<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kwbdgrr-tsvwg-net-collab-rqmts-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Network Collaboration Requirements">Requirements for Network Collaboration Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-00"/>
    <author initials="J." surname="Kaippallimalil" fullname="John Kaippallimalil">
      <organization>Futurewei</organization>
      <address>
        <email>john.kaippallimalil@futurewei.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco</organization>
      <address>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajagopalan" fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>Sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Dawkins" fullname="Spencer Dawkins">
      <organization>Tencent America LLC</organization>
      <address>
        <email>spencerdawkins.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="07"/>
    <area>Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>Media</keyword>
    <keyword>Low Latency</keyword>
    <keyword>Wireless Links</keyword>
    <keyword>Bandwidth constraints</keyword>
    <keyword>Policy</keyword>
    <keyword>Operational Considerations</keyword>
    <abstract>
      <?line 100?>

<t>Wireless networks (e.g., cellular or WLAN) experience significant but transient variations in link quality and have policy constraints (e.g., bandwidth) that affect user experience.
Collaborative signaling (e.g., host-to-network and server-to-network) can improve the user experience by informing the network about the nature and relative importance of packets (frames, streams, etc.) without having to disclose the content of the packets. Moreover, the collaborative signalling may be enabled so that hosts are aware of the network's treatment of incoming packets. Also, host-to-network collaboration can be put in place without revealing the identity of the remote servers. This collaboration allows for differentiated services at the network (e.g., packet discard preference), the sender (e.g., adaptive transmission), or through cooperation of server / host and the network.</t>
      <t>This document lists some use cases that illustrate the need for a mechanism to share metadata and outlines requirements for both host-to-network (and vice versa) and server-to-network (and vice versa). The document focuses on intra-flow or flows bound to the same user.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-kwbdgrr-tsvwg-net-collab-rqmts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TSVWG Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 107?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Wireless networks inherently experience large variations in link quality due to several factors.
These include the change in wireless channel conditions, interference between proximate cells and channels or because of the end user movement.
These variations in link quality can be in the order of a millisecond or less <xref target="_5G-Lumos"/> while congestion control takes several tens of milliseconds (more than one round-trip time (RTT)) to estimate data rate.
End-to-end congestion control algorithms are far from optimal when the link quality is highly variable in sub-RTT timeframes and the application demands both low latency and high bandwidth (e.g., <xref section="2.1" sectionFormat="of" target="RFC6077"/>).</t>
      <t>It is also not practical to convey sub-RTT link changes using an end-to-end feedback signal.
As a consequence, applications settling for a lower throughput when latency is prioritized or achieving higher throughput at the expense of much higher delays.</t>
      <t>With not fully encrypted packets, networks may use some heuristics to build an "implicit signal" derived from the contents of a packet to prioritize or otherwise shape flows.
Implicit signals are not desirable as they lead to ossification of protocols as result of introducing unintended dependencies <xref target="RFC9419"/>.
When packet contents are encrypted, the approach of using implicit signals is no longer viable.</t>
      <t>Bandwidth constraints exist most predominantly at the access network (e.g., radio access networks).
Users who are serviced via these networks use hosts which run various application clients; each having different connectivity needs for an optimal user experience.
These needs are not frozen but change over time depending on the application and even depending on how an application is used (e.g., user's preferences).
An explicit signal to the host can help to manage the use of available bandwidth better and better share it with requesting applications.</t>
      <t>Other applications like interactive media can demand both high throughput and low latency and, in some cases, carry different media streams (e.g., audio and video) in a single transport connection (e.g., WebRTC <xref target="RFC8825"/>).
There may be preferences that an application may wish to convey, such as a higher priority for audio over video (or the opposite) in congested networks.
With RTP <xref target="RFC3550"/>, the type of media could be examined and used as an implicit signal for determining relative priority. However, <xref target="RFC9335"/> defines a new mechanism that completely encrypts RTP header extensions and Contributing sources (CSRCs). Furthermore, a full encrypted transport (e.g., QUIC <xref target="RFC9000"/>) does not expose any media header information that on-path network elements can use for forwarding.</t>
      <t>Also, traffic patterns in some emerging applications can vary significantly during the session. For example, live media or AI-generated content can have significant dynamic variations and potentially aperiodic frames.
Information gleaned from unencrypted media packets and headers that wireless networks used in the past to optimize traffic shaping and scheduling are not exposed in encrypted communications.</t>
      <figure anchor="Figure-e2e">
        <artwork><![CDATA[
                     |
       3GPP/mobile network
+--------------------|----------------------+
|+-- ---+            |   +-----+    +-----+ |
||client+-----------(B)--+radio+----+ UPF | |
|+------+            |   +-----+    +--+--+ |
+--------------------|-----------------|----+
                     |                 |
       Wireless home/ISP network       |
+--------------------|-----------+     |    |          |
|+--- --+    +----+  |  +------+ | +---+--+ | +------+ | +------+
||client+-(B)+WLAN+-(B)-+router+---+router+---+router+---+server|
|+------+    +----+  |  +------+ | +------+ | +------+ | +------+
+--------------------|-----------+          |          |
                     |                      |          |
                     |                      | Transit  |  Content
 User device/Network |    MNO/ISP Network   | Network  |  Network
]]></artwork>
      </figure>
      <t><xref target="Figure-e2e"/> shows where such bandwidth and performance constraints usually exist with a "B" (for Bottleneck) in 3GPP/mobile networks and WLAN/ISP networks.
When a bottleneck exists temporarily, the network has no choice but to discard or delay packets -- which can harm certain flows and, thus, lead to suboptimal perceived experience.
In this document, this is termed 'reactive policy'.</t>
      <t>A network attachment represents the communication link between hosts (client) and network (router) over which a connection policy (including QoS) is applied to flows within that network attachment.</t>
      <t>A network attachment may be established using control plane signaling between the client and the network (access) router and is out of scope of this document.
Transport flows over a network attachment may consist of multiple streams such as video or audio. <xref target="Figure-conn-flow"/> shows a high level view of network attachments, flows, and QoS/policy discussed in <xref target="metadata-req"/>.</t>
      <t>The requirements in <xref target="metadata-req"/> apply to data units like frames within a flow, but not between flows. Specifically, this document does not discuss flows of distinct hosts/users.</t>
      <figure anchor="Figure-conn-flow">
        <artwork><![CDATA[
+----------+          +-----------------+
|+----+    |          | +-------------+ |
|| A1 |--+ |          | | QoS, Policy | |
|+-+--+A2| |          | +---+-----+---+ |          +------+
|  |+-+--+ |  Network |     |     |     |          |srv-A2|
|  |  |    |attachment|     v     |     |          +--+---+
|  |  |  *************************|**** |             |
|  |  +------------- flow-x2 -----|-------------------+   +------+
|  +------------ flow-x1 ---------|-----------------------+srv-A1|
|        *************************|**** |                 +--+---+
+-Client-1-+          |           |     |                    |
                      |           |     |                    |
+----------+  Network attachment  V     |                    |
|+----+  ****************************** |                    |
|| A1 +------------ flow-x3 ---------------------------------+
|+----+  ****************************** |
+----------+          +-----------------+
  Client-2                  Router
]]></artwork>
      </figure>
      <t><xref target="Figure-conn-flow"/> shows "Client-1" and "Client-2" that negotiate  connection policy (e.g., QoS) and other aspects like mobility handling, charging applied to flows in that network attachment.
"Client-1" has "flow-x1" and "flow-x2" over its network attachment while "Client-2" has "flow-x3".
The requirements in this document focuses on on-path collaboration signals that apply to data units such as media frames within flows like "flow-x1/x2/x3" but not between them.</t>
      <t>In summary, the rapid variation of wireless link quality and/or bandwidth limitations in networks along with interactive applications that demand low latency and high throughput can lead to suboptimal user experience. <xref target="uc"/> outlines use cases to illustrate the issues and the need for additional information per flow to allow the network to optimize its handling.</t>
      <t>Some of the complications that are induced by the phenomena discussed above may be eliminated by
   adequate dimensioning and upgrades.  However, such upgrades may not
   be always (immediately) possible or justified. Complementary mitigations are thus needed to soften these complications by introducing some collaboration between endpoints and networks to adjust their behaviors.</t>
      <t><xref target="operational"/> provides operational constraints in the network and <xref target="metadata-req"/> describes the requirements for on-path media collaboration signals.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Discard preference:</dt>
        <dd>
          <t>Is an indication of drop preference within a flow when there are no sufficient network resources to handle all competing packets of that same flow.</t>
        </dd>
        <dt>Intentional Management:</dt>
        <dd>
          <t>Network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>Network reactions to congestion events or protection polices under attacks, with very short to very long durations (e.g., varying wireless and mobile air interface conditions).</t>
        </dd>
        <dt>Traffic shaping:</dt>
        <dd>
          <t>Refers in this document to QoS management at the wireless/access router to delay or discard packets of lower priority to achieve bounded latency and high throughput.</t>
        </dd>
        <dt>User Plane Function (UPF):</dt>
        <dd>
          <t>Refers to a 3GPP element that is located between the mobile infrastructure and the Data Network (DN) as shown in <xref target="Figure-3gpp"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>For a definitive description of 3GPP network architectures, the reader should refer to the 3GPP's TR 23.501 <xref target="TR.23.501-3GPP"/>.</t>
        </dd>
      </dl>
      <figure anchor="Figure-3gpp">
        <name>5GS Architecture</name>
        <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
      </figure>
    </section>
    <section anchor="uc">
      <name>Use Cases</name>
      <section anchor="uc-streaming">
        <name>Media Streaming</name>
        <t>Streaming video contains the occasional key frame ("I-frame") containing a full video frame.
These frames are necessary to rebuild receiver state after loss of delta frames.
The key frames are therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Streaming video also contains audio frames which can be encoded
separately and, thus, can be signaled separately (requirement:
REQ-MEDIA-KEYFRAME).</t>
        <t>Audio is more critical than video for many applications, but its
importance (relative to other packets in the flow) is still an
application decision (requirements: REQ-MEDIA-AV-SEPARATE,
REQ-MEDIA-CLIENT-DECIDES). For example, the ability of the receiver to change the priority by communicating to the network -- without cooperation of the sender -- gives a hearing-impaired user the ability to adjust video above audio.</t>
        <t>Especially with media over QUIC, the server (or relay) sends the same
stream to many receivers, including the same metadata.  Thus, when a
client needs different prioritization (e.g., video over audio or the other way around), this
is only achievable by signaling that priority inversion from the
client to the ISP router (requirement: REQ-CLIENT-DECIDES).</t>
        <t>Examples: live broadcast, on-demand video streaming</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-MEDIA-KEYFRAME:</dt>
          <dd>
            <t>Video contains partial frames and full frames, which need to be distinguished so that
full frames can be indicated to the network.</t>
          </dd>
          <dt>REQ-MEDIA-AV-SEPARATE:</dt>
          <dd>
            <t>Audio can be prioritized differently than video.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>In loss-prone networks or during reactive policy events, retransmissions cause long delays. All packets being treated the same can have challenges in efficiently handling/forwarding data. Today, there is no way to identify packets which are less important and/or loss-tolerant to prioritize packets in challenging networks and/or during reactive events.</t>
          </li>
          <li>
            <t>Some media frames may be able to tolerate more delay over the wire than others (e.g., live media frames require very low latency while a background image for augmented reality may be delivered with more delay tolerance).  Even when the media payload is not encrypted, the network has no means to distinguish these different requirements.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-interactive">
        <name>Interactive Media</name>
        <t>Interactive media includes content that a user can actively engage with and results in input and response actions that can be highly delay-sensitive.</t>
        <t>Examples: VoIP (Peer-to-Peer (P2P), group conferencing), gaming, eXtended Reality (XR).</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PACKET-NATURE:</dt>
          <dd>
            <t>The receiver indicates that a flow is interactive and requests that the network honors the incoming flow's
per-packet signals, which prevents denial of service of mis-marked incoming flows.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>A mobile/roaming user prioritizes audio over video during a VoIP call to have a seamless meeting experience.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-preferences">
        <name>User Preferences</name>
        <t>A game or VoIP application may want to signal different metadata for the same type of packet in each direction.
For example, for a game, video in the server-to-client direction might be more important than audio, whereas input devices (e.g., keystrokes) might be more important than audio.  Each user can have varied preferences for the same type of data originating from the server.</t>
        <t>Determination of such preferences is outside of the scope of this document.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-CLIENT-DECIDES:</dt>
          <dd>
            <t>The receiving client determines importance of packets it receives, as the client may have changing needs over time.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Dynamic changes to priority based on user activity is not possible today. For example, audio packets having the same priority when a user mutes the audio locally, or change in priority during times of emergency where video streaming applications share the same priority as SOS signals.</t>
          </li>
          <li>
            <t>A user prioritizing video over audio while playing an interactive game.</t>
          </li>
          <li>
            <t>User's foreground application should receive priority over background tasks. For example, a user is typing in a document while playing a media in the background within the same session.</t>
          </li>
        </ol>
      </section>
      <section anchor="mixed-traffic">
        <name>Mixed Traffic</name>
        <t>Mixed traffic can contain multiple types of data flowing through the same 5-tuple connection. They may include digital models of the real world, multimedia content, virtualized desktop/apps, and interactive engagement.</t>
        <t>In cases where the wireless network has to drop or delay processing, all packets of the media frame or stream are treated in the same manner.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PACKET-RELIABILITY:</dt>
          <dd>
            <t>Indicate if a packet is treated as reliable or unreliable by the application.</t>
          </dd>
          <dt>REQ-PACKET-NATURE:</dt>
          <dd>
            <t>Indicate if a packet belongs to bulk traffic or interactive traffic.</t>
          </dd>
        </dl>
        <t>Examples: Virtual Apps and Desktops.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Document being printed/saved while being edited. The interactive traffic has higher priority over bulk traffic).</t>
          </li>
          <li>
            <t>File download while intearacting with the webpage. With QUIC, this could occur with the same webserver. Interactive activity performed with the webpage higher priority over file download.</t>
          </li>
          <li>
            <t>In graphics remoting, Critical Glyphs (Reliable) has more priority over Smoothing Glyphs (unreliable) during reactive events.</t>
          </li>
        </ol>
      </section>
      <section anchor="honoring-of-metadata-for-servers-behind-a-gateway">
        <name>Honoring of Metadata for Servers Behind a Gateway</name>
        <t>In enterprise networks and remote desktop use case, a server can host multiple connections with varying type of traffic. These servers are often exposed to the Internet through some sort of a gateway-proxy and the signaling (like DSCP bits) from these servers are often ignored by the access/transit networks.</t>
        <t>Requirement: REQ-CLIENT-DECIDES as defined previously.</t>
      </section>
    </section>
    <section anchor="operational">
      <name>Operational Considerations</name>
      <t>Traffic policing and shaping are enforced in ingress/egress network points for various reasons (protect the network against attacks, ensure conformance with a trafic profile, etc.). Out-of-profile trafic may be discarded or assigned another class (e.g., using Lower Effort Per-Domain Behavior (LE PDB) <xref target="RFC3662"/>) a bandwidth limit among others. The exact behavior is policy-based and deployment-specific.</t>
      <t>The entire set of operations to manage traffic is beyond the scope of this document.
This section focuses on operational constraints that impact  server – network, and host – network modes of sending metadata.</t>
      <section anchor="policy">
        <name>Policy Enforcement</name>
        <t>Some metadata requires the network to share some hints with a host to adjust its behavior for some specific flows.
However, that metadata may have a dependency on the service offering that is subscribed by a user.</t>
        <t>Let us consider the example of a bitrate for an optimized video delivery. <em>Such bitrate may not be computed system-wide</em> given that flows from users with distinct service offerings (and connectivity SLOs) may be serviced by the same network nodes. Instead, the network needs to dynamically adjust the bitrate based on each user's service package and connectivity SLOs to ensure optimal delivery for all users (REQ-METADATA-ACCURACY).</t>
        <t>Requirement:  REQ-METADATA-ACCURACY.</t>
      </section>
      <section anchor="classification">
        <name>Redundant Functions and Classification Complications</name>
        <t>If distinct channels are used to share the metadata between a host and a network, a network that engages in the collaborative signaling approach will require sophisticated features to classify flows and decide which channel is used to share metadata so that it can consume that information.</t>
        <t>Likewise, the network will require to implement redundant functions; for each signaling interface.</t>
        <t><em>As such, application- and protocol-specific signaling channels are suboptimal.</em> (REQ-SINGLE-CHANNEL)</t>
        <t>Requirement:  REQ-SINGLE-CHANNEL is preferred.</t>
      </section>
      <section anchor="metadata-scope">
        <name>Metadata Scope</name>
        <t>An operational challenge for sharing resource-quota like metadata (e.g., maximum bitrate) is that the network is generally not entitled to allocate quota per-application, per-flow, per-stream, etc. that delivered as part of an Internet connectivity service.  However, the network has a visibility about the overall network attachment (e.g. inbound/outbound bandwidth discussed in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>).</t>
        <t>As such, hints about resource-like metadata is bound by default to the overall network attachment, not specific to a given application or flow.</t>
        <t>Most importantly, the metadata can be used by the network to prioritize traffic within a single 5-tuple connection and metadata cannot be leveraged for prioritization between different flows.</t>
        <t>It is out of the scope of this document to discuss setups (e.g., 3GPP PDU Sessions) where network attachments with Guaranteed Bit Rate (GBR) for specific flows is provided.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-SCOPED-METADATA:</dt>
          <dd>
            <t>Means to characterize the scope of a shared metadata for the sake of better interoperability should be supported.</t>
          </dd>
        </dl>
      </section>
      <section anchor="multiple-bottlenecks">
        <name>Multiple Bottlenecks</name>
        <t>Whereas models often show a single bottleneck, there are frequently
two (or more) bottlenecks: the ISP network and within the subscriber
network (e.g., Wi-Fi link).  As such, all bottlenecks near the
subscriber should be able to benefit from network/host collaboration.</t>
        <t>Requirement: REQ-MULTIPLE-BOTTLENECKS should be supported.</t>
      </section>
      <section anchor="app-interference">
        <name>Application Interference</name>
        <t>Applications that have access to a resource-quota information may adopt an aggressive behavior (compared to those that don't have access) if they assumed that a resource-quota like metadata is for the application, not for the host that runs the applications.</t>
        <t>This is challenging for home networks where multiple hosts may be running behind the same CPE, with each of them running a video application. The same challenge may apply when tethering is enabled.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-SIGNAL-EXPOSURE-FAIRNESS:</dt>
          <dd>
            <t>Means to expose the signal independent of the application should be considered. An example of such exposure is OS APIs.</t>
          </dd>
        </dl>
      </section>
      <section anchor="privacy">
        <name>Privacy Considerations</name>
        <t>Encrypted media payloads along with temporary IPv6 addresses between a server and user (client) provide a measure of privacy for the content and the identity of the user.
It should, however, be noted that media flows (e.g., encrypted video payloads in SRTP) exhibit a pattern of bursts and intervals that amounts to a signature and is vulnerable to frequency analysis.
To avoid this kind of frequency analysis, media sent by the server would need to be scheduled or multiplexed differently to each user/recipient.
This may be possible in transports like QUIC which allows flexibility in scheduling each stream.
Transports like QUIC also fully encrypt the entire stream and, therefore, no media headers are observable on-path either.
The security aspects of the media payload / transport are not in the scope of this document and is described here only to provide context for metadata privacy.</t>
        <t>Some metadata (e.g., the size of a burst of packets, sequence number, and timestamp) can be readily observed or inferred by entities
along the network path. However, it is essential to recognize that while sequence numbers and timestamps are typically visible in
the clear-text headers of protocols (e.g., TCP, RTP, or SRTP) they are not directly observable in encrypted protocols such as QUIC. All metadata sent
from the server to the network, including these elements and others, are vulnerable to modification while in transit. Only an
on-path attacker can modify on-path metadata. Such an attacker could engage in other malicious activities, like corrupting the checksum or
completely dropping the packet. For instance, an active attacker could alter the metadata to mislabel packets containing video key-frames
as unimportant, but such changes are detectable by the receiver.</t>
        <t>It is recommended to encrypt or obfuscate the metadata information so it is only available to hosts and to authorized network elements. The method of encryption or obfuscation is not described in this document but rather in other documents describing how this metadata is encoded and exchanged amongst hosts and network elements. The privacy implications of revealing metadata to network elements need to be thoroughly analyzed. This analysis should ensure that any exposure of metadata does not compromise user privacy or allow unauthorized entities to infer sensitive information about the data being transmitted while maintaining minimal resource consumption.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PRIVACY-ADDITIONAL:</dt>
          <dd>
            <t>An on-path observer obtains no additional information about the IP packet.</t>
          </dd>
          <dt>REQ-SIGNALING-AVOIDANCE:</dt>
          <dd>
            <t>Leveraging previous experience <xref target="RFC9049"/>, the folliwing is not required to make use of the collaborative signaling:
</t>
            <ul spacing="normal">
              <li>
                <t>Reveal the application identity.</t>
              </li>
              <li>
                <t>Expose the application cause (or 'reason') to signal metadata.</t>
              </li>
              <li>
                <t>Reveal server identity.</t>
              </li>
              <li>
                <t>Inspect client-to-server encrypted payload by network elements.</t>
              </li>
            </ul>
          </dd>
        </dl>
      </section>
      <section anchor="scalability">
        <name>Scalability</name>
        <t>There may be a large number of media flows handled by the server and wireless/access router.</t>
        <t>Per flow information (state) at a wireless router for optimizing the flow can negate the advantages offered as the number of flows handled increases.</t>
        <t>The metadata and other state information that a router has to maintain for each additional media flow it handles should be kept to a minimum or eliminated altogether.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-ISP-SCALE:</dt>
          <dd>
            <t>The metadata other state information that a wireless router has to maintain for each additional media flow it handles should be very low or none.</t>
          </dd>
        </dl>
      </section>
      <section anchor="continuity">
        <name>Session Continuity</name>
        <t>The general trend in wireless networks is to deploy the wireless router closer to the user.
This can help with low link latency but can result in more frequent handovers as the user moves between routers.
The frequency of handovers increases when a user moves faster or when the media session lasts longer.</t>
        <t>During handovers, there should be minimal delay incurred during handover in configuring/setting up the metadata of a media session in progress.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-CONTINUITY:</dt>
          <dd>
            <t>Handover from one radio or router to another should continue to provide same service level.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abuse">
        <name>Abuse and Constraints</name>
        <t>It is important that not every flow be prioritized; otherwise, the network devolves into the best-effort network that existed prior to metadata signaling. It is a requirement that mechanisms exist to prevent this occurrence.</t>
        <t>Such a mechanism might be simple, for example, a cellular network might allow one flow from a subscriber to declare itself as important; other flows with that subscriber are denied attempts to prioritize themselves. However, the network cannot identify whether the prioritized flow is legitimate or malicious.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-SIGNAL-VALIDATION:</dt>
          <dd>
            <t>The network/OS needs to ensure that the user/client signaling of priority (if any) does not associate the same priority level with all traffic types within the same flow, thereby avoiding prioritizing of all the streams/traffic the same way.</t>
          </dd>
          <dt>REQ-CLIENT-VALIDATION:</dt>
          <dd>
            <t>The network needs to ensure the signal is coming from the same user/client that is part of the 5-tuple flow. This is to ensure no other application influences the priority of another application's flow.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="metadata-req">
      <name>On-path Metadata Requirements</name>
      <t>There are various approaches for collaborative signaling between the server/host and network including out-of-band signaling, client-centric metadata sharing and proxied connections.
The requirements here focus on proxied metadata connections on path with the data traffic.</t>
      <t>The path signals below should follow the principles of intentional distribution, protection of information, minimization and limiting impact as described in <xref target="RFC9419"/> and <xref target="RFC8558"/>.
Leveraging previous experience (<xref target="RFC9049"/>), the metadata signals does not need application identity, application cause (or 'reason'), server identity or the inspection of client(host)-to-server encrypted payload.</t>
      <t>The metadata connections may be between server and network (in either direction) or between host and network (in either direction).</t>
      <t>Some use cases benefit from server – network metadata exchanges (<xref target="server-network"/>) and others need client involvement (<xref target="host-network"/>).</t>
      <t>For the requirements that follow, the assumption is that the client agrees to the exchange of metadata between the server and network, or between the client and network.</t>
      <t>Requirement:</t>
      <dl>
        <dt>REQ-PACKET-SELF:</dt>
        <dd>
          <t>Packet importance is indicated by the packet itself.</t>
        </dd>
      </dl>
      <t>Note REQ-PACKET-SELF should meet the requirements of <xref target="privacy"/> especially REQ-PRIVACY-ADDITIONAL.</t>
      <section anchor="host-network">
        <name>Host-Network Metadata</name>
        <section anchor="interflow-priority">
          <name>Priority between Flows (Inter-flow)</name>
          <t>Certain flows being received by a host (or by an application on a host) are less or more important than other flows of <em>the same host</em>.
For example, a host downloading a software update is generally considered less important than another host doing interactive audio/video or gaming.
By signaling the relative importance of flows to a network element, the network element can (de-)prioritize those flows to best accommodate the needs of the various applications on a same host.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark packets that interfere with the desires of the receiving host -- making their flows more important than what the receiving host considers more important.
This eventually causes all flows to be marked as important, or -- more likely -- such priority markings to be ignored.</t>
          <t>However, prioritizing between flows presents challenges because the host can have both malicious and legitimate applications, and the remote peers can also be malicious and benign.</t>
          <t>There is no requirement associated with this use case.</t>
        </section>
        <section anchor="intra-flow-priority">
          <name>Priority within a Flow (Intra-Flow)</name>
          <t>Interactive Audio/Video has long been using <xref target="RFC3550"/> which runs over UDP.  As described in Section 2.3.7.2 of <xref target="RFC7478"/>, there is value in differentiating between voice, video and data.
Today's video streaming is exclusively over TCP but will migrate to QUIC and eventually is likely to support unreliable transport (<xref target="RFC9221"/>, <xref target="I-D.ietf-moq-transport"/>).  With unreliable transport of video in RTP or QUIC, it is beneficial to differentiate the important video keyframes from other video frames.</t>
          <t>Other applications, as mentioned in <xref target="uc"/>, such as gaming and remote desktop also benefit from differentiating their packets to the network.</t>
          <t>Many of these flows do not originate from a content provider's network -- rather, they originate from a peer (e.g., VoIP, interactive video, peer-to-peer gaming, Remote Desktop, and CDN). Thus, the flows originate from an IP address that is not known before connection establishment, so there needs to be a way for the client to authorize the network elements to receive and hopefully to honor the metadata of those packets from a remote peer.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark every packet of a flow as important, causing much the same problem as the previous use case.
Eventually, when all packets of every flow are marked as important, there is no differentiation between packets within a flow, rendering the network unable to improve reactive policy decisions.</t>
          <t>Requirements: The requirements vary based on use case and user preference. The requirements listed in <xref target="uc"/> are applicable here.</t>
        </section>
      </section>
      <section anchor="network-host">
        <name>Network-Host Metadata</name>
        <section anchor="assisted-offload">
          <name>Assisted Offload</name>
          <t>There are cases (crisis) where "normal" network resources cannot be
used at maximum and, thus, a network would seek to reduce or offload
some of the traffic during these events -- often called 'reactive
traffic policy'.  An example of such use case is cellular networks
that are overly used (and radio resources exhausted) such as a large
collection of people (e.g., parade, sporting event), or such as a
partial radio network outage (e.g., tower power outage).  During such
a condition, an alternative network attachment may be available to
the host (e.g., Wi-Fi).</t>
          <t>Network-to-host signals are useful to put in place adequate traffic
distribution policies on the host (e.g., prefer the use of alternate paths,
offload a network) (REQ-NETWORK-SEEKS-LOAD-DOWN).</t>
        </section>
        <section anchor="nrlp">
          <name>Network Bandwidth &amp; Network Rate Limiting Policies</name>
          <t>Bandwidth constraints exist most predominantly at the access network. This can be constraints in the network itself or a result of rate limiting due to various reasons.</t>
          <t>Also, traffic exchanged over a network attachment may be subject to rate-limit policies. These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription) or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation).</t>
          <t>Requirements:</t>
          <dl>
            <dt>REQ-NETWORK-THROUGHPUT:</dt>
            <dd>
              <t>A mechanism to signal the available network throughput to interested hosts, including changes to throughput.</t>
            </dd>
            <dt>REQ-NRLP:</dt>
            <dd>
              <t>The network shall inform the host of the Rate limiting policies</t>
            </dd>
          </dl>
          <t>Use cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>Performance Optimization: Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals will improve overall network performance and can help optimize the data transfer. Signaling bandwidth availability allows hosts to avoid contributing to network congestion.</t>
            </li>
            <li>
              <t>Dynamic Adaptation: When the network informs the host about available bandwidth, the host can dynamically adjust its data transmission rate.</t>
            </li>
            <li>
              <t>Efficient Resource Utilization: Knowing available bandwidth helps the host allocate resources efficiently.</t>
            </li>
            <li>
              <t>Auto-Scaling Applications: Cloud-based applications can auto-scale based on available bandwidth.</t>
            </li>
            <li>
              <t>Rate Limiting: Monthly data quotas on cellular networks can be easily exceeded by video streaming, in particular, if the client chooses excessively high quality or routinely abandons watching videos that were downloaded. The network can assist the client by informing the client of the network's bandwidth policy.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="server-network">
        <name>Server-Network Metadata</name>
        <section anchor="mdu-stream-id">
          <name>Identification of Media Frames and Streams</name>
          <t>Feedback provided by ECN/L4S to the server (UDP sender) is not fast enough to adjust the sending rate when available wireless capacity changes significantly in very short periods of time (~ 1 millisecond).
Differentiating using multiple DSCP codes does not provide the resolution required to classify media frames or streams and adapt to changes in coding due to dynamic content or resulting from network conditions.</t>
          <t>Relative priority and tolerance to delay of media frames or streams can be used to optimize traffic shaping at the wireless router.
The application can provide information to detect the start, end and set of packets that belong to a media frame.
Alternatively, the application may provide information to identify one stream of the flow from another.
The application provides information to identify either media frames or streams in a flow but not both.</t>
          <t>In cases where the wireless network has to drop or delay processing, all packets of the media frame or stream are treated in the same manner.</t>
          <t>Requirements:</t>
          <dl>
            <dt>REQ-FRAME-START:</dt>
            <dd>
              <t>Indicate packet containing start of media frame.</t>
            </dd>
            <dt>REQ-FRAME-MIDDLE:</dt>
            <dd>
              <t>Indicate packet containing middle(s) of media frame.</t>
            </dd>
            <dt>REQ-FRAME-END:</dt>
            <dd>
              <t>Indicate packet containing end of media frame.</t>
            </dd>
          </dl>
        </section>
        <section anchor="TrafficType">
          <name>Identification of Traffic Type without Disclosure of the Application</name>
          <t>Different nature/types of traffic can be part of the same 5-tuple flow. This could be reliable/loss-tolerant <xref target="RFC9221"/>, bulk/interactive traffic. The type of traffic can be used to prioritize/buffer packets as needed and deprioritize/discard appropriate packets during reactive events, thereby optimizing performance. The application may provide information to identify the type of traffic in per-packet metadata.</t>
          <t>Requirements: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in <xref target="mixed-traffic"/>.</t>
        </section>
        <section anchor="relative-priority">
          <name>Relative Priority</name>
          <t>Relative importance of a media frame provides the priority level of one media frame over another media frame within a stream.
The application server determines the importance based on the media encoded in the media frame (e.g., a base layer video I-frame has higher priority than an enhanced layer P-frame).
Importance may be used to determine drop priority of a media frame in cases of extreme congestion in the wireless network.</t>
          <t>Relative importance of a media stream  is the priority level of one media stream over another stream in the flow (with the same IP 5-tuple).
As with media frames, importance may be used to determine drop priority in cases of extreme congestion in the wireless network.</t>
          <t>There is no requirement associated with this use case.</t>
        </section>
        <section anchor="delay">
          <name>Tolerance to Delay</name>
          <t>Some media frames may be able to tolerate more delay over the wire than others (e.g., live media frames require very low latency while a background image for augmented reality may be delivered with more delay tolerance).
Similarly, some media streams can tolerate more delay over the wire than others (e.g., a stream carrying a background image may tolerate more delay).
ams may be able to tolerate more delay over the wire than others (e.g., a stream carrying a background image for augmented reality may be delivered with more delay tolerance).
Even when the media payload is not encrypted, the network has no means to distinguish these different requirements.</t>
          <t>If the application can indicate that a media frame or stream can tolerate high delay the wireless router can opt to delay packets rather than drop during transient congestion periods.</t>
          <t>Requirements:</t>
          <t>REQ-DELAY-TOLERANCE: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in <xref target="mixed-traffic"/>.</t>
        </section>
        <section anchor="burst">
          <name>Burst Indication</name>
          <t>Media flows can have large and unexpected variations in packet bursts due to dynamic changes in content, server estimation of network conditions and pacing behavior.
Encoding of live video, and multimodal media can only increase the burst size that a server has to contend with sending out in a relative smoothed out manner.
The burst size is observable on the wire, but can only be determined by the end of the burst of packets.
Wireless networks on the other hand cannot reserve resources for the maximum burst size allowed as that will likely lead to poor utilization of radio resources or tail drops.</t>
          <t>The server may provide burst size at the beginning of the burst to allow the scheduler to reserve sufficient resources (and avoid having too few resources that may lead to a tail drop).
The server may also signal end of burst that provides information for the radio to go into sleep mode (Connected Mode Discontinuous Reception, C-DRX) if there is no paging message.</t>
          <dl>
            <dt>REQ-BURST-INDICATOR:</dt>
            <dd>
              <t>Client indicates this flow's maximum burst to
ISP, and ISP agrees it can handle that burst size.  (but what does ISP
router do with the burst? Needs to be described above!)</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="non-req">
      <name>Non-Requirements</name>
      <t>Application feedback with measurements of packets lost and delay incurred may affect the sending rate and other behavior of the application.
The requirements and specification to mitigate these aspects are not in the scope of this document.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Security aspects for the metadata are discussed in <xref target="privacy"/>.
The principles outlined in <xref target="RFC8558"/>, <xref target="RFC9049"/> and <xref target="RFC9419"/> contain security considerations and are referenced in <xref target="metadata-req"/>.</t>
      <t>This document has no other security considerations.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a merge of <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> and <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>.</t>
      <dl>
        <dt>Acknowledgments from <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>:</dt>
        <dd>
          <t>Xavier De Foy and the authors of this draft have discussed the similarities and differences of this draft with the MoQ draft for carrying media metadata.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors wish to thank Mike Heard, Sebastian Moeller and Tom Herbert for discussions on metadata fields, fragmentation and various transport aspects.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors appreciate input from Marcus Ilhar and Magnus Westerlund on the need to address privacy in general and Dan Druta to consider a common transport across various host to network signaling when possible.
Ruediger Geib suggested that limiting the amount of state information that a wireless router has to keep for a flow should be minimized.</t>
        </dd>
        <dt/>
        <dd>
          <t>Ingemar Johansson's suggestions on fast fading (which L4S handles) and dramatic drops in wireless accesses have been helpful to identify the issues.
Thanks to Hang Shi for the review and comments on host-to-network signaling.
Thanks to Luis Miguel Contreras for his review and comments.</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="TR.23.501-3GPP">
        <front>
          <title>3rd Generation Partnership Project; Technical Specification Group Servies and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="TR.23.700-60-3GPP">
        <front>
          <title>Study on XR (Extended Reality) and media services (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="_5G-Lumos">
        <front>
          <title>Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput, Arvind Narayanan et al., ACM Internet Measurement Conference (IMC '20), https://dl.acm.org/doi/10.1145/3419394.3423629</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
        <front>
          <title>Bandwidth measurement for QUIC</title>
          <author fullname="Zafer Gurel">
            <organization/>
          </author>
          <author fullname="Ali C. Begen">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="RFC6077">
        <front>
          <title>Open Research Issues in Internet Congestion Control</title>
          <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
          <author fullname="M. Welzl" initials="M." surname="Welzl"/>
          <author fullname="M. Scharf" initials="M." surname="Scharf"/>
          <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
          <date month="February" year="2011"/>
          <abstract>
            <t>This document describes some of the open problems in Internet congestion control that are known today. This includes several new challenges that are becoming important as the network grows, as well as some issues that have been known for many years. These challenges are generally considered to be open research topics that may require more study or application of innovative techniques before Internet-scale solutions can be confidently engineered and deployed. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6077"/>
        <seriesInfo name="DOI" value="10.17487/RFC6077"/>
      </reference>
      <reference anchor="RFC9419">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RFC8825">
        <front>
          <title>Overview: Real-Time Protocols for Browser-Based Applications</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>This document gives an overview and context of a protocol suite intended for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web".</t>
            <t>It intends to serve as a starting and coordination point to make sure that (1) all the parts that are needed to achieve this goal are findable and (2) the parts that belong in the Internet protocol suite are fully specified and on the right publication track.</t>
            <t>This document is an applicability statement -- it does not itself specify any protocol, but it specifies which other specifications implementations are supposed to follow to be compliant with Web Real-Time Communication (WebRTC).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8825"/>
        <seriesInfo name="DOI" value="10.17487/RFC8825"/>
      </reference>
      <reference anchor="RFC3550">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC9335">
        <front>
          <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
          <author fullname="J. Uberti" initials="J." surname="Uberti"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="S. Murillo" initials="S." surname="Murillo"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations.</t>
            <t>This document updates RFC 3711, the SRTP specification, and defines Cryptex as a new mechanism that completely encrypts header extensions and CSRCs and uses simpler Session Description Protocol (SDP) signaling with the goal of facilitating deployment.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9335"/>
        <seriesInfo name="DOI" value="10.17487/RFC9335"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC3662">
        <front>
          <title>A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <author fullname="K. Nichols" initials="K." surname="Nichols"/>
          <author fullname="K. Wehrle" initials="K." surname="Wehrle"/>
          <date month="December" year="2003"/>
          <abstract>
            <t>This document proposes a differentiated services per-domain behavior (PDB) whose traffic may be "starved" (although starvation is not strictly required) in a properly functioning network. This is in contrast to the Internet's "best-effort" or "normal Internet traffic" model, where prolonged starvation indicates network problems. In this sense, the proposed PDB's traffic is forwarded with a "lower" priority than the normal "best-effort" Internet traffic, thus the PDB is called "Lower Effort" (LE). Use of this PDB permits a network operator to strictly limit the effect of its traffic on "best-effort"/"normal" or all other Internet traffic. This document gives some example uses, but does not propose constraining the PDB's use to any particular type of traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3662"/>
        <seriesInfo name="DOI" value="10.17487/RFC3662"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="29" month="May" year="2024"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-13"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals. For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear. Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements. In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels. Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.ietf-moq-transport">
        <front>
          <title>Media over QUIC Transport</title>
          <author fullname="Luke Curley" initials="L." surname="Curley">
            <organization>Discord</organization>
          </author>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Meta</organization>
          </author>
          <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
            <organization>Cisco</organization>
          </author>
          <author fullname="Victor Vasiliev" initials="V." surname="Vasiliev">
            <organization>Google</organization>
          </author>
          <author fullname="Ian Swett" initials="I." surname="Swett">
            <organization>Google</organization>
          </author>
          <date day="29" month="May" year="2024"/>
          <abstract>
            <t>   This document defines the core behavior for Media over QUIC Transport
   (MOQT), a media transport protocol designed to operate over QUIC and
   WebTransport, which have similar functionality.  MOQT allows a
   producer of media to publish data and have it consumed via
   subscription by a multiplicity of endpoints.  It supports
   intermediate content distribution networks and is designed for high
   scale and low latency distribution.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-moq-transport-04"/>
      </reference>
      <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
        <front>
          <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
          <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Dan Wing" initials="D." surname="Wing">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="14" month="February" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
