Transport and Services Working Group J. Kaippallimalil
Internet-Draft Futurewei
Intended status: Informational D. Wing
Expires: 23 January 2025 Cloud Software Group
S. Gundavelli
Cisco
S. Rajagopalan
Cloud Software Group
S. Dawkins
Tencent America LLC
M. Boucadair
Orange
22 July 2024
Requirements for Network Collaboration Signaling
draft-kwbdgrr-tsvwg-net-collab-rqmts-02
Abstract
Wireless networks (e.g., cellular or WLAN) experience significant but
transient variations in link quality and have policy constraints
(e.g., bandwidth) that affect user experience. Collaborative
signaling (e.g., host-to-network and server-to-network) can improve
the user experience by informing the network about the nature and
relative importance of packets (frames, streams, etc.) without having
to disclose the content of the packets. Moreover, the collaborative
signalling may be enabled so that hosts are aware of the network's
treatment of incoming packets. Also, host-to-network collaboration
can be put in place without revealing the identity of the remote
servers. This collaboration allows for differentiated services at
the network (e.g., packet discard preference), the sender (e.g.,
adaptive transmission), or through cooperation of server / host and
the network.
This document lists some use cases that illustrate the need for a
mechanism to share metadata and outlines requirements for both host-
to-network (and vice versa) and server-to-network (and vice versa).
The document focuses on intra-flow or flows bound to the same user.
About This Document
This note is to be removed before publishing as an RFC.
Status information for this document may be found at
https://datatracker.ietf.org/doc/draft-kwbdgrr-tsvwg-net-collab-
rqmts/.
Kaippallimalil, et al. Expires 23 January 2025 [Page 1]
Internet-Draft Network Collaboration Requirements July 2024
Discussion of this document takes place on the TSVWG Working Group
mailing list (mailto:tsvwg@ietf.org), which is archived at
https://mailarchive.ietf.org/arch/browse/tsvwg/. Subscribe at
https://www.ietf.org/mailman/listinfo/tsvwg/.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 23 January 2025.
Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 7
3. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1. Media Streaming . . . . . . . . . . . . . . . . . . . . . 8
3.2. Interactive Media . . . . . . . . . . . . . . . . . . . . 9
3.3. Accommodate-Delay Traffic . . . . . . . . . . . . . . . . 9
3.4. User Preferences . . . . . . . . . . . . . . . . . . . . 10
3.5. Mixed Traffic . . . . . . . . . . . . . . . . . . . . . . 10
3.6. Honoring of Metadata for Servers Behind a Gateway . . . . 11
4. Operational Considerations . . . . . . . . . . . . . . . . . 12
Kaippallimalil, et al. Expires 23 January 2025 [Page 2]
Internet-Draft Network Collaboration Requirements July 2024
4.1. Policy Enforcement . . . . . . . . . . . . . . . . . . . 12
4.2. Redundant Functions and Classification Complications . . 12
4.3. Metadata Scope . . . . . . . . . . . . . . . . . . . . . 13
4.4. Metadata Granularity . . . . . . . . . . . . . . . . . . 13
4.4.1. Application Metadata . . . . . . . . . . . . . . . . 13
4.4.2. Network Metadata . . . . . . . . . . . . . . . . . . 14
4.5. Multiple Bottlenecks . . . . . . . . . . . . . . . . . . 14
4.6. Application Interference . . . . . . . . . . . . . . . . 15
4.7. Exposure Handling . . . . . . . . . . . . . . . . . . . . 15
4.8. Privacy Considerations . . . . . . . . . . . . . . . . . 16
4.9. Scalability . . . . . . . . . . . . . . . . . . . . . . . 17
4.10. Session Continuity . . . . . . . . . . . . . . . . . . . 17
4.11. Abuse and Constraints . . . . . . . . . . . . . . . . . . 18
5. On-path Metadata Requirements . . . . . . . . . . . . . . . . 18
5.1. Host-Network Metadata . . . . . . . . . . . . . . . . . . 19
5.1.1. Priority between Flows (Inter-flow) . . . . . . . . . 19
5.1.2. Priority within a Flow (Intra-Flow) . . . . . . . . . 20
5.2. Network-Host Metadata . . . . . . . . . . . . . . . . . . 21
5.2.1. Assisted Offload . . . . . . . . . . . . . . . . . . 21
5.2.2. Network Bandwidth & Network Rate Limiting Policies . 21
5.3. Server-Network Metadata . . . . . . . . . . . . . . . . . 22
5.3.1. Identification of Media Frames and Streams . . . . . 22
5.3.2. Identification of Traffic Type without Disclosure of
the Application . . . . . . . . . . . . . . . . . . . 23
5.3.3. Relative Priority . . . . . . . . . . . . . . . . . . 23
5.3.4. Tolerance to Delay . . . . . . . . . . . . . . . . . 23
5.3.5. Burst Indication . . . . . . . . . . . . . . . . . . 24
6. Non-Requirements . . . . . . . . . . . . . . . . . . . . . . 24
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 24
8. Security Considerations . . . . . . . . . . . . . . . . . . . 24
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 25
Informative References . . . . . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 28
1. Introduction
Wireless networks inherently experience large variations in link
quality due to several factors. These include the change in wireless
channel conditions, interference between proximate cells and channels
or because of the end user movement. These variations in link
quality can be in the order of a millisecond or less [_5G-Lumos]
while congestion control takes several tens of milliseconds (more
than one round-trip time (RTT)) to estimate data rate. End-to-end
congestion control algorithms are far from optimal when the link
quality is highly variable in sub-RTT timeframes and the application
demands both low latency and high bandwidth (e.g., Section 2.1 of
[RFC6077]).
Kaippallimalil, et al. Expires 23 January 2025 [Page 3]
Internet-Draft Network Collaboration Requirements July 2024
It is also not practical to convey sub-RTT link changes using an end-
to-end feedback signal. As a consequence, applications settling for
a lower throughput when latency is prioritized or achieving higher
throughput at the expense of much higher delays.
With not fully encrypted packets, networks may use some heuristics to
build an "implicit signal" derived from the contents of a packet to
prioritize or otherwise shape flows. Implicit signals are not
desirable as they lead to ossification of protocols as result of
introducing unintended dependencies [RFC9419]. When packet contents
are encrypted, the approach of using implicit signals is no longer
viable.
Bandwidth constraints exist most predominantly at the access network
(e.g., radio access networks). Users who are serviced via these
networks use hosts which run various application clients; each having
different connectivity needs for an optimal user experience. These
needs are not frozen but change over time depending on the
application and even depending on how an application is used (e.g.,
user's preferences). An explicit signal to the host can help to
manage the use of available bandwidth better and better share it with
requesting applications.
Other applications like interactive media can demand both high
throughput and low latency and, in some cases, carry different media
streams (e.g., audio and video) in a single transport connection
(e.g., WebRTC [RFC8825]). There may be preferences that an
application may wish to convey, such as a higher priority for audio
over video (or the opposite) in congested networks or importance of
certain packets (e.g., video key frames). With RTP [RFC3550], the
type of media could be examined and used as an implicit signal for
determining relative priority. However, [RFC9335] defines a new
mechanism that completely encrypts RTP header extensions and
Contributing sources (CSRCs). Furthermore, a full encrypted
transport (e.g., QUIC [RFC9000]) does not expose any media header
information that on-path network elements can use for forwarding.
As mobile networks primarily service battery-operated devices, the
same information is useful to those networks even without network
congestion, as the information can inform the base station to
aggregate packet transmission to allow the mobile device to briefly
power down (sleep) its radio.
Kaippallimalil, et al. Expires 23 January 2025 [Page 4]
Internet-Draft Network Collaboration Requirements July 2024
Also, traffic patterns in some emerging applications can vary
significantly during the session. For example, live media or AI-
generated content can have significant dynamic variations and
potentially aperiodic frames. Information gleaned from unencrypted
media packets and headers that wireless networks used in the past to
optimize traffic shaping and scheduling are not exposed in encrypted
communications.
|
3GPP/mobile network
+--------------------|----------------------+
|+-- ---+ | +-----+ +-----+ |
||client+-----------(B)--+radio+----+ UPF | |
|+------+ | +-----+ +--+--+ |
+--------------------|-----------------|----+
| |
Wireless home/ISP network |
+--------------------|-----------+ | | |
|+--- --+ +----+ | +------+ | +---+--+ | +------+ | +------+
||client+-(B)+WLAN+-(B)-+router+---+router+---+router+---+server|
|+------+ +----+ | +------+ | +------+ | +------+ | +------+
+--------------------|-----------+ | |
| | |
| | Transit | Content
User device/Network | MNO/ISP Network | Network | Network
Figure 1
Figure 1 shows where such bandwidth and performance constraints
usually exist with a "B" (for Bottleneck) in 3GPP/mobile networks and
WLAN/ISP networks. When a bottleneck exists temporarily, the network
has no choice but to discard or delay packets -- which can harm
certain flows and, thus, lead to suboptimal perceived experience. In
this document, this is termed 'reactive policy'.
A network attachment represents the communication link between hosts
(client) and network (router) over which a connection policy
(including QoS) is applied to flows within that network attachment.
A network attachment may be established using control plane signaling
between the client and the network (access) router and is out of
scope of this document. Transport flows over a network attachment
may consist of multiple streams such as video or audio. Figure 2
shows a high level view of network attachments, flows, and QoS/policy
discussed in Section 5.
Kaippallimalil, et al. Expires 23 January 2025 [Page 5]
Internet-Draft Network Collaboration Requirements July 2024
The requirements in Section 5 apply to data units like frames within
a flow, but not between flows. Specifically, this document does not
discuss flows of distinct hosts/users.
+----------+ +-----------------+
|+----+ | | +-------------+ |
|| A1 |--+ | | | QoS, Policy | |
|+-+--+A2| | | +---+-----+---+ | +------+
| |+-+--+ | Network | | | | |srv-A2|
| | | |attachment| v | | +--+---+
| | | *************************|**** | |
| | +------------- flow-x2 -----|-------------------+ +------+
| +------------ flow-x1 ---------|-----------------------+srv-A1|
| *************************|**** | +--+---+
+-Client-1-+ | | | |
| | | |
+----------+ Network attachment V | |
|+----+ ****************************** | |
|| A1 +------------ flow-x3 ---------------------------------+
|+----+ ****************************** |
+----------+ +-----------------+
Client-2 Router
Figure 2
Figure 2 shows "Client-1" and "Client-2" that negotiate connection
policy (e.g., QoS) and other aspects like mobility handling, charging
applied to flows in that network attachment. "Client-1" has "flow-
x1" and "flow-x2" over its network attachment while "Client-2" has
"flow-x3". The requirements in this document focuses on on-path
collaboration signals that apply to data units such as media frames
within flows like "flow-x1/x2/x3" but not between them.
In summary, the rapid variation of wireless link quality and/or
bandwidth limitations in networks along with interactive applications
that demand low latency and high throughput can lead to suboptimal
user experience. Section 3 outlines use cases to illustrate the
issues and the need for additional information per flow to allow the
network to optimize its handling.
Some of the complications that are induced by the phenomena discussed
above may be eliminated by adequate dimensioning and upgrades.
However, such upgrades may not be always (immediately) possible or
justified. Complementary mitigations are thus needed to soften these
complications by introducing some collaboration between endpoints and
networks to adjust their behaviors.
Kaippallimalil, et al. Expires 23 January 2025 [Page 6]
Internet-Draft Network Collaboration Requirements July 2024
Section 4 provides operational constraints in the network and
Section 5 describes the requirements for on-path media collaboration
signals.
2. Definitions
The document makes use of the following terms:
Discard preference: Is an indication of drop preference within a
flow when there are no sufficient network resources to handle all
competing packets of that same flow.
Intentional Management: Network policy such as (monthly) bandwidth
quota or bandwidth limit, or quality (delay and/or jitter))
assurances.
Reactive Management: Network reactions to congestion events or
protection polices under attacks, with very short to very long
durations (e.g., varying wireless and mobile air interface
conditions).
Traffic shaping: Refers in this document to QoS management at the
wireless/access router to delay or discard packets of lower
priority to achieve bounded latency and high throughput.
User Plane Function (UPF): Refers to a 3GPP element that is located
between the mobile infrastructure and the Data Network (DN) as
shown in Figure 3.
For a definitive description of 3GPP network architectures, the
reader should refer to the 3GPP's TR 23.501 [TR.23.501-3GPP].
┌─────┐ ┌─────┐ ┌─────┐ ┌─────┐ ┌─────┐ ┌─────┐
│NSSF │ │ NEF │ │ NRF │ │ PCF │ │ UDM │ │ AF │
└──┬──┘ └──┬──┘ └──┬──┘ └──┬──┘ └──┬──┘ └──┬──┘
Nnssf│ Nnef│ Nnrf│ Npcf│ Nudm│ │Naf
───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
Nausf│ Namf│ Nsmf│
┌──┴──┐ ┌──┴──┐ ┌──┴──────┐
│AUSR │ │ AMF │ │ SMF │
└─────┘ └──┬──┘ └──┬──────┘
╱ │ │ ╲
Control Plane N1 ╱ │N2 │N4 ╲N4
════════════════════════════════════════════════════════════
User Plane ╱ │ │ ╲
┌───┐ ┌──┴──┐ N3 ┌──┴──┐ N9 ┌─────┐ N6 .───.
│UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN )
└───┘ └─────┘ └─────┘ └─────┘ `───'
Kaippallimalil, et al. Expires 23 January 2025 [Page 7]
Internet-Draft Network Collaboration Requirements July 2024
Figure 3: 5GS Architecture
3. Use Cases
3.1. Media Streaming
Streaming video contains the occasional key frame ("I-frame")
containing a full video frame. These frames are necessary to rebuild
receiver state after loss of delta frames. The key frames are
therefore more critical to deliver to the receiver than delta frames.
Streaming video also contains audio frames which can be encoded
separately and, thus, can be signaled separately (requirement: REQ-
MEDIA-KEYFRAME).
Audio is more critical than video for many applications, but its
importance (relative to other packets in the flow) is still an
application decision (requirements: REQ-MEDIA-AV-SEPARATE, REQ-MEDIA-
CLIENT-DECIDES). For example, the ability of the receiver to change
the priority by communicating to the network -- without cooperation
of the sender -- gives a hearing-impaired user the ability to adjust
video above audio.
Especially with media over QUIC, the server (or relay) sends the same
stream to many receivers, including the same metadata. Thus, when a
client needs different prioritization (e.g., video over audio or the
other way around), this is only achievable by signaling that priority
inversion from the client to the ISP router (requirement: REQ-CLIENT-
DECIDES).
Examples: live broadcast, on-demand video streaming
Requirements:
REQ-MEDIA-KEYFRAME: Video contains partial frames and full frames,
which need to be distinguished so that full frames can be
indicated to the network.
REQ-MEDIA-AV-SEPARATE: Audio can be prioritized differently than
video.
Use cases:
Kaippallimalil, et al. Expires 23 January 2025 [Page 8]
Internet-Draft Network Collaboration Requirements July 2024
1. In loss-prone networks or during reactive policy events,
retransmissions cause long delays. All packets being treated the
same can have challenges in efficiently handling/forwarding data.
Today, there is no way to identify packets which are less
important and/or loss-tolerant to prioritize packets in
challenging networks and/or during reactive events.
2. Some media frames may be able to tolerate more delay over the
wire than others (e.g., live media frames require very low
latency while a background image for augmented reality may be
delivered with more delay tolerance). Even when the media
payload is not encrypted, the network has no means to distinguish
these different requirements.
3.2. Interactive Media
Interactive media includes content that a user can actively engage
with and results in input and response actions that can be highly
delay-sensitive.
Examples: VoIP (Peer-to-Peer (P2P), group conferencing), gaming,
eXtended Reality (XR).
Requirements:
REQ-PACKET-NATURE: The receiver indicates that a flow can be allowed
to be delayed/buffered (bulk data transfer) or not (interactive
traffic) and requests that the network honors the incoming flow's
per-packet signals, which prevents denial of service of mis-marked
incoming flows.
Use cases:
1. A mobile/roaming user prioritizes audio over video during a VoIP
call to have a seamless meeting experience.
3.3. Accommodate-Delay Traffic
Accommodate-Delay traffic includes content that is more resilient to
buffering and delays (e.g., file copy, file download) compared to
interactive traffic. This traffic can be buffered in favor of
improved interactivity, without significant impact to the user
experience. It is least sensitive to buffer bloating.
Requirement: REQ-PACKET-NATURE as defined previously.
Use cases:
Kaippallimalil, et al. Expires 23 January 2025 [Page 9]
Internet-Draft Network Collaboration Requirements July 2024
1. A remote desktop user prioritizes graphics update over an on-
going file copy operation.
2. User application in foreground is given priority over downloading
software updates.
3.4. User Preferences
A game or VoIP application may want to signal different metadata for
the same type of packet in each direction. For example, for a game,
video in the server-to-client direction might be more important than
audio, whereas input devices (e.g., keystrokes) might be more
important than audio. Each user can have varied preferences for the
same type of data originating from the server.
Determination of such preferences is outside of the scope of this
document.
Requirements:
REQ-CLIENT-DECIDES: The receiving client determines importance of
packets it receives, as the client may have changing needs over
time.
Use cases:
1. Dynamic changes to priority based on user activity is not
possible today. For example, audio packets having the same
priority when a user mutes the audio locally, or change in
priority during times of emergency where video streaming
applications share the same priority as SOS signals.
2. A user prioritizing video over audio while playing an interactive
game.
3. User's foreground application should receive priority over
background tasks. For example, a user is typing in a document
while playing a media in the background within the same session.
3.5. Mixed Traffic
Mixed traffic can contain multiple types of data flowing through the
same 5-tuple connection. They may include digital models of the real
world, multimedia content, virtualized desktop/apps, and interactive
engagement.
Kaippallimalil, et al. Expires 23 January 2025 [Page 10]
Internet-Draft Network Collaboration Requirements July 2024
In cases where the wireless network has to drop or delay processing,
all packets of the media frame or stream are treated in the same
manner.
Requirements:
REQ-PACKET-RELIABILITY: Indicate if a packet is treated as reliable
or unreliable by the application.
REQ-PACKET-NATURE: Indicate if a packet belongs to bulk traffic or
interactive traffic.
Examples: Virtual Apps and Desktops.
Use cases:
1. Document being printed/saved while being edited. The interactive
traffic has higher priority over bulk traffic).
2. File download while intearacting with the webpage. With QUIC,
this could occur with the same webserver. Interactive activity
performed with the webpage higher priority over file download.
3. In graphics remoting, Critical Glyphs (Reliable) has more
priority over Smoothing Glyphs (unreliable) during reactive
events.
4. During reactive policy events, the network can choose to drop the
packets marked unreliable by the application, thereby
prioritizing reliable packets to avoid retransmissions and
performance degradation.
3.6. Honoring of Metadata for Servers Behind a Gateway
In enterprise networks and remote desktop use case, a server can host
multiple connections with varying type of traffic. These servers are
often exposed to the Internet through some sort of a gateway-proxy
and the signaling (like DSCP bits) from these servers are often
ignored by the access/transit networks.
Requirement: REQ-CLIENT-DECIDES as defined previously.
Kaippallimalil, et al. Expires 23 January 2025 [Page 11]
Internet-Draft Network Collaboration Requirements July 2024
4. Operational Considerations
Traffic policing and shaping are enforced in ingress/egress network
points for various reasons (protect the network against attacks,
ensure conformance with a trafic profile, etc.). Out-of-profile
trafic may be discarded or assigned another class (e.g., using Lower
Effort Per-Domain Behavior (LE PDB) [RFC3662]) a bandwidth limit
among others. The exact behavior is policy-based and deployment-
specific.
The entire set of operations to manage traffic is beyond the scope of
this document. This section focuses on operational constraints that
impact server – network, and host – network modes of sending
metadata.
4.1. Policy Enforcement
Some metadata requires the network to share some hints with a host to
adjust its behavior for some specific flows. However, that metadata
may have a dependency on the service offering that is subscribed by a
user.
Let us consider the example of a bitrate for an optimized video
delivery. _Such bitrate may not be computed system-wide_ given that
flows from users with distinct service offerings (and connectivity
SLOs) may be serviced by the same network nodes. Instead, the
network needs to dynamically adjust the bitrate based on each user's
service package and connectivity SLOs to ensure optimal delivery for
all users (REQ-METADATA-ACCURACY).
Requirement: REQ-METADATA-ACCURACY.
4.2. Redundant Functions and Classification Complications
If distinct channels are used to share the metadata between a host
and a network, a network that engages in the collaborative signaling
approach will require sophisticated features to classify flows and
decide which channel is used to share metadata so that it can consume
that information.
Likewise, the network will require to implement redundant functions;
for each signaling interface.
_As such, application- and protocol-specific signaling channels are
suboptimal._ (REQ-SINGLE-CHANNEL)
Requirement: REQ-SINGLE-CHANNEL is preferred.
Kaippallimalil, et al. Expires 23 January 2025 [Page 12]
Internet-Draft Network Collaboration Requirements July 2024
4.3. Metadata Scope
An operational challenge for sharing resource-quota like metadata
(e.g., maximum bitrate) is that the network is generally not entitled
to allocate quota per-application, per-flow, per-stream, etc. that
delivered as part of an Internet connectivity service. However, the
network has a visibility about the overall network attachment (e.g.
inbound/outbound bandwidth discussed in
[I-D.ietf-opsawg-teas-attachment-circuit]).
As such, hints about resource-like metadata is bound by default to
the overall network attachment, not specific to a given application
or flow.
Most importantly, the metadata can be used by the network to
prioritize traffic within a single 5-tuple connection and metadata
cannot be leveraged for prioritization between different flows.
It is out of the scope of this document to discuss setups (e.g., 3GPP
PDU Sessions) where network attachments with Guaranteed Bit Rate
(GBR) for specific flows is provided.
Requirement:
REQ-SCOPED-METADATA: Means to characterize the scope of a shared
metadata for the sake of better interoperability should be
supported.
4.4. Metadata Granularity
The packet requirements mentioned above can be broadly classified
into 2 catagories.
4.4.1. Application Metadata
Application metadata comprise of fields in metadata that specifies
how the application will treat the packet. This information, when
available to the network, can be useful in deciding how to handle
packets during reactive events. This level of granularity cannot be
simply replaced by another bit added to the priority field as
evidenced by the use-case below.
Requirements: Packet information such as REQ-PACKET-RELIABILITY, REQ-
PACKET-NATURE as defined above.
Use-case:
Kaippallimalil, et al. Expires 23 January 2025 [Page 13]
Internet-Draft Network Collaboration Requirements July 2024
1. In an interactive gaming session, the traffic can be of multiple
types such as critical and smoothening glyph updates for graphics
traffic, haptic feedback traffic, audio traffic while the game is
being saved (bulk data). In terms of priority, haptic feedback
gets the highest priority and is often transmitted unreliably,
since getting the feedback late is of minimal use. While
considering only priority levels, during an uneventful session,
haptic feedback would assume highest priority while the
smoothening glyphs get the lower priority along with bulk data.
Although, in a loss-prone network, haptic feedback can be dropped
since it is unreliable while critical glyph and bulk data are
expected to be delivered reliably and can result in
retranmissions if lost. This distinction is not feasible with an
addition to the priority level but can be done by defining more
granular metadata. Information about application's treatment of
the packet is used by the network in deciding how to handle
certain types of packets over the other.
4.4.2. Network Metadata
Network metadata comprise of fields in metadata that specifies how
the network should treat the packet. This dictates how the network
should prioritize the packet and has no bearing on the nature of the
packet itself.
Requirement: Packet handling information such as REQ-PACKET-SELF.
Use-case:
1. In a VoIP session where audio is prioritized over video, both
traffic has the same nature (reliability and interactivity) and
differ only in how the packet needs to be prioritized by the
network to ensure audio reaches more reliably, faster and
coherently than video. This is solely the way application wants
the network to prioritize the packet and not the nature of the
packet itself.
4.5. Multiple Bottlenecks
Whereas models often show a single bottleneck, there are frequently
two (or more) bottlenecks: the ISP network and within the subscriber
network (e.g., Wi-Fi link). As such, all bottlenecks near the
subscriber should be able to benefit from network/host collaboration.
Requirement: REQ-MULTIPLE-BOTTLENECKS should be supported.
Kaippallimalil, et al. Expires 23 January 2025 [Page 14]
Internet-Draft Network Collaboration Requirements July 2024
4.6. Application Interference
Applications that have access to a resource-quota information may
adopt an aggressive behavior (compared to those that don't have
access) if they assumed that a resource-quota like metadata is for
the application, not for the host that runs the applications.
This is challenging for home networks where multiple hosts may be
running behind the same CPE, with each of them running a video
application. The same challenge may apply when tethering is enabled.
Requirement:
REQ-SIGNAL-EXPOSURE-FAIRNESS: Means to expose the signal independent
of the application should be considered. An example of such
exposure is OS APIs.
4.7. Exposure Handling
Signaling to the network (Section 5.1, Section 5.3) and consuming the
signals from the network (Section 5.2) will need to be facilitated by
Application Programming Interfaces (APIs) for any application to use
them. Signaling and retrieval of the signals may not be performed at
a single layer (although not encouraged). Hence, a framework is
required to abstract the underlying protocol(s) and allow the
application(s) to retrieve/send signals using a single or a set of
API(s) independent of the channels that are used to convey the
signals. The API framework is required even if one single channel is
used so that any application can consume the signals.
There might be many channels to signal the metadata such as (non-
exhaustive list):
* Application layer
* TCP options [RFC9293]
* UDP Options [I-D.ietf-tsvwg-udp-options]
* IPv6 Hop-by-Hop Options (Section 4.3 of [RFC8200])
* QUIC CID mapping
* ICMP messages
Requirement:
REQ-API-FRAMEWORK: API framework to facilitate signaling for
Kaippallimalil, et al. Expires 23 January 2025 [Page 15]
Internet-Draft Network Collaboration Requirements July 2024
applications.
4.8. Privacy Considerations
Encrypted media payloads along with temporary IPv6 addresses between
a server and user (client) provide a measure of privacy for the
content and the identity of the user. It should, however, be noted
that media flows (e.g., encrypted video payloads in SRTP) exhibit a
pattern of bursts and intervals that amounts to a signature and is
vulnerable to frequency analysis. To avoid this kind of frequency
analysis, media sent by the server would need to be scheduled or
multiplexed differently to each user/recipient. This may be possible
in transports like QUIC which allows flexibility in scheduling each
stream. Transports like QUIC also fully encrypt the entire stream
and, therefore, no media headers are observable on-path either. The
security aspects of the media payload / transport are not in the
scope of this document and is described here only to provide context
for metadata privacy.
Some metadata (e.g., the size of a burst of packets, sequence number,
and timestamp) can be readily observed or inferred by entities along
the network path. However, it is essential to recognize that while
sequence numbers and timestamps are typically visible in the clear-
text headers of protocols (e.g., TCP, RTP, or SRTP) they are not
directly observable in encrypted protocols such as QUIC. All
metadata sent from the server to the network, including these
elements and others, are vulnerable to modification while in transit.
Only an on-path attacker can modify on-path metadata. Such an
attacker could engage in other malicious activities, like corrupting
the checksum or completely dropping the packet. For instance, an
active attacker could alter the metadata to mislabel packets
containing video key-frames as unimportant, but such changes are
detectable by the receiver.
It is recommended to encrypt or obfuscate the metadata information so
it is only available to hosts and to authorized network elements.
The method of encryption or obfuscation is not described in this
document but rather in other documents describing how this metadata
is encoded and exchanged amongst hosts and network elements. The
privacy implications of revealing metadata to network elements need
to be thoroughly analyzed. This analysis should ensure that any
exposure of metadata does not compromise user privacy or allow
unauthorized entities to infer sensitive information about the data
being transmitted while maintaining minimal resource consumption.
Requirements:
REQ-PRIVACY-ADDITIONAL: An on-path observer obtains no additional
Kaippallimalil, et al. Expires 23 January 2025 [Page 16]
Internet-Draft Network Collaboration Requirements July 2024
information about the IP packet.
REQ-SIGNALING-AVOIDANCE: Leveraging previous experience [RFC9049],
the folliwing is not required to make use of the collaborative
signaling:
* Reveal the application identity.
* Expose the application cause (or 'reason') to signal metadata.
* Reveal server identity.
* Inspect client-to-server encrypted payload by network elements.
4.9. Scalability
There may be a large number of media flows handled by the server and
wireless/access router.
Per flow information (state) at a wireless router for optimizing the
flow can negate the advantages offered as the number of flows handled
increases.
The metadata and other state information that a router has to
maintain for each additional media flow it handles should be kept to
a minimum or eliminated altogether.
Requirement:
REQ-ISP-SCALE: The metadata other state information that a wireless
router has to maintain for each additional media flow it handles
should be very low or none.
4.10. Session Continuity
The general trend in wireless networks is to deploy the wireless
router closer to the user. This can help with low link latency but
can result in more frequent handovers as the user moves between
routers. The frequency of handovers increases when a user moves
faster or when the media session lasts longer.
During handovers, there should be minimal delay incurred during
handover in configuring/setting up the metadata of a media session in
progress.
Requirement:
REQ-CONTINUITY: Handover from one radio or router to another should
Kaippallimalil, et al. Expires 23 January 2025 [Page 17]
Internet-Draft Network Collaboration Requirements July 2024
continue to provide same service level.
4.11. Abuse and Constraints
It is important that not every flow be prioritized; otherwise, the
network devolves into the best-effort network that existed prior to
metadata signaling. It is a requirement that mechanisms exist to
prevent this occurrence.
Such a mechanism might be simple, for example, a cellular network
might allow one flow from a subscriber to declare itself as
important; other flows with that subscriber are denied attempts to
prioritize themselves. However, the network cannot identify whether
the prioritized flow is legitimate or malicious.
Requirements:
REQ-SIGNAL-VALIDATION: The network/OS needs to ensure that the user/
client signaling of priority (if any) does not associate the same
priority level with all traffic types within the same flow,
thereby avoiding prioritizing of all the streams/traffic the same
way.
REQ-CLIENT-VALIDATION: The network needs to ensure the signal is
coming from the same user/client that is part of the 5-tuple flow.
This is to ensure no other application influences the priority of
another application's flow.
5. On-path Metadata Requirements
There are various approaches for collaborative signaling between the
server/host and network including out-of-band signaling, client-
centric metadata sharing and proxied connections. The requirements
here focus on proxied metadata connections on path with the data
traffic.
The path signals below should follow the principles of intentional
distribution, protection of information, minimization and limiting
impact as described in [RFC9419] and [RFC8558]. Leveraging previous
experience ([RFC9049]), the metadata signals does not need
application identity, application cause (or 'reason'), server
identity or the inspection of client(host)-to-server encrypted
payload.
The metadata connections may be between server and network (in either
direction) or between host and network (in either direction).
Kaippallimalil, et al. Expires 23 January 2025 [Page 18]
Internet-Draft Network Collaboration Requirements July 2024
Some use cases benefit from server – network metadata exchanges
(Section 5.3) and others need client involvement (Section 5.1).
For the requirements that follow, the assumption is that the client
agrees to the exchange of metadata between the server and network, or
between the client and network.
Requirement:
REQ-PACKET-SELF: Packet importance is indicated by the packet
itself.
Note REQ-PACKET-SELF should meet the requirements of Section 4.8
especially REQ-PRIVACY-ADDITIONAL.
5.1. Host-Network Metadata
5.1.1. Priority between Flows (Inter-flow)
Certain flows being received by a host (or by an application on a
host) are less or more important than other flows of _the same host_.
For example, a host downloading a software update is generally
considered less important than another host doing interactive audio/
video or gaming.
By signaling the relative importance of flows to a network element,
the network element can (de-)prioritize those flows to best
accommodate the needs of the various applications on a same host.
Without a signaling in place between a receiving host and its
network, remote peers are able to mark packets that interfere with
the desires of the receiving host -- making their flows more
important than what the receiving host considers more important.
This eventually causes all flows to be marked as important, or --
more likely -- such priority markings to be ignored.
However, prioritizing between flows, even for the same user/
subscriber, presents the following challenges:
1. Identification and authentication of legitimate applications on
the host. The remote peers can also be malicious and benign.
2. Identifying whether the traffic belongs to a single user or
multiple users from a single network attachment (e.g., tethering
or LAN connected to a CPE). The network will enforce per-
subscriber policies, not per-host.
Kaippallimalil, et al. Expires 23 January 2025 [Page 19]
Internet-Draft Network Collaboration Requirements July 2024
3. Enforcing fairness to all the flows belonging to a single host.
For example, it is a challenge to prevent a platform from marking
certain flows as low priority at platform layer, bypassing the
application, to (de)prioritize certain applications over all the
other applications on the same host. Such unfairness can be
revealed during certification or public benchmark efforts,
though.
Taking into account these challenges, and despite the use case is
described in the document, inter-flow (de)prioritization requirements
are out of the scope of this document.
Future versions of the document may re-consider this conclusion as
a function of the comments received from the TSVWG.
5.1.2. Priority within a Flow (Intra-Flow)
Interactive Audio/Video has long been using [RFC3550] which runs over
UDP. As described in Section 2.3.7.2 of [RFC7478], there is value in
differentiating between voice, video and data. Today's video
streaming is exclusively over TCP but will migrate to QUIC and
eventually is likely to support unreliable transport ([RFC9221],
[I-D.ietf-moq-transport]). With unreliable transport of video in RTP
or QUIC, it is beneficial to differentiate the important video
keyframes from other video frames.
Other applications, as mentioned in Section 3, such as gaming and
remote desktop also benefit from differentiating their packets to the
network.
Many of these flows do not originate from a content provider's
network -- rather, they originate from a peer (e.g., VoIP,
interactive video, peer-to-peer gaming, Remote Desktop, and CDN).
Thus, the flows originate from an IP address that is not known before
connection establishment, so there needs to be a way for the client
to authorize the network elements to receive and hopefully to honor
the metadata of those packets from a remote peer.
Without a signaling in place between a receiving host and its
network, remote peers are able to mark every packet of a flow as
important, causing much the same problem as the previous use case.
Eventually, when all packets of every flow are marked as important,
there is no differentiation between packets within a flow, rendering
the network unable to improve reactive policy decisions.
Requirements: The requirements vary based on use case and user
preference. The requirements listed in Section 3 are applicable
here.
Kaippallimalil, et al. Expires 23 January 2025 [Page 20]
Internet-Draft Network Collaboration Requirements July 2024
5.2. Network-Host Metadata
5.2.1. Assisted Offload
There are cases (crisis) where "normal" network resources cannot be
used at maximum and, thus, a network would seek to reduce or offload
some of the traffic during these events -- often called 'reactive
traffic policy'. An example of such use case is cellular networks
that are overly used (and radio resources exhausted) such as a large
collection of people (e.g., parade, sporting event), or such as a
partial radio network outage (e.g., tower power outage). During such
a condition, an alternative network attachment may be available to
the host (e.g., Wi-Fi).
Network-to-host signals are useful to put in place adequate traffic
distribution policies on the host (e.g., prefer the use of alternate
paths, offload a network) (REQ-NETWORK-SEEKS-LOAD-DOWN).
5.2.2. Network Bandwidth & Network Rate Limiting Policies
Bandwidth constraints exist most predominantly at the access network.
This can be constraints in the network itself or a result of rate
limiting due to various reasons.
Also, traffic exchanged over a network attachment may be subject to
rate-limit policies. These policies may be intentional policies
(e.g., enforced as part of the activation of the network attachment
and typically agreed upon service subscription) or be reactive
policies (e.g., enforced temporarily to manage an overload or during
a DDoS attack mitigation).
Requirements:
REQ-NETWORK-THROUGHPUT: A mechanism to signal the available network
throughput to interested hosts, including changes to throughput.
REQ-NRLP: The network shall inform the host of the Rate limiting
policies
Use cases:
1. Performance Optimization: Some applications support some forms of
bandwidth measurements (e.g., [app-measurement]) which feed how
the content is accessed to using ABR. Complementing or replacing
these measurements with explicit signals will improve overall
network performance and can help optimize the data transfer.
Signaling bandwidth availability allows hosts to avoid
contributing to network congestion.
Kaippallimalil, et al. Expires 23 January 2025 [Page 21]
Internet-Draft Network Collaboration Requirements July 2024
2. Dynamic Adaptation: When the network informs the host about
available bandwidth, the host can dynamically adjust its data
transmission rate.
3. Efficient Resource Utilization: Knowing available bandwidth helps
the host allocate resources efficiently.
4. Auto-Scaling Applications: Cloud-based applications can auto-
scale based on available bandwidth.
5. Rate Limiting: Monthly data quotas on cellular networks can be
easily exceeded by video streaming, in particular, if the client
chooses excessively high quality or routinely abandons watching
videos that were downloaded. The network can assist the client
by informing the client of the network's bandwidth policy.
5.3. Server-Network Metadata
5.3.1. Identification of Media Frames and Streams
Feedback provided by ECN/L4S to the server (UDP sender) is not fast
enough to adjust the sending rate when available wireless capacity
changes significantly in very short periods of time (~ 1
millisecond). Differentiating using multiple DSCP codes does not
provide the resolution required to classify media frames or streams
and adapt to changes in coding due to dynamic content or resulting
from network conditions.
Relative priority and tolerance to delay of media frames or streams
can be used to optimize traffic shaping at the wireless router. The
application can provide information to detect the start, end and set
of packets that belong to a media frame. Alternatively, the
application may provide information to identify one stream of the
flow from another. The application provides information to identify
either media frames or streams in a flow but not both.
In cases where the wireless network has to drop or delay processing,
all packets of the media frame or stream are treated in the same
manner.
Requirements:
REQ-FRAME-ASSOCIATED: Identify all packets belonging to the same
media frame, so they can receive equal drop/forward treatment.
Kaippallimalil, et al. Expires 23 January 2025 [Page 22]
Internet-Draft Network Collaboration Requirements July 2024
5.3.2. Identification of Traffic Type without Disclosure of the
Application
Different nature/types of traffic can be part of the same 5-tuple
flow. This could be reliable/loss-tolerant [RFC9221], bulk/
interactive traffic. The type of traffic can be used to prioritize/
buffer packets as needed and deprioritize/discard appropriate packets
during reactive events, thereby optimizing performance. The
application may provide information to identify the type of traffic
in per-packet metadata.
Requirements: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in
Section 3.5.
5.3.3. Relative Priority
Relative importance of a media frame provides the priority level of
one media frame over another media frame within a stream. The
application server determines the importance based on the media
encoded in the media frame (e.g., a base layer video I-frame has
higher priority than an enhanced layer P-frame). Importance may be
used to determine drop priority of a media frame in cases of extreme
congestion in the wireless network.
Relative importance of a media stream is the priority level of one
media stream over another stream in the flow (with the same IP
5-tuple). As with media frames, importance may be used to determine
drop priority in cases of extreme congestion in the wireless network.
There is no requirement associated with this use case.
5.3.4. Tolerance to Delay
Some media frames may be able to tolerate more delay over the wire
than others (e.g., live media frames require very low latency while a
background image for augmented reality may be delivered with more
delay tolerance). Similarly, some media streams can tolerate more
delay over the wire than others (e.g., a stream carrying a background
image may tolerate more delay). ams may be able to tolerate more
delay over the wire than others (e.g., a stream carrying a background
image for augmented reality may be delivered with more delay
tolerance). Even when the media payload is not encrypted, the
network has no means to distinguish these different requirements.
If the application can indicate that a media frame or stream can
tolerate high delay the wireless router can opt to delay packets
rather than drop during transient congestion periods.
Kaippallimalil, et al. Expires 23 January 2025 [Page 23]
Internet-Draft Network Collaboration Requirements July 2024
Requirements:
REQ-DELAY-TOLERANCE: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as
defined in Section 3.5.
5.3.5. Burst Indication
Media flows can have large and unexpected variations in packet bursts
due to dynamic changes in content, server estimation of network
conditions and pacing behavior. Encoding of live video, and
multimodal media can only increase the burst size that a server has
to contend with sending out in a relative smoothed out manner. The
burst size is observable on the wire, but can only be determined by
the end of the burst of packets. Wireless networks on the other hand
cannot reserve resources for the maximum burst size allowed as that
will likely lead to poor utilization of radio resources or tail
drops.
The server may provide burst size at the beginning of the burst to
allow the scheduler to reserve sufficient resources (and avoid having
too few resources that may lead to a tail drop). The server may also
signal end of burst that provides information for the radio to go
into sleep mode (Connected Mode Discontinuous Reception, C-DRX) if
there is no paging message.
REQ-BURST-INDICATOR: Client indicates this flow's maximum burst to
the service provider network, and network agrees it can handle
that burst size.
6. Non-Requirements
Application feedback with measurements of packets lost and delay
incurred may affect the sending rate and other behavior of the
application. The requirements and specification to mitigate these
aspects are not in the scope of this document.
7. IANA Considerations
None.
8. Security Considerations
Security aspects for the metadata are discussed in Section 4.8. The
principles outlined in [RFC8558], [RFC9049] and [RFC9419] contain
security considerations and are referenced in Section 5.
This document has no other security considerations.
Kaippallimalil, et al. Expires 23 January 2025 [Page 24]
Internet-Draft Network Collaboration Requirements July 2024
Acknowledgments
This document is a merge of [I-D.rwbr-tsvwg-signaling-use-cases] and
[I-D.kaippallimalil-tsvwg-media-hdr-wireless].
T. Reddy contributed text and ideas to this document.
Acknowledgments from
[I-D.kaippallimalil-tsvwg-media-hdr-wireless]: Xavier De Foy and the
authors of this draft have discussed the similarities and
differences of this draft with the MoQ draft for carrying media
metadata.
The authors wish to thank Mike Heard, Sebastian Moeller and Tom
Herbert for discussions on metadata fields, fragmentation and
various transport aspects.
The authors appreciate input from Marcus Ilhar and Magnus
Westerlund on the need to address privacy in general and Dan Druta
to consider a common transport across various host to network
signaling when possible. Ruediger Geib suggested that limiting
the amount of state information that a wireless router has to keep
for a flow should be minimized.
Ingemar Johansson's suggestions on fast fading (which L4S handles)
and dramatic drops in wireless accesses have been helpful to
identify the issues. Thanks to Hang Shi for the review and
comments on host-to-network signaling. Thanks to Luis Miguel
Contreras and Colin Kahn for their review and comments.
Informative References
[app-measurement]
Gurel, Z. and A. C. Begen, "Bandwidth measurement for
QUIC", 2024, .
[I-D.ietf-moq-transport]
Curley, L., Pugin, K., Nandakumar, S., Vasiliev, V., and
I. Swett, "Media over QUIC Transport", Work in Progress,
Internet-Draft, draft-ietf-moq-transport-05, 8 July 2024,
.
[I-D.ietf-opsawg-teas-attachment-circuit]
Boucadair, M., Roberts, R., de Dios, O. G., Barguil, S.,
and B. Wu, "YANG Data Models for Bearers and 'Attachment
Circuits'-as-a-Service (ACaaS)", Work in Progress,
Kaippallimalil, et al. Expires 23 January 2025 [Page 25]
Internet-Draft Network Collaboration Requirements July 2024
Internet-Draft, draft-ietf-opsawg-teas-attachment-circuit-
13, 29 May 2024, .
[I-D.ietf-tsvwg-udp-options]
Touch, J. D., "Transport Options for UDP", Work in
Progress, Internet-Draft, draft-ietf-tsvwg-udp-options-32,
21 March 2024, .
[I-D.kaippallimalil-tsvwg-media-hdr-wireless]
Kaippallimalil, J., Gundavelli, S., and S. Dawkins, "Media
Handling Considerations for Wireless Networks", Work in
Progress, Internet-Draft, draft-kaippallimalil-tsvwg-
media-hdr-wireless-04, 14 February 2024,
.
[I-D.rwbr-tsvwg-signaling-use-cases]
Rajagopalan, S., Wing, D., Boucadair, M., and T. Reddy.K,
"Host to Network Signaling Use Cases for Collaborative
Traffic Differentiation", Work in Progress, Internet-
Draft, draft-rwbr-tsvwg-signaling-use-cases-02, 17 March
2024, .
[RFC3550] Schulzrinne, H., Casner, S., Frederick, R., and V.
Jacobson, "RTP: A Transport Protocol for Real-Time
Applications", STD 64, RFC 3550, DOI 10.17487/RFC3550,
July 2003, .
[RFC3662] Bless, R., Nichols, K., and K. Wehrle, "A Lower Effort
Per-Domain Behavior (PDB) for Differentiated Services",
RFC 3662, DOI 10.17487/RFC3662, December 2003,
.
[RFC6077] Papadimitriou, D., Ed., Welzl, M., Scharf, M., and B.
Briscoe, "Open Research Issues in Internet Congestion
Control", RFC 6077, DOI 10.17487/RFC6077, February 2011,
.
[RFC7478] Holmberg, C., Hakansson, S., and G. Eriksson, "Web Real-
Time Communication Use Cases and Requirements", RFC 7478,
DOI 10.17487/RFC7478, March 2015,
.
Kaippallimalil, et al. Expires 23 January 2025 [Page 26]
Internet-Draft Network Collaboration Requirements July 2024
[RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", STD 86, RFC 8200,
DOI 10.17487/RFC8200, July 2017,
.
[RFC8558] Hardie, T., Ed., "Transport Protocol Path Signals",
RFC 8558, DOI 10.17487/RFC8558, April 2019,
.
[RFC8825] Alvestrand, H., "Overview: Real-Time Protocols for
Browser-Based Applications", RFC 8825,
DOI 10.17487/RFC8825, January 2021,
.
[RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
Multiplexed and Secure Transport", RFC 9000,
DOI 10.17487/RFC9000, May 2021,
.
[RFC9049] Dawkins, S., Ed., "Path Aware Networking: Obstacles to
Deployment (A Bestiary of Roads Not Taken)", RFC 9049,
DOI 10.17487/RFC9049, June 2021,
.
[RFC9221] Pauly, T., Kinnear, E., and D. Schinazi, "An Unreliable
Datagram Extension to QUIC", RFC 9221,
DOI 10.17487/RFC9221, March 2022,
.
[RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)",
STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022,
.
[RFC9335] Uberti, J., Jennings, C., and S. Murillo, "Completely
Encrypting RTP Header Extensions and Contributing
Sources", RFC 9335, DOI 10.17487/RFC9335, January 2023,
.
[RFC9419] Arkko, J., Hardie, T., Pauly, T., and M. Kühlewind,
"Considerations on Application - Network Collaboration
Using Path Signals", RFC 9419, DOI 10.17487/RFC9419, July
2023, .
[TR.23.501-3GPP]
"3rd Generation Partnership Project; Technical
Specification Group Servies and System Aspects; System
architecture for the 5G System (5GS); Stage 2 (Release
18)", March 2023.
Kaippallimalil, et al. Expires 23 January 2025 [Page 27]
Internet-Draft Network Collaboration Requirements July 2024
[TR.23.700-60-3GPP]
"Study on XR (Extended Reality) and media services
(Release 18)", August 2022.
[_5G-Lumos]
"Lumos5G: Mapping and Predicting Commercial mmWave 5G
Throughput, Arvind Narayanan et al., ACM Internet
Measurement Conference (IMC '20),
https://dl.acm.org/doi/10.1145/3419394.3423629", October
2020.
Authors' Addresses
John Kaippallimalil
Futurewei
Email: john.kaippallimalil@futurewei.com
Dan Wing
Cloud Software Group Holdings, Inc.
Email: danwing@gmail.com
Sri Gundavelli
Cisco
Email: sgundave@cisco.com
Sridharan Rajagopalan
Cloud Software Group Holdings, Inc.
Email: Sridharan.girish@gmail.com
Spencer Dawkins
Tencent America LLC
Email: spencerdawkins.ietf@gmail.com
Mohamed Boucadair
Orange
35000 Rennes
France
Email: mohamed.boucadair@orange.com
Kaippallimalil, et al. Expires 23 January 2025 [Page 28]