<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zarifis-scone-taxonomy-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SCONE Throttling Taxonomy">SCONEPRO Taxonomy of throttling policies used worldwide</title>
    <seriesInfo name="Internet-Draft" value="draft-zarifis-scone-taxonomy-00"/>
    <author initials="K." surname="Zarifis" fullname="Kyriakos Zarifis">
      <organization>Meta</organization>
      <address>
        <email>kzarifis@meta.com</email>
      </address>
    </author>
    <author initials="S." surname="Jaiswal" fullname="Sharad Jaiswal">
      <organization>Meta</organization>
      <address>
        <email>sj77@meta.com</email>
      </address>
    </author>
    <author initials="I." surname="Purushothaman" fullname="Ilango Purushothaman">
      <organization>Meta</organization>
      <address>
        <email>ipurush@meta.com</email>
      </address>
    </author>
    <author initials="J." surname="Varsanik" fullname="Jon Varsanik">
      <organization>Google</organization>
      <address>
        <email>jvarsanik@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Tiwari" fullname="Abhishek Tiwari">
      <organization>Meta</organization>
      <address>
        <email>atiwari@meta.com</email>
      </address>
    </author>
    <author initials="M." surname="Joras" fullname="Matt Joras">
      <organization>Meta</organization>
      <address>
        <email>mjoras@meta.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Web and Internet Transport</area>
    <workgroup>SCONE</workgroup>
    <keyword>Throttling</keyword>
    <abstract>
      <?line 76?>

<t>This document provides a description of traffic throttling and a taxonomy of throttling policies used by CSPs worldwide.</t>
    </abstract>
  </front>
  <middle>
    <?line 80?>

<section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="throttling-background-and-introduction">
      <name>Throttling Background and Introduction</name>
      <section anchor="background">
        <name>Background</name>
        <t>Video traffic constitutes 70-80% of all traffic on the internet. Communications Service Providers (CSPs) throttle video traffic for a variety of reasons. Reasons cited by CSPs include service differentiation for their subscribers, enforcement of data limited plans, accommodation of mobility of users from well provisioned cells to purely provisioned or congested cells, efficient operation of radio access networks etc.</t>
        <t><xref target="draft-tomar-sconepro-ecn-01"/> provides additional background on the motivation and challenges around CSP traffic throttling.</t>
      </section>
      <section anchor="throttler-implementations">
        <name>Throttler Implementations</name>
        <section anchor="token-bucket-filters">
          <name>Token Bucket Filters</name>
          <t>Achieving a controlled flow rate, referred to as Committed Information Rate (CIR), is commonly done using a Token Bucket Filter (TBF). In the simplest abstraction, network devices maintain a token bucket per flow, and tokens are added to a bucket at specified intervals. If the bucket is full with tokens, no more tokens are added. Token buckets control the burst size and mean rate of a flow by only allowing through as many packets as the number of tokens available in the flow’s bucket at any given time. The burst size is thus equal to the bucket size, and arriving packets are forwarded immediately as long as there are enough tokens to serve them.</t>
          <t>There are two main types of traffic throttlers: policers and shapers. Both typically implement TBFs, and they mostly differ in how they handle non-conforming packets, i.e. packets that arrive in a token bucket with insufficient tokens to forward them.</t>
        </section>
        <section anchor="policers">
          <name>Policers</name>
          <t>Policers drop (or deprioritize) non conforming packets. A burst is propagated as long as it fits within the TBF’s capacity, otherwise excess packets are discarded. While this converges to a consistent mean transmission rate in the long term, it generates high packet loss and triggers retransmissions by the content delivery network (CDN) endpoint, leading to transmission rates with fluctuations.</t>
        </section>
        <section anchor="shapers">
          <name>Shapers</name>
          <t>Shapers, on the other hand, employ an additional outbound queue and add non-conforming packets to it instead of dropping them. The enqueued packets are then scheduled for transmission at the configured rate of the shaper. This results in a more stable output rate close to the CIR, but also adds to the round trip time (RTT) measured by the clients by introducing queueing delays. The additional delay is bounded by the size of the queue used by the shaper.</t>
        </section>
      </section>
      <section anchor="impact-of-throttling">
        <name>Impact of throttling</name>
        <section anchor="impact-of-throttling-on-protocols">
          <name>Impact of throttling on protocols</name>
          <t>In the transport layer, throttling complicates estimation mechanisms. For example, BBR can base its initial bandwidth estimation for a new connection on the initial burst that a full token bucket will allow. Once the tokens are depleted and throttling kicks in, the bandwidth estimates will drop considerably, triggering a reaction in the congestion control.</t>
          <t>As a result, in the application layer, ABR algorithms can be adversely affected due to fluctuating bandwidth estimation. This can lead to video players flapping between video bitrates, causing degraded QoE and even video stalls.</t>
        </section>
        <section anchor="impact-of-throttling-on-involved-parties">
          <name>Impact of throttling on involved parties</name>
          <t>By influencing transport and application layer mechanisms, throttling has a direct impact on  content providers, service providers, and end users.</t>
          <t>Throttling affects Content Application Providers (CAPs):</t>
          <ul spacing="normal">
            <li>
              <t>The high packet loss rate introduced by policers leads to aggressive and unnecessary retransmissions, generating CPU overhead on CDN servers.</t>
            </li>
            <li>
              <t>Both shapers and policers can lead to degraded QoE caused respectively by RTT inflation and packet loss</t>
            </li>
          </ul>
          <t>Throttling also affects Communications Service Providers (CSPs):</t>
          <ul spacing="normal">
            <li>
              <t>Both policers and shapers require the ability to identify candidate flows for throttling (Deep Packet Inspection (DPI), Server Name Identification (SNI) parsing), which can be CPU and memory intensive, especially for high rate flows where the packet inspection has to be done on-path at the rate of the flow.</t>
            </li>
            <li>
              <t>Although packets are dropped on arrival by policers (TBFs are on inbound interfaces), carriers can still carry bytes to the edge of their network just to drop them there, which can waste bandwidth, especially due to unnecessarily retransmitted packets. With retransmission rates up to 20-30%, network overhead can add up.</t>
            </li>
            <li>
              <t>Shapers require slightly more complex middleboxes that maintain outbound queues on egress interfaces. The queues create artificial and unnecessary congestion. On the Radio Access Network side, while smoothing bursts can maintain consistent throughput, removing bursts can actually decrease radio access network (RAN) scheduling efficiency.</t>
            </li>
          </ul>
          <t>Lastly, throttling affects clients:</t>
          <ul spacing="normal">
            <li>
              <t>The most obvious impact is QoE degradation, since video playback mechanisms are limited to artificially imposed bandwidth bounds.</t>
            </li>
            <li>
              <t>Additionally, the temporal characteristics of shaped traffic does not allow mobile device modems to schedule sleep cycles (Discontinuous Reception (DRX)) leading to higher device battery consumption.</t>
            </li>
          </ul>
          <t>An overall impact of throttling, as well as the benefits obviating the need to throttle is summarized in <xref target="YouTube"/></t>
        </section>
      </section>
    </section>
    <section anchor="presence-of-throttling-globally">
      <name>Presence of throttling globally</name>
      <t>Considering the breadth of implementations and policies used by CSPs to meet their specific needs, detecting throttling in the wild is not trivial. Some studies have quantified the prevalence of throttling using various methodologies which come with limitations or vantage point biases This section summarizes some key findings.</t>
      <t>An analysis of millions of video streams served by Google’s CDN over a period of 7 days in 2015 (<xref target="flach"/>) revealed that ~2% of video segments served in North America were impacted by policing, while the number increased to ~7% for Africa and APAC. 30% of the connections were throttled between 0.5 and 2Mbps, and for all the connections that were throttled, a 15% increase in rebuffering time was observed compared to non-throttled counterparts.</t>
      <t>In 2019 <xref target="li"/> identified 30 (out of 144 analyzed) CSPs across 7 countries that throttled at least one of several video streaming services, by conducting crowd-sourced experiments from mobile phones. Specifically in the US, where the examined content providers were popular, it was found that most CSPs throttle several of the streaming services, with video traffic typically being throttled at 1.5Mbps. However, notably, CSPs used different throttling rates for different content providers (mainly due to the inaccuracy in identifying candidate flows), and throttled constantly both during peak as well as low traffic hours when congestion was not an issue.</t>
      <t>Analyzing goodput data across connections served by Meta to countries outside of the US in 2022 identified ~200 ASNs that use throttling. Among them, 60% throttled at rates up to 1Mbps, 30% between 1-2Mbps, and ~10% between 2-5Mbps. A more recent analysis in 2024 identified ~274 globally that throttle content served by Meta. The detected throttling rates were mostly consistent, with a slight shift towards lower rates: 68% of the ASNs now throttled at rates up to 1Mbps, 30% between 1-2Mbps, and 7% between 2-5Mbps. In most cases, especially for ASNs in Latin America and Asia/Pacific, throttling was attributed to carrier-side Fair Usage Policies, with carriers implementing application-specific data caps for the various Meta apps. Within the US, most major CSPs throttled at specific rates (predominantly 2Mbps or 4Mbps), without imposing data caps for most of the users.</t>
      <t>Across the different studies, a few key take-aways are highlighted:
Over the last ~10 years there has been an increasing trend in use of throttling by CSPs, particularly for video traffic.
Most US carriers throttle video traffic constantly, regardless of time of day or network conditions or user usage patterns.
User Data Caps are prevalent, especially in APAC/LATAM
CSPs around the world employ different mechanisms and diverse throttling policies, depending on the market and business needs.</t>
    </section>
    <section anchor="taxonomy-of-throttling-policies">
      <name>Taxonomy of throttling policies</name>
      <t>This section provides a taxonomy of the various throttling policies implemented by Communication Service Providers (CSPs) in the wild. These policies are designed to manage network traffic effectively and are influenced by a range of factors, including business objectives, network conditions, and regulatory requirements.</t>
      <ul spacing="normal">
        <li>
          <t><strong>Constant, Application-Based Throttling</strong>: CSPs may implement constant throttling policies that specifically target video flows from Content Application Providers (CAPs). These policies enforce a fixed rate, often utilizing Server Name Indication (SNI) to identify and manage specific applications. This approach ensures consistent bandwidth allocation for certain types of traffic, regardless of network conditions.</t>
        </li>
        <li>
          <t><strong>Time-of-Day (ToD) Based Throttling</strong>: To manage peak traffic periods, CSPs may employ ToD-based throttling. For example, network traffic may be throttled during peak hours, such as between 6 PM and 10 PM, to alleviate congestion and maintain service quality for all users. This strategy allows CSPs to optimize network performance during times of high demand.</t>
        </li>
        <li>
          <t>**Data Capped User Throttling: Throttling policies may also be applied based on data usage caps. Users may experience throttling once they exceed predefined data limits, which can be set on a daily or monthly basis. Some CSPs offer manual top-ups to allow users to purchase additional data. Additionally, app-specific data caps may be enforced, such as throttling Facebook or Instagram or YouTube video traffic after a user consumes 25GB or 30GB of app-specific data per month.</t>
        </li>
        <li>
          <t><strong>User-Specific Policies</strong>: CSPs may implement user-specific throttling policies based on individual user profiles or subscription tiers. This allows for personalized bandwidth management, where users on different plans may experience varying levels of throttling. Such policies enable CSPs to offer differentiated services and pricing models.</t>
        </li>
        <li>
          <t><strong>Network topology specific policies</strong>: CSP may implement different throttling policies based on the network topology. For example in the case of a cellular network as users move from a 5G network to a 4G network the CSP may change the throttling policies. Another example is users accessing the internet through a wifi access point using a cellular backbone (fixed wireless access) vs a satellite backbone, vs a fiber/cable backhaul are subject to very different throttling policies.</t>
        </li>
      </ul>
    </section>
    <section anchor="design-choices-for-throughput-advice-signaling">
      <name>Design choices for throughput advice signaling</name>
      <t>Understanding the throttling ecosystem on the Internet today is crucial for designing a protocol to communicate throughput advice. In particular, to sufficiently communicate the kinds of policies in use today any throughput advice signalling must be able to achieve certain degrees of frequency and granularity.</t>
      <ul spacing="normal">
        <li>
          <t><strong>Frequency of signal</strong>: As discussed above, policies vary from being constantly active to being applied only during certain hours of the day. They can also be reactive to user-specific changes such as exceeding a subscription’s data allotment. This variability implies a requirement on the advice signaling protocol that is able to alter the advice in step with these changes in policy.</t>
        </li>
        <li>
          <t><strong>Granularity of signal</strong>: Similarly to frequency, the actual rates used in these policies vary as wildly as the policies themselves. Some, such as in the time-of-day policies, are based on network usage and demand. Others, such as the application-based constant policies, are aimed at an application serving a certain video quality. These rates also change over time with no standardization. A solution which seeks to communicate these rates as throughput advice needs to have the ability to encode the wide range of policies used.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>General SCONE security considerations are discussed in the other documents
covering the specific network-to-host signaling methods.  This document only
addresses questions regarding use of ECN for SCONE.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="draft-tomar-sconepro-ecn-01" target="https://www.ietf.org/archive/id/draft-tomar-sconepro-ecn-01.html">
          <front>
            <title>SCONEPRO Need for Defining A New On-Path Signaling Mechanism</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="YouTube" target="https://datatracker.ietf.org/meeting/119/materials/slides-119-sconepro-youtube-plan-aware-streaming-01">
          <front>
            <title>YouTube Plan Aware Streaming</title>
            <author>
              <organization>YouTube</organization>
            </author>
            <date year="2024" month="March" day="21"/>
          </front>
        </reference>
        <reference anchor="flach" target="https://dl.acm.org/doi/pdf/10.1145/2934872.2934873">
          <front>
            <title>An Internet-Wide Analysis of Traffic Policing</title>
            <author initials="T." surname="Flach" fullname="T. Flach">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="li" target="https://dl.acm.org/doi/pdf/10.1145/3341302.3342092">
          <front>
            <title>A Large-Scale Analysis of Deployed Traffic Differentiation Practices</title>
            <author initials="F." surname="Li" fullname="F. Li">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 200?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document represents collaboration, comments, and inputs from others,
including:</t>
      <ul spacing="normal">
        <li>
          <t>Tom Saffell (Youtube)</t>
        </li>
        <li>
          <t>Wesley Eddy (Meta)</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
