<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-deen-mops-network-overlay-impacts-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="NOISV">Network Overlay Impacts to Streaming Video</title>
    <seriesInfo name="Internet-Draft" value="draft-deen-mops-network-overlay-impacts-01"/>
    <author fullname="Glenn Deen">
      <organization>Comcast-NBCUniversal</organization>
      <address>
        <email>glenn_deen@comcast.com</email>
      </address>
    </author>
    <author fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="21"/>
    <area>Operations and Management</area>
    <workgroup>Media OPerationS</workgroup>
    <keyword>network policy</keyword>
    <keyword>video streaming</keyword>
    <keyword>streaming</keyword>
    <abstract>
      <?line 48?>

<t>This document examines the operational impacts to streaming video applications
caused by changes to network policies by network overlays.  The network policy
changes include IP address assignment, transport
protocols, routing, DNS resolver which in turn affect a variety of important
content delivery aspects such as latency, CDN cache selection, delivery path
choices, traffic classification and content access controls.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://gitnnelg.github.io/NetworkOverlays/draft-deen-mops-network-overlay-impacts.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-deen-mops-network-overlay-impacts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Media OPerationS Working Group mailing list (<eref target="mailto:mops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gitnnelg/NetworkOverlays"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The past decade of Internet evolution has included two significant trends,  the global growth of video streaming and  active passionate work within the IETF on enhancing Internet user privacy.</t>
      <t>The work on these initiatives has largely occured independently of one another, though there are a few individuals and companies that are involved with both efforts.   However, the arrival of the newly developed privacy enhancements in consumer products and their subsequent use by streaming video viewers has brought the work of the two efforts in contact and highlighted a number of friction points which are having impacts to the viewers and support engineers of video streaming platforms.</t>
      <t>To be clear, this document is not proposing or advocating rolling back any of the privacy enhancements for the viewers.  Instead the authors hope to help educate the IETF and others on the practical operational impacts of these enhancements and to eventually develop approaches that can help mitigate such impacts.</t>
      <t>The authors also readily acknowledge the many challenges and difficulties in improving Internet privacy into something as complex as the Internet while maintaining compatibiltiy with the wildly varied applications and uses the Internet's users rely upon daily in their lives. This is hard stuff and it's very natural for there to be operational considerations that must be understood and folded back into architectural designs and consumer products.</t>
      <t>The hope in developing this document is to provide meaningful and helpful feedback from the streaming application and streaming platform operational perspective to help the enhanced privacy architecture work being done at the IETF.</t>
      <section anchor="streaming-video-architects-and-privacy-enhancement-designers-working-together">
        <name>Streaming Video Architects and Privacy Enhancement Designers Working Together</name>
        <t>This document is not intended to challenge the need for privacy enhancements for the Internet, instead the hope is to illustrate impacts of such changes to the billions of users of Streaming Video delivered over the Internet so that the designers of privacy enhancements and the designers of services built on them can better understand the impacts of different design choices and perhaps find ways to mitigate such impacts through altered design choices.</t>
        <t>Given the popularity of streaming video with the Internet's users and it's importancne to network operators, streaming platform operators and many others it only makes sense that as the IETF and it's participants work on improving privacy for those same users that the two efforts work together for everyone's benefit.</t>
      </section>
      <section anchor="possible-outcomes">
        <name>Possible Outcomes</name>
        <t>One possible outcome might be a best design and implementation guide developed together and published by the IETF Media Operations Group.</t>
        <t>Another possible outcome might be an IAB led study on the operational impacts of Network Overlays to help the IETF and Internet communities better understand the operational impacts of various architectural decisions along with approaches mitigating the operational impacts.</t>
      </section>
    </section>
    <section anchor="internet-privacy-enhancements">
      <name>Internet Privacy Enhancements</name>
      <t>Enhancing Internet Privacy is a challenging task to do for something as complex as the running Internet and it is easy for great proposals that fix one issue to cause new issues to arise in other places.  That's not a reason to stop trying, but it is important to understand the consequences of changes and to find ways to manage or mitigate such impacts, ideally without weakening or rolling back the enhancements.</t>
      <t>A popular design choice in privacy enhancements at the IETF has been the encapsulation of data inside encrypted connections.  <xref target="RFC9000"/> is an excellent example of this design and introduces a protocol that is always encrypted.</t>
      <section anchor="network-overlays">
        <name>Network Overlays</name>
        <t>Along with the use of encrypted connections another popular approach is to additionally create alternative routes and tunnels for connections which bypass the routing and other policy decisions of the ISP access network and of the public open Internet.   These alternative network policy choices have the effect of creating a Network Overlay that operates on top of and over the device's Access Network and the Open Internet, but follows an independent set of policies chosen by the Network Overlay.</t>
        <artwork><![CDATA[
 R  = router
                    <--- non-overlay traffic path --->
 device -- R ---- R ------------- R ------------- R ---- R -- dest-node
            \                                           /
             \                                         /
              \                                       /
               R -- R -- ingest -- egress -- R ------+
                     <--- overlay traffic path --->

 Figure 1:  Network Overlay routing select traffic via an alternate path
]]></artwork>
        <section anchor="partitioning">
          <name>Partitioning</name>
          <t>Network Overlay policy changes includes an alternate routing policy since a fundamental aspect of this design is the tunneling of connections through alternate paths to enhance privacy. The reasons for this approach are discussed in the IAB document <eref target="https://datatracker.ietf.org/doc/draft-iab-privacy-partitioning/">Partitioning as an Architecture for Privacy</eref>.</t>
        </section>
        <section anchor="policy-changes">
          <name>Policy Changes</name>
          <t>Beyond alternate routing policies, network overlays often also make changes to the Source IP Address assignment, and/or selection of the DNS Resolver and/or including protocol conversions/translations such as HTTP2-&gt;HTTP3 and HTTP2-&gt;HTTPS2+TLS, and can include IP layer changes such as IPv4-&gt;IPv6 or IPv6-&gt;IPv6 conversions.</t>
        </section>
        <section anchor="masque">
          <name>MASQUE</name>
          <t>Protocols such as MASQUE <xref target="RFC9484"/> and services built on it such as Apple's <eref target="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">iCloud Private Relay</eref> are examples of Privacy Enhancing Network Overlays that involve making a number of network policy changes from the open Internet for the connections passed through them.</t>
        </section>
      </section>
      <section anchor="making-it-easy-for-users-by-working-under-the-covers">
        <name>Making It Easy (for Users) by Working Under the Covers</name>
        <t>Privacy has historically been a complicated feature to add into products targeted to end users. There are many reasons for this such as trying to meet every possible scenario and use-case and trying to provide easy user access to advanced privacy frameworks and taxonomies.   Many attempts have been made and very few have achieved finding success with end users.</t>
        <t>Perhaps learning from the lessons of offering too many options, the recent trend in privacy enhancements has steered torward either a very simple "Privacy On or Off" switch or in other cases automatically enabling or "upgrading" to enhance privacy.   Apple's iCloud Private Relay can be easily turned on with a single settings switch, while privacy features such as Encrypted DNS over HTTP and upgrade from HTTP to HTTPS connections have had a number of deployments that automatically enable them for users when possible.</t>
        <t>Keeping with the motto of Keep It Simple, users are generally not provided with granular Network Overlay controls permitting the user to select what applications, or what network connections the Network Overlay's policies can apply to.</t>
        <t>Adhereing with the Keep It Simple approach the application itself has very little connection to privacy enhancing Network Overlays.  Applications generally do not have a means to detect when networking policy changes are active. Applications generally do not have a means to access policy change settings or to interact to change them.</t>
      </section>
    </section>
    <section anchor="streaming-video">
      <name>Streaming Video</name>
      <t>Streaming Video, while just one of the many different Internet applications does standout from other uses in a number of significant ways that perhaps merit some amount of special consideration in understanding and addressing the impacts caused by particular privacy enhancing design and service offering choices.</t>
      <t>Firstly, Streaming video operates at a hard to imagine scale - streaming video is served globally to more than 2 billion user daily currently and continuing to grow in leaps and bounds.</t>
      <t>Secondly, the content types delivered through streaming has evolved from  the pre-recorded low-resolution, low-bit rate, latency tolerant Video-On-Demand movies, live or pre-recorded TV shows, and user generated videos delivered by pioneering streaming platforms to now including low-latency 4K and 8K live sports events, while also evolving the pre-recorded content with high-bit rate such as 4K and 8K cinema quality and High Dynamic Range (HDR) lighting.</t>
      <t>Finally, the expectations of streaming video viewers have significantly evolved from the days of settling for being able to watch a movie in a PC browser.  Viewers expect to watch on any device type they want ranging from low-end-streaming sticks that plug into a USB port, to 4K and HDR capable laptops, 4K and 8K HDR TV screens, gaming consoles, smart phones and many more choices.  Viewers also expect to have the same great viewing experience while at home connected via high-speed wired Internet, high-speed WiFi, or mobile cellular 5G and even satellite Internet connections.</t>
      <t>To meet the growth to billions of users, the growth in content type, quality and speed expectations, and  on-any-device anywhere that I am over any-network-connection expectations of users the Streaming Video technology infrastructure has had to itself evolve significantly.  This video streaming evolution work is being done in the IETF and in the <eref target="https://www.svta.org/">Streaming Video Technology Alliance (SVTA)</eref>, and in a number of other technical and industry groups.</t>
      <t>It's hard to overstate just how much the growth of Streaming video has contributed to the growth of the Internet.  Internet connections of multiples of hundred megabits and gigabits speeds today are because of the needs of video streaming, the ongoing work on low-latency networking and ultra-low-latency video delivery are both driven by the use of streaming video.</t>
      <section anchor="advances-in-streaming-video-architecture">
        <name>Advances in Streaming Video Architecture</name>
        <t>Internet streaming has greatly matured and diversified from its early days of viewers
watching pre-recorded 320x240, 640x480 standard definiton 480p movies to wired PCs connected
to the Internet via high-latency, low-bandwidth DSL as early DOCSIS modems.</t>
        <t>Streaming has grown to the extent that it has become a daily go-to video source world wide for billions of viewers
and has expanded from pre-recorded movies to encompass every type of video content
imaginable.  This growth to billions of viewers and the addition of low latency sensistive
content and new connectivity options like WiFi, Cellular and Satellite in addition to
high-speed DOCSIS and fiber is the world streaming platforms now provide service in.</t>
        <t>With the large user base and its usage, the Streaming platforms also have significant technical challenges to meet viewer expectations:</t>
        <ul spacing="normal">
          <li>
            <t>(1) Delivery scales that commonly range from hundreds of thousands to many millions of viewers simultaneously, with billions of views globally daily;</t>
          </li>
          <li>
            <t>(2) Low latency demands from live sports, live events and live streamed content;</t>
          </li>
          <li>
            <t>(3) content resolutions and corresponding formats which have jumped from the days of SD-480p to 4K (3840x2160) and 8K (7680x4320) along with bit rates which can had data needs of 10-24+ Mbps for 4K with 8K demanding 40 Mbps under extreme compression and 150-300 Mbps for high quality such as cinema;</t>
          </li>
          <li>
            <t>(4) devices with very diverse capabilities low-cost streaming sticks, to Smart TVs, tablets, phones, and game consoles</t>
          </li>
          <li>
            <t>(5) broad range of connectivity choices including WiFi, gig speed-low latency DOCSIS, Fiber, satellite, and 5G cellular networks;</t>
          </li>
          <li>
            <t>(6) application transport protocols including DASH, HLS, HTTP2/TCP, HTTP3/QUIC, WebRTC, Media over QUIC (MoQ) and specialty application transports such as SRT, HESP etc.</t>
          </li>
        </ul>
        <t>To meet these challenges streaming platforms have significantly invested in developing delivery architectures that
are built with detailed understandings of each element in the content delivery pathway starting from the content capture all the way
through to the screen of the viewer.</t>
        <t>Streaming applications are part of an end-to-end architecture that is optimized around achieving the best experience including low latency video delivery to viewing devices.  Obviously the open Internet can be unpredictable with momentary issues such as packet loss, congestion and other conditions but streaming architecture is desiged to do its best when such momentary problems arise.</t>
      </section>
    </section>
    <section anchor="emerging-operational-issues-with-network-overlay-policy-changes">
      <name>Emerging Operational Issues with Network Overlay Policy Changes</name>
      <t>Streaming video applications and the streaming platforms used for delivering content to them are beginning to encounter a variety operational problems related to the Network Overlays as users and customers of both bring them together.</t>
      <t>The various impacts are listed further down in this document but there are a few classes of issues that have been observed:</t>
      <ul spacing="normal">
        <li>
          <t>(1) Routing changes which cause bypassing edge CDN caches and instead choosing less optimal caches</t>
        </li>
      </ul>
      <artwork><![CDATA[
 R  = router
           <--- non-overlay traffic path --->
 device -- R ---- R ---- Edge CDN Cache
            \
             \
              \
               R --- R -- ingest -- R --- R -- egress -- R ------R ---- Less Optimal CDN Cache
                     <--- overlay traffic path --->

 Figure:  Routing Changes alering CDN Cache selection
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>(2) Routing changes which add network latency compared to edge CDN caches or access network peering connections</t>
        </li>
        <li>
          <t>(3) Forced encryption of unencrypted HTTP2 connections to HTTP2+TLS connections</t>
        </li>
        <li>
          <t>(4) DNS Resolver choice changes resulting in less optimal CDN cache selection or bypassing of CDN load balancing direction</t>
        </li>
        <li>
          <t>(5) Changed Source IP Address for the application's connections to Streaming Platform Servers resulting in logging, geofencing, and session management problems</t>
        </li>
        <li>
          <t>(6) Performance and Problem determination tools \&amp; protocols not able to traverse the alternative route tunnel impacting services ability to diagnose connection and performance problems</t>
        </li>
      </ul>
      <section anchor="impact-of-changing-network-routing-and-other-policies">
        <name>Impact of Changing Network Routing and other Policies</name>
        <t>The problem for streaming applications occurs when the underlying network properties and policies change from what is expected by the streaming application. In particular when such changes are either hidden or not visible to the streaming application.</t>
        <t>While the open Internet is a dynamic environment, changing of basic network behavior and policies from what is expected as seen from the streaming application,  deviate unexpectedly from what the streaming application expects. This behavior disrupts the optimized streaming delivery architecture for the end-user device.  Changes to Network Policies such the routing, source IP address assigned to the streaming application traffic, DNS resolver choice etc influences this behavior.</t>
        <t>Having an understanding and a reliable understanding of the delivery path is essential for streaming operators and the introduction
of network overlays based on technologies such as MASQUE especially when they are designed to not be easily detected, even
by applications using them has created a new set of technical problems for streaming operators and network operators and
for the viewers that subscribe to them.</t>
        <t>The core problem occurs when changes to network policies are made, often without notification or visibilty to applications and
without clear methods of probing to determine and test changed behaviors that affect the streaming application's content
delivery path resulting in increased latency, changes of IP address for the application as seen by either the application
or the streaming service connection, changes to DNS resolvers being queried and the results returned by DNS, and changes to
application transports such as adding or removing outer layer encryption are all problems that have been observed in
production streaming platforms.</t>
        <section anchor="middleboxes-and-learning-from-the-past">
          <name>Middleboxes and learning from the past</name>
          <t>The IETF has discussed this situation in the past, more than 20 years ago in 2002 Middleboxes: Taxonomy and Issues <xref target="RFC3234"/>
was published capturing the issues with Middleboxes in the network and the affects of hidden changes occuring on the network between the sender and receiver.</t>
        </section>
      </section>
    </section>
    <section anchor="approaches-to-mitigate-or-minimize-impacts">
      <name>Approaches to Mitigate or Minimize Impacts</name>
      <t>There are a number of ways Network Overlays can work with Streaming applications to mitigate or at best minimize their impacts.</t>
      <section anchor="transparent-policy-settings">
        <name>Transparent Policy Settings</name>
        <t>A common theme in many of the mitigation proposal is making the Network Overlay changes and behavior transparent to the Streaming application.  This approach should not affect privacy enhancements of the Network Overlay as it doesn't alter the Network Overlay. Enabling the Streaming Application to better understand the network environment it is operating, allows the application to adapt the changes and work within them.</t>
      </section>
      <section anchor="policy-change-notification">
        <name>Policy Change Notification</name>
        <t>Related to better transparency of policy settings is enabling notification to applications of changes to network policies.  This would enable the streaming application to take into account the changes when they occur - for example a Network Overlay turning on or off.</t>
      </section>
      <section anchor="exclusion-from-policy-changes">
        <name>Exclusion from Policy Changes</name>
        <t>The other approach is enabling applications to be excluded from network overlays.  This could be be done through a variety of approaches such as providing users an option on their device to exclude either by specific applications, by specific end point destinations identified by DNS name or IP address, or by some other characteristic.</t>
      </section>
      <section anchor="support-tools">
        <name>Support Tools</name>
        <t>One of the issues streaming platforms have run into, especially when working on connection and performance issues is that Network Overlays that only affect very specific application protocols, for example HTTP2/TCP and HTTP3/QUIC+UDP connections, is that other Internet protocols like ICMP which are fundamental in the toolkits of support desks do not traverse the Network Overlay tunnel.  Since neither HTTP2 or HTTP3 protocols provide native ways of finding "the bad hop" or measuring bandwidth or latency along their path, the customer service Helpdesk and the Network Engineers often find they lack the necessary support tools to help customers in determining streaming problems.</t>
      </section>
    </section>
    <section anchor="appendix-a-network-overlays-are-different-than-vpns">
      <name>Appendix A: Network Overlays are different than VPNs</name>
      <t>While conceptually similar in many ways to VPN (Virtual Private Network) technology, the various network overlay
technologies currently being deployed as well as new ones currently being designed by the IETF differ quite
siginificanlty from the older VPN approach they are replacing in a number of ways.</t>
      <t>It is also worth noting that one reason why the issues discussed in this document have not been concerned with
regard to VPNs is that largely VPNs have not been a pervasive way to stream video.   First, many VPNs have not had very good or consistent throughput compared to the direct open Internet and so provide a poor viewing experience.  Second, many video platforms block or deny service to VPN connections due to the very common use of VPNs to bypass geofiltering restrictions.</t>
      <t>Whatever the reason, it's work looking at how VPNs differ from the Network Overlays being discussed herein.</t>
      <section anchor="vpns-typically">
        <name>VPNs typically:</name>
        <ul spacing="normal">
          <li>
            <t>(1) VPNs typically are detectable by both the video application and often by the streaming platform.</t>
          </li>
          <li>
            <t>(2) VPNs typically work at the network layer of a device, resulting in a wide-range (if not all) transports</t>
          </li>
          <li>
            <t>and protocols from the device flowing through the VPN</t>
          </li>
          <li>
            <t>(3) VPNs typically provide exception options allowing for exclusion from traversing via the VPN based on</t>
          </li>
          <li>
            <t>various criteria such as application, destination IP address, application protocol etc.</t>
          </li>
        </ul>
        <section anchor="network-overlays-typically">
          <name>Network Overlays typically:</name>
          <ul spacing="normal">
            <li>
              <t>(1) Network Overlays are often undetectable by video applications or by the streaming platform, when in use</t>
            </li>
            <li>
              <t>(2) Network Overlays often only apply to specific application transports such as HTTP2/TCP or HTTP3/QUIC while not applying to HTTP2/TCP+TLS on the same device.</t>
            </li>
            <li>
              <t>(3) Network Overlays often only apply to HTTP connections and do not support ICMP, non-http versions of DNS, NTP etc, and various tools used for network measurement, problem determination, and network management that are not http based.</t>
            </li>
            <li>
              <t>(4) Network Overlays do not expose to applications any means for the application to discover the policy changes the overlay will apply to the applications network connections.</t>
            </li>
            <li>
              <t>(5) Network Overlays do not expose mechanisms or APIs for applications to interact with them such as getting or setting options.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9484">
        <front>
          <title>Proxying IP in HTTP</title>
          <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
          <date month="October" year="2023"/>
          <abstract>
            <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9484"/>
        <seriesInfo name="DOI" value="10.17487/RFC9484"/>
      </reference>
      <reference anchor="RFC3234">
        <front>
          <title>Middleboxes: Taxonomy and Issues</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="S. Brim" initials="S." surname="Brim"/>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions. It does not, however, claim to be definitive. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3234"/>
        <seriesInfo name="DOI" value="10.17487/RFC3234"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 305?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge to the contributions from the Streaming Video Technology Alliance (SVTA) based on their work studying the impacts of network overlays on the streaming platforms. In particular, contributions from Brian Paxton have been very helpful.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
