<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brw-scone-analysis-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="Solution Analysis">SCONE Solution Analysis</title>
    <seriesInfo name="Internet-Draft" value="draft-brw-scone-analysis-00"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="December" day="03"/>
    <area>wit</area>
    <workgroup>scone</workgroup>
    <keyword>collaborative networking</keyword>
    <keyword>adaptive application</keyword>
    <abstract>
      <?line 56?>

<t>This document provides an analysis of various SCONE solutions to share the throughput advice.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The document provides an analysis of proposed SCONE solutions to share the throughput advice. The currently analyzed solutions (listed in alphabetic order)
are as follows:</t>
      <dl>
        <dt>MASQUE:</dt>
        <dd>
          <t>"MASQUE extension for signaling throughput advice" <xref target="I-D.ihlar-scone-masque-mediabitrate"/></t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref target="sec-masque"/>.</t>
        </dd>
        <dt>NRLP:</dt>
        <dd>
          <t>"Discovery of Network Rate-Limit Policies (NRLPs)" <xref target="I-D.brw-scone-rate-policy-discovery"/></t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref target="sec-nrlp"/>.</t>
        </dd>
        <dt>SCONE:</dt>
        <dd>
          <t>"A new QUIC version for network property communication" <xref target="I-D.joras-scone-quic-protocol"/></t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref target="sec-scone"/>.</t>
        </dd>
        <dt>TRAIN:</dt>
        <dd>
          <t>"Transparent Rate Adaptation Indications for Networks (TRAIN) Protocol" <xref target="I-D.thomson-scone-train-protocol"/></t>
        </dd>
        <dt/>
        <dd>
          <t>See <xref target="sec-train"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-class">
      <name>Criteria Classification</name>
      <t>The following categories are used to classify the various criteria:</t>
      <dl>
        <dt>Security/Privacy (Sec):</dt>
        <dd>
          <t>Indicates whether this impacts security/privacy. Some of the criteria that are classified as security-related may also have implications on the efficiency of sharing an advice (e.g., as that is likely to be ignored).</t>
        </dd>
        <dt/>
        <dd>
          <t>Some security/privacy criteria are as follows:
</t>
          <ul spacing="normal">
            <li>
              <t>Zero-trust security: Only authorized network elements must provide the throughput advice.</t>
            </li>
            <li>
              <t>Privacy: Indicates whether a solution does not reveal any details about the app or server identity.</t>
            </li>
            <li>
              <t>Mobility:  Indicates whether a solution supports guards against a malicious app that keeps changing the 5-tuple to evade rate-limit enforcement by the network.</t>
            </li>
          </ul>
        </dd>
        <dt>Deployability (Dep):</dt>
        <dd>
          <t>Captures criteria that are important for unlocking the deployment of a solution at both network and host sides.</t>
        </dd>
        <dt/>
        <dd>
          <t>A deployability hurdle would be typically the misalignment of incentives
between those receiving the benefit vs. those bearing the cost of providing the benefit (<xref section="3.3" sectionFormat="of" target="I-D.narten-radir-problem-statement"/>). For example, the sender of the advice should see (immediate) benefits.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some other deployability criteria are as follows:
</t>
          <ul spacing="normal">
            <li>
              <t>Fate sharing: reflects whether the mechanism used to advertise the throughput advice shares the fate of the rest of the network configuration on the host.</t>
            </li>
            <li>
              <t>Atomic configuration: Indicates whether the throughput advice can be learned using very few packets and whether changes to the policy require sharing the entire policy or just the relevant part.</t>
            </li>
          </ul>
        </dd>
        <dt>Performance (Per):</dt>
        <dd>
          <t>May impact the performance of the network device that enables the solution and/or the performance of the flow.</t>
        </dd>
        <dt>Service Interference (Int):</dt>
        <dd>
          <t>Captures implications on other services (e.g., side effects).</t>
        </dd>
        <dt/>
        <dd>
          <t>For example, tweaking MTU may have an implication on all the flows that share the same network attachment, not only those that consumes an advice. Likewise, requiring address sharing has a plenty of issues that are discussed in <xref target="RFC6269"/>. Also, relying upon an explicit proxy would penalize the proxy which could serve both good and 'bad' clients (e.g., launching Layer 7 DDoS attacks).</t>
        </dd>
        <dt>Functional (Fun):</dt>
        <dd>
          <t>Characterizes the functional capabilities offered by activating a solution.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some examples of functional criteria are as follows:
</t>
          <ul spacing="normal">
            <li>
              <t>Updatability: indicates whether a solution allows to update hosts with policy changes at any time.</t>
            </li>
            <li>
              <t>Path coupled signaling/Path decoupled signaling: Indicates whether solution allows for the entity to share the advice be on-path or off-path. This criterion is also meant to assess the deployment flexibility offered by a solution.</t>
            </li>
            <li>
              <t>Support cascaded environments: Rate-limits may be enabled at several levels. For example, rate-limits may be enforced on the CPE in the home network for the endpoints attached to it and in the provider network to rate-limit the traffic from the subscriber. This criterion indicates whether such setups are supported.</t>
            </li>
          </ul>
        </dd>
      </dl>
      <t>A criterion may belong to one or more categories.</t>
      <table anchor="class">
        <name>Criteria Classification</name>
        <thead>
          <tr>
            <th align="right">Criteria</th>
            <th align="center">Sec</th>
            <th align="center">Dep</th>
            <th align="center">Per</th>
            <th align="center">Int</th>
            <th align="center">Fun</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">Protocol ossification</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Zero-trust security</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Privacy</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Guard against random advice injection by an on-path attacker</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Mobility (guard against changing 5-tuple)</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Require guards against app abuse</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Fate sharing</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Atomic configuration</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Updatability</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Integration with network management tools</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Applicable to QUIC</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Applicable to any application</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Require an OS API</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Requires PvD</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Support cascaded environments</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Path coupled signaling</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Path decoupled signaling</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Traffic direction (h2n, n2h, both)</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Per-host policies</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Per-subscriber policies</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Extendable</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Require data plane upgrade/change</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Require transport payload inspection (network)</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Require transport payload inspection (host)</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Require flow inspection and tracking (network)</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Require steering policies on the host</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Depend on the server to consume the signal</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Impact the connection setup delay</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Require the identity of the target server</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center"> </td>
            <td align="center">X</td>
          </tr>
          <tr>
            <td align="right">Require MTU tweaking</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Incur multi-layer encryption</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Incur nested congestion control</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Incur multiple round-trips</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Forwarding peformance impact</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center">X</td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">IP address sharing issues</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
          <tr>
            <td align="right">Penalizing the proxy</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
            <td align="center">X</td>
            <td align="center"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="detailed-analysis">
      <name>Detailed Analysis</name>
      <section anchor="sec-analysis">
        <name>Summary</name>
        <table anchor="sol-sum">
          <name>Analysis Summary</name>
          <thead>
            <tr>
              <th align="right">Criteria</th>
              <th align="center">MASQUE</th>
              <th align="center">NRLP</th>
              <th align="center">SCONE</th>
              <th align="center">TRAIN</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="right">Protocol ossification</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Zero-trust security</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Privacy</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Guard against random advice injection by an on-path attacker</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Mobility (guard against changing 5-tuple)</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require guards against app abuse</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Fate sharing</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Atomic configuration</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Updatability</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Integration with network management tools</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Applicable to QUIC</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Applicable to any application</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require an OS API</td>
              <td align="center">TBC</td>
              <td align="center">Y/N(p)</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Requires PvD</td>
              <td align="center">TBC</td>
              <td align="center">Y(p)/N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Support cascaded environments</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Path coupled signaling</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Path decoupled signaling</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Traffic direction (h2n, n2h, both)</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Per-host policies</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Per-subscriber policies</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Extendable</td>
              <td align="center">TBC</td>
              <td align="center">Y</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require data plane upgrade/change</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require transport payload inspection (network)</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require transport payload inspection (host)</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require flow inspection and tracking (network)</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require steering policies on the host</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Depend on the server to consume the signal</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Impact the connection setup delay</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require the identity of the target server</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Require MTU tweaking</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Incur multi-layer encryption</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Incur nested congestion control</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Incur multiple round-trips</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Forwarding peformance impact</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">IP address sharing issues</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
            <tr>
              <td align="right">Penalizing the proxy</td>
              <td align="center">TBC</td>
              <td align="center">N</td>
              <td align="center">TBC</td>
              <td align="center">TBC</td>
            </tr>
          </tbody>
        </table>
        <ul empty="true">
          <li>
            <t>Notes:
(p) indicates the assessment when PvD is used as NRLP mechanism.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-masque">
        <name>MASQUE (to be completed by the authors of MASQUE)</name>
        <section anchor="key-idea">
          <name>Key Idea</name>
        </section>
        <section anchor="discussion">
          <name>Discussion</name>
        </section>
        <section anchor="main-expected-gains">
          <name>Main Expected Gains</name>
        </section>
        <section anchor="costs">
          <name>Costs</name>
        </section>
      </section>
      <section anchor="sec-nrlp">
        <name>NRLP</name>
        <section anchor="key-idea-1">
          <name>Key Idea</name>
          <t>NRLP leverages existing discovery mechanisms (DHCP, RA, PvD) for networks to advertise throughout advices.
The same generic blob is used independent of the signaling mechanism. NRLP operates within the existing network/host trust model.</t>
          <t>Also, NRLP does not introduce additional dependency that would hinder having the benefits of enabling the NRLP feature.</t>
        </section>
        <section anchor="discussion-1">
          <name>Discussion</name>
          <t>Only network elements that are entitled to send DHCP/RA/PvD configuration are allowed to share the throughput advices. As such, NRLP has built-in:</t>
          <ul spacing="normal">
            <li>
              <t>zero-trust model</t>
            </li>
            <li>
              <t>Guard against random advice injection</t>
            </li>
          </ul>
          <t>Taking into account that NRLP advices are bound to a traffic category, NLRP relies upon the OS to enforce the received policies
for applications falling under a traffic category (or all traffic). In doing so, NRLP adheres to the following:</t>
          <ul spacing="normal">
            <li>
              <t>Mobility (guard against changing 5-tuple)</t>
            </li>
            <li>
              <t>Require guards against app abuse: The OS can allocate network resources more fairly
among different processes, with NRLP signals, ensuring that no single process monopolizes the network.</t>
            </li>
          </ul>
          <t>NRLP meets the following criteria:</t>
          <ul spacing="normal">
            <li>
              <t>Fate sharing: RA/DHCP are needed anyway so that connectivity is provided over a network attachment. NRLP ensures that throughput advices shares the fare of the other network configuration on the host.</t>
            </li>
            <li>
              <t>Atomic configuration: Only one packet (e.g., RA) is required to share the advice. Also, only a specific portion of the configuration can be provided.</t>
            </li>
            <li>
              <t>Updatability/Proactive signaling: It is possible to change the policy at any time and notify hosts (e.g., by sending a new RA).</t>
            </li>
          </ul>
          <t>Given that NRLP advices are shared during the establishment of a network attachment and then as part of the maintenance of the attachment, NRLP is therefore:</t>
          <ul spacing="normal">
            <li>
              <t>Applicable to any transport protocol: This allows specifically to ensure a feature parity for applications that fallback to another transport protocol (e.g., QUIC to TCP).</t>
            </li>
            <li>
              <t>Applicable to QUIC</t>
            </li>
            <li>
              <t>Applicable to any application</t>
            </li>
          </ul>
          <t>To that aim:</t>
          <ul spacing="normal">
            <li>
              <t>RA/DHCP NRLP requires an OS API to expose the signal to applications, and ensure application fairness.</t>
            </li>
            <li>
              <t>If PvD is used, an app only needs to learn the PvD ID from the OS (which is not specific to NRLP) and the PvD additional information can be retrieved by the app itself (without any dependency on the OS).</t>
            </li>
          </ul>
          <t>NRLP leverages existing mechanisms for the provisioning of network attachments, including supply of the various policies (<xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/>). Also, NRLP leverages AAA mechanisms (e.g., <xref target="RFC9445"/>). Therefore, NRLP eases:</t>
          <ul spacing="normal">
            <li>
              <t>Integration with network management tools</t>
            </li>
          </ul>
          <t>One of NRLP flavors:</t>
          <ul spacing="normal">
            <li>
              <t>Requires PvD discovery. This is not required for DHCP/RA.</t>
            </li>
          </ul>
          <t>NRLP does not restrict the deployment options as providers can deploy distributed or centralized DHCP servers, use relays, enable NRLP RA in access routers, etc. Similar to other network configuration purposes, NRLP has the following capabilities:</t>
          <ul spacing="normal">
            <li>
              <t>Support cascaded environments. The throughput advice can even be correlated with local conditions or policies as shown, e.g., in <xref target="ac-casc"/>.</t>
            </li>
            <li>
              <t>Path coupled signaling</t>
            </li>
            <li>
              <t>Path decoupled signaling</t>
            </li>
          </ul>
          <figure anchor="ac-casc">
            <name>Example of Cascaded NRLPs</name>
            <artset>
              <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="192" width="424" viewBox="0 0 424 192" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
                  <path d="M 8,112 L 8,160" fill="none" stroke="black"/>
                  <path d="M 64,32 L 64,80" fill="none" stroke="black"/>
                  <path d="M 64,112 L 64,160" fill="none" stroke="black"/>
                  <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                  <path d="M 96,112 L 96,144" fill="none" stroke="black"/>
                  <path d="M 144,48 L 144,144" fill="none" stroke="black"/>
                  <path d="M 176,48 L 176,144" fill="none" stroke="black"/>
                  <path d="M 248,32 L 248,176" fill="none" stroke="black"/>
                  <path d="M 416,32 L 416,176" fill="none" stroke="black"/>
                  <path d="M 8,32 L 64,32" fill="none" stroke="black"/>
                  <path d="M 248,32 L 416,32" fill="none" stroke="black"/>
                  <path d="M 64,48 L 96,48" fill="none" stroke="black"/>
                  <path d="M 144,48 L 176,48" fill="none" stroke="black"/>
                  <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
                  <path d="M 96,80 L 144,80" fill="none" stroke="black"/>
                  <path d="M 176,96 L 248,96" fill="none" stroke="black"/>
                  <path d="M 8,112 L 64,112" fill="none" stroke="black"/>
                  <path d="M 96,112 L 144,112" fill="none" stroke="black"/>
                  <path d="M 64,144 L 96,144" fill="none" stroke="black"/>
                  <path d="M 144,144 L 176,144" fill="none" stroke="black"/>
                  <path d="M 8,160 L 64,160" fill="none" stroke="black"/>
                  <path d="M 248,176 L 416,176" fill="none" stroke="black"/>
                  <g class="text">
                    <text x="36" y="52">Host</text>
                    <text x="36" y="68">#1</text>
                    <text x="160" y="84">C</text>
                    <text x="100" y="100">nrlp#2</text>
                    <text x="160" y="100">P</text>
                    <text x="328" y="100">Network</text>
                    <text x="160" y="116">E</text>
                    <text x="212" y="116">nrlp#1</text>
                    <text x="36" y="132">Host</text>
                    <text x="36" y="148">#2</text>
                    <text x="100" y="164">nrlp#3</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="center"><![CDATA[
.------.                      .--------------------.
| Host +---+     .---.        |                    |
|  #1  |   |     |   |        |                    |
'------'   +-----+ C |        |                    |
         nrlp#2  | P +--------+      Network       |
.------.   .-----+ E | nrlp#1 |                    |
| Host |   |     |   |        |                    |
|  #2  +---'     '---'        |                    |
'------' nrlp#3               |                    |
                              '--------------------'
]]></artwork>
            </artset>
          </figure>
          <t>The same generic blob is used in NRLP independent of the signaling mechanism. The blob is designed with the following key characteristics:</t>
          <ul spacing="normal">
            <li>
              <t>Traffic direction (h2n, n2h, both): policies for one or both directions can be supplied.</t>
            </li>
            <li>
              <t>Per-host policies: An explicit indication in inserted in the advice to tag per-host policies.</t>
            </li>
            <li>
              <t>Per-subscriber policies: An explicit indication in inserted in the advice to tag per-subscriber policies. This covers deployment scenarios such as tethering or CPE-based service offerings.</t>
            </li>
            <li>
              <t>Provide provisions for extensions: NLRP includes provisions for future attributes that are tracked in IANA registries.</t>
            </li>
          </ul>
          <t>Given that NRLP leverages existing control plane mechanisms, NRLP does not:</t>
          <ul spacing="normal">
            <li>
              <t>Suffer from protocol ossification issues</t>
            </li>
            <li>
              <t>Require data plane upgrade/change</t>
            </li>
            <li>
              <t>Require transport payload inspection (network)</t>
            </li>
            <li>
              <t>Require transport payload inspection (host)</t>
            </li>
            <li>
              <t>Require flow inspection and tracking (network)</t>
            </li>
          </ul>
          <t>Also, given that NRLP signals are exchanged before connection establishment, NRLP does not:</t>
          <ul spacing="normal">
            <li>
              <t>Depend on the server to consume the signal: NRLP advices are immediately consumable by applications and do not require involving a remote server.</t>
            </li>
            <li>
              <t>Require the identity of the target server to receive or consume the advices.</t>
            </li>
          </ul>
          <t>Moreover, NRLP does require any encapsulation or proxy function at the network. As such, NRLP does not:</t>
          <ul spacing="normal">
            <li>
              <t>Require steering policies on the host to decide which flows are eligible to the proxy service.</t>
            </li>
            <li>
              <t>Impact the connection setup delay: NRLP signals are available on bootstrap of a host (and prior to any connection establishment).</t>
            </li>
            <li>
              <t>Require MTU tweaking</t>
            </li>
            <li>
              <t>Incur multi-layer encryption</t>
            </li>
            <li>
              <t>Incur nested congestion control</t>
            </li>
            <li>
              <t>Incur multiple round-trips: The signal is immediately available in one packet (RA NRLP, typically).</t>
            </li>
            <li>
              <t>Overhead of unauthenticated re-encryption</t>
            </li>
            <li>
              <t>Forwarding performance impact</t>
            </li>
            <li>
              <t>IP address sharing issues: NRLP does not require changing the source IP address used by a host.</t>
            </li>
            <li>
              <t>Penalize any network node (a proxy, typically) which could serve both good and bad clients (e.g., launching Layer 7 DDoS attacks).</t>
            </li>
          </ul>
        </section>
        <section anchor="main-expected-gains-1">
          <name>Main Expected Gains</name>
          <ul spacing="normal">
            <li>
              <t>Lower deployment barrier to experiment in large scale (no hardware or software change is needed in network components).</t>
            </li>
            <li>
              <t>Schedule network requests (independent of the transport protocol) more efficiently, preventing network congestion, and improving overall stability and network performance.</t>
            </li>
            <li>
              <t>Unlock new services in local networks and enhance the quality of experience at the LAN by providing a simple tool to communicate local policies to hosts.</t>
            </li>
            <li>
              <t>Provide a mechanism to assist networks managing the load at the source and, thus, contribute to better handle network overloads and optimize the use of resources under non nominal conditions.</t>
            </li>
          </ul>
        </section>
        <section anchor="costs-1">
          <name>Costs</name>
          <ul spacing="normal">
            <li>
              <t>A simple configuration is required for IPv4: DHCP flavor can be provided by configuration of custom options. Refer to <xref target="NRLP-WIRE"/>.</t>
            </li>
            <li>
              <t>A similar configuration approach can be followed for DHCPv6.</t>
            </li>
            <li>
              <t>A minor change to the network is required for NRLP RA: upgrade configuration of PE nodes with new Neighbor Discovery option. Note that all IPv6 hosts and networks are already required to support Neighbor Discovery <xref target="RFC4861"/>.</t>
            </li>
            <li>
              <t>An API needs to be exposed on the host to share the advice with applications (e.g., scutil on MacOS). No additional API is needed if PvD is used.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="sec-scone">
        <name>SCONE  (to be completed by the authors of SCONE)</name>
        <section anchor="key-idea-2">
          <name>Key Idea</name>
        </section>
        <section anchor="discussion-2">
          <name>Discussion</name>
        </section>
        <section anchor="main-expected-gains-2">
          <name>Main Expected Gains</name>
        </section>
        <section anchor="costs-2">
          <name>Costs</name>
        </section>
      </section>
      <section anchor="sec-train">
        <name>TRAIN  (to be completed by the authors of TRAIN)</name>
        <section anchor="key-idea-3">
          <name>Key Idea</name>
        </section>
        <section anchor="discussion-3">
          <name>Discussion</name>
        </section>
        <section anchor="main-expected-gains-3">
          <name>Main Expected Gains</name>
        </section>
        <section anchor="costs-3">
          <name>Costs</name>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security-related criteria are analyzed for each proposed solution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any IANA request.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ihlar-scone-masque-mediabitrate">
          <front>
            <title>MASQUE extension for signaling throughput advice</title>
            <author fullname="Marcus Ihlar" initials="L. M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a new Capsule (RFC9297) that can be used with
   CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT
   extensions to signal throughput advice for traffic that is proxied
   through an HTTP server.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ihlar-scone-masque-mediabitrate-01"/>
        </reference>
        <reference anchor="I-D.brw-scone-rate-policy-discovery">
          <front>
            <title>Discovery of Network Rate-Limit Policies (NRLPs)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Gyan Mishra" initials="G. S." surname="Mishra">
              <organization>Verizon Inc</organization>
            </author>
            <author fullname="Markus Amend" initials="M." surname="Amend">
              <organization>Deutsche Telekom</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <date day="8" month="October" year="2024"/>
            <abstract>
              <t>   Traffic exchanged over a network attachment may be subject to rate-
   limit policies.  These policies may be intentional policies (e.g.,
   enforced as part of the activation of the network attachment and
   typically agreed upon service subscription) or be reactive policies
   (e.g., enforced temporarily to manage an overload or during a DDoS
   attack mitigation).  This document specifies a mechanims for hosts to
   dynamically discover Network Rate-Limit Policies (NRLPs).  This
   information is then passed to applicaitons that might adjust their
   behaviors accordingly.

   Networks already support mechanisms to advertize a set of network
   properties to hosts using Neighbor Discovery options.  Examples of
   such properties are link MTU (RFC 4861) and PREFIX64 (RFC 8781).
   This document complements these tools and specifies a Neighbor
   Discovery option to be used in Router Advertisements (RAs) to
   communicate these policies to hosts.  For address family parity, a
   new DHCP option is also defined.  The document also discusses how
   Provisioning Domains (PvD) can be used to notify hosts with NRLPs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-brw-scone-rate-policy-discovery-00"/>
        </reference>
        <reference anchor="I-D.joras-scone-quic-protocol">
          <front>
            <title>A new QUIC version for network property communication</title>
            <author fullname="Matt Joras" initials="M." surname="Joras">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Marcus Ihlar" initials="L. M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document describes a new QUIC version.  The proposed wire format
   and a set of procedures can be used to communicate throughput advice
   between an endpoint and an on-path network element.  Throughput
   advice are sent in QUIC packets of a new QUIC version.  These QUIC
   packets are sent adjecent to established QUIC version 1 and 2
   connections, within the same UDP 4-tuple.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-joras-scone-quic-protocol-00"/>
        </reference>
        <reference anchor="I-D.thomson-scone-train-protocol">
          <front>
            <title>Transparent Rate Adaptation Indications for Networks (TRAIN) Protocol</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christian Huitema" initials="C." surname="Huitema">
              <organization>Private Octopus Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   On-path network elements can sometimes be configured to apply rate
   limits to flows that pass them.  This document describes a method for
   signaling to endpoints that rate limiting policies are in force and
   approximately what that rate limit is.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-thomson-scone-train-protocol-00"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="NRLP-WIRE" target="https://github.com/boucadair/draft-xxx-ac-rate-policy-discovery/blob/main/example-nrlp-wire-format.md">
          <front>
            <title>Examples of Wire Format Options</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.narten-radir-problem-statement">
          <front>
            <title>On the Scalability of Internet Routing</title>
            <author fullname="Dr. Thomas Narten" initials="T." surname="Narten">
              <organization>IBM</organization>
            </author>
            <date day="17" month="February" year="2010"/>
            <abstract>
              <t>There has been much discussion over the last years about the overall
scalability of the Internet routing system.  Some have argued that
the resources required to maintain routing tables in the core of the
Internet are growing faster than available technology will be able to
keep up.  Others disagree with that assessment.  This document
attempts to describe the factors that are placing pressure on the
routing system and the growth trends behind those factors.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-narten-radir-problem-statement-05"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Durand" initials="A." surname="Durand"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="P. Roberts" initials="P." surname="Roberts"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber. Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing. These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches. Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on. Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-14"/>
        </reference>
        <reference anchor="RFC9445">
          <front>
            <title>RADIUS Extensions for DHCP-Configured Services</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The specification is generic and can be applicable to any service that relies upon DHCP. Both DHCPv4- and DHCPv6-configured services are covered.</t>
              <t>Also, this document updates RFC 4014 by relaxing a constraint on permitted RADIUS attributes in the RADIUS Attributes DHCP suboption.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9445"/>
          <seriesInfo name="DOI" value="10.17487/RFC9445"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
