<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rwbr-tsvwg-signaling-use-cases-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Host to Network Signaling: Use Cases">Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
    <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="17"/>
    <area>Web and Internet Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>user experience</keyword>
    <keyword>bandwidth</keyword>
    <keyword>priority</keyword>
    <keyword>enriched feedback</keyword>
    <keyword>media streaming</keyword>
    <keyword>realtime media</keyword>
    <keyword>QoS</keyword>
    <keyword>5G</keyword>
    <keyword>Wi-Fi</keyword>
    <keyword>WiFi</keyword>
    <keyword>diffserv</keyword>
    <abstract>
      <?line 70?>

<t>Host-to-network (and vice versa) signaling can improve the user experience by informing
the network which flows are more important and which packets within a
flow are more important without having to disclose the content of the packets being delivered. The differentiated service may be provided
at the network (e.g., packet discard preference), the sender (e.g.,
adaptive transmission or session migration), or through cooperation of both the host
and the network.</t>
      <t>This document lists use cases demonstrating the need for a mechanism
to share metadata about flows between a receiving host and its networks
to enable differentiated traffic treatment for packets sent to the
host. Such a mechanism is typically implemented using a signaling
protocol between the host and a set of network elements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/signaling-use-cases/draft-wing-tsvwg-signaling-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rwbr-tsvwg-signaling-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport and Services Working Group Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/signaling-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 85?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Bandwidth constraints exist most predominantly at the access network (e.g., radio access networks).
Users who are serviced via these networks use various hosts which run various
applications; each having different connectivity needs for an optimal user
experience. These needs are not frozen but change over time
depending on the application and even depending on how an application
is used (e.g., user's preferences).</t>
      <t>The simple network diagram below shows where such bandwidth and
performance constraints usually exist with a "B" (for Bottleneck).
Other network bottlenecks may be experienced in other segments not shown
in the figure, such as interconnection links or the infrastructure that hosts the service (e.g.,
flash crowds).  When a bottleneck exists temporarily, the network has no choice but
to discard or delay packets -- which can harm certain flows and thus lead to suboptimal perceived experience.  In this
document, this is termed 'reactive policy'.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="520" viewBox="0 0 520 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,48 L 8,80" fill="none" stroke="black"/>
            <path d="M 48,48 L 48,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
            <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
            <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
            <path d="M 176,80 L 176,128" fill="none" stroke="black"/>
            <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
            <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,48 L 280,80" fill="none" stroke="black"/>
            <path d="M 336,48 L 336,80" fill="none" stroke="black"/>
            <path d="M 352,32 L 352,56" fill="none" stroke="black"/>
            <path d="M 352,72 L 352,128" fill="none" stroke="black"/>
            <path d="M 368,48 L 368,80" fill="none" stroke="black"/>
            <path d="M 424,48 L 424,80" fill="none" stroke="black"/>
            <path d="M 440,32 L 440,56" fill="none" stroke="black"/>
            <path d="M 440,72 L 440,128" fill="none" stroke="black"/>
            <path d="M 456,48 L 456,80" fill="none" stroke="black"/>
            <path d="M 496,48 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 152,32" fill="none" stroke="black"/>
            <path d="M 8,48 L 48,48" fill="none" stroke="black"/>
            <path d="M 200,48 L 256,48" fill="none" stroke="black"/>
            <path d="M 280,48 L 336,48" fill="none" stroke="black"/>
            <path d="M 368,48 L 424,48" fill="none" stroke="black"/>
            <path d="M 456,48 L 496,48" fill="none" stroke="black"/>
            <path d="M 48,64 L 64,64" fill="none" stroke="black"/>
            <path d="M 80,64 L 96,64" fill="none" stroke="black"/>
            <path d="M 152,64 L 168,64" fill="none" stroke="black"/>
            <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
            <path d="M 256,64 L 280,64" fill="none" stroke="black"/>
            <path d="M 336,64 L 368,64" fill="none" stroke="black"/>
            <path d="M 424,64 L 456,64" fill="none" stroke="black"/>
            <path d="M 8,80 L 48,80" fill="none" stroke="black"/>
            <path d="M 200,80 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,80 L 336,80" fill="none" stroke="black"/>
            <path d="M 368,80 L 424,80" fill="none" stroke="black"/>
            <path d="M 456,80 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,96 L 152,96" fill="none" stroke="black"/>
            <g class="text">
              <text x="116" y="52">WLAN</text>
              <text x="28" y="68">host</text>
              <text x="72" y="68">B</text>
              <text x="124" y="68">access</text>
              <text x="176" y="68">B</text>
              <text x="228" y="68">router</text>
              <text x="308" y="68">router</text>
              <text x="396" y="68">router</text>
              <text x="476" y="68">host</text>
              <text x="120" y="84">point</text>
              <text x="392" y="116">Transit</text>
              <text x="488" y="116">Content</text>
              <text x="44" y="132">User</text>
              <text x="96" y="132">Network</text>
              <text x="224" y="132">ISP</text>
              <text x="272" y="132">Network</text>
              <text x="392" y="132">Network</text>
              <text x="488" y="132">Network</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
           +------+  |                     |          |
+----+     |WLAN  |  |  +------+  +------+ | +------+ | +----+
|host+--B--+access+--B--+router+--+router+---+router+---+host|
+----+     |point |  |  +------+  +------+ | +------+ | +----+
           +------+  |                     |          |
                     |                     | Transit  |  Content
   User Network      |    ISP Network      | Network  |  Network
]]></artwork>
      </artset>
      <t>Complications that are induced by such phenomena may be eliminated by
adequate dimensioning and upgrades. However, such upgrades may not
be always immediately possible or economically justified.</t>
      <t>Complementary mitigations are thus needed to soften these complications
by introducing some collaboration between a host and its networks to adjust
their behaviors.</t>
      <t>For traffic sent in either direction, the network network elements
that terminate a bandwidth constraining link (or located few hops next to that element) can be fed
with flow metadata. Such augmentation allows those network elements
to make autonomous decisions to prioritize, delay, or drop packets,
especially when performing reactive resource management. Absent such metadata,
these network elements have no guidance and treat packets indiscriminately.</t>
      <t>There are several challenges with this metadata augmentation:</t>
      <ul spacing="normal">
        <li>
          <t>for hosts:
          </t>
          <ul spacing="normal">
            <li>
              <t>which data to share without privacy breach or lowering confidentiality.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>for network elements:
          </t>
          <ul spacing="normal">
            <li>
              <t>Which metadata to honor</t>
            </li>
            <li>
              <t>Tradeoff between the extra cost (including processing) versus benefits</t>
            </li>
            <li>
              <t>Operational impacts</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Configured cooperation between an ISP and content providers (via contractual agreements, typically) can allows
metadata signals augmenting packets to be honored by the ISP.  This
cooperation has historically involved examination of server IP
address, TLS SNI, AS number, or heuristics to identify flows.
However, this cooperation might have scalability issues (e.g., ISPs to establish and maintain agreements with a large number of content providers), operational implications as the network configuration will rely on service-specific (e.g., risk of frozen or stale configuration), mismatch between the expected service level from users and the delivered one, etc.
Moreover, smaller ISPs, small content providers, and new content providers are harmed.</t>
      <t>A more egalitarian approach provides the same benefit to parties --
large and small -- and also provide richer signaling to further
improve user experience and metadata interoperability. This allows all
parties, big and small, to request the network differentiate a flow,
improving the Internet for end users per <xref target="RFC8890"/>.</t>
      <t>Rather than relying on configured cooperation between ISPs and
content providers, this document shows use cases where the client
tells its ISP the importance of packets it is receiving.  This
provides several benefits described in later sections.</t>
      <t>There is already some consensus that applications can benefit by collaborative signaling
the network (<xref target="IAB"/>, <xref target="ATIS"/>).  This document provides
use cases to further detail the need of such signaling and highlights
the value of the receiving host signaling to its network about flows
being sent to the host.</t>
    </section>
    <section anchor="scope-running-experiments">
      <name>Scope &amp; Running Experiments</name>
      <t>This document does not intend to define any signaling protocol
nor call whether a new signaling protocol, a new extension, one or more
signaling protocols are needed.</t>
      <t>However, this document provides a reference to digest the intended
benefits for enabling collaborating of a host and its networks. These
benefits are yet to be backed up with more evidence. Some experimental
work would be reasonable to be endorsed by the IETF to solicit more
feedback and collect assess the benefits under various setups.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <dl>
        <dt>Intentional Management:</dt>
        <dd>
          <t>network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>network reactions to congestion events, with very short to very long
durations  (e.g., varying wireless and mobile air
interface conditions).</t>
        </dd>
      </dl>
    </section>
    <section anchor="various-approaches-for-collaborative-signaling">
      <name>Various Approaches for Collaborative Signaling</name>
      <t><xref target="design-approaches"/> depicts examples of approaches to establish channels to convey
and share metadata between a host, its networks, and the servers.</t>
      <t>Metadata exchanges can occur in one single direction or both directions of a flows.</t>
      <figure anchor="design-approaches">
        <name>Candidate Signaling Approaches</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="672" width="552" viewBox="0 0 552 672" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,112" fill="none" stroke="black"/>
              <path d="M 8,272 L 8,304" fill="none" stroke="black"/>
              <path d="M 8,512 L 8,544" fill="none" stroke="black"/>
              <path d="M 40,112 L 40,192" fill="none" stroke="black"/>
              <path d="M 40,304 L 40,432" fill="none" stroke="black"/>
              <path d="M 40,544 L 40,656" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,112" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,304" fill="none" stroke="black"/>
              <path d="M 64,512 L 64,544" fill="none" stroke="black"/>
              <path d="M 184,64 L 184,88" fill="none" stroke="black"/>
              <path d="M 184,104 L 184,112" fill="none" stroke="black"/>
              <path d="M 192,256 L 192,280" fill="none" stroke="black"/>
              <path d="M 192,296 L 192,304" fill="none" stroke="black"/>
              <path d="M 208,496 L 208,520" fill="none" stroke="black"/>
              <path d="M 208,536 L 208,544" fill="none" stroke="black"/>
              <path d="M 256,128 L 256,192" fill="none" stroke="black"/>
              <path d="M 264,320 L 264,336" fill="none" stroke="black"/>
              <path d="M 264,368 L 264,432" fill="none" stroke="black"/>
              <path d="M 280,560 L 280,624" fill="none" stroke="black"/>
              <path d="M 320,64 L 320,88" fill="none" stroke="black"/>
              <path d="M 320,104 L 320,112" fill="none" stroke="black"/>
              <path d="M 328,256 L 328,280" fill="none" stroke="black"/>
              <path d="M 328,296 L 328,304" fill="none" stroke="black"/>
              <path d="M 344,496 L 344,520" fill="none" stroke="black"/>
              <path d="M 344,536 L 344,544" fill="none" stroke="black"/>
              <path d="M 440,80 L 440,112" fill="none" stroke="black"/>
              <path d="M 440,272 L 440,304" fill="none" stroke="black"/>
              <path d="M 456,64 L 456,80" fill="none" stroke="black"/>
              <path d="M 456,256 L 456,272" fill="none" stroke="black"/>
              <path d="M 456,512 L 456,544" fill="none" stroke="black"/>
              <path d="M 472,48 L 472,64" fill="none" stroke="black"/>
              <path d="M 472,112 L 472,192" fill="none" stroke="black"/>
              <path d="M 472,240 L 472,256" fill="none" stroke="black"/>
              <path d="M 472,304 L 472,432" fill="none" stroke="black"/>
              <path d="M 472,496 L 472,512" fill="none" stroke="black"/>
              <path d="M 488,480 L 488,496" fill="none" stroke="black"/>
              <path d="M 488,544 L 488,656" fill="none" stroke="black"/>
              <path d="M 496,80 L 496,112" fill="none" stroke="black"/>
              <path d="M 496,272 L 496,304" fill="none" stroke="black"/>
              <path d="M 512,64 L 512,96" fill="none" stroke="black"/>
              <path d="M 512,256 L 512,288" fill="none" stroke="black"/>
              <path d="M 512,512 L 512,544" fill="none" stroke="black"/>
              <path d="M 520,368 L 520,384" fill="none" stroke="black"/>
              <path d="M 528,48 L 528,80" fill="none" stroke="black"/>
              <path d="M 528,240 L 528,272" fill="none" stroke="black"/>
              <path d="M 528,496 L 528,528" fill="none" stroke="black"/>
              <path d="M 544,480 L 544,512" fill="none" stroke="black"/>
              <path d="M 200,48 L 304,48" fill="none" stroke="black"/>
              <path d="M 472,48 L 528,48" fill="none" stroke="black"/>
              <path d="M 456,64 L 512,64" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 440,80 L 496,80" fill="none" stroke="black"/>
              <path d="M 512,80 L 528,80" fill="none" stroke="black"/>
              <path d="M 64,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 496,96 L 512,96" fill="none" stroke="black"/>
              <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
              <path d="M 440,112 L 496,112" fill="none" stroke="black"/>
              <path d="M 200,128 L 304,128" fill="none" stroke="black"/>
              <path d="M 48,158 L 72,158" fill="none" stroke="black"/>
              <path d="M 48,162 L 72,162" fill="none" stroke="black"/>
              <path d="M 224,158 L 248,158" fill="none" stroke="black"/>
              <path d="M 224,162 L 248,162" fill="none" stroke="black"/>
              <path d="M 264,158 L 288,158" fill="none" stroke="black"/>
              <path d="M 264,162 L 288,162" fill="none" stroke="black"/>
              <path d="M 440,158 L 464,158" fill="none" stroke="black"/>
              <path d="M 440,162 L 464,162" fill="none" stroke="black"/>
              <path d="M 208,240 L 312,240" fill="none" stroke="black"/>
              <path d="M 472,240 L 528,240" fill="none" stroke="black"/>
              <path d="M 456,256 L 512,256" fill="none" stroke="black"/>
              <path d="M 8,272 L 64,272" fill="none" stroke="black"/>
              <path d="M 440,272 L 496,272" fill="none" stroke="black"/>
              <path d="M 512,272 L 528,272" fill="none" stroke="black"/>
              <path d="M 64,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 496,288 L 512,288" fill="none" stroke="black"/>
              <path d="M 8,304 L 64,304" fill="none" stroke="black"/>
              <path d="M 440,304 L 496,304" fill="none" stroke="black"/>
              <path d="M 208,320 L 312,320" fill="none" stroke="black"/>
              <path d="M 48,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 464,352" fill="none" stroke="black"/>
              <path d="M 480,352 L 504,352" fill="none" stroke="black"/>
              <path d="M 48,400 L 64,400" fill="none" stroke="black"/>
              <path d="M 240,400 L 256,400" fill="none" stroke="black"/>
              <path d="M 480,400 L 504,400" fill="none" stroke="black"/>
              <path d="M 224,480 L 328,480" fill="none" stroke="black"/>
              <path d="M 488,480 L 544,480" fill="none" stroke="black"/>
              <path d="M 472,496 L 528,496" fill="none" stroke="black"/>
              <path d="M 8,512 L 64,512" fill="none" stroke="black"/>
              <path d="M 456,512 L 512,512" fill="none" stroke="black"/>
              <path d="M 528,512 L 544,512" fill="none" stroke="black"/>
              <path d="M 64,528 L 456,528" fill="none" stroke="black"/>
              <path d="M 512,528 L 528,528" fill="none" stroke="black"/>
              <path d="M 8,544 L 64,544" fill="none" stroke="black"/>
              <path d="M 456,544 L 512,544" fill="none" stroke="black"/>
              <path d="M 224,560 L 328,560" fill="none" stroke="black"/>
              <path d="M 48,592 L 120,592" fill="none" stroke="black"/>
              <path d="M 208,592 L 272,592" fill="none" stroke="black"/>
              <path d="M 48,638 L 64,638" fill="none" stroke="black"/>
              <path d="M 48,642 L 64,642" fill="none" stroke="black"/>
              <path d="M 464,638 L 480,638" fill="none" stroke="black"/>
              <path d="M 464,642 L 480,642" fill="none" stroke="black"/>
              <path d="M 200,48 C 191.16936,48 184,55.16936 184,64" fill="none" stroke="black"/>
              <path d="M 304,48 C 312.83064,48 320,55.16936 320,64" fill="none" stroke="black"/>
              <path d="M 200,128 C 191.16936,128 184,120.83064 184,112" fill="none" stroke="black"/>
              <path d="M 304,128 C 312.83064,128 320,120.83064 320,112" fill="none" stroke="black"/>
              <path d="M 208,240 C 199.16936,240 192,247.16936 192,256" fill="none" stroke="black"/>
              <path d="M 312,240 C 320.83064,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 208,320 C 199.16936,320 192,312.83064 192,304" fill="none" stroke="black"/>
              <path d="M 312,320 C 320.83064,320 328,312.83064 328,304" fill="none" stroke="black"/>
              <path d="M 504,352 C 512.83064,352 520,359.16936 520,368" fill="none" stroke="black"/>
              <path d="M 504,400 C 512.83064,400 520,392.83064 520,384" fill="none" stroke="black"/>
              <path d="M 224,480 C 215.16936,480 208,487.16936 208,496" fill="none" stroke="black"/>
              <path d="M 328,480 C 336.83064,480 344,487.16936 344,496" fill="none" stroke="black"/>
              <path d="M 224,560 C 215.16936,560 208,552.83064 208,544" fill="none" stroke="black"/>
              <path d="M 328,560 C 336.83064,560 344,552.83064 344,544" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,640 476,634.4 476,645.6" fill="black" transform="rotate(0,480,640)"/>
              <polygon class="arrowhead" points="488,400 476,394.4 476,405.6" fill="black" transform="rotate(180,480,400)"/>
              <polygon class="arrowhead" points="488,352 476,346.4 476,357.6" fill="black" transform="rotate(180,480,352)"/>
              <polygon class="arrowhead" points="472,352 460,346.4 460,357.6" fill="black" transform="rotate(0,464,352)"/>
              <polygon class="arrowhead" points="472,160 460,154.4 460,165.6" fill="black" transform="rotate(0,464,160)"/>
              <path class="jump" d="M 344,536 C 338,536 338,520 344,520" fill="none" stroke="black"/>
              <path class="jump" d="M 328,296 C 322,296 322,280 328,280" fill="none" stroke="black"/>
              <path class="jump" d="M 320,104 C 314,104 314,88 320,88" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="280,592 268,586.4 268,597.6" fill="black" transform="rotate(0,272,592)"/>
              <polygon class="arrowhead" points="272,160 260,154.4 260,165.6" fill="black" transform="rotate(180,264,160)"/>
              <polygon class="arrowhead" points="264,400 252,394.4 252,405.6" fill="black" transform="rotate(0,256,400)"/>
              <polygon class="arrowhead" points="256,160 244,154.4 244,165.6" fill="black" transform="rotate(0,248,160)"/>
              <path class="jump" d="M 208,536 C 214,536 214,520 208,520" fill="none" stroke="black"/>
              <path class="jump" d="M 192,296 C 198,296 198,280 192,280" fill="none" stroke="black"/>
              <path class="jump" d="M 184,104 C 190,104 190,88 184,88" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="56,640 44,634.4 44,645.6" fill="black" transform="rotate(180,48,640)"/>
              <polygon class="arrowhead" points="56,592 44,586.4 44,597.6" fill="black" transform="rotate(180,48,592)"/>
              <polygon class="arrowhead" points="56,400 44,394.4 44,405.6" fill="black" transform="rotate(180,48,400)"/>
              <polygon class="arrowhead" points="56,352 44,346.4 44,357.6" fill="black" transform="rotate(180,48,352)"/>
              <polygon class="arrowhead" points="56,160 44,154.4 44,165.6" fill="black" transform="rotate(180,48,160)"/>
              <g class="text">
                <text x="16" y="36">(1)</text>
                <text x="72" y="36">Proxied</text>
                <text x="148" y="36">Connection</text>
                <text x="252" y="84">Network(s)</text>
                <text x="36" y="100">Client</text>
                <text x="468" y="100">Server</text>
                <text x="92" y="164">User</text>
                <text x="168" y="164">Data+Metadata</text>
                <text x="308" y="164">User</text>
                <text x="384" y="164">Data+Metadata</text>
                <text x="92" y="180">Secure</text>
                <text x="164" y="180">Connection</text>
                <text x="216" y="180">1</text>
                <text x="308" y="180">Secure</text>
                <text x="380" y="180">Connection</text>
                <text x="432" y="180">2</text>
                <text x="16" y="228">(2)</text>
                <text x="88" y="228">Out-of-band</text>
                <text x="172" y="228">Metadata</text>
                <text x="240" y="228">Sharing</text>
                <text x="260" y="276">Network(s)</text>
                <text x="36" y="292">Client</text>
                <text x="468" y="292">Server</text>
                <text x="132" y="356">End-to-End</text>
                <text x="204" y="356">Secure</text>
                <text x="276" y="356">Connection</text>
                <text x="328" y="356">+</text>
                <text x="356" y="356">User</text>
                <text x="396" y="356">Data</text>
                <text x="500" y="372">GLUE</text>
                <text x="496" y="388">CXs</text>
                <text x="108" y="404">Metadata</text>
                <text x="188" y="404">(Optional)</text>
                <text x="276" y="404">&lt;-</text>
                <text x="324" y="404">Metadata</text>
                <text x="404" y="404">(Optional)</text>
                <text x="460" y="404">-&gt;</text>
                <text x="100" y="420">Secure</text>
                <text x="172" y="420">Connection</text>
                <text x="224" y="420">1</text>
                <text x="324" y="420">Secure</text>
                <text x="396" y="420">Connection</text>
                <text x="448" y="420">2</text>
                <text x="16" y="468">(3)</text>
                <text x="100" y="468">Client-centric</text>
                <text x="196" y="468">Metadata</text>
                <text x="264" y="468">Sharing</text>
                <text x="276" y="516">Network(s)</text>
                <text x="36" y="532">Client</text>
                <text x="484" y="532">Server</text>
                <text x="164" y="596">Metadata</text>
                <text x="132" y="612">Secure</text>
                <text x="204" y="612">Connection</text>
                <text x="116" y="644">End-to-End</text>
                <text x="188" y="644">Secure</text>
                <text x="260" y="644">Connection</text>
                <text x="324" y="644">User</text>
                <text x="400" y="644">Data+Metadata</text>
                <text x="280" y="660">|</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
(1)  Proxied Connection
                       .--------------.                   +------+
                      |                |                +-+----+ |
+------+              |   Network(s)   |              +-+----+ +-+
|Client+--------------)----------------(--------------+Server+-+
+---+--+              |                |              +---+--+
    |                  '-------+------'                   |
    |                          |                          |
    +<===User Data+Metadata===>+<===User Data+Metadata===>+
    |   Secure Connection 1    |   Secure Connection 2    |
    |                          |                          |

(2)  Out-of-band Metadata Sharing
                        .--------------.                  +------+
                       |                |               +-+----+ |
+------+               |   Network(s)   |             +-+----+ +-+
|Client+---------------)----------------(-------------+Server+-+
+---+--+               |                |             +---+--+
    |                   '-------+------'                  |
    |                           |                         |
    +<-----End-to-End Secure Connection + User Data------>+<---.
    |                           |                         | GLUE|
    |                           |                         | CXs |
    +<-- Metadata (Optional) -->+<- Metadata (Optional) ->+<---'
    |    Secure Connection 1    |    Secure Connection 2  |
    |                           |                         |

(3)  Client-centric Metadata Sharing
                          .--------------.                  +------+
                         |                |               +-+----+ |
+------+                 |   Network(s)   |             +-+----+ +-+
|Client+-----------------)----------------(-------------+Server+-+
+---+--+                 |                |             +---+--+
    |                     '-------+------'                  |
    |                             |                         |
    +<--------- Metadata -------->+                         |
    |        Secure Connection    |                         |
    |                             |                         |
    +<== End-to-End Secure Connection User Data+Metadata ==>+
    |                             |                         |
]]></artwork>
        </artset>
      </figure>
      <t>The client-centric metadata sharing approach because it preserves privacy and also
takes advantage of clients having a full view on their available network attachments.
Without client involvement some use-cases cannot be solved, as detailed below
in <xref target="generic-cases"/>.</t>
      <ul empty="true">
        <li>
          <t>Note: some use cases may require seeking for users preference or receiving these preferences. Such matters are
out of scope.</t>
        </li>
      </ul>
    </section>
    <section anchor="signaling-avoidance">
      <name>Signaling Avoidance</name>
      <t>Leveraging previous experience (<xref target="RFC9049"/>), the signaling protocol does <em>not</em> need:</t>
      <ul spacing="normal">
        <li>
          <t>application identity</t>
        </li>
        <li>
          <t>application cause (or 'reason') to signal metadata</t>
        </li>
        <li>
          <t>server identity</t>
        </li>
        <li>
          <t>client-to-server encrypted payload inspection by network elements</t>
        </li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <section anchor="generic-cases">
        <name>Generic Cases</name>
        <section anchor="priority-between-flows-inter-flow-of-the-same-host">
          <name>Priority Between Flows (Inter-Flow) of The Same Host</name>
          <t>Certain flows being received by a host (or by an application on a host) are less or more important than other
flows of <strong>the same host</strong>.  For example, a host downloading a software update is generally considered less important
than another host doing interactive audio/video or gaming.  By signaling the relative importance
of flows to a network element, the network element can (de-)prioritize
those flows to best accommodate the needs of the various applications on a same host.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark packets that interfere with the
desires of the receiving host -- making their flows more important than what the receiving host
considers more important. This eventually causes all flows to be marked as important, or -- more
likely -- such priority markings to be ignored.</t>
        </section>
        <section anchor="priority-within-a-flow-intra-flow">
          <name>Priority Within a Flow (Intra-Flow)</name>
          <t>Interactive Audio/Video has long been using <xref target="RTP"/> which
runs over UDP.  As described in <xref section="2.3.7.2" sectionFormat="of" target="RFC7478"/>, there
is value in differentiating between voice, video and data.  Today's
video streaming is exclusively over TCP but will migrate to QUIC and
eventually is likely to support unreliable transport (<xref target="RFC9221"/>,
<xref target="I-D.ietf-moq-transport"/>).  With unreliable transport of video in
RTP or QUIC, it is beneficial to differentiate the important video
keyframes from other video frames.  Other applications such as gaming
and remote desktop also benefit from differentiating their packets to
the network.</t>
          <t>Many of these flows do not originate from a content provider's network --
rather, they originate from a peer (e.g., VoIP, interactive video,
peer-to-peer gaming, Remote Desktop).
Thus, the flows originate from an IP address that is not known before
connection establishment, so there needs to be a way for the client
to authorize the network elements to receive and hopefully to honor the metadata of those
packets.</t>
          <t>Without a signaling in place between a receiving host and its network,
remote peers are able to mark every packet of a flow
as important, causing much the same problem as the previous use-case. Eventually, when all
packets of every flow are marked as important, there is no differentiation between packets
within a flow, rendering the network unable to improve reactive policy decisions.</t>
        </section>
      </section>
      <section anchor="detailed-use-cases">
        <name>Detailed Use Cases</name>
        <section anchor="example-media-streaming">
          <name>Media Streaming</name>
          <t>Streaming video contains the occasional key frame ("i-frame")
containing a full video frame.  These are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
          <t>Streaming video also contains audio frames which can be encoded
separately and thus can be signaled separately.  Audio is more
critical than video for almost all applications, but its importance
(relative to other packets in the flow) is still an application decision.</t>
          <t>Examples: Super bowl, On-Demand Streaming</t>
          <t>Requirement:</t>
          <t>Signal the flow needs least delay between server and client. Network can provide minimal delay information to the host. Feedback from the network and the client, based on user preference, is required for more efficient streaming. This is required for incorporating special needs based on application/user capabilities and to prioritize traffic during reactive events.</t>
          <t>Problems:</t>
          <ol spacing="normal" type="1"><li>
              <t>All packets prioritized the same irrespective of user preferences/needs:  </t>
              <t>
a.  A client based change in priority of a certain type of data is not possible. For example, a hearing challenged user can choose video over audio while the priority is different for other users.  </t>
              <t>
b.  Dynamic changes to priority based on user activity is not possible today. For example, audio packets having the same priority when a user mutes the audio locally, or change in priority during time of emergency where video streaming applications share the same priority as SOS signals.</t>
            </li>
            <li>
              <t>In loss-prone networks or during a reactive policy events, retransmissions cause immense delay. Networks, not able to distinguish between reliable and loss-tolerant data or the critical data within a flow (i-frames, p-frames, and audio packets), can have challenges in efficiently handling/forwarding data.</t>
            </li>
          </ol>
          <t>Solution:</t>
          <ol spacing="normal" type="1"><li>
              <t>Client to ISP (Host-to-network) signaling can help with conveying user needs.  </t>
              <t>
a. The server (content provider) achieves best scalability by sending a single stream with the same per-packet metadata. The client, on the other hand, signaling the ISP to treat certain packets with a different priority over the others, can help solve the issue. For example, for video streaming, if the metadata just said "audio" (0x00), "video i-frame" (0x01) "video p-frame" (0x02), the client could have the signaling protocol tell an upstream router which one was most important. Some users could prioritize video over audio and vice versa.  </t>
              <t>
b. Clients occasionally change the importance of receiving certain streams, such as muting video or audio, but still need to receive some frames to populate their playout jitter buffer. In such cases, the client can signal the ISP to (de-)prioritize certain types of traffic during the duration of that event. The per-packet metadata from the server would remain the same while the ISP treats certain per-packet metadata differently. These signals can be propagated to the server (in the form of a network to host signals) for improved efficiency, but this is out of the scope of this document.</t>
            </li>
            <li>
              <t>Server to ISP (Host-to-network) per packet metadata can help in informing the network about the nature of traffic.</t>
            </li>
          </ol>
        </section>
        <section anchor="interactive-media">
          <name>Interactive Media</name>
          <t>Examples: VoIP (peer-to-peer (P2P), group conferencing), gaming.</t>
          <t>Requirement:</t>
          <t>The flow needs low jitter and low delay. However, the network can only provide a limited amount of low jitter/low delay to each host, maybe as few as one. This requires signaling feedback indicating that low jitter and low delay flows are already subscribed to other hosts. In response, the user and the application will likely continue, occasionally re-attempting to get the desired quality of service from the network.</t>
          <t>In many scenarios a game or VoIP application will want to signal different metadata for the same type of packet in each direction.  For example, for a game, video in the server-to-client direction might be more important than audio, whereas input devices (e.g., keystrokes) might be more important than audio.</t>
          <t>Many interactive audio/video applications also support sharing the presenter's screen, file, video, or pictures.  During this sharing the presenter's video is less important but the screen or picture is more important.  This change of importance can be conveyed in metadata to the network, by signaling from the client to the network element(s).</t>
          <t>Both gaming (video in both directions, audio in both directions, input
devices from client to server) and interactive audio/video (VoIP,
video conference) involves important traffic in both directions --
thus is a slightly more complicated use-case than the previous
example.  Additionally, most Internet service providers constrain
upstream bandwidth so proper packet treatment is critical in the
upstream direction.</t>
          <t>Examples: VoIP, online gaming.</t>
          <t>Problems:</t>
          <ol spacing="normal" type="1"><li>
              <t>Peer-to-peer communication often involves direct connection(s) without involvement of an intermediary server (or one of the peers take the role of a server in some gaming cases). The signaling (like DSCP) from these IP addresses are often ignored as these IP addresses are not in the ISPs' list of recognized servers. It is the same fate for servers that are not in the ISPs' list of recognized servers in an online gaming or a conference scenario</t>
            </li>
            <li>
              <t>Each peer part of the network will have different preferences and it is difficult for the application to modify metadata for each peer based on the preference.</t>
            </li>
          </ol>
          <t>Solutions:</t>
          <ol spacing="normal" type="1"><li>
              <t>Client-to-network signal indicating ISP to honor the honoring signaling data of a particular flow enables any data, irrespective of whether the sending server is part of the list of IP addresses or not. This enables client(user)-driven processing of metadata and client driven authorization of the IP addresses apart from the ISPs' list of recognized IP addresses.</t>
            </li>
            <li>
              <t>Client-to-network signaling also helps the ISP treat the same metadata differently for different flows based on the user preference. The per-packet metadata from the server would remain the same, simplifying signaling implementation on the server and making it more scalable.</t>
            </li>
          </ol>
          <section anchor="examples-of-same-type-of-metadata-with-different-preferences">
            <name>Examples of Same Type of Metadata with Different Preferences</name>
            <t>A game or VoIP application may want to signal different metadata for the same type of packet in each direction.  For example, for a game, video in the server-to-client direction might be more important than audio, whereas input devices (e.g., keystrokes) might be more important than audio. Each user can have varied preferences for the same type of data originating from the server. Determination of such preferences is outside of the scope of this document.</t>
            <ol spacing="normal" type="1"><li>
                <t>Video in a media session: One user can choose to keep the video and screen-sharing equally distributed on the screen while another user can minimize or reduce the size of the video. Based on the size/preference of the video window, video packets can be prioritized accordingly relative to screen-shared content. This preference can be propagated to the server as network-to-host signaling for more efficient transmission but that is out of the scope of this document.</t>
              </li>
              <li>
                <t>User Inactivity signal: When the user is inactive during an interactive session such as gaming (activity can be detected automatically or can be a simple user signal of Away-from-Keyboard (AFK)), the client can signal to the ISP to deprioritize the packets to the extent that the client receives some data to populate their playout jitter buffer.</t>
              </li>
            </ol>
          </section>
        </section>
        <section anchor="bulk-data-transfer">
          <name>Bulk Data Transfer</name>
          <t>Examples: backup/restore, software update, RSS feed update, email, printing to a print server, file copy</t>
          <t>Requirement: Signal the flow as below best-effort.</t>
          <t>Problem:</t>
          <ol spacing="normal" type="1"><li>
              <t>Bulk data is generally not interactive and can be forwarded of over paths of greater latency. It is treated as non-time sensitive operation. Although some bulk transfers (like saving a file in the middle of editing) that cannot be minimized, where the user will have to wait till it is completed to further use the device, should be given real-time importance. Bulk data such as printing a file while editing can be parallelized and need not have real-time priority. Similarly, backing up of data can be parallelized while restoring of data cannot be parallelized based on the application.</t>
            </li>
          </ol>
          <t>Solution:</t>
          <ol spacing="normal" type="1"><li>
              <t>Client-to-network signaling can enhance the user experience by identifying and signaling the flow's priority appropriately for the ISP to handle the packets accordingly.</t>
            </li>
          </ol>
        </section>
        <section anchor="mixed-traffic">
          <name>Mixed Traffic</name>
          <t>Examples: Desktop Virtualization</t>
          <dl>
            <dt>Requirement:</dt>
            <dd>
              <t>Signal flow will vary depending on the nature of the packet. With variety of traffic going through the session, some packets can contain interactive traffic while the others contain bulk transfer. There can be combination of reliable and unreliable traffic within the same session through multiple streams. Host-to-network signaling plays a vital role in effectively forwarding mixed traffic for better user interactivity and network performance. ```</t>
            </dd>
          </dl>
          <t>Mixed traffic has a large variety of applications with unique cases. For the purpose of use case, Desktop Virtualization is considered below.</t>
          <t>Problems:</t>
          <ol spacing="normal" type="1"><li>
              <t>In remote desktop use case, a server can host multiple connections with varying type of traffic to it. These servers are often in a database, exposed to the internet through some sort of a gateway-proxy and the signaling (like DSCP bits) from these servers are often ignored by the ISPs.</t>
            </li>
            <li>
              <t>A video key frame should be handled differently by the network
depending on a streaming application versus a remote desktop
application.  The video streaming application's primary and only
nature of traffic is video and audio.  In contrast, a remote desktop
application might be playing a video and its associated audio while at
the same time the user is editing a document. The user's keystrokes
and those glyphs need to be prioritized over the video lest the user
think their inputs are being ignored (and type the same characters
again).</t>
            </li>
            <li>
              <t>With multiple applications running in the same virtualized environment, video streaming having same priority as graphics updates while the user is playing a video in the background while typing a document in the foreground can cause interactivity issues.</t>
            </li>
          </ol>
          <t>Solution:</t>
          <ol spacing="normal" type="1"><li>
              <t>Client-to-network signal indicating ISP to honor the signaling data of a particular flow enables the servers, that are not even directly visible to the ISPs, to benefit from signaling. This enables client(user)-driven processing of metadata and client driven authorization of the IP addresses apart from the ISPs' list of recognized IP addresses.</t>
            </li>
            <li>
              <t>Client signaling can reduce/eliminate the resource intensive responsibility of identifying such scenarios and modifying the metadata accordingly. The per-packet metadata from the server would remain the same, simplifying signaling implementation on the server and making it more scalable.</t>
            </li>
            <li>
              <t>Client signaling based on user activity can improve user experience. Signaling the ISP to treat the same metadata differently based on the user activity can help improve/resolve this, while keeping the per packet metadata the same.</t>
            </li>
          </ol>
        </section>
        <section anchor="assisted-offload">
          <name>Assisted Offload</name>
          <t>There are  cases (crisis) where "normal" network
resources cannot be used at maximum and, thus, a network would seek to
reduce or offload some of the traffic during these events -- often
called 'reactive traffic policy'. An example of such use case is cellular networks that are overly used (and radio resources exhausted) such as a large collection of people (e.g., parade, sporting event), or such as a partial radio network outage (e.g., tower power outage).  During such a condition, an alternative network attachment may be available to the host (e.g., Wi-Fi).</t>
          <t>Network-to-host signals are useful to put in place adequate traffic distribution policies (e.g., prefer the use of alternate paths, offload a network).</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="policy-enforcement">
        <name>Policy Enforcement</name>
        <t>Some metadata requires the network to share some hints with a host to adjust its behavior for some specific flows. However, that metadata may have a dependency on the service offering that is subscribed by a user. Let us consider the example of a bitrate for an optimized video delivery. <strong>Such bitrate may not be computed system-wide</strong> given that flows from users with distinct service offerings
(and connectivity SLOs) may be serviced by the same network nodes.</t>
      </section>
      <section anchor="redundant-functions-classification-complications">
        <name>Redundant Functions &amp; Classification Complications</name>
        <t>If distinct channels are used to share the metadata between a host and a network, a network that engages in the collaborative signaling approach will require sophisticated features to classify flows and decide which channel is used to share metadata so that it can consume that information. Likewise, the network will require to implement redundant functions; for each signaling interface.</t>
        <t>As such, application- and protocol-specific signaling channels are suboptimal.</t>
      </section>
      <section anchor="metadata-scope">
        <name>Metadata Scope</name>
        <t>An operational challenge for sharing resource-quota like metadata (e.g., maximum bitrate) is that the network is generally not entitled to allocate quota per-application, per-flow, per-stream, etc. that
delivered as part of an Internet connectivity service. However, the network has a visibility about the overall network attachment (e.g., inbound/outbound bandwidth discussed in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>). As such,  hints about resource-like metadata is bound by default to the overall network attachment, not specific to a given application or flow.</t>
        <ul empty="true">
          <li>
            <t>It is out of the scope of this document to discuss setups (e.g., 3GPP PDU Sessions) where network attachments with GBR (Guaranteed Bit Rate) for specific flows is provided.</t>
          </li>
        </ul>
      </section>
      <section anchor="applications-interference">
        <name>Applications Interference</name>
        <t>Applications that have access to a resource-quota information may adopt an aggressive behavior (compared to those that don't have access) if they assumed that a resource-quota like metadata is for the application, not for the host that runs the applications.</t>
        <t>This is challenging for home networks where multiple hosts may be running behind the same CPE, with each of them running a video application.</t>
      </section>
      <section anchor="abuse-and-constraints">
        <name>Abuse and Constraints</name>
        <t>It is important that not every flow be prioritized; otherwise, the
network devolves into the best-effort network that existed prior to
metadata signaling. It is a requirement that mechanisms exist to
prevent this occurrence.</t>
        <t>Such a mechanism might be simple, for example, a cellular network might allow one flow from a subscriber to declare itself as important; other flows with that subscriber are denied attempts to prioritize themselves.  The mechanism might be more complex where authentication and authorization is performed by an enterprise network which, itself, decides which flows are important based on its policy and only the enterprise network communicates flow priorities to the ISP network.  The enterprise might prioritize certain users (e.g., IT staff), certain equipment (audio/video equipment in a conference room), or whatever its policies it might want.</t>
      </section>
      <section anchor="key">
        <name>Key Establishment</name>
        <t>Various proposals have suggested establishing a key to validate
per-packet metadata or to decrypt per-packet metadata.  However, most
proposals have not specified how this key would be established. A
signaling protocol from the receiving host to its ISP could establish
such a key. The host can then convey the key to the sending host to
use to integrity protect or encrypt the per-packet metadata.</t>
        <ul empty="true">
          <li>
            <t>Note: The CPU overhead of validating or decrypting such per-packet metadata
needs to be carefully considered (and further assessed via experiments) by the signaling protocol proposing such
keying. Also, the required operational setup should be documented.</t>
          </li>
        </ul>
      </section>
      <section anchor="metadata-versioncapability-exchange">
        <name>Metadata Version/Capability Exchange</name>
        <t>The sender has to convey metadata in a way that is understood by the
various network elements on the path -- each of which might be
operated by different entities and have different capabilities.  For
example, the Wi-Fi access point might be operated by an enterprise
network, hotel, or home user, whereas the upstream router is operated by
the ISP.  Each of those might support different versions of the same
metadata, or might need the metadata expressed in different ways.</t>
        <t>The signaling protocol would provide a way to learn the needs of those
networks, and provide metadata signaling satisfying most or all of their
needs.</t>
      </section>
      <section anchor="forwarding-processing-slow-path-vs-fast-path">
        <name>Forwarding Processing: Slow Path vs. Fast Path</name>
        <t>TBC</t>
      </section>
      <section anchor="impacts-of-nested-congestion-controls">
        <name>Impacts of Nested Congestion Controls</name>
        <t>TBC</t>
      </section>
    </section>
    <section anchor="requirements-summary">
      <name>Requirements Summary</name>
      <t>TODO summary.</t>
      <ul spacing="normal">
        <li>
          <t>The activation of the collaborative signalling MUST NOT lower the perceived service
of flows during nominal conditions (i.e., when the network is not in a reactive policy mode).</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ATIS" target="https://access.atis.org/higherlogic/ws/public/download/72240">
        <front>
          <title>Content Classification for Traffic Optimization</title>
          <author>
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="IAB">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RTP">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.ietf-moq-transport">
        <front>
          <title>Media over QUIC Transport</title>
          <author fullname="Luke Curley" initials="L." surname="Curley">
            <organization>Discord</organization>
          </author>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Meta</organization>
          </author>
          <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
            <organization>Cisco</organization>
          </author>
          <author fullname="Victor Vasiliev" initials="V." surname="Vasiliev">
            <organization>Google</organization>
          </author>
          <author fullname="Ian Swett" initials="I." surname="Swett">
            <organization>Google</organization>
          </author>
          <date day="4" month="March" year="2024"/>
          <abstract>
            <t>   This document defines the core behavior for Media over QUIC Transport
   (MOQT), a media transport protocol designed to operate over QUIC and
   WebTransport, which have similar functionality.  MOQT allows a
   producer of media to publish data and have it consumed via
   subscription by a multiplicity of endpoints.  It supports
   intermediate content distribution networks and is designed for high
   scale and low latency distribution.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-moq-transport-03"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="16" month="March" year="2024"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-08"/>
      </reference>
    </references>
    <?line 529?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Hang Shi for the review and comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
