <path d="M 264,320 L 264,336" fill="none" stroke="black"/>
              <path d="M 264,368 L 264,432" fill="none" stroke="black"/>
              <path d="M 280,560 L 280,624" fill="none" stroke="black"/>
              <path d="M 320,64 L 320,88" fill="none" stroke="black"/>
              <path d="M 320,104 L 320,112" fill="none" stroke="black"/>
              <path d="M 328,256 L 328,280" fill="none" stroke="black"/>
              <path d="M 328,296 L 328,304" fill="none" stroke="black"/>
              <path d="M 344,496 L 344,520" fill="none" stroke="black"/>
              <path d="M 344,536 L 344,544" fill="none" stroke="black"/>
              <path d="M 440,80 L 440,112" fill="none" stroke="black"/>
              <path d="M 440,272 L 440,304" fill="none" stroke="black"/>
              <path d="M 456,64 L 456,80" fill="none" stroke="black"/>
              <path d="M 456,256 L 456,272" fill="none" stroke="black"/>
              <path d="M 456,512 L 456,544" fill="none" stroke="black"/>
              <path d="M 472,48 L 472,64" fill="none" stroke="black"/>
              <path d="M 472,112 L 472,192" fill="none" stroke="black"/>
              <path d="M 472,240 L 472,256" fill="none" stroke="black"/>
              <path d="M 472,304 L 472,432" fill="none" stroke="black"/>
              <path d="M 472,496 L 472,512" fill="none" stroke="black"/>
              <path d="M 488,480 L 488,496" fill="none" stroke="black"/>
              <path d="M 488,544 L 488,656" fill="none" stroke="black"/>
              <path d="M 496,80 L 496,112" fill="none" stroke="black"/>
              <path d="M 496,272 L 496,304" fill="none" stroke="black"/>
              <path d="M 512,64 L 512,96" fill="none" stroke="black"/>
              <path d="M 512,256 L 512,288" fill="none" stroke="black"/>
              <path d="M 512,512 L 512,544" fill="none" stroke="black"/>
              <path d="M 520,368 L 520,384" fill="none" stroke="black"/>
              <path d="M 528,48 L 528,80" fill="none" stroke="black"/>
              <path d="M 528,240 L 528,272" fill="none" stroke="black"/>
              <path d="M 528,496 L 528,528" fill="none" stroke="black"/>
              <path d="M 544,480 L 544,512" fill="none" stroke="black"/>
              <path d="M 200,48 L 304,48" fill="none" stroke="black"/>
              <path d="M 472,48 L 528,48" fill="none" stroke="black"/>
              <path d="M 456,64 L 512,64" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 440,80 L 496,80" fill="none" stroke="black"/>
              <path d="M 512,80 L 528,80" fill="none" stroke="black"/>
              <path d="M 64,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 496,96 L 512,96" fill="none" stroke="black"/>
              <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
              <path d="M 440,112 L 496,112" fill="none" stroke="black"/>
              <path d="M 200,128 L 304,128" fill="none" stroke="black"/>
              <path d="M 48,158 L 72,158" fill="none" stroke="black"/>
              <path d="M 48,162 L 72,162" fill="none" stroke="black"/>
              <path d="M 224,158 L 248,158" fill="none" stroke="black"/>
              <path d="M 224,162 L 248,162" fill="none" stroke="black"/>
              <path d="M 264,158 L 288,158" fill="none" stroke="black"/>
              <path d="M 264,162 L 288,162" fill="none" stroke="black"/>
              <path d="M 440,158 L 464,158" fill="none" stroke="black"/>
              <path d="M 440,162 L 464,162" fill="none" stroke="black"/>
              <path d="M 208,240 L 312,240" fill="none" stroke="black"/>
              <path d="M 472,240 L 528,240" fill="none" stroke="black"/>
              <path d="M 456,256 L 512,256" fill="none" stroke="black"/>
              <path d="M 8,272 L 64,272" fill="none" stroke="black"/>
              <path d="M 440,272 L 496,272" fill="none" stroke="black"/>
              <path d="M 512,272 L 528,272" fill="none" stroke="black"/>
              <path d="M 64,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 496,288 L 512,288" fill="none" stroke="black"/>
              <path d="M 8,304 L 64,304" fill="none" stroke="black"/>
              <path d="M 440,304 L 496,304" fill="none" stroke="black"/>
              <path d="M 208,320 L 312,320" fill="none" stroke="black"/>
              <path d="M 48,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 464,352" fill="none" stroke="black"/>
              <path d="M 480,352 L 504,352" fill="none" stroke="black"/>
              <path d="M 48,400 L 64,400" fill="none" stroke="black"/>
              <path d="M 240,400 L 256,400" fill="none" stroke="black"/>
              <path d="M 272,400 L 312,400" fill="none" stroke="black"/>
              <path d="M 400,400 L 464,400" fill="none" stroke="black"/>
              <path d="M 480,400 L 504,400" fill="none" stroke="black"/>
              <path d="M 224,480 L 328,480" fill="none" stroke="black"/>
              <path d="M 488,480 L 544,480" fill="none" stroke="black"/>
              <path d="M 472,496 L 528,496" fill="none" stroke="black"/>
              <path d="M 8,512 L 64,512" fill="none" stroke="black"/>
              <path d="M 456,512 L 512,512" fill="none" stroke="black"/>
              <path d="M 528,512 L 544,512" fill="none" stroke="black"/>
              <path d="M 64,528 L 456,528" fill="none" stroke="black"/>
              <path d="M 512,528 L 528,528" fill="none" stroke="black"/>
              <path d="M 8,544 L 64,544" fill="none" stroke="black"/>
              <path d="M 456,544 L 512,544" fill="none" stroke="black"/>
              <path d="M 224,560 L 328,560" fill="none" stroke="black"/>
              <path d="M 48,592 L 120,592" fill="none" stroke="black"/>
              <path d="M 208,592 L 272,592" fill="none" stroke="black"/>
              <path d="M 48,638 L 64,638" fill="none" stroke="black"/>
              <path d="M 48,642 L 64,642" fill="none" stroke="black"/>
              <path d="M 464,638 L 480,638" fill="none" stroke="black"/>
              <path d="M 464,642 L 480,642" fill="none" stroke="black"/>
              <path d="M 200,48 C 191.16936,48 184,55.16936 184,64" fill="none" stroke="black"/>
              <path d="M 304,48 C 312.83064,48 320,55.16936 320,64" fill="none" stroke="black"/>
              <path d="M 200,128 C 191.16936,128 184,120.83064 184,112" fill="none" stroke="black"/>
              <path d="M 304,128 C 312.83064,128 320,120.83064 320,112" fill="none" stroke="black"/>
              <path d="M 208,240 C 199.16936,240 192,247.16936 192,256" fill="none" stroke="black"/>
              <path d="M 312,240 C 320.83064,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 208,320 C 199.16936,320 192,312.83064 192,304" fill="none" stroke="black"/>
              <path d="M 312,320 C 320.83064,320 328,312.83064 328,304" fill="none" stroke="black"/>
              <path d="M 504,352 C 512.83064,352 520,359.16936 520,368" fill="none" stroke="black"/>
              <path d="M 504,400 C 512.83064,400 520,392.83064 520,384" fill="none" stroke="black"/>
              <path d="M 224,480 C 215.16936,480 208,487.16936 208,496" fill="none" stroke="black"/>
              <path d="M 328,480 C 336.83064,480 344,487.16936 344,496" fill="none" stroke="black"/>
              <path d="M 224,560 C 215.16936,560 208,552.83064 208,544" fill="none" stroke="black"/>
              <path d="M 328,560 C 336.83064,560 344,552.83064 344,544" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,640 476,634.4 476,645.6" fill="black" transform="rotate(0,480,640)"/>
              <polygon class="arrowhead" points="488,400 476,394.4 476,405.6" fill="black" transform="rotate(180,480,400)"/>
              <polygon class="arrowhead" points="488,352 476,346.4 476,357.6" fill="black" transform="rotate(180,480,352)"/>
              <polygon class="arrowhead" points="472,400 460,394.4 460,405.6" fill="black" transform="rotate(0,464,400)"/>
              <polygon class="arrowhead" points="472,352 460,346.4 460,357.6" fill="black" transform="rotate(0,464,352)"/>
              <polygon class="arrowhead" points="472,160 460,154.4 460,165.6" fill="black" transform="rotate(0,464,160)"/>
              <path class="jump" d="M 344,536 C 338,536 338,520 344,520" fill="none" stroke="black"/>
              <path class="jump" d="M 328,296 C 322,296 322,280 328,280" fill="none" stroke="black"/>
              <path class="jump" d="M 320,104 C 314,104 314,88 320,88" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="280,592 268,586.4 268,597.6" fill="black" transform="rotate(0,272,592)"/>
              <polygon class="arrowhead" points="280,400 268,394.4 268,405.6" fill="black" transform="rotate(180,272,400)"/>
              <polygon class="arrowhead" points="272,160 260,154.4 260,165.6" fill="black" transform="rotate(180,264,160)"/>
              <polygon class="arrowhead" points="264,400 252,394.4 252,405.6" fill="black" transform="rotate(0,256,400)"/>
              <polygon class="arrowhead" points="256,160 244,154.4 244,165.6" fill="black" transform="rotate(0,248,160)"/>
              <path class="jump" d="M 208,536 C 214,536 214,520 208,520" fill="none" stroke="black"/>
              <path class="jump" d="M 192,296 C 198,296 198,280 192,280" fill="none" stroke="black"/>
              <path class="jump" d="M 184,104 C 190,104 190,88 184,88" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="56,640 44,634.4 44,645.6" fill="black" transform="rotate(180,48,640)"/>
              <polygon class="arrowhead" points="56,592 44,586.4 44,597.6" fill="black" transform="rotate(180,48,592)"/>
              <polygon class="arrowhead" points="56,400 44,394.4 44,405.6" fill="black" transform="rotate(180,48,400)"/>
              <polygon class="arrowhead" points="56,352 44,346.4 44,357.6" fill="black" transform="rotate(180,48,352)"/>
              <polygon class="arrowhead" points="56,160 44,154.4 44,165.6" fill="black" transform="rotate(180,48,160)"/>
              <g class="text">
                <text x="16" y="36">(1)</text>
                <text x="72" y="36">Proxied</text>
                <text x="148" y="36">Connection</text>
                <text x="252" y="84">Network(s)</text>
                <text x="36" y="100">Client</text>
                <text x="468" y="100">Server</text>
                <text x="92" y="164">User</text>
                <text x="168" y="164">Data+Metadata</text>
                <text x="308" y="164">User</text>
                <text x="384" y="164">Data+Metadata</text>
                <text x="92" y="180">Secure</text>
                <text x="164" y="180">Connection</text>
                <text x="216" y="180">1</text>
                <text x="308" y="180">Secure</text>
                <text x="380" y="180">Connection</text>
                <text x="432" y="180">2</text>
                <text x="16" y="228">(2)</text>
                <text x="88" y="228">Out-of-band</text>
                <text x="172" y="228">Metadata</text>
                <text x="240" y="228">Sharing</text>
                <text x="260" y="276">Network(s)</text>
                <text x="36" y="292">Client</text>
                <text x="468" y="292">Server</text>
                <text x="132" y="356">End-to-End</text>
                <text x="204" y="356">Secure</text>
                <text x="276" y="356">Connection</text>
                <text x="328" y="356">+</text>
                <text x="356" y="356">User</text>
                <text x="396" y="356">Data</text>
                <text x="500" y="372">GLUE</text>
                <text x="496" y="388">CXs</text>
                <text x="108" y="404">Metadata</text>
                <text x="188" y="404">(Optional)</text>
                <text x="356" y="404">Metadata</text>
                <text x="100" y="420">Secure</text>
                <text x="172" y="420">Connection</text>
                <text x="224" y="420">1</text>
                <text x="324" y="420">Secure</text>
                <text x="396" y="420">Connection</text>
                <text x="448" y="420">2</text>
                <text x="16" y="468">(3)</text>
                <text x="100" y="468">Client-centric</text>
                <text x="196" y="468">Metadata</text>
                <text x="264" y="468">Sharing</text>
                <text x="276" y="516">Network(s)</text>
                <text x="36" y="532">Client</text>
                <text x="484" y="532">Server</text>
                <text x="164" y="596">Metadata</text>
                <text x="132" y="612">Secure</text>
                <text x="204" y="612">Connection</text>
                <text x="116" y="644">End-to-End</text>
                <text x="188" y="644">Secure</text>
                <text x="260" y="644">Connection</text>
                <text x="324" y="644">User</text>
                <text x="400" y="644">Data+Metadata</text>
                <text x="280" y="660">|</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
(1)  Proxied Connection
                       .--------------.                   +------+
                      |                |                +-+----+ |
+------+              |   Network(s)   |              +-+----+ +-+
|Client+--------------)----------------(--------------+Server+-+
+---+--+              |                |              +---+--+
    |                  '-------+------'                   |
    |                          |                          |
    +<===User Data+Metadata===>+<===User Data+Metadata===>+
    |   Secure Connection 1    |   Secure Connection 2    |
    |                          |                          |

(2)  Out-of-band Metadata Sharing
                        .--------------.                  +------+
                       |                |               +-+----+ |
+------+               |   Network(s)   |             +-+----+ +-+
|Client+---------------)----------------(-------------+Server+-+
+---+--+               |                |             +---+--+
    |                   '-------+------'                  |
    |                           |                         |
    +<-----End-to-End Secure Connection + User Data------>+<---.
    |                           |                         | GLUE|
    |                           |                         | CXs |
    +<-- Metadata (Optional) -->+<----- Metadata -------->+<---'
    |    Secure Connection 1    |    Secure Connection 2  |
    |                           |                         |

(3)  Client-centric Metadata Sharing
                          .--------------.                  +------+
                         |                |               +-+----+ |
+------+                 |   Network(s)   |             +-+----+ +-+
|Client+-----------------)----------------(-------------+Server+-+
+---+--+                 |                |             +---+--+
    |                     '-------+------'                  |
    |                             |                         |
    +<--------- Metadata -------->+                         |
    |        Secure Connection    |                         |
    |                             |                         |
    +<== End-to-End Secure Connection User Data+Metadata ==>+
    |                             |                         |
]]></artwork>
        </artset>
      </figure>
      <t>The client-centric metadata sharing approach because it preserves privacy and also
takes advantage of clients having a full view on their available network attachments.</t>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <section anchor="generic-cases">
        <name>Generic Cases</name>
        <section anchor="priority-between-flows-inter-flow-of-the-same-host">
          <name>Priority Between Flows (Inter-Flow) of The Same Host</name>
          <t>Certain flows being received by a host (or by an application on a host) are less or more important than other
flows of <strong>the same host</strong>.  For example, a host downloading a software update is generally considered less important
than another host doing interactive audio/video or gaming.  By signaling the relative importance
of flows to a network element, the network element can (de-)prioritize
those flows to best accomodate the needs of the various applications (on a same host) and
between hosts on a network.</t>
        </section>
        <section anchor="priority-within-a-flow-intra-flow">
          <name>Priority Within a Flow (Intra-Flow)</name>
          <t>Interactive Audio/Video has long been using <xref target="RTP"/> which
runs over UDP.  As described in <xref section="2.3.7.2" sectionFormat="of" target="RFC7478"/>, there
is value in differentiating between voice, video and data.  Today's
video streaming is exclusively over TCP but will migrate to QUIC and
eventually is likely to support unreliable transport (<xref target="RFC9221"/>,
<xref target="I-D.kpugin-rush"/>).  With unreliable transport of video in
RTP or QUIC, it is beneficial to differentiate the important video
keyframes from other video frames.  Other applications such as gaming
and remote desktop also benefit from differentiating their packets to
the network.</t>
          <t>Many of these flows do not originate from a content provider's network.
Thus, the flows originate from an IP address that is not known before
connection establishment, so there needs to be a way for the client
to authorize the network elements to receive and hopefully to honor the metadata of those
packets.</t>
        </section>
      </section>
      <section anchor="detailed-use-cases">
        <name>Detailed Use Cases</name>
        <section anchor="example-video-streaming">
          <name>Video Streaming</name>
          <t>Streaming video contains the occasional key frame ("i-frame")
containing a full video frame.  These are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
          <t>Streaming video also contains audio frames which can be encoded
separately and thus can be signaled separately.  Audio is more
critical than video for almost all applications, but its importance
(relative to other packets in the flow) is still an application decision.  In the example below, the audio
is more important than video (importance=high, PT=keep, RU=reliable), video key frames
have middle importance (importance=low, PT=discard, RU=reliable), and both types
of video delta frames (P-frame and B-frame) have least importance (importance=low, PT=discard, RU=unreliable).</t>
          <t>Video Streaming Metadata:</t>
          <t>Based on metadata types listed in the <xref target="I-D.rwbr-sconepro-flow-metadata"/>, the host to network metadata parameters for video streaming type is given below.</t>
          <table anchor="_table-video-streaming">
            <name>Example Values for Video Streaming Metadata</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video I-frame (key frame)</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta P-frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">video delta B-frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="interactive-media">
          <name>Interactive Media</name>
          <t>Examples: VoIP, gaming.</t>
          <t>Requirement:  Signal the flow needs low jitter and low delay. However, the network can only provide
a limited amount of low jitter/low delay to each host, maybe as few as one. This requires signaling
feedback indicating that low jitter and low delay flows are already subscribed to other hosts. In
response, the user and the application will likely continue, occasionally re-attempting to get the
desired quality of service from the network.</t>
          <t>In many scenarios a game or VoIP application will want to signal different
metadata for the same type of packet in each direction.  For example, for
a game, video in the server-to-client direction might be more important
than audio, whereas input devices (e.g., keystrokes) might be more important
than audio.</t>
          <t>Both gaming (video in both directions, audio in both directions, input
devices from client to server) and interactive audio/video (VoIP,
video conference) involves important traffic in both directions --
thus is a slightly more complicated use-case than the previous
example.  Additionally, most Internet service providers constrain
upstream bandwidth so proper packet treatment is critical in the
upstream direction.</t>
          <t>Metadata:</t>
          <t>Based on metadata types listed in the <xref target="I-D.rwbr-sconepro-flow-metadata"/>, the host to network metadata parameters for interactive media type is given below.</t>
          <t>Interactive A/V, downstream Metadata:</t>
          <table anchor="_table-interactive-av-downstream">
            <name>Example Values for Interactive A/V, downstream</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video key frame</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
          <table anchor="_table-video-av-upstream">
            <name>Example Values for Interactive A/V, upstream</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video key frame</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
          <t>Many interactive audio/video applications also support sharing the presenter's
screen, file, video, or pictures.  During this sharing the presenter's video
is less important but the screen or picture is more important.  This change
of imporance can be conveyed in metadata to the network, as in the table
below:</t>
          <t>Interactive A/V, upstream Metadata:</t>
          <table anchor="_table-video-av-sharing">
            <name>Example Values for Interactive A/V with picture sharing, upstream</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video key frame</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">picture sharing</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
          <t>In many scenarios a game or VoIP application will want to signal different
metadata for the same type of packet in each direction.  For example, for
a game, video in the server-to-client direction might be more important
than audio, whereas input devices (e.g., keystrokes) might be more important
than audio.</t>
          <t>Todo: this section on cooperation needs editing.</t>
        </section>
        <section anchor="bulk-data-transfer">
          <name>Bulk Data Transfer</name>
          <t>Examples: backup/restore, software update, RSS feed update, email, printing to a print server</t>
          <t>Requirement: Signal the flow as below best-effort.</t>
          <t>Metadata:</t>
          <table>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
                <th align="center">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">File copy</td>
                <td align="center">low</td>
                <td align="center">bulk</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Printing</td>
                <td align="center">high</td>
                <td align="center">bulk</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="mixed-traffic">
          <name>Mixed Traffic</name>
          <t>Examples: Desktop Virtualization, Office software in the cloud (editing local files, typing is interactive while save operation is bulk transfer)</t>
          <t>Requirement: Signal flow will vary depending on the nature of the packet. With variety of traffic going through the session, some packets can contain interactive traffic while the others contain bulk transfer. There can be combination of reliable and unreliable traffic within the same session through multiple streams. Host-to-network signaling plays a vital role in effectively routing mixed traffic for ideal user interactivity and network performance.</t>
          <t>Example packet metadata for Desktop Virtualization (like Citrix
Virtual Apps and Desktops - CVAD) application.  This is shown in two
tables, client-to-server traffic (<xref target="_table-desktop-virtualization-c2s"/>)
and server-to-client traffic (<xref target="_table-desktop-virtualization-s2c"/>).</t>
          <t>Remote Desktop Virtualization Metadata:</t>
          <t>Based on metadata types listed in the <xref target="I-D.rwbr-sconepro-flow-metadata"/>, the host to network metadata parameters for remote desktop virtualization type is given below.</t>
          <table anchor="_table-desktop-virtualization-c2s">
            <name>Example Values for Remote Desktop Virtualization Metadata, client to server</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
                <th align="center">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">User typing</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Mouse click/End Position</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center">The start and endpoint of the pointer movement is vital to ensure user action is completed correctly. So, the endpoints have to be reliably transmitted with real-time priority. **</td>
              </tr>
              <tr>
                <td align="center">Interactive audio</td>
                <td align="center">high</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Authentication - Finger print, smart card</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Interactive video key frame</td>
                <td align="center">low</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center">Video key frames form the base frames of a video upon which the next 'n' timeframe of video updates is applied on. These frames, are hence, critical and without them, the video would not be coherent until the next critical frame is received. Retransmits of these are harmful to the UX. ***</td>
              </tr>
              <tr>
                <td align="center">Mouse position tracking</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center">When the pointer is moved from one point to another, the coordinates of the pointers between the two points can be lost without much of an impact to the UX as long as the start and endpoint reaches. This would ensure the user action is completed, even if the experience seems glitchy.</td>
              </tr>
              <tr>
                <td align="center">Interactive video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center"> </td>
              </tr>
            </tbody>
          </table>
          <table anchor="_table-desktop-virtualization-s2c">
            <name>Example Values for Remote Desktop Virtualization Metadata, server to client</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
                <th align="center">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">Glyph critical</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center">The frames that form the base for the image is more critical and needs to be transmitted as reliably as possible. Retransmits of these are harmful to the UX.**</td>
              </tr>
              <tr>
                <td align="center">Interactive (or streaming) audio</td>
                <td align="center">high</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Haptic feedback</td>
                <td align="center">high</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center">Virtualizing haptic feedback is real-time and high importance although the feedback being delivered late is of no use. So dropping the packet altogether and not retransmitting it makes more sense</td>
              </tr>
              <tr>
                <td align="center">Interactive (or streaming) video key frame</td>
                <td align="center">low</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center">Video key frames form the base frames of a video upon which the next 'n' timeframe of video updates is applied on. These frames, are hence, critical and without them, the video would not be coherent until the next critical frame is received. Retransmits of these are harmful to the UX. ***</td>
              </tr>
              <tr>
                <td align="center">File copy</td>
                <td align="center">low</td>
                <td align="center">bulk</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Interactive (or streaming) video predictive frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center">Video predictive frames can be lost, which would result in minor glitch but not compromise the user activity and video would still be coherent and useful. The reception of subsequent video key frame would mitigate the loss in quality caused by lost predictive frames.</td>
              </tr>
              <tr>
                <td align="center">Glyph smoothing</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">Unreliable</td>
                <td align="center">The smoothing elements of the glyph can be lost and would still present a recognizable image, although with a lesser quality. Hence, these can be marked as loss tolerant as the user action is still completed with a small compromise to the UX. Moreover, with the reception of the next glyph critical frame would mitigate the loss in quality caused by lost glyph smoothing elements.</td>
              </tr>
            </tbody>
          </table>
          <t>*** A video key frame should be handled differently by the network
depending on a streaming application versus a remote desktop
application.  The video streaming application's primary and only
nature of traffic is video and audio.  In contrast, a remote desktop
application might be playing a video and its associated audio while at
the same time the user is editing a document.  The user's keystrokes
and those glyphs need to be prioritized over the video lest the user
think their inputs are being ignored (and type the same characters
again). Hence, the values are different even for the same nature of
traffic but a different application.</t>
        </section>
        <section anchor="assisted-offload">
          <name>Assisted Offload</name>
          <t>There are  cases (crisis) where "normal" network
resources cannot be used at maximum and, thus, a network would seek to
reduce or offload some of the traffic during these events -- often
called 'reactive traffic policy'. An example of such sue case is cellular networks
that are overly used (and radio resources exhausted) while alternative network
attachment networks are available to host.</t>
          <t>Network-to-host signals are
useful to put in place adequate traffic distribution policies (e.g.,
prefer the use of alternate paths, offload a network).</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="abuse-and-constraints">
        <name>Abuse and Constraints</name>
        <t>It is important that not every flow be prioritized; otherwise, the
network devolves into the best-effort network that existed prior to
metadata signaling. It is a requirement that mechanisms exist to
prevent this occurrence.</t>
        <t>Such a mechanism might be simple, for example, a
cellular network might allow one flow from a subscriber to declare
itself as important; other flows with that subscriber are denied
attempts to prioritize themselves.  The mechanism might be more
complex where authentication and authorization is performed by an
enterprise network which, itself, decides which flows are important
based on its policy and only the enterprise network communicates flow
priorities to the ISP network.  The enterprise might prioritize
certain users (e.g., IT staff), certain equipment (audio/video
equipment in a conference room), or whatever its policies it might
want.</t>
      </section>
      <section anchor="key">
        <name>Key Establishment</name>
        <t>Various proposals have suggested establishing a key to validate
per-packet metadata or to decrypt per-packet metadata.  However, most
proposals have not specified how this key would be established. A
signaling protocol from the receiving host to its ISP could establish
such a key. The host can then convey the key to the sending host to
use to integrity protect or encrypt the per-packet metadata.</t>
        <ul empty="true">
          <li>
            <t>Note: The CPU overhead of validating or decrypting such per-packet metadata
needs to be carefully considered (and further assessed via experiments) by the signaling protocol proposing such
keying. Also, the required operational setup should be documented.</t>
          </li>
        </ul>
      </section>
      <section anchor="metadata-versioncapability-exchange">
        <name>Metadata Version/Capability Exchange</name>
        <t>The sender has to convey metadata in a way that is understood by the
various network elements on the path -- each of which might be
operated by different entities and have different capabilities.  For
example, the Wi-Fi access point might be operated by an enterprise
network, hotel, or home user, whereas the upstream router is operated by
the ISP.  Each of those might support different versions of the same
metadata, or might need the metadata expressed in different ways.</t>
        <t>The signaling protocol would provide a way to learn the needs of those
networks, and provide metadata signaling satisfying most or all of their
needs.</t>
      </section>
      <section anchor="on-the-use-of-fast-path">
        <name>On the Use of Fast Path</name>
        <t>TBC</t>
      </section>
      <section anchor="impacts-of-nested-congestion-controls">
        <name>Impacts of Nested Congestion Controls</name>
        <t>TBC</t>
      </section>
    </section>
    <section anchor="requirements-summary">
      <name>Requirements Summary</name>
      <t>TODO summary.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ATIS" target="https://access.atis.org/higherlogic/ws/public/download/72240">
        <front>
          <title>Content Classification for Traffic Optimization</title>
          <author>
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="I-D.trammell-plus-spec">
        <front>
          <title>Path Layer UDP Substrate Specification</title>
          <author fullname="Brian Trammell" initials="B." surname="Trammell">
            <organization>ETH Zurich</organization>
          </author>
          <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
            <organization>ETH Zurich</organization>
          </author>
          <date day="13" month="March" year="2017"/>
          <abstract>
            <t>   This document specifies a common Path Layer UDP Substrate (PLUS) wire
   image for encrypted transport protocols carried over UDP.  The base
   PLUS header carries information for driving a minimal state machine
   at middleboxes described in [I-D.trammell-plus-statefulness], and
   provides optional exposure of additional information to devices along
   the path using the mechanism described in
   [I-D.trammell-plus-abstract-mech].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-trammell-plus-spec-01"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="14" month="February" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
      </reference>
      <reference anchor="I-D.cc-v6ops-wlcg-flow-label-marking">
        <front>
          <title>Use of the IPv6 Flow Label for WLCG Packet Marking</title>
          <author fullname="Dale W. Carder" initials="D. W." surname="Carder">
            <organization>Energy Sciences Network</organization>
          </author>
          <author fullname="Tim Chown" initials="T." surname="Chown">
            <organization>Jisc</organization>
          </author>
          <author fullname="Shawn McKee" initials="S." surname="McKee">
            <organization>University of Michigan</organization>
          </author>
          <author fullname="Marian Babik" initials="M." surname="Babik">
            <organization>CERN</organization>
          </author>
          <date day="10" month="July" year="2023"/>
          <abstract>
            <t>   This document describes an experimentally deployed approach currently
   used within the Worldwide Large Hadron Collider Computing Grid (WLCG)
   to mark packets with their project (experiment) and application.  The
   marking uses the 20-bit IPv6 Flow Label in each packet, with 15 bits
   used for semantics (community and activity) and 5 bits for entropy.
   Alternatives, in particular use of IPv6 Extension Headers (EH), were
   considered but found to not be practical.  The WLCG is one of the
   largest worldwide research communities and has adopted IPv6 heavily
   for movement of many hundreds of PB of data annually, with the
   ultimate goal of running IPv6 only.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cc-v6ops-wlcg-flow-label-marking-02"/>
      </reference>
      <reference anchor="IAB">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RTP">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.kpugin-rush">
        <front>
          <title>RUSH - Reliable (unreliable) streaming protocol</title>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Facebook</organization>
          </author>
          <author fullname="Alan Frindell" initials="A." surname="Frindell">
            <organization>Facebook</organization>
          </author>
          <author fullname="Jorge Cenzano Ferret" initials="J. C." surname="Ferret">
            <organization>Facebook</organization>
          </author>
          <author fullname="Jake Weissman" initials="J." surname="Weissman">
            <organization>Facebook</organization>
          </author>
          <date day="10" month="May" year="2023"/>
          <abstract>
            <t>   RUSH is an application-level protocol for ingesting live video.  This
   document describes the protocol and how it maps onto QUIC.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the mailing list (), which
   is archived at .

   Source for this draft and an issue tracker can be found at
   https://github.com/afrind/draft-rush.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kpugin-rush-02"/>
      </reference>
      <reference anchor="I-D.rwbr-sconepro-flow-metadata">
        <front>
          <title>Flow Metadata for Collaborative Host/Network Signaling</title>
          <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Dan Wing" initials="D." surname="Wing">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines per-flow and per-packet metadata for both
   network-to-host and host-to-network signaling in Concise Data
   Definition Language (CDDL) which expresses both CBOR and JSON.  The
   common metadata definition allows interworking between signaling
   protocols with high fidelity.  The metadata is also self- describing
   to improve interpretation by network elements and endpoints while
   reducing the need for version negotiation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rwbr-sconepro-flow-metadata-00"/>
      </reference>
    </references>
    <?line 523?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
