<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rwbr-tsvwg-signaling-use-cases-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Collaborative Host/Network Signaling: Use Cases">Signaling Use Cases for Collaborative Traffic Differentiation</title>
    <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-00"/>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Web and Internet Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>user experience</keyword>
    <keyword>bandwidth</keyword>
    <keyword>priority</keyword>
    <keyword>enriched feedback</keyword>
    <keyword>media streaming</keyword>
    <keyword>realtime media</keyword>
    <keyword>QoS</keyword>
    <keyword>5G</keyword>
    <keyword>Wi-Fi</keyword>
    <keyword>WiFi</keyword>
    <keyword>diffserv</keyword>
    <abstract>
      <?line 70?>

<t>Host-to-network (and vice versa) signaling can improve the user experience by informing
the network which flows are more important and which packets within a
flow are more important without having to disclose the content of the packets being delivered. The differentiated service may be provided
at the network (e.g., packet discard preference), the sender (e.g.,
adaptive transmission or session migration), or through cooperation of both the host
and the network.</t>
      <t>This document outlines a set of use-cases that highlight the need for a mechanism
to share metadata about flows between a host and its network in order to enable different traffic treatment.
Such a mechanism is typically implemented using a signaling protocol between the host and
a set of trusted netwrok elements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/signaling-use-cases/draft-wing-tsvwg-signaling-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rwbr-tsvwg-signaling-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport and Services Working Group Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/signaling-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Bandwidth constraints exist most predominantly at the access network (e.g., radio access networks).
Users who are serviced via these networks use various hosts which run various
applications; each having different connectivity needs for an optimal user
experience. These needs are not frozen but change over time
depending on the application and even depending on how an application
is used (e.g., user's preferences).</t>
      <t>The simple network diagram below shows where such bandwidth and
performance constraints usually exist with a "B" (for Bottleneck).
Other network bottlenecks may be experienced in other segments not shown
in the figure, such as interconnection links or the infrastructure that hosts the service (e.g.,
flash crowds). A bottleneck may be limited in time, present or not regular patters, etc.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="520" viewBox="0 0 520 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,48 L 8,80" fill="none" stroke="black"/>
            <path d="M 48,48 L 48,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
            <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
            <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
            <path d="M 176,80 L 176,128" fill="none" stroke="black"/>
            <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
            <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,48 L 280,80" fill="none" stroke="black"/>
            <path d="M 336,48 L 336,80" fill="none" stroke="black"/>
            <path d="M 352,32 L 352,56" fill="none" stroke="black"/>
            <path d="M 352,72 L 352,128" fill="none" stroke="black"/>
            <path d="M 368,48 L 368,80" fill="none" stroke="black"/>
            <path d="M 424,48 L 424,80" fill="none" stroke="black"/>
            <path d="M 440,32 L 440,56" fill="none" stroke="black"/>
            <path d="M 440,72 L 440,128" fill="none" stroke="black"/>
            <path d="M 456,48 L 456,80" fill="none" stroke="black"/>
            <path d="M 496,48 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 152,32" fill="none" stroke="black"/>
            <path d="M 8,48 L 48,48" fill="none" stroke="black"/>
            <path d="M 200,48 L 256,48" fill="none" stroke="black"/>
            <path d="M 280,48 L 336,48" fill="none" stroke="black"/>
            <path d="M 368,48 L 424,48" fill="none" stroke="black"/>
            <path d="M 456,48 L 496,48" fill="none" stroke="black"/>
            <path d="M 48,64 L 64,64" fill="none" stroke="black"/>
            <path d="M 80,64 L 96,64" fill="none" stroke="black"/>
            <path d="M 152,64 L 168,64" fill="none" stroke="black"/>
            <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
            <path d="M 256,64 L 280,64" fill="none" stroke="black"/>
            <path d="M 336,64 L 368,64" fill="none" stroke="black"/>
            <path d="M 424,64 L 456,64" fill="none" stroke="black"/>
            <path d="M 8,80 L 48,80" fill="none" stroke="black"/>
            <path d="M 200,80 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,80 L 336,80" fill="none" stroke="black"/>
            <path d="M 368,80 L 424,80" fill="none" stroke="black"/>
            <path d="M 456,80 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,96 L 152,96" fill="none" stroke="black"/>
            <g class="text">
              <text x="116" y="52">WLAN</text>
              <text x="28" y="68">host</text>
              <text x="72" y="68">B</text>
              <text x="124" y="68">access</text>
              <text x="176" y="68">B</text>
              <text x="228" y="68">router</text>
              <text x="308" y="68">router</text>
              <text x="396" y="68">router</text>
              <text x="476" y="68">host</text>
              <text x="120" y="84">point</text>
              <text x="392" y="116">Transit</text>
              <text x="488" y="116">Content</text>
              <text x="44" y="132">User</text>
              <text x="96" y="132">Network</text>
              <text x="224" y="132">ISP</text>
              <text x="272" y="132">Network</text>
              <text x="392" y="132">Network</text>
              <text x="488" y="132">Network</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
           +------+  |                     |          |
+----+     |WLAN  |  |  +------+  +------+ | +------+ | +----+
|host+--B--+access+--B--+router+--+router+---+router+---+host|
+----+     |point |  |  +------+  +------+ | +------+ | +----+
           +------+  |                     |          |
                     |                     | Transit  |  Content
   User Network      |    ISP Network      | Network  |  Network
]]></artwork>
      </artset>
      <t>Complications that are induced by such phenomena may be eliminated by
adequate dimensioning and upgrades. However, such upgrades may not
be always immediately possible or economically justified.</t>
      <t>Complementary mitigations are thus needed to soften these complications
by introducing some collaboration between hosts and networks to adjust
their behaviors.</t>
      <t>For traffic sent in either direction, the network network elements
that terminate a bandwidth constraining link (or located few hops next to that element) can be fed
with flow metadata. Such augmentation allows those network elements
to make autonomous decisions to prioritize, delay, or drop packets,
especially when performing reactive resource management. Absent such metadata,
these network elements have no means to guide the enforcement of the reactive
resource policy.</t>
      <t>There are several challenges with this metadata augmentation:</t>
      <ul spacing="normal">
        <li>
          <t>for hosts: which data to share without privacy breach or lowering confidentiality.</t>
        </li>
        <li>
          <t>for network elements:  </t>
          <ul spacing="normal">
            <li>
              <t>Deciding which metadata to trust</t>
            </li>
            <li>
              <t>Tradeoff between the extra cost (including processing) vs. expected benefits</t>
            </li>
            <li>
              <t>Impact on the network operations</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>The metadata signals from a content provider are more likely to be
authentic (if adequate authorization/validation are in place) but the metadata signals from other hosts may be "wrong",
undesired by the peer host, or maliciously contain improper metadata.
Attempts to automate identification of content providers have included
HTTP "Host" header inspection and TLS SNI inspection which are
expected to fail as encrypted SNI and privacy-enhancing proxies
become more prevalent. Another mechanism to authorize metadata
signals from a content provider is to configure the ISP equipment
with the content network's source IP addresses (or other labels that
may be visible on the packets) and provide a differentiated service
to the traffic that match these criteria. However, such an arrangement
may have scalability issues. An approach to mitigate these issues is to limit
the target contents networks and networks that would put in place these arrangements.
Such limitations would benefit large players (large ISPs and large content network) and
disadvantages small players (and new players).  A more egalitarian
approach would provide the same benefit to all parties -- large and
small -- and also provide richer signaling to further improve user
experience and metadata interoperability. This would allow all parties
to become part of the "Internet fast lane".</t>
      <t>The authorization problem exists with technologies as relatively
simple as DiffServ and the problem persists with many other
recently discussed metadata signaling mechanisms, including
embedding information in the UDP payload
(<xref target="I-D.trammell-plus-spec"/>), UDP options
(<xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>), overloading
the IPv6 Flow Label (<xref target="I-D.cc-v6ops-wlcg-flow-label-marking"/>,
and Hop-by-Hop Options.  One mechanism suggested occasionally is
to encrypt or integrity protect the metadata with a key; such a key
could be established using a signaling protocol, see <xref target="key"/>.</t>
      <t>There is some consensus that applications can benefit by collaborative signaling
the network (<xref target="IAB"/>, <xref target="ATIS"/>).  This document provides
use-cases to further detail the need of such signaling.</t>
    </section>
    <section anchor="scope-running-experiments">
      <name>Scope &amp; Running Experiments</name>
      <t>This document does not intend to define any signaling protocol
nor call whether a new signaling protocol, a new extension, one or more
signaling protocols are needed.</t>
      <t>However, this document provides a reference to digest the intended
benefits for enabling collaborating between hosts and networks. These
benefits are yet to be backed up with more evidence. Some experimental
work would be reasonable to be endorsed by the IETF to solicit more
feedback and collect assess the benefits under various setups.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <dl>
        <dt>Intentional Management:</dt>
        <dd>
          <t>network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>network reactions to congestion events, with very short to very long
durations  (e.g., varying wireless and mobile air
interface conditions).</t>
        </dd>
      </dl>
    </section>
    <section anchor="various-approaches-for-collaborative-signaling">
      <name>Various Approaches for Collaborative Signaling</name>
      <t><xref target="design-approaches"/> depicts examples of approaches to establish channels to convey
and share metadata between hosts, networks, and servers.</t>
      <t>Metadata exchanges can occur in one single direction or both directions of a flows.</t>
      <figure anchor="design-approaches">
        <name>Candidate Signaling Approaches</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="672" width="552" viewBox="0 0 552 672" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,112" fill="none" stroke="black"/>
              <path d="M 8,272 L 8,304" fill="none" stroke="black"/>
              <path d="M 8,512 L 8,544" fill="none" stroke="black"/>
              <path d="M 40,112 L 40,192" fill="none" stroke="black"/>
              <path d="M 40,304 L 40,432" fill="none" stroke="black"/>
              <path d="M 40,544 L 40,656" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,112" fill="none" stroke="black"/>
              <path d="M 64,272 L 64,304" fill="none" stroke="black"/>
              <path d="M 64,512 L 64,544" fill="none" stroke="black"/>
              <path d="M 184,64 L 184,88" fill="none" stroke="black"/>
              <path d="M 184,104 L 184,112" fill="none" stroke="black"/>
              <path d="M 192,256 L 192,280" fill="none" stroke="black"/>
              <path d="M 192,296 L 192,304" fill="none" stroke="black"/>
              <path d="M 208,496 L 208,520" fill="none" stroke="black"/>
              <path d="M 208,536 L 208,544" fill="none" stroke="black"/>
              <path d="M 256,128 L 256,192" fill="none" stroke="black"/>
              <path d="M 264,320 L 264,336" fill="none" stroke="black"/>
              <path d="M 264,368 L 264,432" fill="none" stroke="black"/>
              <path d="M 280,560 L 280,624" fill="none" stroke="black"/>
              <path d="M 320,64 L 320,88" fill="none" stroke="black"/>
              <path d="M 320,104 L 320,112" fill="none" stroke="black"/>
              <path d="M 328,256 L 328,280" fill="none" stroke="black"/>
              <path d="M 328,296 L 328,304" fill="none" stroke="black"/>
              <path d="M 344,496 L 344,520" fill="none" stroke="black"/>
              <path d="M 344,536 L 344,544" fill="none" stroke="black"/>
              <path d="M 440,80 L 440,112" fill="none" stroke="black"/>
              <path d="M 440,272 L 440,304" fill="none" stroke="black"/>
              <path d="M 456,64 L 456,80" fill="none" stroke="black"/>
              <path d="M 456,256 L 456,272" fill="none" stroke="black"/>
              <path d="M 456,512 L 456,544" fill="none" stroke="black"/>
              <path d="M 472,48 L 472,64" fill="none" stroke="black"/>
              <path d="M 472,112 L 472,192" fill="none" stroke="black"/>
              <path d="M 472,240 L 472,256" fill="none" stroke="black"/>
              <path d="M 472,304 L 472,432" fill="none" stroke="black"/>
              <path d="M 472,496 L 472,512" fill="none" stroke="black"/>
              <path d="M 488,480 L 488,496" fill="none" stroke="black"/>
              <path d="M 488,544 L 488,656" fill="none" stroke="black"/>
              <path d="M 496,80 L 496,112" fill="none" stroke="black"/>
              <path d="M 496,272 L 496,304" fill="none" stroke="black"/>
              <path d="M 512,64 L 512,96" fill="none" stroke="black"/>
              <path d="M 512,256 L 512,288" fill="none" stroke="black"/>
              <path d="M 512,512 L 512,544" fill="none" stroke="black"/>
              <path d="M 520,368 L 520,384" fill="none" stroke="black"/>
              <path d="M 528,48 L 528,80" fill="none" stroke="black"/>
              <path d="M 528,240 L 528,272" fill="none" stroke="black"/>
              <path d="M 528,496 L 528,528" fill="none" stroke="black"/>
              <path d="M 544,480 L 544,512" fill="none" stroke="black"/>
              <path d="M 200,48 L 304,48" fill="none" stroke="black"/>
              <path d="M 472,48 L 528,48" fill="none" stroke="black"/>
              <path d="M 456,64 L 512,64" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 440,80 L 496,80" fill="none" stroke="black"/>
              <path d="M 512,80 L 528,80" fill="none" stroke="black"/>
              <path d="M 64,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 496,96 L 512,96" fill="none" stroke="black"/>
              <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
              <path d="M 440,112 L 496,112" fill="none" stroke="black"/>
              <path d="M 200,128 L 304,128" fill="none" stroke="black"/>
              <path d="M 48,158 L 72,158" fill="none" stroke="black"/>
              <path d="M 48,162 L 72,162" fill="none" stroke="black"/>
              <path d="M 224,158 L 248,158" fill="none" stroke="black"/>
              <path d="M 224,162 L 248,162" fill="none" stroke="black"/>
              <path d="M 264,158 L 288,158" fill="none" stroke="black"/>
              <path d="M 264,162 L 288,162" fill="none" stroke="black"/>
              <path d="M 440,158 L 464,158" fill="none" stroke="black"/>
              <path d="M 440,162 L 464,162" fill="none" stroke="black"/>
              <path d="M 208,240 L 312,240" fill="none" stroke="black"/>
              <path d="M 472,240 L 528,240" fill="none" stroke="black"/>
              <path d="M 456,256 L 512,256" fill="none" stroke="black"/>
              <path d="M 8,272 L 64,272" fill="none" stroke="black"/>
              <path d="M 440,272 L 496,272" fill="none" stroke="black"/>
              <path d="M 512,272 L 528,272" fill="none" stroke="black"/>
              <path d="M 64,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 496,288 L 512,288" fill="none" stroke="black"/>
              <path d="M 8,304 L 64,304" fill="none" stroke="black"/>
              <path d="M 440,304 L 496,304" fill="none" stroke="black"/>
              <path d="M 208,320 L 312,320" fill="none" stroke="black"/>
              <path d="M 48,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 464,352" fill="none" stroke="black"/>
              <path d="M 480,352 L 504,352" fill="none" stroke="black"/>
              <path d="M 48,400 L 64,400" fill="none" stroke="black"/>
              <path d="M 240,400 L 256,400" fill="none" stroke="black"/>
              <path d="M 272,400 L 312,400" fill="none" stroke="black"/>
              <path d="M 400,400 L 464,400" fill="none" stroke="black"/>
              <path d="M 480,400 L 504,400" fill="none" stroke="black"/>
              <path d="M 224,480 L 328,480" fill="none" stroke="black"/>
              <path d="M 488,480 L 544,480" fill="none" stroke="black"/>
              <path d="M 472,496 L 528,496" fill="none" stroke="black"/>
              <path d="M 8,512 L 64,512" fill="none" stroke="black"/>
              <path d="M 456,512 L 512,512" fill="none" stroke="black"/>
              <path d="M 528,512 L 544,512" fill="none" stroke="black"/>
              <path d="M 64,528 L 456,528" fill="none" stroke="black"/>
              <path d="M 512,528 L 528,528" fill="none" stroke="black"/>
              <path d="M 8,544 L 64,544" fill="none" stroke="black"/>
              <path d="M 456,544 L 512,544" fill="none" stroke="black"/>
              <path d="M 224,560 L 328,560" fill="none" stroke="black"/>
              <path d="M 48,592 L 120,592" fill="none" stroke="black"/>
              <path d="M 208,592 L 272,592" fill="none" stroke="black"/>
              <path d="M 48,638 L 64,638" fill="none" stroke="black"/>
              <path d="M 48,642 L 64,642" fill="none" stroke="black"/>
              <path d="M 464,638 L 480,638" fill="none" stroke="black"/>
              <path d="M 464,642 L 480,642" fill="none" stroke="black"/>
              <path d="M 200,48 C 191.16936,48 184,55.16936 184,64" fill="none" stroke="black"/>
              <path d="M 304,48 C 312.83064,48 320,55.16936 320,64" fill="none" stroke="black"/>
              <path d="M 200,128 C 191.16936,128 184,120.83064 184,112" fill="none" stroke="black"/>
              <path d="M 304,128 C 312.83064,128 320,120.83064 320,112" fill="none" stroke="black"/>
              <path d="M 208,240 C 199.16936,240 192,247.16936 192,256" fill="none" stroke="black"/>
              <path d="M 312,240 C 320.83064,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 208,320 C 199.16936,320 192,312.83064 192,304" fill="none" stroke="black"/>
              <path d="M 312,320 C 320.83064,320 328,312.83064 328,304" fill="none" stroke="black"/>
              <path d="M 504,352 C 512.83064,352 520,359.16936 520,368" fill="none" stroke="black"/>
              <path d="M 504,400 C 512.83064,400 520,392.83064 520,384" fill="none" stroke="black"/>
              <path d="M 224,480 C 215.16936,480 208,487.16936 208,496" fill="none" stroke="black"/>
              <path d="M 328,480 C 336.83064,480 344,487.16936 344,496" fill="none" stroke="black"/>
              <path d="M 224,560 C 215.16936,560 208,552.83064 208,544" fill="none" stroke="black"/>
              <path d="M 328,560 C 336.83064,560 344,552.83064 344,544" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,640 476,634.4 476,645.6" fill="black" transform="rotate(0,480,640)"/>
              <polygon class="arrowhead" points="488,400 476,394.4 476,405.6" fill="black" transform="rotate(180,480,400)"/>
              <polygon class="arrowhead" points="488,352 476,346.4 476,357.6" fill="black" transform="rotate(180,480,352)"/>
              <polygon class="arrowhead" points="472,400 460,394.4 460,405.6" fill="black" transform="rotate(0,464,400)"/>
              <polygon class="arrowhead" points="472,352 460,346.4 460,357.6" fill="black" transform="rotate(0,464,352)"/>
              <polygon class="arrowhead" points="472,160 460,154.4 460,165.6" fill="black" transform="rotate(0,464,160)"/>
              <path class="jump" d="M 344,536 C 338,536 338,520 344,520" fill="none" stroke="black"/>
              <path class="jump" d="M 328,296 C 322,296 322,280 328,280" fill="none" stroke="black"/>
              <path class="jump" d="M 320,104 C 314,104 314,88 320,88" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="280,592 268,586.4 268,597.6" fill="black" transform="rotate(0,272,592)"/>
              <polygon class="arrowhead" points="280,400 268,394.4 268,405.6" fill="black" transform="rotate(180,272,400)"/>
              <polygon class="arrowhead" points="272,160 260,154.4 260,165.6" fill="black" transform="rotate(180,264,160)"/>
              <polygon class="arrowhead" points="264,400 252,394.4 252,405.6" fill="black" transform="rotate(0,256,400)"/>
              <polygon class="arrowhead" points="256,160 244,154.4 244,165.6" fill="black" transform="rotate(0,248,160)"/>
              <path class="jump" d="M 208,536 C 214,536 214,520 208,520" fill="none" stroke="black"/>
              <path class="jump" d="M 192,296 C 198,296 198,280 192,280" fill="none" stroke="black"/>
              <path class="jump" d="M 184,104 C 190,104 190,88 184,88" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="56,640 44,634.4 44,645.6" fill="black" transform="rotate(180,48,640)"/>
              <polygon class="arrowhead" points="56,592 44,586.4 44,597.6" fill="black" transform="rotate(180,48,592)"/>
              <polygon class="arrowhead" points="56,400 44,394.4 44,405.6" fill="black" transform="rotate(180,48,400)"/>
              <polygon class="arrowhead" points="56,352 44,346.4 44,357.6" fill="black" transform="rotate(180,48,352)"/>
              <polygon class="arrowhead" points="56,160 44,154.4 44,165.6" fill="black" transform="rotate(180,48,160)"/>
              <g class="text">
                <text x="16" y="36">(1)</text>
                <text x="72" y="36">Proxied</text>
                <text x="148" y="36">Connection</text>
                <text x="252" y="84">Network(s)</text>
                <text x="36" y="100">Client</text>
                <text x="468" y="100">Server</text>
                <text x="92" y="164">User</text>
                <text x="168" y="164">Data+Metadata</text>
                <text x="308" y="164">User</text>
                <text x="384" y="164">Data+Metadata</text>
                <text x="92" y="180">Secure</text>
                <text x="164" y="180">Connection</text>
                <text x="216" y="180">1</text>
                <text x="308" y="180">Secure</text>
                <text x="380" y="180">Connection</text>
                <text x="432" y="180">2</text>
                <text x="16" y="228">(2)</text>
                <text x="88" y="228">Out-of-band</text>
                <text x="172" y="228">Metadata</text>
                <text x="240" y="228">Sharing</text>
                <text x="260" y="276">Network(s)</text>
                <text x="36" y="292">Client</text>
                <text x="468" y="292">Server</text>
                <text x="132" y="356">End-to-End</text>
                <text x="204" y="356">Secure</text>
                <text x="276" y="356">Connection</text>
                <text x="328" y="356">+</text>
                <text x="356" y="356">User</text>
                <text x="396" y="356">Data</text>
                <text x="500" y="372">GLUE</text>
                <text x="496" y="388">CXs</text>
                <text x="108" y="404">Metadata</text>
                <text x="188" y="404">(Optional)</text>
                <text x="356" y="404">Metadata</text>
                <text x="100" y="420">Secure</text>
                <text x="172" y="420">Connection</text>
                <text x="224" y="420">1</text>
                <text x="324" y="420">Secure</text>
                <text x="396" y="420">Connection</text>
                <text x="448" y="420">2</text>
                <text x="16" y="468">(3)</text>
                <text x="100" y="468">Client-centric</text>
                <text x="196" y="468">Metadata</text>
                <text x="264" y="468">Sharing</text>
                <text x="276" y="516">Network(s)</text>
                <text x="36" y="532">Client</text>
                <text x="484" y="532">Server</text>
                <text x="164" y="596">Metadata</text>
                <text x="132" y="612">Secure</text>
                <text x="204" y="612">Connection</text>
                <text x="116" y="644">End-to-End</text>
                <text x="188" y="644">Secure</text>
                <text x="260" y="644">Connection</text>
                <text x="324" y="644">User</text>
                <text x="400" y="644">Data+Metadata</text>
                <text x="280" y="660">|</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
(1)  Proxied Connection
                       .--------------.                   +------+
                      |                |                +-+----+ |
+------+              |   Network(s)   |              +-+----+ +-+
|Client+--------------)----------------(--------------+Server+-+
+---+--+              |                |              +---+--+
    |                  '-------+------'                   |
    |                          |                          |
    +<===User Data+Metadata===>+<===User Data+Metadata===>+
    |   Secure Connection 1    |   Secure Connection 2    |
    |                          |                          |

(2)  Out-of-band Metadata Sharing
                        .--------------.                  +------+
                       |                |               +-+----+ |
+------+               |   Network(s)   |             +-+----+ +-+
|Client+---------------)----------------(-------------+Server+-+
+---+--+               |                |             +---+--+
    |                   '-------+------'                  |
    |                           |                         |
    +<-----End-to-End Secure Connection + User Data------>+<---.
    |                           |                         | GLUE|
    |                           |                         | CXs |
    +<-- Metadata (Optional) -->+<----- Metadata -------->+<---'
    |    Secure Connection 1    |    Secure Connection 2  |
    |                           |                         |

(3)  Client-centric Metadata Sharing
                          .--------------.                  +------+
                         |                |               +-+----+ |
+------+                 |   Network(s)   |             +-+----+ +-+
|Client+-----------------)----------------(-------------+Server+-+
+---+--+                 |                |             +---+--+
    |                     '-------+------'                  |
    |                             |                         |
    +<--------- Metadata -------->+                         |
    |        Secure Connection    |                         |
    |                             |                         |
    +<== End-to-End Secure Connection User Data+Metadata ==>+
    |                             |                         |
]]></artwork>
        </artset>
      </figure>
      <t>The client-centric metadata sharing approach because it preserves privacy and also
takes advantage of clients having a full view on their available network attachments.</t>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <section anchor="generic-cases">
        <name>Generic Cases</name>
        <section anchor="priority-between-flows-inter-flow-of-the-same-host">
          <name>Priority Between Flows (Inter-Flow) of The Same Host</name>
          <t>Certain flows being received by a host (or by an application on a host) are less or more important than other
flows of <strong>the same host</strong>.  For example, a host downloading a software update is generally considered less important
than another host doing interactive audio/video or gaming.  By signaling the relative importance
of flows to a network element, the network element can (de-)prioritize
those flows to best accomodate the needs of the various applications (on a same host) and
between hosts on a network.</t>
        </section>
        <section anchor="priority-within-a-flow-intra-flow">
          <name>Priority Within a Flow (Intra-Flow)</name>
          <t>Interactive Audio/Video has long been using <xref target="RTP"/> which
runs over UDP.  As described in <xref section="2.3.7.2" sectionFormat="of" target="RFC7478"/>, there
is value in differentiating between voice, video and data.  Today's
video streaming is exclusively over TCP but will migrate to QUIC and
eventually is likely to support unreliable transport (<xref target="RFC9221"/>,
<xref target="I-D.kpugin-rush"/>).  With unreliable transport of video in
RTP or QUIC, it is beneficial to differentiate the important video
keyframes from other video frames.  Other applications such as gaming
and remote desktop also benefit from differentiating their packets to
the network.</t>
          <t>Many of these flows do not originate from a content provider's network.
Thus, the flows originate from an IP address that is not known before
connection establishment, so there needs to be a way for the client
to authorize the network elements to receive and hopefully to honor the metadata of those
packets.</t>
        </section>
      </section>
      <section anchor="detailed-use-cases">
        <name>Detailed Use Cases</name>
        <section anchor="example-video-streaming">
          <name>Video Streaming</name>
          <t>Streaming video contains the occasional key frame ("i-frame")
containing a full video frame.  These are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
          <t>Streaming video also contains audio frames which can be encoded
separately and thus can be signaled separately.  Audio is more
critical than video for almost all applications, but its importance
(relative to other packets in the flow) is still an application decision.  In the example below, the audio
is more important than video (importance=high, PT=keep, RU=reliable), video key frames
have middle importance (importance=low, PT=discard, RU=reliable), and both types
of video delta frames (P-frame and B-frame) have least importance (importance=low, PT=discard, RU=unreliable).</t>
          <t>Video Streaming Metadata:</t>
          <table anchor="_table-video-streaming">
            <name>Example Values for Video Streaming Metadata</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video I-frame (key frame)</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta P-frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">video delta B-frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="interactive-media">
          <name>Interactive Media</name>
          <t>Examples: VoIP, gaming.</t>
          <t>Requirement:  Signal the flow needs low jitter and low delay. However, the network can only provide
a limited amount of low jitter/low delay to each host, maybe as few as one. This requires signaling
feedback indicating that low jitter and low delay flows are already subscribed to other hosts. In
response, the user and the application will likely continue, occasionally re-attempting to get the
desired quality of service from the network.</t>
          <t>In many scenarios a game or VoIP application will want to signal different
metadata for the same type of packet in each direction.  For example, for
a game, video in the server-to-client direction might be more important
than audio, whereas input devices (e.g., keystrokes) might be more important
than audio.</t>
          <t>Both gaming (video in both directions, audio in both directions, input
devices from client to server) and interactive audio/video (VoIP,
video conference) involves important traffic in both directions --
thus is a slightly more complicated use-case than the previous
example.  Additionally, most Internet service providers constrain
upstream bandwidth so proper packet treatment is critical in the
upstream direction.</t>
          <t>Metadata:</t>
          <t>Based on metadata types listed in the <xref target="I-D.rwbr-sconepro-flow-metadata-"/>, the host to network metadata parameters for interactive media type will as given below.</t>
          <t>Interactive A/V, downstream Metadata:</t>
          <table anchor="_table-interactive-av-downstream">
            <name>Example Values for Interactive A/V, downstream</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video key frame</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
          <table anchor="_table-video-av-upstream">
            <name>Example Values for Interactive A/V, upstream</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video key frame</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
          <t>Many interactive audio/video applications also support sharing the presenter's
screen, file, video, or pictures.  During this sharing the presenter's video
is less important but the screen or picture is more important.  This change
of imporance can be conveyed in metadata to the network, as in the table
below:</t>
          <t>Interactive A/V, upstream Metadata:</t>
          <table anchor="_table-video-av-sharing">
            <name>Example Values for Interactive A/V with picture sharing, upstream</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">video key frame</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
              </tr>
              <tr>
                <td align="center">audio</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
              <tr>
                <td align="center">picture sharing</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
              </tr>
            </tbody>
          </table>
          <t>In many scenarios a game or VoIP application will want to signal different
metadata for the same type of packet in each direction.  For example, for
a game, video in the server-to-client direction might be more important
than audio, whereas input devices (e.g., keystrokes) might be more important
than audio.</t>
          <t>Todo: this section on cooperation needs editing.</t>
        </section>
        <section anchor="bulk-data-transfer">
          <name>Bulk Data Transfer</name>
          <t>Examples: backup/restore, software update, RSS feed update, email, printing to a print server</t>
          <t>Requirement: Signal the flow as below best-effort.</t>
          <t>Metadata:</t>
          <table>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
                <th align="center">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">File copy</td>
                <td align="center">low</td>
                <td align="center">bulk</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Printing</td>
                <td align="center">high</td>
                <td align="center">bulk</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="mixed-traffic">
          <name>Mixed Traffic</name>
          <t>Examples: Desktop Virtualization, Office software in the cloud (editing local files, typing is interactive while save operation is bulk transfer)</t>
          <t>Requirement: Signal flow will vary depending on the nature of the packet. With variety of traffic going through the session, some packets can contain interactive traffic while the others contain bulk transfer. There can be combination of reliable and unreliable traffic within the same session through multiple streams. Host-to-network signaling plays a vital role in effectively routing mixed traffic for ideal user interactivity and network performance.</t>
          <t>Example packet metadata for Desktop Virtualization (like Citrix
Virtual Apps and Desktops - CVAD) application.  This is shown in two
tables, client-to-server traffic (<xref target="_table-desktop-virtualization-c2s"/>)
and server-to-client traffic (<xref target="_table-desktop-virtualization-s2c"/>).</t>
          <t>Remote Desktop Virtualization Metadata:</t>
          <table anchor="_table-desktop-virtualization-c2s">
            <name>Example Values for Remote Desktop Virtualization Metadata, client to server</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
                <th align="center">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">User typing</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Mouse click/End Position</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center">The start and endpoint of the pointer movement is vital to ensure user action is completed correctly. So, the endpoints have to be reliably transmitted with real-time priority. **</td>
              </tr>
              <tr>
                <td align="center">Interactive audio</td>
                <td align="center">high</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Authentication - Finger print, smart card</td>
                <td align="center">low</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Interactive video key frame</td>
                <td align="center">low</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center">Video key frames form the base frames of a video upon which the next 'n' timeframe of video updates is applied on. These frames, are hence, critical and without them, the video would not be coherent until the next critical frame is received. Retransmits of these are harmful to the UX. ***</td>
              </tr>
              <tr>
                <td align="center">Mouse position tracking</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center">When the pointer is moved from one point to another, the coordinates of the pointers between the two points can be lost without much of an impact to the UX as long as the start and endpoint reaches. This would ensure the user action is completed, even if the experience seems glitchy.</td>
              </tr>
              <tr>
                <td align="center">Interactive video delta frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center"> </td>
              </tr>
            </tbody>
          </table>
          <table anchor="_table-desktop-virtualization-s2c">
            <name>Example Values for Remote Desktop Virtualization Metadata, server to client</name>
            <thead>
              <tr>
                <th align="center">Traffic type</th>
                <th align="center">Importance</th>
                <th align="center">PacketNature</th>
                <th align="center">PacketType</th>
                <th align="center">Comments</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="center">Glyph critical</td>
                <td align="center">high</td>
                <td align="center">realtime</td>
                <td align="center">reliable</td>
                <td align="center">The frames that form the base for the image is more critical and needs to be transmitted as reliably as possible. Retransmits of these are harmful to the UX.**</td>
              </tr>
              <tr>
                <td align="center">Interactive (or streaming) audio</td>
                <td align="center">high</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Haptic feedback</td>
                <td align="center">high</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center">Virtualizing haptic feedback is real-time and high importance although the feedback being delivered late is of no use. So dropping the packet altogether and not retransmitting it makes more sense</td>
              </tr>
              <tr>
                <td align="center">Interactive (or streaming) video key frame</td>
                <td align="center">low</td>
                <td align="center">keep</td>
                <td align="center">unreliable</td>
                <td align="center">Video key frames form the base frames of a video upon which the next 'n' timeframe of video updates is applied on. These frames, are hence, critical and without them, the video would not be coherent until the next critical frame is received. Retransmits of these are harmful to the UX. ***</td>
              </tr>
              <tr>
                <td align="center">File copy</td>
                <td align="center">low</td>
                <td align="center">bulk</td>
                <td align="center">reliable</td>
                <td align="center"> </td>
              </tr>
              <tr>
                <td align="center">Interactive (or streaming) video predictive frame</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">unreliable</td>
                <td align="center">Video predictive frames can be lost, which would result in minor glitch but not compromise the user activity and video would still be coherent and useful. The reception of subsequent video key frame would mitigate the loss in quality caused by lost predictive frames.</td>
              </tr>
              <tr>
                <td align="center">Glyph smoothing</td>
                <td align="center">low</td>
                <td align="center">discard</td>
                <td align="center">Unreliable</td>
                <td align="center">The smoothing elements of the glyph can be lost and would still present a recognizable image, although with a lesser quality. Hence, these can be marked as loss tolerant as the user action is still completed with a small compromise to the UX. Moreover, with the reception of the next glyph critical frame would mitigate the loss in quality caused by lost glyph smoothing elements.</td>
              </tr>
            </tbody>
          </table>
          <t>*** A video key frame should be handled differently by the network
depending on a streaming application versus a remote desktop
application.  The video streaming application's primary and only
nature of traffic is video and audio.  In contrast, a remote desktop
application might be playing a video and its associated audio while at
the same time the user is editing a document.  The user's keystrokes
and those glyphs need to be prioritized over the video lest the user
think their inputs are being ignored (and type the same characters
again). Hence, the values are different even for the same nature of
traffic but a different application.</t>
        </section>
        <section anchor="assisted-offload">
          <name>Assisted Offload</name>
          <t>There are  cases (crisis) where "normal" network
resources cannot be used at maximum and, thus, a network would seek to
reduce or offload some of the traffic during these events -- often
called 'reactive traffic policy'. An example of such sue case is cellular networks
that are overly used (and radio resources exhausted) while alternative network
attachment networks are available to host.</t>
          <t>Network-to-host signals are
useful to put in place adequate traffic distribution policies (e.g.,
prefer the use of alternate paths, offload a network).</t>
        </section>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="abuse-and-constraints">
        <name>Abuse and Constraints</name>
        <t>It is important that not every flow be prioritized; otherwise, the
network devolves into the best-effort network that existed prior to
metadata signaling. It is a requirement that mechanisms exist to
prevent this occurrence.</t>
        <t>Such a mechanism might be simple, for example, a
cellular network might allow one flow from a subscriber to declare
itself as important; other flows with that subscriber are denied
attempts to prioritize themselves.  The mechanism might be more
complex where authentication and authorization is performed by an
enterprise network which, itself, decides which flows are important
based on its policy and only the enterprise network communicates flow
priorities to the ISP network.  The enterprise might prioritize
certain users (e.g., IT staff), certain equipment (audio/video
equipment in a conference room), or whatever its policies it might
want.</t>
      </section>
      <section anchor="key">
        <name>Key Establishment</name>
        <t>Various proposals have suggested establishing a key to validate
per-packet metadata or to decrypt per-packet metadata.  However, most
proposals have not specified how this key would be established. A
signaling protocol from the receiving host to its ISP could establish
such a key. The host can then convey the key to the sending host to
use to integrity protect or encrypt the per-packet metadata.</t>
        <ul empty="true">
          <li>
            <t>Note: The CPU overhead of validating or decrypting such per-packet metadata
needs to be carefully considered (and further assessed via experiments) by the signaling protocol proposing such
keying. Also, the required operational setup should be documented.</t>
          </li>
        </ul>
      </section>
      <section anchor="metadata-versioncapability-exchange">
        <name>Metadata Version/Capability Exchange</name>
        <t>The sender has to convey metadata in a way that is understood by the
various network elements on the path -- each of which might be
operated by different entities and have different capabilities.  For
example, the Wi-Fi access point might be operated by an enterprise
network, hotel, or home user, whereas the upstream router is operated by
the ISP.  Each of those might support different versions of the same
metadata, or might need the metadata expressed in different ways.</t>
        <t>The signaling protocol would provide a way to learn the needs of those
networks, and provide metadata signaling satisfying most or all of their
needs.</t>
      </section>
      <section anchor="on-the-use-of-fast-path">
        <name>On the Use of Fast Path</name>
        <t>TBC</t>
      </section>
      <section anchor="impacts-of-nested-congestion-controls">
        <name>Impacts of Nested Congestion Controls</name>
        <t>TBC</t>
      </section>
    </section>
    <section anchor="requirements-summary">
      <name>Requirements Summary</name>
      <t>TODO summary.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ATIS" target="https://access.atis.org/higherlogic/ws/public/download/72240">
        <front>
          <title>Content Classification for Traffic Optimization</title>
          <author>
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="I-D.trammell-plus-spec">
        <front>
          <title>Path Layer UDP Substrate Specification</title>
          <author fullname="Brian Trammell" initials="B." surname="Trammell">
            <organization>ETH Zurich</organization>
          </author>
          <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
            <organization>ETH Zurich</organization>
          </author>
          <date day="13" month="March" year="2017"/>
          <abstract>
            <t>   This document specifies a common Path Layer UDP Substrate (PLUS) wire
   image for encrypted transport protocols carried over UDP.  The base
   PLUS header carries information for driving a minimal state machine
   at middleboxes described in [I-D.trammell-plus-statefulness], and
   provides optional exposure of additional information to devices along
   the path using the mechanism described in
   [I-D.trammell-plus-abstract-mech].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-trammell-plus-spec-01"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="14" month="February" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
      </reference>
      <reference anchor="I-D.cc-v6ops-wlcg-flow-label-marking">
        <front>
          <title>Use of the IPv6 Flow Label for WLCG Packet Marking</title>
          <author fullname="Dale W. Carder" initials="D. W." surname="Carder">
            <organization>Energy Sciences Network</organization>
          </author>
          <author fullname="Tim Chown" initials="T." surname="Chown">
            <organization>Jisc</organization>
          </author>
          <author fullname="Shawn McKee" initials="S." surname="McKee">
            <organization>University of Michigan</organization>
          </author>
          <author fullname="Marian Babik" initials="M." surname="Babik">
            <organization>CERN</organization>
          </author>
          <date day="10" month="July" year="2023"/>
          <abstract>
            <t>   This document describes an experimentally deployed approach currently
   used within the Worldwide Large Hadron Collider Computing Grid (WLCG)
   to mark packets with their project (experiment) and application.  The
   marking uses the 20-bit IPv6 Flow Label in each packet, with 15 bits
   used for semantics (community and activity) and 5 bits for entropy.
   Alternatives, in particular use of IPv6 Extension Headers (EH), were
   considered but found to not be practical.  The WLCG is one of the
   largest worldwide research communities and has adopted IPv6 heavily
   for movement of many hundreds of PB of data annually, with the
   ultimate goal of running IPv6 only.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cc-v6ops-wlcg-flow-label-marking-02"/>
      </reference>
      <reference anchor="IAB">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RTP">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.kpugin-rush">
        <front>
          <title>RUSH - Reliable (unreliable) streaming protocol</title>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Facebook</organization>
          </author>
          <author fullname="Alan Frindell" initials="A." surname="Frindell">
            <organization>Facebook</organization>
          </author>
          <author fullname="Jorge Cenzano Ferret" initials="J. C." surname="Ferret">
            <organization>Facebook</organization>
          </author>
          <author fullname="Jake Weissman" initials="J." surname="Weissman">
            <organization>Facebook</organization>
          </author>
          <date day="10" month="May" year="2023"/>
          <abstract>
            <t>   RUSH is an application-level protocol for ingesting live video.  This
   document describes the protocol and how it maps onto QUIC.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the mailing list (), which
   is archived at .

   Source for this draft and an issue tracker can be found at
   https://github.com/afrind/draft-rush.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kpugin-rush-02"/>
      </reference>
      <reference anchor="I-D.rwbr-sconepro-flow-metadata-">
        <front>
          <title>*** BROKEN REFERENCE ***</title>
          <author>
            <organization/>
          </author>
          <date/>
        </front>
      </reference>
    </references>
    <?line 519?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1dbXMbuZH+jl+BkqvOkk1Su94ke1HOSWTZ3lXdrq1Ysveq
ru7DcAYkJxoOmMGMZEby/fZ7uhvAYEjK8q6dutzVqioxOcQAjX7vRqN3PB6r
tmwrc6T3zst5nVVlPddvndEnmTNOz2yjT2xVZVPbZG15ZfRFk81mZa6fl7OZ
aUzdlnhu6z2VTaeNucI8w/HfW9cevjLttW0udVziqF9jT+VZa+a2WR/psp5Z
pQqb19kSIBVYqx0319Nm3Lqr6/nYhffHnTPjnF4ff/WVct10WToHMNr1Cu+d
vrh4qfUDnVXOAqCyLszK4P/qdm+k90xRtrYps4q+nB4/wz/Y5d7pm4uXe6ru
llPTHKkCMB2p3NbO1K5zR7ptOqOwvW9U1pgMs/5kpjqrC31at6apTUuYqd3K
Nu2eos3OG9utMC4+5tHnprkqc2D2JwwhXH9Hw/bUpVnjpeJI6bHG3hpt3q9M
U5o6N/Roinevy6Jd0JdVUwL+dk2fTd2U+cIUemZMMc3yS3q4xBYz7VoAusQa
9Agfq7ZcGvmNnvzFntM/v/2O/v+ncvyylA/ybwHyAowrpa5M3QEVWv+8DWkt
tNjber7MygrPmaJ/Lk07m9hmTj9kTb7AD4u2Xbmjw0MaR4/ARZMw7JAeHE4b
e+3MIc9wSG/Oy3bRTfFukdXXWOxwB6PQuApUdW2yhh8/kQkmpd315qHwIQ28
mw8ni3ZZ7SmVde3CNkRHrKf1rKsqYebzpiwWGXCn32R/zeZ2lVVZzWOwr6wu
/85ydKRPKtsBrXbWXoPTBG2QoqrAcm4Edssn/FaQt13jeUBuu7olqXpbly04
5Lyl3Ws708dLsFae8Sgj5PjPPRfgAzKa0i3+PKdfJrld7v3X9m6eYx8/MW/9
02zA0/LjcP9oF/i30M9sl2dFVjY7NvAaSJibIQgv8Sw36YJLmWkyDTP92fJ7
tPL2uhdl0y2zyjjsUb8xRbHesfAre1lmw3VP66Ic7PPS1kWLxeIulVK1bZas
bY+UIhXaf9P6+OL0/Ign8Hr+BFoSmhBoz6Ayocp5cdb0Qbe/XkFVeKjk1ayZ
G8hNEJssh8S7CQY4lspFOV+YprLzMj+8doerblrhU2Gv68pmxeG3T5785iue
iNWqfvLVk28A9ng8BhNATWV5qxQZinFrx7W3FfukXUi16CvTuOxAR6HTOZiv
XK4aC/vSLsymwtTTtRY0EIPSgDDn9QLKUs8qqA9NvLa0+D/MBGWW1aLPZMgK
mtS0Tl9DL5S1zhS9s+sVGmC7Vi+yK4KstdCcLq+sE8hyj2zwLH0N004NDS5M
BSo14CF9gR+LxKKCQ50oVqjLNcZr2m1ZmEJlrU63tG8m88nIz8yLZ02B0Ybn
ys3BiIc7sn+NH63Aryu2zi3pcm87yQpCkfHHZTlvmPwHbBzbBYRyvsB2LJAs
DIMtTW274NkXoJ0i7CWQTZS6WJROw5p3S8ZB14J6EGCYJsMoicoT72FbxEUV
/hc2SFYNi2ewWfkCYuKWCvh1CyaDabGJNgMDEfqFpFOsbAzIxQAxOUtgO6Cq
pC0SFjCLqbNpleCcMMG8T0azJXgn6rwDJySra+wGRg0SU1Vr4oHK0ECA2Tmi
Z5awKMjV2txWEaaAJoJKRQzAq3A0AYHY2EttZEo3EelYlkVRGaUekJfR2KLL
WSTVs+AOEIORAJV4BxJQYv4lLQL6FxbsDxYFqJ5lRGo3OafJitJu/OYOJgoO
WgMBWFhme8+NJJEZTeYinR2RUV9lcEo6x1t0Xoiarg7PVbZaVV7VuD9ok+Fn
LzI9CbCX2mCHV/BtmPzif0LYLSmkrGJBV72gs9w448cSmLUFLzT270D4FGxB
hJsbDT0BosP7UeII0rJWSJLAxfxi4O7owagFCX6dDlQl77kIGCSoHrpE5gh9
ikTaMZNEjEOVQ6yW4AnSJm5BPHsNxYmBxGrRyWMewSZZk5NCS6ncuY75T6hN
+geMt/dsT+8Tsp7ZFloeaLwEDK+xwyauPo0/uaBUelQWLB083pk58yAjk4DE
hgVZs3LeNWYk0GYOr8D1DVQDqsD5mJv1hSEN3GSAGjyLl7yEM3eIPhLt5hXS
DMYIzAy/rgDy9HECbIC1gklqBU4i5Yjw7VivNAxpY+Yd/EVowhZQwdEwLRwN
9d/0p7PMXc0VmyD/93jMf4+1vtW7/pKnt+qxH0pffvrh+BX/fJtOEj/dbn18
rG5p3/j8DF9E0PwXaFXA+jj9NPhI7w1XX1kg/eet/ks3fd+IwVMOCsqWB3gP
gyYgJaJD9NdPcHp+tvk0fsUA/1lop9SJXfbKQxiJZB1hXUeMC2vPDLlamNqC
c7PI3cQyNRvT6Ro2z/ytwxdIIQaRlWOdDZnvVpDKAi48vNRrKIDGc3h4zvOB
xRTmzKrrbA3OX3Ic1RoI4srCZpIxASMaSAP0rliIv0K3w8GCffd7YN2eNWvo
9bac+/1kLBydYy0GUMnEwRcWk+FI9pPdK3ZtxBQQ+A4bxogYcEMIg8ERWaP9
RUWNqbOCoCKnqGwwlHSwbcjcvCSx9TaQxQpyZkpWCEXZiICPBp5H+DfYLMWU
AesK0qGVpttmioAmNaH3sV5lc6bOzFwD3BWh4H1LUPJMft4DdveA+hmcH1Z3
7IsFB2CixUx3rLS8Iq/YHYBn1pupBEwLgl4Cvq4lYpHVKkxeOuEuG8Lr8u/Q
MXDRsjW7QEVjV8F/GynjVniFqQwFXmuvrGl38B9y9q2gnmzXsAdXZ3NeHJpt
yshl/gpbGKmBQY2QkoUkk4aBmYA27+ACMhEM+be5WSbOZVhYxYVXFoyzFlsE
LhM7Dv6GJYVlrKBf50Z8XEwAo9Y7VQk2EUU8YjvMDHXkbTsPi95Y8IKBuqss
h/A1bOGZxNewMOSz23pWFuzdVrDvEz/p5p45ZnmsnwO7bIBltQgY8Qa5TDzo
gqTTzmYDHwsc1GRYDbZxv6zzqiu8O0ZqFx8P9BUEnQxfzooBNmYGJ5EnPF2C
wG1wDQJo0eV1Sqx6hEbcPUcex1Jn0dn3rnrTxwtVeUmaAtBPDWcICA85AJzp
qJYkceCjrsMrYKnw3My6Tq+qDN48uzXtnUCIBRfR91pwD45lPd8bqQ4RgIMo
s8bkaMT4sczg8K/KnHw1AEo7gbBKkIXt99KmjmFdl6tWlAkkaEmwC2FjLAmG
3MSFZ2ahCAT5+4uLM71HMd+eXpiMsFXWJFTRE7v44VyfvzpNHwszAB8q0g9Q
zBAIkzcCN6ZZrzhRgNdoCs+OY1PDD8w9H7wvDdQoFPXSEwd+BLAt0lkLAnuX
X3bJhOlxru4jfMnoYZafi/Nj2OaB1OWK+Fx5oesjRM9t8CO98J6egTcKyDLF
R6QtBTRoelOJFVSewleltz91GmQeeBQwSAByd3ipWNuaPvwhzQua5otgfqAK
IcHZpnEkl7jhhAfvh0BhCiP+BIglyTjQ4Doyq8fsPjeWdAJpX7F+xq8gozzO
2MvjmF1yDgE/fWiyYdII3mvbVdhq10Y58VMnEDofz/EC3vTKe14FALNYkF5f
E7vuy1dQTVaUrxvUYhwrBN1ZcYVQKyN16iBIVT+NQHsdHsC5hXfLfGfmpAkR
H2W1iujxW/FUY085A6MGGIkdafasacHGGiGiwEVgyMKUU8GSlPqO03CKuEmi
U5KarmF+CnmUjdCKJ4k6hh191oNCWQq8yoA/trYpWIr1HAsYPQn2aS9mymeI
CwB4bfZ8nDTQfQQ22HkpEU6wT5DI2lKGiRIIDsau4hxXtVY+yMJDOpOgfLQO
qYgwEyB3/Vywx2uRJpjK3HCITImTzlFQt6FYCV1RHSCqiDZFmeXUFGxdYs4N
wPtQ6e3zM2x+TekvtX9z86fT8fMJZAxuY1WNV1XnxqTVPnw4GPFQCnDJwISh
l1m5WgGlFPWWlc86s8s5XhTN+BpqvIJm4PcpuqV1QrLr9Ozqd/ol0eQH0hU6
zJnn46vfwcsaX1f5fExO1JiVyXiZcYb+w4cR53C+t6vxdD3GP5wIBFjg2de1
SbSi6+ZgdVIjNs8z8pwkJcKk93qYbArxzZyOKjgfAo09NF0+eL006z94pUKf
Ve7FUmOJbFqVbvHRFAsUkjH65gavfvgQnZ3SBefYH+H4wCHJQ3jHUiRruk79
aFJkYaFBBpGRefzs6ZuXJ7//zde/B86wMuVYQQqgaZjx8vLnVJLo6iWvABpg
uWKuC2LCSIgLTyjxc55D7vS/6Dddzc7zCxZR8WQ3EmyFNRK0E9prto0F9laT
MK93II7yxppCFfJhGaSMVdUuFMsvcK4kdALX1RzwkCZT2y/4bAxHNBPK7XrT
0e7ED2aPuRNJoRJ3+SwCbQUOQ3DU2Gvk7J14lZFk+HZ36OMzRf0sBN7atOKS
aTo4Ix5beQXB6plA4yTTOfGRiXjPKiXJ5MCmcHadlXyiTAeIEVT1jhafR3Jc
Ry5WK0gLB3YMJ+2DxCMjay8Zkghqx5nbkGBzpu1WjlkDcfYV2XOOIjHJcyJ2
6T3VUzZULJn6xxiAHKmjyMoSHcRkzv4Stm1RrQ+SsO1vnYWYAuH9I7af7DDC
bWUrv89BEkFwiKd/LSn9cnBAW+n40ISAfROCot2gSOji4y9ILJGflCll4xBu
CVXAQGvKRzVMNf5WYagqOu+e65CQA67WHDx4NSnGzMJ2QRTKRrE5m2WSWCsE
YweM0ncey8feHu88Ao+n2Erd3JBPPa/HWXzhwwfKH5Y5J2QzMk18ZNUP4PRz
0GycoqzZo+OdX0H/EbQbWe4BZ48iW494Z+TKGQ7ifwzjzXtJfYqOg5LuGk7w
1aTX6jlnvn1Qz+SlRH58IvBKTn0jg7b/9YHWZ+xEF8R/PvO3O1ek9WQ8+Jvs
GBJSUndMsZVv2nrweOzzYz5RFlJlgzd8RmkfXvHWFHGCx5SqO6ng/7SPh4Af
jDf+9odfH58zCWgCztvthOFjD8JbaudgrR+GheSfh7swdde7d8Kw+e7jf3v6
9Cln7J6Dhx4HZsLDP37sp7juuckp2OnZQn99909PPh9mtf8E5HzdtWM7G5OG
0pH/zyE+4XR619/9jHkPX97PmPfy5X2M+Ql8eR9j3suX923jPr78BMa8l8Yf
+S3wJc/9oi7ofPgFF51sstNjHblTIPkjvzX5nMX1dz+8ffFZ4OuT/3DJJnr+
3BfPOqsOdAA1/TnQT3552IPwERHbLWOfh321/w34UlhvTJESIslPF7IvIWZf
RNC+iKh9AWH7fHH7MgL3ySJ3F1fe83acfZslP2Htz4X86VP9UVWxbcb0wIz9
srXlrOrmSD/Y8ggRbDDnjeE0zuuneyRIptmTgpyneyewXJTrTRzLxP/c+yAp
knwohH2WQoSwT7BNTZ7RiXzZygkpeNLFxHxIDak2uyTAQtqKU7a8ggvn8hlX
L+mrEnGfZBZLBIhXVJQ3Tc60s7bFqqFo4UFf14kvD/R3CGII3PjkAbxHqV7U
z7xP+5IPa/Y5OzSmLwcEDe35nFJflCNW6sQ0nJEOhR5y0pIb+OMcZvmSD8qT
0rfBeT2BL78fcNzHIYGPXZNSnnaR+SNwJasAikePYgqO3n/0CCqMTsq8Zz8K
64ZSJ5+jCLVs3Yrpiph3TojgJAklJChJDLgZkAiAYgCyus/hY1pJLwEzPn7K
uqK0hxSaWtrCnAs8AdSzNMCX0yBJkMX5c6OwIdkZpRE3j16Gh3v+IYcPCPDG
B/2pmJJztTjTlGL1LM/t0hY+q+srMnziL4Sug9zLPhMlYlYyqcMAnkf01UQD
5vnJF2ZJoouYp8mEeST0Dfg6Zny9Y3wtEOVSxAiIsYYklG5u/vTm4ozSOd/8
9rdfIXbjMwbVdBQFUdnI2+dnlLKlM0KXN+VUKhBubs6DjZ18M/l28oT2+ifM
8u1vvv1XSgoRDQ0VilxlVcfnN2n+PU1WXNkyByMJSUk+5VRTXwCb64dOyQ+x
mJeYCdFdBfAp+ylAXpyc8cHQdQmJldotzkX85e3pCSOWA+nOJ+mS4yjXrbiS
t6vBL6WkMGJ5L+W6KM/15MnXlBsMqclVNy/rcdO5heS8iBS7JwBOBPqyVsAy
MSxBNCLdVDqf4aBjVEn6JOcTkvuJosmzUI30rAHDDM66ZAF5TnlKyWOlnBYS
HCIrHF03ZmmpEsC4y9auJFkeEoE89yaxRPuF8r3WpjlBirs5ozzzpw4iGYXl
XBzYdS7n4XccFj10/UQXi86JHHoNtPFynZwKST6zlIzfZQ0FhC3MKLOUVOTE
PINIuLPCmF4+JVuV6etszWmONtoZNTj32qEY+GWvgJlrF3ZlyGAwWy1s7aeL
doqxA72hPBJZoPVzzoFCpgZm44EWgT2PTH/zwGvcMdN7HMUB1rEfJbzgDy8l
i9bnpym1LHyi9/fKMX/aO1B+9MDiRY7ijK4cJBEG6AiZyjd469OurArlUdBA
QPkQd9bSGZ11rPwKU2HnkTfJpEUgOAWpmBpENDFGdNhGxSOSuuXqUO0P6OJC
bCUGM2+jgBk64oFtRlhVzlB9SYWpc0vJVWdWWSPVLHJ00oXkuLcqfGAYxpA+
5CmpZIAZLoJNsHn8UeVexcWIlGFOJXLEuopSm4lt2o8GCxsW0Q7iFqrP2DWg
vH5Lam7DxocSDgB3GioBmGOk2k6kijGhPNibpl/g3u9hekoFqSN9dvH00pjV
SL95+zQouYOgsHt6Kj7+lIrNZGODCRkQzOfLdDenJNxLTe16hQmj+kyprffP
hHd59DP5fCBnr5Whg7WfsXavtSn9uSl0wT0+Uuo21oYTaPc4yac9ALf6jIn4
KuMiQD9Anl0MZ7pVt0dbIdcdf0fp0KMd7+16xo+xE8HpqcfifqTgwfZOyLeI
X+IVGp0+80ZvGAzcDggXCHYHugaLhALudEBiW+9e5Nk/ahHRHp/wd8sF3PHL
z0AXRU1kp7a0ewiRXnhRfkfOlKTk72JWipfIgqRO4I9850n5WdyRfmdPz0bB
eabTib91ZSOnEtpHYVHleFtJn+RsQ8oB8JXPPZK6iNRMctq9rtbBzKssFrBm
S7rcQfahn/MwzsenA1wezYU5y2w95bNtqpHLyCc2/vC9EaBdclAZj5RKRJR5
8FzgJdwFfHIVIquAyYKOg6bBz42KmN3xCVBKpWUrOlAd9fcuwll7qozZD/Ve
Jpmhsu7wyuCsuDHjTEqJfEECFXtgHhWKlMLxEh2L+mJhdoKGnhd0PR/nOwTG
FGbQWeKc5IBYxJK3tAnWNSt869HWe3oquirBFeLghPUdYPAXLKgqkqgTD0s2
A0K8rASEUXR+Y8UzAtzWjsXFSk5glnzpYbp5ucQHhCR/I6kT55prqnMpjFy6
8wde0GGQGYuQ/uATJgPanpGVEf7X+xHMjWOgkZf9Xb8wGCqAwYTx2yLU8lal
AOmu4HWfZVBFly1cV8ELV7ainEVinr3t2QZE0/1V8lZKvlbCt0fAXOJMhcJZ
rh6QA3ix9FIaAtjpZoKnHDk1hZwFEn+O5B5FLFkJLNjXs8WSVtWtRGElp6RS
fLOKTkx/rYQgjf6SsEY/Qc9V/VneEV33oMNkYpRYB0kOAiTMhYr4BVVAcHzG
12UdoDOAQMo8wmtjH5lKcgGECtoqzksuHr7Q/ma+fiMQTy6VsjiwHFFEVdJt
CfavJhth9+G7ESdF/MbucSW+qM/wBZyDPlT4cl6AzPdlLfGXMLkJjcfZ1Tgh
2t3G9yOkJvv7K4n/uUgsXhWIGxXNzyBteIcIy3mOuzT6IOnCEWjILoUctde7
jvPfD52Co2FMDZtZVsFacmUJVU+ALyhmft75Nynu2z2Nzw5RXmuQT42l0rJM
MrHeigBD6ZZUTVDkxT/J5SsJhKU4Q9TtoB6990dGcilKCmoJ84p149EO3Rgp
8atm/CcTm9vIJYHfvrAQRjb+VBmU8qcNqIaC+asb/Ivc4Atb2COvXEI1VD24
5SzBH7UM8QWZCC2fddUlHyDKrTfgLY0tKQDrVofQT63ly5LDw6CRfnN+zt06
4gO+2U/3Gcs6BEOZfPPY2ohQNwPUzPkbpXQSMzYz4L4dOpAfTd/co2J2K5hb
fWKXkgi+J3Nzj9LZrXLSp6x9XlLtXm5Xa731t6E4pkSdwc+7RDM9yqX5zwLy
d80/EP5fMj+zzY/lexDdEyLlmOf+GOJd2dAZjS+DH+nXNND0DOQlKOd+Gfue
J/kSXcUmlI4O1it/RpRa6esFYc9RirDnbDqAoa20nocPdnMZcxhrDKqq1FsX
qGthlEGDg4mcCdG5n5EIPkRwcysGXNoJiD5wUlDs5L6ApHzJ5sZLSMlOwjyy
I07wU4bCxcGDLXHVb5NY8OWUTlP8FaVINr4DOji/kjXkiDGqwNAbIUC/7GAE
SHOLGubro8MWFklddEW3RjOowhY4bWzF1ISo8n13SpPQrV++a8BcEmDgIKww
/up7ggrKjCQFzjq5LT6JvBW09UCl7+Y2vU/pGn1Stk35XvnfqAwhlBbzS4i3
9cm74+cHqT0JvhN7aHQMRUi7phKDKfOkr1wAXkSbxc3t39yIafTncDCRKUjj
/AldcFB9iWtiNT51DveELllwjo+P/O7Y/f8rXckFLl4TfFyXbToyn6Yrf7RU
XwJC5JeHVGJzZl3pi3t+4fzcK6HNfEspKBi55h6UimW+hyW/MiGFIoLEt00c
IV9SkXnQbJz7MZQcyW1D/gWdWp3bkb87K/P7O4lyCuoBW4eWKC29zI4XbWLM
uwiNtyb60SNCxOlmJHQnoukAabjlXb7srUfwcbghKsw5hvVDVNKITzCiG2YN
VWbAOxbblyA6wfCtTJYCue3DJ2sPrOinAvxu4xSMVIzkaKeUbvMPuZ5cFu9W
8SKnRE7vW/2wfsg9HQSoeOwl/pHk9kjdcA4s9PyQmUecu15Q5nDUp9W4j4+/
koxFlkJ2mVRubdCZOVuEhbQe6YDtqgcoziQQcbZdao0m+o0JHOL6I3+GImuW
s64KMeHb/yA2edQLzCqICTU8uvTCeU/Ucxfaf1r4685BNjiipVooKY2o/S/s
S0pF0chfN7VNwSUFbkO8+vY5HL5eW+2FxFvPyrq+3dGSaiqIqnxHmC5Nx13r
UGWT+U4f23LNt8ONG9wi9HLcHytsy/JIurOUM3+8G+8qOmOWTs+rss0XEM7d
XJ/Gmney/XbU+VFR7aO7u03YR+K8T7NJo63M+l05tgS6/wNm6rtqvVr0ojaE
/2ebETEiXt/wodeGJgptaZZU7hgSQAOVkRbFpFZArpuKdcDn0O/jZ6mCbYNB
pYrxoPMg2o/PMhzfU1uvPPaC/AhKP1XRRJ4kfbXYmJ71YjCOXARESyT1ByDb
Inr68bWN7mfclZHmAgprS9JPppobbqxiuk8cWcxn5/6qYl34tj+RVBz5tNzc
w5OXbn6aLX2wgflfjeL/ilH8R0T0n0Rp6o1Wyu89wX+hHX63c8aBzRx5wgqO
G+MQNnIOuaQaOTFanKom9JOtgwEv3YYljPFeSi+pg0opxpGsozo8aSlIBFqF
eJdO9hHgm1BPmbC8zJf2ZZAaNoAZjuG5qJxLravQYG6wZTG7otPd0lqKnQfh
x70YfrsTwxwaxPli9aH3XeZiQxIPhdk8QU/oEkZXjHM7p2ab08qbgVGvoPxV
dDpBMPFqKyJ6ESLfCkOWoevyYhUYRy2C+Ya7R7pd3otA0ccjfiFp1pCSuxeQ
H6G6LFeUxC4hA0JGiZwPLegvpeV8g2ixCeGneDgIsL+AhxMyA9b7OuThQE/o
4y1WdYtw7XoBUlNhYkxdwzz7C9c+KzJs95d0RB6kw+nubCd30NOqYLWZ4gjK
cucs3P8PTNWImFLpj0pSY6GAwSV13pKE5nJFyl5Rs7zRR6Hoc9qUTpKK1X46
vtXunM2lv4v4E5Iny6SjiiTyyVZHPi1jbps6xPh7+X63vq1hn1T3HT6p+J9Z
RlqWeYepvx9Q+H6LEWFVuMzPPUaIxy59QTVn8aX+SJyCcg6lSJ0VeSlyTyPg
OTUnzilQUdk8K+uDVDqlzF5m6htKcrgwOMaIJFGBJKR5k+Y4g8SW5G2PnZM6
i9ezGffzSNppaenqsA8ZxKAD381xjxvyVnuRD0NHLjYM3syyCHKznfflsqPi
7mLElbej5G6G12TGXFLROTDT5XymYwUUSZp6lRB2VIQjU9JZcoOeusJwTzlF
7R6w7sPYpSy8Jd0AHnKznlA5GztSdIY3ytGYqSrusxjuoKvYkI8bkax9a0wu
s+fWov3mzftFxv1ODwJjVlReI2W/AVf9haKk5Q+hO1494gJzR0cc/kof5QW5
pCX0ZaLSarGD3NAtbQwU+21FdIG4TQk24NYz3KEhnigp6ekZmJddNg8y+aTt
AsQKpIhEk04Cr0OiHYr5xF/5CV3EiKmmNB8h6aTv7anUKSe3BoXJ4hgY7ncw
k1OeVNj+IBnw69IX5anYbNSEOqra25bkeCgymHTaey8MztMSo233wJloAS0L
dYdMIOkWFbvj+J6kmICqq2QA+fXUfoCru6hUfbOpblRq0sdnJA0+4v0qtclw
/gXpOkSJDkaKv1wRqxcbKaHPK2IFqEZTzfhwPmDWo80XQHo7m7XpBKxLTF1y
z+W+6VmPe3ajMfNVrO7fsSspkGfz/96rh2yY3hNbkDZAAs58Pt9fbqsV1zpg
6aRNILuVdJeGNjfiAvgiFvj3hZ390ec0lJGRqfDdP4Kx8onRrUUA+bKruYrO
8aQq7F8aWbS+s1moyBQ8JBMJIpLbY7m/yddxf2F/cnt6QXmi2ewAAYv/PfZK
gy7pq0xU/5ivf/WVg7qxdintqq9BSRKYfqMELYWGBIyio2+5fvLvcCtepFdk
9M0DaiOkVGgEQlV81pFOke5msfFRvFkjtpMcFOpKIm37DHXvHW+evtjAlNwe
accIYC8WE1P5odpYnRvyUuNJairKjYlZvmjt6x09k6DLd7Tm6atoJXzjwN7X
AxK+iJrSgSlOpfrmTBJX8PhcKilrXxnDU3o0yMGeeF5+btLHvMRWSyju5yM4
4VB/B16U+qN+Zal1PK1+cvaWbQ31DeTA2PdKJDevCfjl7qjcFnZ7PpVmehCF
+ItLyc1MNl+hUZM05fG9r/s+QDD33t3cgWShXACCrq6xEj2unD+E8Gq06E9k
YSi4uU/i4gaPjJso0RFyYKV31NDM1ocn2So023vhW774ztPS752uPMbGMmk/
N3/rK9wh4x5DrrU29CxS4dLm1r2v2GUQKhNuhTT6nIVGnV7tKdmVqK/EIYPW
Y83BySJi6aT7d9hKyer0pW1UtAK0IP8nSkKfcskjRyWbrgau7NWPipVZC7BP
xdphQT4TaZ++moTte6jIkv7LnJDqp1Ve0QGyF37H4gkLDKHSrd/OlVAoRqrk
fka7Kg03+U1xodObcuCwRvgtvTVK5HKxrfgWvw37BnrikuudNaGbabyRa3u8
+A5C4b0dve8c/UceZhxtcEU0X+uq/K7KRkRJuPO1b30njtJLuot0Bi4BzM9O
eID0V2UoXokWPel7PVHX6MZWzg+HC5WUIzh93i0pusKvr5+/Br75m3RIoxv+
JAGbbhaPDL/yjKfHr463hw16kpHE1FZG+qZUE//fquD/vA5mOc7puiXcaOmT
jhhZ/qtBpni6N4OyNnxnnxbP4ki4Pv8DYeTkxmxpAAA=

-->

</rfc>
