<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-deen-mops-network-overlay-impacts-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="NOISV">Network Overlay Impacts to Streaming Video</title>
    <seriesInfo name="Internet-Draft" value="draft-deen-mops-network-overlay-impacts-00"/>
    <author fullname="Glenn Deen">
      <organization>Comcast-NBCUniversal</organization>
      <address>
        <email>glenn_deen@comcast.com</email>
      </address>
    </author>
    <author fullname="Sanjay Mishra">
      <organization>Verizon</organization>
      <address>
        <email>sanjay.mishra@verizon.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Operations and Management</area>
    <workgroup>Media OPerationS</workgroup>
    <keyword>network policy</keyword>
    <keyword>video streaming</keyword>
    <keyword>streaming</keyword>
    <abstract>
      <?line 48?>

<t>This document examines the operational impacts to streaming video applications
caused by changes to network policies by network overlays.  The network policy
changes include IP address assignment, transport
protocols, routing, DNS resolver which in turn affect a variety of important
content delivery aspects such as latency, CDN cache selection, delivery path
choices, traffic classification and content access controls.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://gitnnelg.github.io/NetworkOverlays/draft-deen-mops-network-overlay-impacts.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-deen-mops-network-overlay-impacts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Media OPerationS Working Group mailing list (<eref target="mailto:mops@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mops/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mops/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/gitnnelg/NetworkOverlays"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The past decade of Internet evolution has included two significant trends,  the global growth of video streaming and  active passionate work within the IETF and places on enhancing Internet user privacy.</t>
      <t>The work on these initiatives has largely been done independently of one another, though there are a few individuals and companies that are involved with both efforts.   However, the arrival of the newly developed privacy enhancements in consumer products and their subsequent use by streaming video viewers has brought the work of the two efforts in contact and highlighted a number of friction points which are having impacts to users and support engineers of video streaming platforms.</t>
      <t>To be clear, this document is not proposing or advocating rolling back the any of the privacy enhancements for users.  Instead the authors hope to help educate the IETF and others on the practical operational impacts of these enhancements and to eventually develop approaches that can help mitigate such impacts.</t>
      <t>The authors also readily acknowledge the many challenges and difficulties in improving Internet privacy into something as complex as the Internet while maintaining compatibiltiy with the wildly varied applications and uses the Internet's users rely upon daily in their lives. This is hard stuff and it's very natural for their to be operational considerations that must be understood and folded back into architectural designs and consumer products.</t>
      <t>The hope in developing this document is to provide meaningful and helpful feedback from the streaming application and streaming platform operational perspective to help the enhanced privacy architecture work being done at the IETF.</t>
      <section anchor="streaming-video-architects-and-privacy-enhancement-designers-working-together">
        <name>Streaming Video Architects and Privacy Enhancement Designers Working Together</name>
        <t>This document is not intended to challenge the need for privacy enhancements for the Internet, instead the hope is to illustrate impacts of such changes to the billions of users of Streaming Video delivered over the Internet so that the designers of privacy enhancements and the designers of services built on them can better understand the impacts of different design choices and perhaps find ways to mitigate such impacts through altered design choices.</t>
        <t>Given the popularity of streaming video with the Internet's users and it's importancne to network operators, streaming platform operators and many others it only makes sense that as the IETF and it's participants work on improving privacy for those same users that the two efforts work together for everyone's benefit.</t>
      </section>
      <section anchor="possible-outcomes">
        <name>Possible Outcomes</name>
        <t>One possible outcome might be a best design and implementation guide developed together and published by the IETF Media Operations Group.</t>
        <t>Another possible outcome might be an IAB led study on the operational impacts of Network Overlays to help the IETF and Internet communities better understand the operational impacts of various architectural decisions along with mitigate approaches.</t>
      </section>
    </section>
    <section anchor="internet-privacy-enhancements">
      <name>Internet Privacy Enhancements</name>
      <t>Enhancing Internet Privacy is a challenging task to do for something as complex as the running Internet and it is easy for great proposals that fix one issue to cause new issues to arise in other places.  That's not a reason to stop trying, but it is important to understand the consequences of changes and to find ways to manage or mitigate such impacts, ideally without weaking or rolling back the enhancements.</t>
      <t>A popular design choice in privacy enhancements at the IETF has been the encapsulation of data inside encrypted connections.  {!RFC9000} is an excellent example of this design and introduces a protocol that is always encrypted.</t>
      <section anchor="network-overlays">
        <name>Network Overlays</name>
        <t>Along with the use of encrypted connections another popular approach is to additionally create alterative routings and tunnels for connections which bypass the routing and other policy decisions of the ISP access network and of the public open Internet.   These alternative network policy choices have the effect of creating a Network Overlay that operates on top of and over the device's Access Network and the Open Internet, but follows an independent set of policies chosen by the Network Overlay.</t>
        <t><tt>
  
 R  = router
                                      &lt;--- non-overlay traffic path ---&gt;
  device ------ R -------- R ------------------------------  R ---------------- R ---- R ---- dest-node
                 \                                                             /
                  \                                                           /
                   \                                                         /
                    R ----- R ----- ingest-node ----- egrees-node ----- R --+
                                      &lt;--- overlay traffic path ---&gt;
  &lt;/br&gt;
 Figure 1:  Network Overlay routing select traffic via an alternate path
</tt></t>
        <section anchor="partitioning">
          <name>Partitioning</name>
          <t>Network Overlay policy changes will include an alternate routing policy since a fundamental aspect of this design is the tunneling of connections through alternate paths to enhance privacy. The reasons for this approach are discussed in the IAB document <eref target="https://datatracker.ietf.org/doc/draft-iab-privacy-partitioning/">Partitioning as an Architecture for Privacy</eref>.</t>
        </section>
        <section anchor="policy-changes">
          <name>Policy Changes</name>
          <t>Beyond alternate routing policies, network overlays often also make changes to the Source IP Address Assignment, the DNS Resolver Selection, can include protocol conversions/translations such as HTTP2-&gt;HTTP3 and HTTP2-&gt;HTTPS2+TLS, and can include IP layer changes such as IPv4-&gt;IPv6 or IPv6-&gt;IPv6 conversions.</t>
        </section>
        <section anchor="masque">
          <name>MASQUE</name>
          <t>Protocols such as MASQUE <xref target="RFC9494"/> and services built on it such as Apple's <eref target="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">iCloud Private Relay</eref> are examples of Privacy Enhancing Network Overlays that involve making a number of network policy changes from the open Internet for the connections passed through them.</t>
          <t>The IETF has discussed this situation in the past, more than 20 years ago in 2002 Middleboxes: Taxonomy and Issues <xref target="RFC3234"/>
was published capturing the issues with Middleboxes in the network and the affects of hidden changes occuring on the network between the sender and receiver.</t>
        </section>
      </section>
      <section anchor="making-it-easy-for-users-by-working-under-the-covers">
        <name>Making It Easy (for Users) by Working Under the Covers</name>
        <t>Privacy has historically been a complicated feature to add into products targeted to end users. There are many reasons for this such as trying to meet every possible scenario and use-case and trying to provide easy user access to advanced privacy frameworks and taxonomies.   Many attempts have been made, very very few have succeeed in finding success with end users.</t>
        <t>Perhaps learning from the lesson of offering too many options the recent trend in privacy enhancements has steered torward either a very simple "Privacy On or Off" switch or in other cases automatically enabling or "upgrading" to enhance privacy.   Apple's iCloud Private Relay can be easily turned on with a single settings switch, while privacy features like Encrypted DNS over HTTP and upgrade from HTTP to HTTPS connections have had a number of deployments automatically enable them for users when possible.</t>
        <t>Keeping with the Keep It Simple approach, users are generally not provided with granular Network Overlay controls permitting the user to select what applications, or what network connections the Network Overlay's policies apply to.</t>
        <t>Also, keeping with the Keep It Simple approach the application itself has very little connection to privacy enhancing Network Overlays.  Applications generally do not have a means to detect when networking policy changes are active. Applications generally do not have a means to access policy change settings or to interact with changing them.</t>
      </section>
    </section>
    <section anchor="streaming-video">
      <name>Streaming Video</name>
      <t>Streaming Video, while just one of the many different Internet applications does standout from other uses in a number of significant that perhaps merit some amount of special consideration in understanding and addressing the impacts caused by particular privacy enhancing design and service offering choices.</t>
      <t>Firstly, Streaming Video operates at a hard to imagine scale - streaming video globally to be more than 2 billion user daily currently and continuing to grow in leaps and bounds.</t>
      <t>Secondly, the content types delivered through streaming has evolved from  the pre-recorded low-resolution, low-bit rate, latency tolerant Video On Demand movies, TV shows, and user generated videos delivered by pioneer streaming platforms to now include low-latency 4K and 8K live sports events, while also evolving the pre-recorded content to become very resolution and high high-bit rate 4K and 8K cinema quality and High Dynamic Range (HDR) lighting.</t>
      <t>Finally, the expectations of streaming video viewers have significantly evolved from the days of settling for being able to watch a movie in a PC browser.  Viewers expect to watch on any device type the want from low-end-streaming sticks that plug into USB ports, to 4K and HDR capable laptops, 4K and 8K HDR TV screens, gaming consoles, phones and many more choices.  Viewers also expect to have the same great viewing experience while at home connected via high-speed wired Internet, high-speed WiFi, or mobile cellular 5G and even satellite Internet connections.</t>
      <t>To meet the growth to billions of users, the growth in content type, quality and speed expectations, and the on-any-device anywhere that I am over any-network-connection expectations of users the Streaming Video technology infrastructure has had to itself evolve significantly.  This is video streaming evolution work that done in the IETF, in the <eref target="https://www.svta.org/">Streaming Video Technology Alliance (SVTA)</eref>, and in a number of other technical and industry groups.</t>
      <t>It's hard to overstate just how much the growth of Streaming Video has contributed to the growth of the Internet.  Internet connections of hundred megabit and gigabit speeds are because of the needs of video streaming, the ongoing work on low-latency networking and ultra-low-latency video delivery are both driven by streaming video.</t>
      <section anchor="advances-in-streaming-video-architecture">
        <name>Advances in Streaming Video Architecture</name>
        <t>Internet streaming has greatly matured and diversified from its early days of viewers
watching pre-recorded 320x240, 640x480 standard definiton 480p movies to wired PCs connected
to the Internet via high-latency, low-bandwidth DSL as early DOCSIS modems.</t>
        <t>Streaming has grown be a daily go-to video source world wide for billions of viewers
and has expanded from pre-recorded movies to encompass every type of video content
imaginable.  This growth to billions of viewers and the addition of low latency sensistive
content and new connectivity options like WiFi, Cellular and Satellite in addition to
high-speed DOCSIS and fibre is the world streaming platforms now provide service in.</t>
        <t>Streaming platform have now have significant technical challenges to meet viewer expectations:</t>
        <ul spacing="normal">
          <li>
            <t>(1) Delivery scales that commonly range from hundreds of thousands to many millions of viewers simultaneously, with billions of views globally daily;</t>
          </li>
          <li>
            <t>(2) Low latency demands from live sports, live events and live streamed content;</t>
          </li>
          <li>
            <t>(3) content resolutions and corresponding formats which have jumped from the days of SD-480p to 4K (3840x2160) and 8K (7680x4320) along with bit rates which can had data needs of 10-24+ Mbps for 4K with 8K demanding 40 Mbps under extreme compression and 150-300 Mbps for high quality such as cinema;</t>
          </li>
          <li>
            <t>(4) devices with very diverse capabilities low-cost streaming sticks, to Smart TVs, tablets, phones, and game consoles</t>
          </li>
          <li>
            <t>(5) broad range of connectivity choices including WiFi, gig speed-low latency DOCSIS, satellite, and 5G cellular networks;</t>
          </li>
          <li>
            <t>(6) application transport protocols including DASH, HLS, http2/tcp, http3/QUIC, WebRTC, Media over QUIC (MoQ) and specialty application transports such as SRT, HESP etc.</t>
          </li>
        </ul>
        <t>To meet these challenges streaming platforms have significantly invested in developing delivery architectures that
are built with detailed understandings of each element in the content delivery pathway from the content capture all the way
through to the screen of the viewer.</t>
        <t>Streaming applications are part of an end to end architecture that is optimized around achieving the best experience including low latency video delivery to viewing devices.  Obviously the open Internet can be unpredictable with momentary issues such as packet loss, congestion and other conditions but streaming architecture is desiged to do its best when such momentary problems arise.</t>
      </section>
    </section>
    <section anchor="emerging-operational-issues-with-network-overlay-policy-changes">
      <name>Emerging Operational Issues with Network Overlay Policy Changes</name>
      <t>Streaming video applications and the streaming platforms delivery content to them are beginning to encounter a variety operational problem related to the Network Overlays as users and customers of both bring them together.</t>
      <t>The various impacts are list later in this document but there are a few classes of issues that have been observed:</t>
      <ul spacing="normal">
        <li>
          <t>(1) Routing changes which cause bypassing edge CDN caches on access networks to be bypassed</t>
        </li>
        <li>
          <t>(2) Routing changes which add network latency compared to edge CDN caches or access network peering connections</t>
        </li>
        <li>
          <t>(3) Forced encrypted of unencrypted HTTP2 connections to HTTP2+TLS connections</t>
        </li>
        <li>
          <t>(4) DNS Resolver choice changes resulting in less optimal CDN cache selection or bypassing of CDN load balancing direction</t>
        </li>
        <li>
          <t>(5) Changed Source IP Address for the application's connections to Streaming Platform Servers resulting in logging, geofencing, and session management problems</t>
        </li>
        <li>
          <t>(6) Performance and Problem determination tools \&amp; protocols not able to traverse the alternative route tunnel impacting services ability to diagnose connection and performance problems</t>
        </li>
      </ul>
      <section anchor="impact-of-changing-network-routing-and-other-policies">
        <name>Impact of Changing Network Routing and other Policies</name>
        <t>The problem for streaming applications occurs when the underlying network properties and policies change from what is expected by the streaming application. In particular when such changes are not hidden or not visible to the streaming application.</t>
        <t>While the open Internet is a dynamic environment, changing of basic network behavior and policies, from what is expected as seen from the streaming application,  deviate unexpectedly from what the streaming application expects disrupts the optimized streaming delivery architecture the device.  Changes to Network Policies such the routing, source IP address assigned to the streaming application traffic, DNS resolver choice etc.</t>
        <t>Having an understanding and a reliable understanding of the delivery path is essential for streaming operators and the introduction
of network overlays based on technologies such as MASQUE especially when they are designed to not be easily detected, even
by applications using them has created a new set of technical problems for streaming operators and network operators and
for the viewers that subscribe to them.</t>
        <t>The core problem occurs when changes to network policies are made, often without notification or visibilty to applications and
without clear methods of probing to determine and test changed behaviors that affect the streaming application's content
delivery path resulting in increased latency, changes of IP address for the application as seen by either the application
or the streaming service connection, changes to DNS resolvers being queried and the results returned by DNS, and changes to
application transports such as adding or removing outer layer encryption are all problems that have been observed in
production streaming platforms.</t>
      </section>
    </section>
    <section anchor="approaches-to-mitigate-or-minimize-impacts">
      <name>Approaches to Mitigate or Minimize Impacts</name>
      <t>There are a number of ways Network Overlays can work with Streaming Applications to mitigate or at best minimize their impacts.</t>
      <section anchor="transparent-policy-settings">
        <name>Transparent Policy Settings</name>
        <t>A common theme in many of the mitigation proposal is making the Network Overlay changes and behavior transparent to the Streaming Application.  This approach should not affect privacy enhancements of the Network Overlay as it doesn't alter the Network Overlay. Enabling the Streaming Application to better understand the network environment it is operating, allows the application to adapt the changes and work within them.</t>
      </section>
      <section anchor="policy-change-notification">
        <name>Policy Change Notification</name>
        <t>Related to better transparency of policy settings is enabling notification to applications of changes to network policies.  This would enable the streaming application to take into account the changes when they occur - for example a Network Overlay turning on or off.</t>
      </section>
      <section anchor="exclusion-from-policy-changes">
        <name>Exclusion from Policy Changes</name>
        <t>The other approach is enabling applications to be excluded from network overlays.  This could be be done through a variety of approaches such as providing users an option on their device to exclude either by specific applications, by specific end point destinations identified by DNS name or IP address, or by some other characteristic.</t>
      </section>
      <section anchor="support-tools">
        <name>Support Tools</name>
        <t>One of the issues streaming platforms have run into, especially when working on connection and performance issues is that Network Overlays that only affect very specific application protocols, for example HTTP2/tcp and HTTP3/QUIC+UDP connections, is that other Internet protocols like ICMP which are fundamental in the toolkits of support desks do not traverse the Network Overlay tunnel.  Since neither HTTP2 or HTTP3 provide protocol native ways of finding "the bad hop" or measuring bandwidth or latency along their path, helpdesks and engineers often find they lack the necessary support tools to help customers in determining streaming problems.</t>
      </section>
    </section>
    <section anchor="appendix-a-network-overlays-are-different-than-vpns">
      <name>Appendix A: Network Overlays are different than VPNs</name>
      <t>While conceptually similar in many ways to VPN (Virtual Private Network) technology, the various network overlay
technologies currently being deployed as well as new ones currently being designed by the IETF differ quite
siginificanlty from the older VPN approach they are replacing in a number of ways.</t>
      <t>It is also worth noting that one reason why the issues discussed in this document have not been concerns with
regard to VPNs is that largely VPNs have not been a pervasive way to stream video.   First, many VPNs have not had very good or consistent throughput compared to the direct open Internet and so provide a poor viewing experience.  Second, many video platforms block or deny service to VPN connections due to the very common use of VPNs to bypass geofiltering restrictions.</t>
      <t>Whatever the reason, it's work looking at how VPNs differ from the Network Overlays being discussed herein.</t>
      <section anchor="vpns-typically">
        <name>VPNs typically:</name>
        <ul spacing="normal">
          <li>
            <t>(1) VPNs typically are detectable by both the video application and often by the streaming platform.</t>
          </li>
          <li>
            <t>(2) VPNs typically work at the network layer of a device, resulting in a wide-range (if not all) transports</t>
          </li>
          <li>
            <t>and protocols from the device flowing through the VPN</t>
          </li>
          <li>
            <t>(3) VPNs typically provide exception options allowing for exclusion from traversing via the VPN based on</t>
          </li>
          <li>
            <t>various criteria such as application, destination IP address, application protocol etc.</t>
          </li>
        </ul>
        <section anchor="network-overlays-typically">
          <name>Network Overlays typically:</name>
          <ul spacing="normal">
            <li>
              <t>(1) Network Overlays are often undetectable by video applications or by the streaming platform, when in use</t>
            </li>
            <li>
              <t>(2) Network Overlays often only apply to specific application transports such as HTTP2/TCP or HTTP3/QUIC while not applying to HTTP2/TCP+TLS on the same device.</t>
            </li>
            <li>
              <t>(3) Network Overlays often only apply to HTTP connections and do not support ICMP, non-http versions of DNS, NTP etc, and various tools used for network measurement, problem determination, and network management that are not http based.</t>
            </li>
            <li>
              <t>(4) Network Overlays do not expose to applications any means for the application to discover the policy changes the overlay will apply to the applications network connections.</t>
            </li>
            <li>
              <t>(5) Network Overlays do not expose mechanisms or APIs for applications to interact with them such as getting or setting options.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC9494">
        <front>
          <title>Long-Lived Graceful Restart for BGP</title>
          <author fullname="J. Uttaro" initials="J." surname="Uttaro"/>
          <author fullname="E. Chen" initials="E." surname="Chen"/>
          <author fullname="B. Decraene" initials="B." surname="Decraene"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <date month="November" year="2023"/>
          <abstract>
            <t>This document introduces a BGP capability called the "Long-Lived Graceful Restart Capability" (or "LLGR Capability"). The benefit of this capability is that stale routes can be retained for a longer time upon session failure than is provided for by BGP Graceful Restart (as described in RFC 4724). A well-known BGP community called "LLGR_STALE" is introduced for marking stale routes retained for a longer time. A second well-known BGP community called "NO_LLGR" is introduced for marking routes for which these procedures should not be applied. We also specify that such long-lived stale routes be treated as the least preferred and that their advertisements be limited to BGP speakers that have advertised the capability. Use of this extension is not advisable in all cases, and we provide guidelines to help determine if it is.</t>
            <t>This memo updates RFC 6368 by specifying that the LLGR_STALE community must be propagated into, or out of, the path attributes exchanged between the Provider Edge (PE) and Customer Edge (CE) routers.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9494"/>
        <seriesInfo name="DOI" value="10.17487/RFC9494"/>
      </reference>
      <reference anchor="RFC3234">
        <front>
          <title>Middleboxes: Taxonomy and Issues</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="S. Brim" initials="S." surname="Brim"/>
          <date month="February" year="2002"/>
          <abstract>
            <t>This document is intended as part of an IETF discussion about "middleboxes" - defined as any intermediary box performing functions apart from normal, standard functions of an IP router on the data path between a source host and destination host. This document establishes a catalogue or taxonomy of middleboxes, cites previous and current IETF work concerning middleboxes, and attempts to identify some preliminary conclusions. It does not, however, claim to be definitive. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3234"/>
        <seriesInfo name="DOI" value="10.17487/RFC3234"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 285?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge to the contributions from the Streaming Video Technology Alliance (SVTA) based on their work studing the impacts of network overlays on the streaming platforms participating in the SVTS.  In particular the contributions of Brian Paxton have been very helpful.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
