<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kwbdgrr-tsvwg-net-collab-rqmts-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="H2N Collaboration Requirements">Requirements for Host-to-Network Collaboration Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-04"/>
    <author initials="J." surname="Kaippallimalil" fullname="John Kaippallimalil">
      <organization>Futurewei</organization>
      <address>
        <email>john.kaippallimalil@futurewei.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco</organization>
      <address>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajagopalan" fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>Sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Dawkins" fullname="Spencer Dawkins">
      <organization>Tencent America LLC</organization>
      <address>
        <email>spencerdawkins.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="14"/>
    <area>Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>Media</keyword>
    <keyword>Low Latency</keyword>
    <keyword>Wireless Links</keyword>
    <keyword>Bandwidth constraints</keyword>
    <keyword>Policy</keyword>
    <keyword>Operational Considerations</keyword>
    <abstract>
      <?line 114?>

<t>Collaborative signaling from host-to-network (i.e., client-to-network and server-to-network)
can improve the user experience by informing the network about the
nature and relative importance of packets (frames, streams, etc.)
without having to disclose the content of the packets. Moreover,
the collaborative signaling may be enabled so that clients and
servers are aware of the network's treatment of incoming packets.
Also, client-to-network collaboration can be put in place without
revealing the identity of the remote servers. This collaboration
allows for differentiated services at the network (e.g., packet
discard preference), the sender (e.g., adaptive transmission), or
through cooperation of server/client and the network.</t>
      <t>This document lists some use cases that illustrate the need for a
mechanism to share metadata and outlines host-to-network requirements. The document focuses on
signaling information about a UDP transport flow (UDP 4-tuple).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-kwbdgrr-tsvwg-net-collab-rqmts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TSVWG Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 132?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Wireless networks, including 5G and WLAN, inherently experience large
variations in link quality over sub-RTT (round-trip time) intervals and on the other
hand, applications such as interactive media demand both low latency
and high bandwidth.</t>
      <t>Superior service during adverse network events can be achieved by the
sender conveying packet behavior preferences to the network for
packets within a single UDP 4-tuple flow.  During adverse network events
this allows the network to be informed about the least-impactful
packets to drop (or delay) in the same UDP 4-tuple flow.  Without such
signaling, the network can only indiscriminately drop (or delay)
packets.  With such capability, loss-tolerant and delay-tolerant
transport protocols such as RTP <xref target="RFC3550"/>, QUIC <xref target="RFC9000"/>, and Unreliable
QUIC <xref target="RFC9221"/> can inform the network and provide a superior end
user experience.</t>
      <t>Some of the complications that are induced by adverse network events
may be eliminated by adequate dimensioning and upgrades.
However, such upgrades may not be always (immediately) possible or
justified. Complementary mitigations are thus needed to soften these
complications by introducing some collaboration between endpoints and
networks to adjust their behaviors. This document focuses on host-to-network collaboration,
which covers both client-to-network (C2N) and server-to-network (S2N) directions.</t>
      <t><xref target="sec-rationale"/> discusses the rationale for per-packet metadata.</t>
      <t><xref target="uc"/> outlines use cases to illustrate the issues
and the need for additional information per flow to allow the network
to optimize its handling. <xref target="metadata-req"/> describes the requirements for on-path media
collaboration signals.</t>
      <t><xref target="sys-considerations"/> provides operational constraints in the network.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Host:</dt>
        <dd>
          <t>Refers to an endpoint that is connected to a network (called, client) or a server that delivers a service to a client.</t>
        </dd>
        <dt>Per-Flow Metadata:</dt>
        <dd>
          <t>Refers to metadata that doesn't change often during the lifetime
of a connection and thus can be exchanged once or as needed. This is communicated per flow (i.e., UDP 4-tuple) between client and network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of such metadata are client request to honor per-packet metadata and preferences.</t>
        </dd>
        <dt>Per-Packet Metadata:</dt>
        <dd>
          <t>Refers to metadata that varies packet to packet within the same flow, often capturing
the nature and characteristics of the traffic each packet carries. This needs to be communicated on a per packet basis.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of such metadata are Packet Priority and tolerance to delay</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>Network management actions that are undertaken as a reaction to unplanned overload events.
Concretely, this includes policies which react to congestion events with very short to very
long durations (e.g., varying wireless and mobile air interface conditions) or protection
policies to soften the impact of ongoing attacks.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-rationale">
      <name>Rationale for Per-packet Metadata</name>
      <t>Maximizing network utilization and enhancing user experience under
adverse conditions are challenging. Wireless networks face issues
like channel condition changes, cell interference, and user mobility.
These variations can occur in milliseconds <xref target="_5G-Lumos"/>, while congestion
control takes tens of milliseconds (more than one RTT) to estimate data
rate. Application servers encoding live or interactive content also take
time to adjust to network rates. End-to-end congestion control algorithms (CCAs)
are suboptimal when link quality varies in sub-RTT timeframes and applications
need low latency and high bandwidth (e.g., <xref section="2.1" sectionFormat="of" target="RFC6077"/>).
Applications settle for lower throughput when prioritizing latency or higher
throughput with higher delays.</t>
      <t>Feedback-based rate control for a flow (UDP 4-tuple) cannot adapt to sub-RTT
wireless channel changes. Application servers can provide per-packet information
for network shapers to allocate resources effectively. Heuristics can build
an “implicit signal” from unencrypted packets to prioritize flows, but this leads
to protocol ossification <xref target="RFC9419"/>. Encrypted packets make implicit signals unviable.</t>
      <t>Bandwidth constraints are most prominent in access networks (e.g., radio access networks).
Users, serviced via these networks, use clients with varying connectivity needs for
optimal experiences, which change over time based on application usage.
Explicit signals to clients can help manage bandwidth better.</t>
      <t>Interactive media applications and likewise demand high throughput and low latency,
sometimes carrying different streams (e.g., audio and video)
in a single connection (e.g., WebRTC <xref target="RFC8825"/>).</t>
      <t>With RTP <xref target="RFC3550"/>, media type could be used as an implicit signal
for determining relative priority. However, <xref target="RFC9335"/> encrypts RTP
header extensions and Contributing sources (CSRCs). Fully encrypted transport
(e.g., QUIC <xref target="RFC9000"/>) does not expose media header information for network decisions.</t>
      <figure anchor="Figure-e2e">
        <name>E2E Media Transport Overview</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="528" viewBox="0 0 528 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
              <path d="M 24,80 L 24,112" fill="none" stroke="black"/>
              <path d="M 24,192 L 24,224" fill="none" stroke="black"/>
              <path d="M 80,80 L 80,112" fill="none" stroke="black"/>
              <path d="M 80,192 L 80,224" fill="none" stroke="black"/>
              <path d="M 112,192 L 112,224" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,224" fill="none" stroke="black"/>
              <path d="M 200,192 L 200,224" fill="none" stroke="black"/>
              <path d="M 208,80 L 208,112" fill="none" stroke="black"/>
              <path d="M 256,80 L 256,112" fill="none" stroke="black"/>
              <path d="M 256,192 L 256,224" fill="none" stroke="black"/>
              <path d="M 272,176 L 272,200" fill="none" stroke="black"/>
              <path d="M 272,216 L 272,240" fill="none" stroke="black"/>
              <path d="M 288,192 L 288,224" fill="none" stroke="black"/>
              <path d="M 296,80 L 296,112" fill="none" stroke="black"/>
              <path d="M 320,112 L 320,192" fill="none" stroke="black"/>
              <path d="M 344,80 L 344,112" fill="none" stroke="black"/>
              <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
              <path d="M 360,64 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,192 L 376,224" fill="none" stroke="black"/>
              <path d="M 432,192 L 432,224" fill="none" stroke="black"/>
              <path d="M 464,192 L 464,224" fill="none" stroke="black"/>
              <path d="M 520,192 L 520,224" fill="none" stroke="black"/>
              <path d="M 8,64 L 168,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 360,64" fill="none" stroke="black"/>
              <path d="M 24,80 L 80,80" fill="none" stroke="black"/>
              <path d="M 208,80 L 256,80" fill="none" stroke="black"/>
              <path d="M 296,80 L 344,80" fill="none" stroke="black"/>
              <path d="M 80,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 208,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 296,96" fill="none" stroke="black"/>
              <path d="M 24,112 L 80,112" fill="none" stroke="black"/>
              <path d="M 208,112 L 256,112" fill="none" stroke="black"/>
              <path d="M 296,112 L 344,112" fill="none" stroke="black"/>
              <path d="M 8,128 L 168,128" fill="none" stroke="black"/>
              <path d="M 184,128 L 312,128" fill="none" stroke="black"/>
              <path d="M 328,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 184,176 L 272,176" fill="none" stroke="black"/>
              <path d="M 24,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 112,192 L 152,192" fill="none" stroke="black"/>
              <path d="M 200,192 L 256,192" fill="none" stroke="black"/>
              <path d="M 288,192 L 344,192" fill="none" stroke="black"/>
              <path d="M 376,192 L 432,192" fill="none" stroke="black"/>
              <path d="M 464,192 L 520,192" fill="none" stroke="black"/>
              <path d="M 152,208 L 168,208" fill="none" stroke="black"/>
              <path d="M 184,208 L 200,208" fill="none" stroke="black"/>
              <path d="M 256,208 L 288,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 376,208" fill="none" stroke="black"/>
              <path d="M 432,208 L 464,208" fill="none" stroke="black"/>
              <path d="M 24,224 L 80,224" fill="none" stroke="black"/>
              <path d="M 112,224 L 152,224" fill="none" stroke="black"/>
              <path d="M 200,224 L 256,224" fill="none" stroke="black"/>
              <path d="M 288,224 L 344,224" fill="none" stroke="black"/>
              <path d="M 376,224 L 432,224" fill="none" stroke="black"/>
              <path d="M 464,224 L 520,224" fill="none" stroke="black"/>
              <path d="M 8,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 184,240 L 272,240" fill="none" stroke="black"/>
              <g class="text">
                <text x="176" y="36">:</text>
                <text x="104" y="52">3GPP/mobile</text>
                <text x="184" y="52">network</text>
                <text x="176" y="68">:</text>
                <text x="176" y="84">:</text>
                <text x="52" y="100">client</text>
                <text x="176" y="100">B</text>
                <text x="232" y="100">radio</text>
                <text x="324" y="100">CN</text>
                <text x="176" y="116">:</text>
                <text x="176" y="132">:</text>
                <text x="176" y="148">:</text>
                <text x="92" y="164">Wireless</text>
                <text x="164" y="164">home/ISP</text>
                <text x="232" y="164">network</text>
                <text x="176" y="180">:</text>
                <text x="360" y="180">:</text>
                <text x="448" y="180">:</text>
                <text x="176" y="196">:</text>
                <text x="360" y="196">:</text>
                <text x="448" y="196">:</text>
                <text x="52" y="212">client</text>
                <text x="96" y="212">-B-</text>
                <text x="132" y="212">WLAN</text>
                <text x="176" y="212">B</text>
                <text x="228" y="212">router</text>
                <text x="316" y="212">router</text>
                <text x="404" y="212">router</text>
                <text x="492" y="212">server</text>
                <text x="176" y="228">:</text>
                <text x="360" y="228">:</text>
                <text x="448" y="228">:</text>
                <text x="176" y="244">:</text>
                <text x="360" y="244">:</text>
                <text x="448" y="244">:</text>
                <text x="176" y="260">:</text>
                <text x="360" y="260">:</text>
                <text x="448" y="260">:</text>
                <text x="176" y="276">:</text>
                <text x="360" y="276">:</text>
                <text x="400" y="276">Transit</text>
                <text x="448" y="276">:</text>
                <text x="496" y="276">Content</text>
                <text x="28" y="292">User</text>
                <text x="108" y="292">device/Network</text>
                <text x="176" y="292">:</text>
                <text x="240" y="292">MNO/ISP</text>
                <text x="304" y="292">Network</text>
                <text x="360" y="292">:</text>
                <text x="400" y="292">Network</text>
                <text x="448" y="292">:</text>
                <text x="496" y="292">Network</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                     :
       3GPP/mobile network
+--------------------:----------------------+
| +------+           :   +-----+    +-----+ |
| |client+-----------B---+radio+----+  CN | |
| +------+           :   +-----+    +--+--+ |
+--------------------:-----------------|----+
                     :                 |
       Wireless home/ISP network       |
+--------------------:-----------+     |    :          :
| +------+   +----+  :  +------+ | +---+--+ : +------+ : +------+
| |client+-B-+WLAN+--B--+router+---+router+---+router+---+server|
| +------+   +----+  :  +------+ | +------+ : +------+ : +------+
+--------------------:-----------+          :          :
                     :                      :          :
                     :                      : Transit  :  Content
 User device/Network :    MNO/ISP Network   : Network  :  Network
]]></artwork>
        </artset>
      </figure>
      <t><xref target="Figure-e2e"/> shows where such bandwidth and performance constraints
usually exist with a "B" (for Bottleneck) in 3GPP/mobile networks
and WLAN/ISP networks.  When a bottleneck exists temporarily, the
network has no choice but to discard or delay packets -- which can
harm certain flows and, thus, lead to suboptimal perceived experience.
In this document, this is termed 'Reactive Management'.</t>
      <figure anchor="Figure-netshaper">
        <name>Metadata and Network Shaping</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="560" viewBox="0 0 560 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,176" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,176" fill="none" stroke="black"/>
              <path d="M 184,80 L 184,176" fill="none" stroke="black"/>
              <path d="M 200,112 L 200,160" fill="none" stroke="black"/>
              <path d="M 272,112 L 272,160" fill="none" stroke="black"/>
              <path d="M 288,80 L 288,176" fill="none" stroke="black"/>
              <path d="M 496,80 L 496,176" fill="none" stroke="black"/>
              <path d="M 552,80 L 552,176" fill="none" stroke="black"/>
              <path d="M 48,48 L 504,48" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 184,80 L 288,80" fill="none" stroke="black"/>
              <path d="M 496,80 L 552,80" fill="none" stroke="black"/>
              <path d="M 72,112 L 176,112" fill="none" stroke="black"/>
              <path d="M 200,112 L 272,112" fill="none" stroke="black"/>
              <path d="M 72,142 L 200,142" fill="none" stroke="black"/>
              <path d="M 72,146 L 200,146" fill="none" stroke="black"/>
              <path d="M 280,142 L 496,142" fill="none" stroke="black"/>
              <path d="M 280,146 L 496,146" fill="none" stroke="black"/>
              <path d="M 200,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 8,176 L 64,176" fill="none" stroke="black"/>
              <path d="M 184,176 L 288,176" fill="none" stroke="black"/>
              <path d="M 496,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 504,48 L 520,80" fill="none" stroke="black"/>
              <path d="M 32,80 L 48,48" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="288,144 276,138.4 276,149.6" fill="black" transform="rotate(180,280,144)"/>
              <polygon class="arrowhead" points="184,112 172,106.4 172,117.6" fill="black" transform="rotate(0,176,112)"/>
              <polygon class="arrowhead" points="80,144 68,138.4 68,149.6" fill="black" transform="rotate(180,72,144)"/>
              <polygon class="arrowhead" points="80,112 68,106.4 68,117.6" fill="black" transform="rotate(180,72,112)"/>
              <g class="text">
                <text x="112" y="36">(A)</text>
                <text x="176" y="36">Application</text>
                <text x="264" y="36">signaling</text>
                <text x="336" y="36">(client</text>
                <text x="376" y="36">-</text>
                <text x="416" y="36">server)</text>
                <text x="104" y="100">(C)</text>
                <text x="136" y="100">C2N</text>
                <text x="240" y="132">Network</text>
                <text x="348" y="132">downstream</text>
                <text x="420" y="132">packet</text>
                <text x="236" y="148">Shaper</text>
                <text x="312" y="164">(B)</text>
                <text x="360" y="164">on-path</text>
                <text x="408" y="164">S2N</text>
                <text x="460" y="164">metadata</text>
                <text x="36" y="196">Client</text>
                <text x="236" y="196">Router</text>
                <text x="524" y="196">Server</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
            (A) Application signaling (client - server)
     +--------------------------------------------------------+
    /                                                          \
+--+---+              +------------+                         +--+---+
|      |   (C) C2N    |            |                         |      |
|      |<------------>| +--------+ |                         |      |
|      |              | | Network| |  downstream packet      |      |
|      |<=============+=+ Shaper +<+=========================+      |
|      |              | +--------+ | (B) on-path S2N metadata|      |
+------+              +------------+                         +------+
 Client                   Router                              Server
]]></artwork>
        </artset>
      </figure>
      <t><xref target="Figure-netshaper"/> shows a bottleneck (access) router on the Server to Client path.
A network shaper in the router manages QoS of multiple users’ flows and can buffer,
discard, or apply other flow control rules. Application layer signaling and feedback
between Client and Server (A - in the figure) adjust transmission rate over several RTTs
using feedback and CCAs, settling to a steady rate to avoid excessive packet loss.
In networks where link conditions (between Client and Router) vary significantly at
sub-RTT timescales, this results in unused bandwidth at short timescales.</t>
      <t>Research (e.g., <xref target="_5G-Octopus"/>) indicates that media applications can achieve better QoE
when sending at a higher rate (less conservative than current CCA) and tolerating some
packet loss or delay of low priority packets. Packet priority and tolerance to delay in
such cases would be provided on-path in a side channel associated with the downstream packet (B).
The requirements for this server-to-network (S2N) metadata are described in <xref target="server-network"/>.</t>
      <t>The client may provide information to an (access) router to drop 'lower priority'-marked packets
of a flow (UDP 4-tuple) temporarily which can in turn allocate available bandwidth
to other flows of that network attachment, especially during a reactive management event.</t>
      <t>Network shapers observe flows and apply policies to maximize performancebut are unaware underlying
flows belinging to the same user and network attachment (e.g., a subscriber connection, a 3GPP PDU
Session). Clients may provide information to an (access) router to drop
'lower priority'-marked packets of a flow (UDP 4-tuple) temporarily during congestion,
allowing bandwidth allocation to other flows of the same network attachment.</t>
      <t>In summary, the rapid variation of wireless link quality and/or
bandwidth limitations in networks along with interactive applications
that demand low latency and high throughput can lead to suboptimal
user experience.</t>
    </section>
    <section anchor="req-definition">
      <name>Requirements Definition</name>
      <section anchor="server-to-network-s2n">
        <name>Server-to-Network (S2N)</name>
        <dl>
          <dt>REQ-PACKET-PRIORITY:</dt>
          <dd>
            <t>Server indicates the importance of a packet within a flow. This allows the network
to prioritize based on requirement and during a Reactive Management event. This
priority value may also be used to indicate loss tolerance and the
network elements may drop loss tolerant packets during Reactive Management
events.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-packet metadata requirement.</t>
          </dd>
          <dt>REQ-PACKET-DELAY:</dt>
          <dd>
            <t>Metadata to indicate whether the packet can tolerate delay.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-packet metadata requirement.</t>
          </dd>
        </dl>
      </section>
      <section anchor="client-to-network-c2n">
        <name>Client-to-Network (C2N)</name>
        <dl>
          <dt>REQ-CLIENT-DECIDES:</dt>
          <dd>
            <t>User/Client indicating to the network to honor the application's
metadata signaling.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-flow metadata requirement.</t>
          </dd>
          <dt>REQ-PAYLOAD-CLIENT-DECIDES:</dt>
          <dd>
            <t>The ability of the receiver to change the priority by communicating
to the network to prioritize one payload(metadata) over another within
the flow -- without cooperation of the sender. Gives the sender the
ability to have same metadata for all the connections without having
to change based on the user preference, aids in scalability.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-flow metadata requirement.</t>
          </dd>
        </dl>
      </section>
      <section anchor="api">
        <name>API</name>
        <dl>
          <dt>REQ-API-FRAMEWORK:</dt>
          <dd>
            <t>API framework to facilitate signaling for applications.</t>
          </dd>
          <dt/>
          <dd>
            <t>Signaling from client to network (<xref target="client-flow-auth"/>)
and server to network (<xref target="server-network"/>))
is best facilitated by Application Programming Interfaces
(APIs). Signaling and retrieval of
the signals may not be performed at a single layer (although not
encouraged). Hence, for server to network signaling, a framework is required to abstract the underlying
per-packet metadata protocol(s) and allow the application(s) to retrieve/send signals
using a single or a set of APIs independent of the channels that
are used to convey the signals. The API framework is required even
if one single channel is used so that any application on a client can
consume the signals.</t>
          </dd>
          <dt/>
          <dd>
            <t>The API framework uses the medium negotiated under <xref target="metadata-negotiation"/> to send/receive the signals.</t>
          </dd>
        </dl>
      </section>
      <section anchor="system-considerations">
        <name>System Considerations</name>
        <dl>
          <dt>REQ-PRIVACY-ADDITIONAL:</dt>
          <dd>
            <t>An on-path observer obtains (or gleans) no additional information about the IP
packet.</t>
          </dd>
          <dt>REQ-SIGNALING-AVOIDANCE:</dt>
          <dd>
            <t>Leveraging previous experience <xref target="RFC9049"/>, the following is not
required to make use of the collaborative signaling:
</t>
            <ul spacing="normal">
              <li>
                <t>Reveal the application identity.</t>
              </li>
              <li>
                <t>Expose the application cause (or 'reason') to signal metadata.</t>
              </li>
              <li>
                <t>Reveal the server identity.</t>
              </li>
              <li>
                <t>Inspect client-to-server encrypted payload by network elements.</t>
              </li>
            </ul>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="uc">
      <name>Use Cases</name>
      <section anchor="uc-streaming">
        <name>Media Streaming</name>
        <t>Streaming video contains the occasional key frame ("I-frame")
containing a full video frame.  These frames are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Examples: live broadcast, on-demand video streaming.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>The majority of streaming traffic is Audio and Video traffic.
Audio traffic is more critical than video for many applications and
vice-versa for some. This differences in priority needs to be indicated
to the network to ensure network (de)prioritizes (or even drop if
deemed necessary) traffic appropriately.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY.  </t>
            <t>
Impact: With the above requirement met, better quality of service
 could be maintained in resource-constrained networks and during
 Reactive Management events ensuring better user experience.</t>
          </li>
          <li>
            <t>The server (or relay) sends the same stream to many receivers,
including the same metadata (especially with media over QUIC).
Different clients have different priorities for different types of traffic.
This would result in change in priorities for the same type of traffic
that a single server sends, based on the user/client.  </t>
            <t>
Requirement: REQ-PAYLOAD-CLIENT-DECIDES.  </t>
            <t>
Impact: With the above requirement met, each client/user preferences are
 prioritized accordingly while maintaining scalability on the server, since
 the metadata that the server sends still remains the same for all the connections.</t>
          </li>
          <li>
            <t>In loss-prone networks or during Reactive Management events, if all packets of an application
flow (UDP 4-tuple) such as live broadcast or on-demand video streaming are treated the same,
it limits the ability to maximize network utilization and use the transiently available bandwidth.
Dropping or delaying of (media) packets randomly is likely to lower network utilization
and application performance.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PACKET-DELAY.  </t>
            <t>
Impact: By identifying packets that tolerate being dropped, congestion can be reduced leading
 to improved performance/quality of service.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-interactive">
        <name>Interactive Media</name>
        <t>Interactive media includes content that a user can actively engage
with and results in input and response actions that can be highly
delay-sensitive. This can also include mixed traffic based on the
user activity and interaction.</t>
        <t>Examples: VoIP (Peer-to-Peer (P2P), group conferencing), gaming,
Remote Desktop Virtualization, eXtended Reality (XR).</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>A mobile/roaming user prioritizes audio over video during a VoIP
call to have a seamless meeting experience.  </t>
            <t>
Requirement: REQ-PAYLOAD-CLIENT-DECIDES.  </t>
            <t>
Impact: With the above requirement met, each client/user preferences are
 prioritized accordingly while maintaining scalability on the server.</t>
          </li>
          <li>
            <t>A remote desktop user prioritizes graphics updates over an on-going
file copy operation. A user types in/interacts with a document/file after triggering a
save file operation, while save operation is on-going.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PACKET-DELAY.  </t>
            <t>
Impact: By prioritizing graphic updates/interactive traffic, user
 interactivity is improved with lesser jitter.</t>
          </li>
          <li>
            <t>A game or VoIP application may want to signal different metadata
for the same type of packet in each direction. One user, in a VoIP
conference call, wants to prioritize the slide deck being shared while
the other wants to prioritize audio and other wants to prioritize
video of the speaker. Each user's varied preferences can be catered
with same type of metadata originating from the server.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PAYLOAD-CLIENT-DECIDES.  </t>
            <t>
Impact: With the above requirement met, each client/user preferences are
 prioritized accordingly while maintaining scalability on the server.</t>
          </li>
          <li>
            <t>A network glitch while user is in an eXtended Reality application.
The traffic comprises of haptic, video, audio, graphics update and
keystrokes. During such a Reactive Management event, some packets need to be
deprioritized/dropped to maintain interactivity.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PACKET-DELAY.  </t>
            <t>
Impact: By prioritizing high priority traffic, user's
 interactive experience is improved with lesser jitter.</t>
          </li>
        </ol>
      </section>
      <section anchor="metadata-negotiation">
        <name>Metadata Negotiation Support</name>
        <t>Currently, some flows are granted higher priority over other flows
because of a contractual agreement between the ISP and the content
provider. These contracts could be extended to also allow per-packet
metadata within a single UDP 4-tuple, as desired by this
document (<xref target="client-flow-auth"/>). However,
these sorts of agreements favor large content providers and major
ISPs, disfavoring smaller providers and smaller ISPs while also
preventing other network topologies such as peer-to-peer networking
(e.g., VoIP) as that traffic does not originate from a contracted
content provider.</t>
        <t>For all applications to benefit from per-packet prioritization within
a single UDP 4-tuple, the client needs to communicate with the ISP to determine which per-packet
markings are supported by the ISP's network (e.g., encoded into IPv6 Flow Label,
UDP Option, or DSCP). Then it can indicate to the ISP's network that a
certain UDP 4-tuple will have those markings and instruct the server
to generate those per-packet metadata markings.</t>
        <t>There might be many channels to signal the Server-to-Network per-packet metadata such as
(non-exhaustive list):</t>
        <ul spacing="normal">
          <li>
            <t>TCP options <xref target="RFC9293"/></t>
          </li>
          <li>
            <t>UDP Options <xref target="I-D.ietf-tsvwg-udp-options"/></t>
          </li>
          <li>
            <t>IPv6 Hop-by-Hop Options (<xref section="4.3" sectionFormat="of" target="RFC8200"/>)</t>
          </li>
          <li>
            <t>QUIC CID mapping</t>
          </li>
          <li>
            <t>ICMP messages</t>
          </li>
        </ul>
        <t>Requirements: REQ-API-FRAMEWORK and REQ-CLIENT-DECIDES.</t>
        <t>Impact: By signaling ISPs to honor the metadata for a particular flow, the client
  facilitates identifying important packets to the ISP enhancing packet delay or
  drop decisions during Reactive Management events.</t>
        <figure anchor="client-learn">
          <name>API Framework: Client learns ISP capabilities and signals how incoming IP packets will signal network collaboration</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="480" viewBox="0 0 480 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,48 L 24,224" fill="none" stroke="black"/>
                <path d="M 440,48 L 440,224" fill="none" stroke="black"/>
                <path d="M 32,64 L 432,64" fill="none" stroke="black"/>
                <path d="M 32,112 L 432,112" fill="none" stroke="black"/>
                <path d="M 32,160 L 432,160" fill="none" stroke="black"/>
                <path d="M 32,208 L 432,208" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="440,160 428,154.4 428,165.6" fill="black" transform="rotate(0,432,160)"/>
                <polygon class="arrowhead" points="440,64 428,58.4 428,69.6" fill="black" transform="rotate(0,432,64)"/>
                <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
                <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
                <g class="text">
                  <text x="28" y="36">Client</text>
                  <text x="408" y="36">ISP</text>
                  <text x="452" y="36">router</text>
                  <text x="64" y="84">Network</text>
                  <text x="152" y="84">Collaboration</text>
                  <text x="264" y="84">Capabilities?</text>
                  <text x="44" y="132">my</text>
                  <text x="88" y="132">Network</text>
                  <text x="176" y="132">Collaboration</text>
                  <text x="284" y="132">capabilities</text>
                  <text x="60" y="180">Server</text>
                  <text x="108" y="180">will</text>
                  <text x="148" y="180">mark</text>
                  <text x="200" y="180">packets</text>
                  <text x="256" y="180">using</text>
                  <text x="312" y="180">"method</text>
                  <text x="360" y="180">#4"</text>
                  <text x="44" y="228">ok</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
     Client                                           ISP router
       |                                                   |
       |-------------------------------------------------->|
       | Network Collaboration Capabilities?               |
       |                                                   |
       |<--------------------------------------------------|
       | my Network Collaboration capabilities             |
       |                                                   |
       |-------------------------------------------------->|
       | Server will mark packets using "method #4"        |
       |                                                   |
       |<--------------------------------------------------|
       | ok                                                |

]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="metadata-req">
      <name>On-path Metadata Requirements</name>
      <t>There are various approaches for collaborative signaling between
the server/client and network including out-of-band signaling,
client-centric metadata sharing and proxied connections. The
requirements here focus on proxied metadata connections on path
with the data traffic.</t>
      <t>The path signals below should follow the principles of intentional
distribution, protection of information, minimization and limiting
impact as described in <xref target="RFC9419"/> and <xref target="RFC8558"/>. Leveraging
previous experience (<xref target="RFC9049"/>), the metadata signals do not
need application identity, application cause (or 'reason'), server
identity or the inspection of client-to-server encrypted payload.</t>
      <t>The metadata connections may be between server and network (in
either direction) or between client and network (in either direction).</t>
      <t>Some use cases benefit from server-network metadata exchanges
(<xref target="server-network"/>) after first performing a client-network metadata
exchange (<xref target="client-flow-auth"/>).</t>
      <t>For the requirements that follow, the assumption is that the client
agrees to the exchange of metadata between the server and network,
or between the client and network.</t>
      <section anchor="client-network">
        <name>Client-Network Metadata</name>
        <t>Client-to-network metadata is critical in both identifying the flow that
contains metadata as well as negotiate the medium of signaling of metadata.</t>
        <section anchor="client-flow-auth">
          <name>Client-Network Flow Authorization and Negotiation</name>
          <t>By signaling the ISP, a client can authorize the ISP to honor
incoming per-packet metadata for a certain flow (UDP 4-tuple).</t>
          <t>This same signal also allows negotiating capabilities
discussed in <xref target="metadata-negotiation"/>) and sharing the keys
necessary for encrypting or obfuscating server-to-network per-
packet metadata recommended in <xref target="privacy"/>.</t>
          <t>REQ-CLIENT-DECIDES is satisfied by signaling Client Flow Authorization as part of client-to-network signal.</t>
        </section>
      </section>
      <section anchor="server-network">
        <name>Server-Network Metadata</name>
        <t>Application flows (UDP 4-tuple) for live media, eXtended Reality (XR),
and gaming require high bandwidth and low latency. In wireless networks,
some bandwidth cannot be scheduled using feedback-based rate control due
to significant link variations at sub-RTT timescales. Congestion control
algorithms settle to a steady rate to avoid excessive packet loss.
Feedback via ECN/L4S <xref target="RFC9331"/> provides an accurate signal but lacks finer
resolution information of instantaneous bandwidth available.</t>
        <t>If application packets can tolerate delay or some loss of lower priority
packets, the network traffic shaper and scheduler can use this information
to provide higher application quality of service <xref target="_5G-Octopus"/>.</t>
        <t>The metadata in <xref target="relative-priority"/> should satisfy constraints identified
in <xref target="sys-considerations"/>. Privacy <xref target="privacy"/> requires that metadata should not provide
additional information to identify the application or user. The application
server can decide on metadata values that provide the best handling for packets
and may not reflect exact priority values. This metadata is advisory, and
network traffic policy that restricts its use would not result in additional issues.
Other constraints include scale (<xref target="scalability"/>) and continuity (<xref target="continuity"/>).</t>
        <t>Realizing the additional bandwidth potential with these metadata may require
a higher sending rate for the transport flow, which is not specified in this
document. Network shapers and schedulers can use the metadata in
<xref target="relative-priority"/>, but further details are out of scope.</t>
        <t>Previous work in <xref target="TR.23.700-70-3GPP"/> has identified the general problem, but the solution
in <xref target="TS.23.501-3GPP"/> is specific to a 5G network. The metadata sent from a dedicated 5G
application server identifies PDU set information and end-of-burst signals, which are not
understood by non-3GPP systems such as Wi-Fi or DOCSIS. Further, 3GPP functions and policy
configurations are required since this is a 5G specific solution. The metadata disclosed
in the 5G solution also identifies frame boundaries and does not fully conform to the
constraints for privacy or minimality of data identified in <xref target="sys-considerations"/>.</t>
        <section anchor="relative-priority">
          <name>Packet Priority</name>
          <t>Per-packet priority information provides the priority level of one
packet relative to other packets within a transport flow (UDP
4-tuple). When a packet is marked with high priority, the expectation
is that during a Reactive Management event, the network will give high importance to forwarding the
packet compared to a packet marked with low priority.
The application server can decide on the priority or
importance values that provide the best handling for the packets
of the transport flow.
When more than one application stream (e.g., video, audio)
is sent on the same transport flow, the application server decides
the best allocation of priority values across the different streams
of the flow.</t>
          <t>Per-packet priority or importance determines the drop priority of
a packet.</t>
          <t>REQ-PACKET-PRIORITY is satisfied by signaling Packet Priority as part of server-to-network metadata.</t>
        </section>
        <section anchor="delay">
          <name>Tolerance to Delay</name>
          <t>Some packets of a media flow (UDP 4-tuple) can tolerate more delay
over the wire than others (e.g., packets carrying live media frames
require very low latency while packets carrying a background image
for augmented reality can tolerate more delay). The objective of
this metadata is to indicate that these packets can tolerate a
limited amount of delay when there is severe congestion or limited
bandwidth. Similar to the LE PHB <xref target="RFC8622"/> for flows, the
expectation is that in this case, each packet marked with this
metadata is dropped during a Reactive Management event. As with
per-packet priority in <xref target="relative-priority"/>, the application server
can decide on the metadata values that provide the best handling
for the packets of the transport flow.</t>
          <t>REQ-PACKET-DELAY is satisfied by signaling Tolerance to Delay as part of server-to-network metadata.</t>
        </section>
      </section>
    </section>
    <section anchor="sys-considerations">
      <name>System Considerations</name>
      <t>Traffic policing and shaping are enforced in ingress/egress network
points for various reasons (protect the network against attacks,
ensure conformance with a traffic profile, etc.). Out-of-profile
traffic may be discarded or assigned another class (e.g., using Lower
Effort Per-Domain Behavior (LE PDB) <xref target="RFC3662"/>) a bandwidth limit
among others. The exact behavior is policy-based and deployment-specific.</t>
      <t>The entire set of operations to manage traffic is beyond the scope
of this document.  This section focuses on operational constraints
that impact  server-network, and client-network modes of sending
metadata.</t>
      <section anchor="privacy">
        <name>Privacy Considerations</name>
        <t>Media flows are vulnerable to traffic analysis even without per-packet
metadata (see, e.g., <xref target="traffic-analysis"/>). The security aspects of the
media payload / transport are not in the scope of this document; these
are mentioned here only to provide context for metadata privacy.</t>
        <t>Protocols such as TLS, SRTP, and QUIC offer some mitigations (like padding)
but are vulnerable to traffic analysis (<xref target="traffic-analysis-2"/>).</t>
        <t>Per-packet metadata can aid in traffic analysis. Hence, it is recommended to
encrypt or obfuscate the metadata information so it is only available to the
server, client, and authorized network elements. However, encryption/obfuscation
of per-packet metadata is ineffective if the threat resides in the same network
entity with keys to decrypt the metadata. The method of encryption or
obfuscation is out of scope.  To best preserve privacy, implementations might
also consider less granular per-packet marking, for example marking all
audio and video packets the same and only marking a background data transfer
with different metadata.</t>
        <t>Analysis to ensure that metadata exposure does not compromise user privacy
or allow unauthorized entities to infer sensitive information, while
maintaining minimal resource consumption is crucial. There is a tension
between resource consumption of such encryption and the user's privacy
(<xref section="7.4" sectionFormat="of" target="RFC6973"/>).</t>
        <t>REQ-PRIVACY-ADDITIONAL and REQ-SIGNALING-AVOIDANCE are satisfied by
not revealing any information that could identify the application's identity, reason to signal,
server identity, and securing the metadata.</t>
      </section>
    </section>
    <section anchor="non-req">
      <name>Non-Requirements</name>
      <t>Application feedback with measurements of packets lost and delay
incurred may affect the sending rate and other behavior of the
application.  The requirements and specification to mitigate these
aspects are not in the scope of this document.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Security aspects for the metadata are discussed in <xref target="privacy"/>.
The principles outlined in <xref target="RFC8558"/>, <xref target="RFC9049"/>, and <xref target="RFC9419"/>
contain security considerations and are referenced in <xref target="metadata-req"/>.</t>
      <t>Per-packet metadata can be vulnerable to modification in transit by
on-path attackers, who can corrupt checksums, drop packets, or modify
metadata. Such changes can be detected by the receiver.</t>
      <t>Since the document focuses only on priorities within a flow
(not specifying inter-flow priority), the document does not induce concerns related to a specific
user or client declaring all flows or a subset of them as being more important. Such abuse concerns are thus not applicable.</t>
      <t>Privacy-related considerations are discussed in <xref target="privacy"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="TS.23.501-3GPP">
        <front>
          <title>3rd Generation Partnership Project; Technical Specification Group Servies and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="TR.23.700-70-3GPP">
        <front>
          <title>Study on XR (Extended Reality) and media services (Release 19)</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="August"/>
        </front>
      </reference>
      <reference anchor="_5G-Lumos">
        <front>
          <title>Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput, Arvind Narayanan et al., ACM Internet Measurement Conference (IMC '20), https://dl.acm.org/doi/10.1145/3419394.3423629</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="_5G-Octopus">
        <front>
          <title>Octopus: In-Network Content Adaptation to Control Congestion on 5G Links, Yongzhou Chen et al., ACM/IEEE Symposium on Edge Computing (SEC '23), https://dl.acm.org/doi/10.1145/3583740.3628438</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="December"/>
        </front>
      </reference>
      <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
        <front>
          <title>Bandwidth measurement for QUIC</title>
          <author fullname="Zafer Gurel">
            <organization/>
          </author>
          <author fullname="Ali C. Begen">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="traffic-analysis" target="https://www.mdpi.com/1424-8220/24/11/3509">
        <front>
          <title>Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning</title>
          <author fullname="Ibrahim A. Alwhbi">
            <organization/>
          </author>
          <author fullname="Cliff C. Zou">
            <organization/>
          </author>
          <author fullname="Reem N. Alharbi">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="traffic-analysis-2" target="https://www.gnan.ece.gatech.edu/archive/ICC_2021_Netflix_Insights.pdf">
        <front>
          <title>A real-world dataset of netflix videos and user watch-behavior</title>
          <author>
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="RFC3550">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="RFC6077">
        <front>
          <title>Open Research Issues in Internet Congestion Control</title>
          <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
          <author fullname="M. Welzl" initials="M." surname="Welzl"/>
          <author fullname="M. Scharf" initials="M." surname="Scharf"/>
          <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
          <date month="February" year="2011"/>
          <abstract>
            <t>This document describes some of the open problems in Internet congestion control that are known today. This includes several new challenges that are becoming important as the network grows, as well as some issues that have been known for many years. These challenges are generally considered to be open research topics that may require more study or application of innovative techniques before Internet-scale solutions can be confidently engineered and deployed. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6077"/>
        <seriesInfo name="DOI" value="10.17487/RFC6077"/>
      </reference>
      <reference anchor="RFC9419">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RFC8825">
        <front>
          <title>Overview: Real-Time Protocols for Browser-Based Applications</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>This document gives an overview and context of a protocol suite intended for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web".</t>
            <t>It intends to serve as a starting and coordination point to make sure that (1) all the parts that are needed to achieve this goal are findable and (2) the parts that belong in the Internet protocol suite are fully specified and on the right publication track.</t>
            <t>This document is an applicability statement -- it does not itself specify any protocol, but it specifies which other specifications implementations are supposed to follow to be compliant with Web Real-Time Communication (WebRTC).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8825"/>
        <seriesInfo name="DOI" value="10.17487/RFC8825"/>
      </reference>
      <reference anchor="RFC9335">
        <front>
          <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
          <author fullname="J. Uberti" initials="J." surname="Uberti"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="S. Murillo" initials="S." surname="Murillo"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations.</t>
            <t>This document updates RFC 3711, the SRTP specification, and defines Cryptex as a new mechanism that completely encrypts header extensions and CSRCs and uses simpler Session Description Protocol (SDP) signaling with the goal of facilitating deployment.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9335"/>
        <seriesInfo name="DOI" value="10.17487/RFC9335"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC9293">
        <front>
          <title>Transmission Control Protocol (TCP)</title>
          <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="9293"/>
        <seriesInfo name="DOI" value="10.17487/RFC9293"/>
      </reference>
      <reference anchor="I-D.ietf-tsvwg-udp-options">
        <front>
          <title>Transport Options for UDP</title>
          <author fullname="Dr. Joseph D. Touch" initials="J. D." surname="Touch">
            <organization>Independent Consultant</organization>
          </author>
          <author fullname="C. M. Heard" initials="C. M." surname="Heard">
            <organization>Unaffiliated</organization>
          </author>
          <date day="13" month="October" year="2024"/>
          <abstract>
            <t>   Transport protocols are extended through the use of transport header
   options. This document updates RFC 768 (UDP) by indicating the
   location, syntax, and semantics for UDP transport layer options
   within the surplus area after the end of the UDP user data but
   before the end of the IP length.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-udp-options-37"/>
      </reference>
      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering"/>
          <author fullname="R. Hinden" initials="R." surname="Hinden"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals. For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear. Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements. In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels. Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC9331">
        <front>
          <title>The Explicit Congestion Notification (ECN) Protocol for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
          <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
          <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>This specification defines the protocol to be used for a new network service called Low Latency, Low Loss, and Scalable throughput (L4S). L4S uses an Explicit Congestion Notification (ECN) scheme at the IP layer that is similar to the original (or 'Classic') ECN approach, except as specified within. L4S uses 'Scalable' congestion control, which induces much more frequent control signals from the network, and it responds to them with much more fine-grained adjustments so that very low (typically sub-millisecond on average) and consistently low queuing delay becomes possible for L4S traffic without compromising link utilization. Thus, even capacity-seeking (TCP-like) traffic can have high bandwidth and very low delay at the same time, even during periods of high traffic load.</t>
            <t>The L4S identifier defined in this document distinguishes L4S from 'Classic' (e.g., TCP-Reno-friendly) traffic. Then, network bottlenecks can be incrementally modified to distinguish and isolate existing traffic that still follows the Classic behaviour, to prevent it from degrading the low queuing delay and low loss of L4S traffic. This Experimental specification defines the rules that L4S transports and network elements need to follow, with the intention that L4S flows neither harm each other's performance nor that of Classic traffic. It also suggests open questions to be investigated during experimentation. Examples of new Active Queue Management (AQM) marking algorithms and new transports (whether TCP-like or real time) are specified separately.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9331"/>
        <seriesInfo name="DOI" value="10.17487/RFC9331"/>
      </reference>
      <reference anchor="RFC8622">
        <front>
          <title>A Lower-Effort Per-Hop Behavior (LE PHB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document specifies properties and characteristics of a Lower- Effort Per-Hop Behavior (LE PHB). The primary objective of this LE PHB is to protect Best-Effort (BE) traffic (packets forwarded with the default PHB) from LE traffic in congestion situations, i.e., when resources become scarce, BE traffic has precedence over LE traffic and may preempt it. Alternatively, packets forwarded by the LE PHB can be associated with a scavenger service class, i.e., they scavenge otherwise-unused resources only. There are numerous uses for this PHB, e.g., for background traffic of low precedence, such as bulk data transfers with low priority in time, non-time-critical backups, larger software updates, web search engines while gathering information from web servers and so on. This document recommends a standard Differentiated Services Code Point (DSCP) value for the LE PHB.</t>
            <t>This specification obsoletes RFC 3662 and updates the DSCP recommended in RFCs 4594 and 8325 to use the DSCP assigned in this specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8622"/>
        <seriesInfo name="DOI" value="10.17487/RFC8622"/>
      </reference>
      <reference anchor="RFC3662">
        <front>
          <title>A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <author fullname="K. Nichols" initials="K." surname="Nichols"/>
          <author fullname="K. Wehrle" initials="K." surname="Wehrle"/>
          <date month="December" year="2003"/>
          <abstract>
            <t>This document proposes a differentiated services per-domain behavior (PDB) whose traffic may be "starved" (although starvation is not strictly required) in a properly functioning network. This is in contrast to the Internet's "best-effort" or "normal Internet traffic" model, where prolonged starvation indicates network problems. In this sense, the proposed PDB's traffic is forwarded with a "lower" priority than the normal "best-effort" Internet traffic, thus the PDB is called "Lower Effort" (LE). Use of this PDB permits a network operator to strictly limit the effect of its traffic on "best-effort"/"normal" or all other Internet traffic. This document gives some example uses, but does not propose constraining the PDB's use to any particular type of traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3662"/>
        <seriesInfo name="DOI" value="10.17487/RFC3662"/>
      </reference>
      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
      <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
        <front>
          <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
          <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Dan Wing" initials="D." surname="Wing">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="10" month="August" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

   Note: The solution in this draft will be revised to address
   requirements defined in [draft-kwbdgrr-tsvwg-net-collab-rqmts].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-05"/>
      </reference>
    </references>
    <?line 708?>

<section anchor="x-req-def">
      <name>Extended Requirements Definition</name>
      <dl>
        <dt>REQ-MEDIA-AV-SEPARATE:</dt>
        <dd>
          <t>Audio can be prioritized differently than video.</t>
        </dd>
        <dt/>
        <dd>
          <t>This requirement may be generalized to non-media packet types.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is an enhanced requirement that requires e2e application layer
signaling (out of scope here) to identify of frame boundaries and may
not be suitable in cases which are sensitive to traffic analysis
(see REQ-SIGNALING-AVOIDANCE and <xref target="RFC9049"/>). If the application
provides frame boundaries, the client signals the enhanced application
priority values in REQ-PAYLOAD-CLIENT-DECIDES.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is a per-flow metadata requirement.</t>
        </dd>
        <dt>REQ-MEDIA-KEYFRAME:</dt>
        <dd>
          <t>Video contains prediction frames and full frames, which need to be
distinguished so that full frames can be indicated to the
network.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is an enhanced requirement that requires e2e application layer
signaling (out of scope here) to identify of frame boundaries and may
not be suitable in cases which are sensitive to traffic analysis
(see REQ-SIGNALING-AVOIDANCE and <xref target="RFC9049"/>). If the application
provides frame boundaries, the client signals the enhanced application
priority values in REQ-PAYLOAD-CLIENT-DECIDES.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is a per-packet metadata requirement.</t>
        </dd>
        <dt>REQ-CONTINUITY:</dt>
        <dd>
          <t>Handover from one radio or router to another should continue to
provide same service level.</t>
        </dd>
        <dt>REQ-MULTIPLE-BOTTLENECKS:</dt>
        <dd>
          <t>Signaling should support Multiple bottlenecks.</t>
        </dd>
        <dt/>
        <dd>
          <t>The network must identify multiple bottlenecks, including those
within the ISP and subscriber networks, ensuring all bottlenecks
benefit from network/client collaboration to enhance overall performance.</t>
        </dd>
        <dt>REQ-SINGLE-CHANNEL:</dt>
        <dd>
          <t>The network should use a single channel for sharing metadata
to simplify the process and avoid the need for redundant functions.</t>
        </dd>
        <dt>REQ-ISP-SCALE:</dt>
        <dd>
          <t>The metadata and other state information that a router has to
maintain for each additional flow it handles should be kept
to a minimum or eliminated altogether.</t>
        </dd>
      </dl>
    </section>
    <section anchor="extended-use-cases">
      <name>Extended Use-Cases</name>
      <section anchor="media-streaming-extended">
        <name>Media Streaming Extended</name>
        <t>Streaming video contains the occasional key frame ("I-frame")
containing a full video frame.  These frames are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Examples:</t>
        <ol spacing="normal" type="1"><li>
            <t>Audio is more critical than video for many applications and should
be prioritized differently than video.  </t>
            <t>
Requirement: REQ-MEDIA-AV-SEPARATE.</t>
          </li>
          <li>
            <t>Video contains prediction frames and full frames, which need to be
distinguished so that full frames can be indicated to the network.  </t>
            <t>
Requirement: REQ-MEDIA-KEYFRAME.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="extended-system-considerations">
      <name>Extended System Considerations</name>
      <section anchor="classification">
        <name>Redundant Functions and Classification Complications</name>
        <t>If distinct channels are used to share the metadata between a host
and a network, a network that engages in the collaborative signaling
approach will require sophisticated features to classify flows and
decide which channel is used to share metadata so that it can consume
that information.</t>
        <t>Likewise, the network will require to implement redundant functions;
for each signaling interface.</t>
        <t><em>As such, application- and protocol-specific signaling channels are
suboptimal.</em> (REQ-SINGLE-CHANNEL)</t>
        <t>Requirement:  REQ-SINGLE-CHANNEL is preferred.</t>
      </section>
      <section anchor="continuity">
        <name>Session Continuity</name>
        <t>The frequency of handovers increases when a user moves
faster or when the media session lasts longer. During handovers,
there should be minimal delay incurred during handover in
configuring/setting up the metadata of a media session in progress.</t>
        <t>Requirement: REQ-CONTINUITY.</t>
      </section>
      <section anchor="multiple-bottlenecks">
        <name>Multiple Bottlenecks</name>
        <t>Whereas models often show a single bottleneck, there are frequently
two (or more) bottlenecks: the ISP network and within the subscriber
network (e.g., Wi-Fi link). As such, all bottlenecks near the
subscriber should be able to benefit from network/client collaboration.</t>
        <t>Requirement: REQ-MULTIPLE-BOTTLENECKS.</t>
      </section>
      <section anchor="scalability">
        <name>Scalability</name>
        <t>There may be a large number of flows handled by the server
and wireless/access router. Per flow information (state) at a
wireless router for optimizing the flow can negate the advantages
offered as the number of flows handled increases.</t>
        <t>Requirement: REQ-ISP-SCALE.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a merge of <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/>
and <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>.</t>
      <t>T. Reddy contributed text and ideas to this document.</t>
      <dl>
        <dt>Acknowledgments from <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>:</dt>
        <dd>
          <t>Xavier De Foy and the authors of this draft have discussed the
similarities and differences of this draft with the MoQ draft for
carrying media metadata.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors wish to thank Mike Heard,
Sebastian Moeller and Tom Herbert for discussions on metadata fields,
fragmentation and various transport aspects.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors appreciate
input from Marcus Ilhar and Magnus Westerlund on the need to address
privacy in general and Dan Druta to consider a common transport
across various client/server to network signaling when possible.
Ruediger Geib suggested that limiting the amount of state information
that a wireless router has to keep for a flow should be minimized.</t>
        </dd>
        <dt/>
        <dd>
          <t>Ingemar Johansson's suggestions on fast fading (which L4S handles)
and dramatic drops in wireless accesses have been helpful to identify
the issues.  Thanks to Hang Shi for the review and comments on
client-to-network signaling.  Thanks to Luis Miguel Contreras, Colin
Kahn, Marcus Ilhar and Tianji Jiang for their review and comments.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
