<?xml version="1.0" encoding="UTF-8"?>
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  ipr="trust200902"
  category="info"
  submissionType="independent"
  docName="draft-dpa-uzpif-framework-00">

  <front>
    <title abbrev="UZPIF">The Universal Zero-Port Interconnect Framework (UZPIF): An Identity-Centric Architecture for Post-Port Networking</title>

    <author fullname="Benjamin Anthony Fisher" initials="B.A." surname="Fisher">
      <organization abbrev="DPA R&amp;D">DPA R&amp;D Ltd (https://www.dpa-cloud.co.uk)</organization>
      <address>
        <email>b.fisher@dpa-cloud.co.uk</email>
        <uri>https://orcid.org/0009-0004-4412-2269</uri>
      </address>
    </author>

    <date year="2026" month="January" day="6"/>

    <keyword>zero-port networking</keyword>
    <keyword>identity-centric networking</keyword>
    <keyword>rendezvous protocols</keyword>
    <keyword>zero trust</keyword>
    <keyword>post-quantum cryptography</keyword>

    <abstract>
      <t>
        The Universal Zero-Port Interconnect Framework (UZPIF) describes a post-port networking model in which
        communication is established via outbound, identity-bound sessions to Rendezvous Nodes (RNs).
        By removing publicly reachable listening ports at endpoints, UZPIF aims to reduce exposure to Internet-wide
        scanning and unsolicited ingress, and to constrain a broad class of lateral-movement vectors.
      </t>
      <t>
        This document outlines architectural motivation, a high-level security model, operational and economic
        considerations, a governance concept (Pantheon), and an incremental migration approach.
        UZPIF is intended to be read alongside companion work describing the Universal Zero-Port Transport Protocol (UZP; <xref target="UZP"/>)
        and TLS-UZP (<xref target="TLS-DPA"/>).
      </t>
    </abstract>
  </front>

  <middle>

    <section anchor="scope-and-status" toc="include">
      <name>Scope and Status</name>
      <t>
        This document is an Internet-Draft and represents work in progress.
        It is published to enable structured technical review, interoperability discussion, and disciplined
        specification development around the Universal Zero-Port Interconnect Framework (UZPIF).
      </t>
      <t>
        The material is a research artefact.
        It does not claim technical completeness, production readiness, or endorsement by the IETF or any other
        standards body, and it is not presented as a standards-track specification.
      </t>
      <t>
        It is not a universal replacement, is not mandated outside its target environment, and is designed for
        experimentation and profile-driven deployments.
      </t>
      <t>
        During conversion from internal research documents into IETF XML, care has been taken to:
      </t>
      <ul>
        <li><t>preserve a clear distinction between normative and informative content;</t></li>
        <li><t>use requirement language (e.g., "MUST", "SHOULD", "MAY") only where protocol behaviour is intentionally specified;</t></li>
        <li><t>avoid any implication of registry finalisation, mandatory implementation, or standard-track status; and</t></li>
        <li><t>maintain intellectual-property neutrality, with no implied patent grants or licensing commitments beyond the IETF Trust copyright licence applicable to Internet-Draft text.</t></li>
      </ul>
      <t>
        Ongoing research, implementation, performance validation, and real-world pilot work remain outside the scope
        of this Internet-Draft text and may be pursued separately.
      </t>
    </section>

    <section anchor="executive-summary" toc="include">
      <name>Executive Summary</name>
      <t>
        The Internet still commonly exposes services via publicly reachable transport ports, a legacy design choice
        that enables scanning and unsolicited connection attempts at global scale.
        Operationally, this contributes to exposure for denial-of-service attacks, credential attacks, and lateral
        movement within networks.
      </t>
      <t>
        UZPIF (the framework) and UZP (<xref target="UZP"/>) (its transport protocol) remove the concept of exposed ports at endpoints.
        Both endpoints initiate outbound, identity-anchored sessions to a Rendezvous Node (RN), which only stitches
        traffic when identity, context, and declared purpose align under policy issued by Pantheon, the identity and
        policy plane.
      </t>
      <t>
        The intent is a model where nothing is discoverable unless explicitly permitted by policy and exposed through the rendezvous fabric, and where
        application traffic is end-to-end authenticated and encrypted.
        UZP (<xref target="UZP"/>) is designed to support performance properties such as:
      </t>
      <ul>
        <li><t>block-level reliability,</t></li>
        <li><t>selective retransmission, and</t></li>
        <li><t>deterministic pacing.</t></li>
      </ul>
      <t>
        Legacy applications (e.g., HTTP(S), remote desktop, file sharing, and real-time media) are intended to
        continue to operate without modification via a Host Identity Layer (HIL) that maps traditional application
        expectations onto identity-centric sessions.
      </t>
      <t>
        UZPIF is intended to be evolutionary rather than revolutionary.
        It deliberately builds on transport, security, and identity work embodied in QUIC <xref target="RFC9000"/>,
        TLS 1.3 <xref target="RFC8446"/>, and the Host Identity Protocol <xref target="RFC7401"/>, while aligning with
        modern zero-trust guidance (e.g., NIST SP 800-207 <xref target="NIST-SP800-207"/>) and post-quantum
        cryptography standardisation efforts (e.g., the NIST PQC project <xref target="NIST-PQC"/>).
      </t>
    </section>

    <section anchor="introduction">
      <name>Introduction</name>
      <t>
        This document provides an architectural overview of UZPIF and motivates why an identity-first, rendezvous-based
        model that avoids publicly reachable listeners may be desirable.
      </t>

      <section anchor="why-now">
        <name>Why Now?</name>
        <ul>
          <li>
            <t>
              Investment in perimeter defences (e.g., DDoS mitigation and application firewalls) can yield diminishing
              returns as attackers automate scanning and exploit discovery at Internet scale.
            </t>
          </li>
          <li>
            <t>
              Zero Trust Network Access (ZTNA) and SASE deployments indicate demand for identity-first networking, yet
              many approaches still expose TCP/UDP ingress and rely on perimeter constructs.
              <xref target="NIST-SP800-207"/>
            </t>
          </li>
          <li>
            <t>
              Post-quantum cryptography efforts provide a path to identity-first transport without prohibitive
              performance regression as key encapsulation and signature schemes mature.
              <xref target="NIST-PQC"/>
            </t>
          </li>
        </ul>
      </section>

      <section anchor="whats-new">
        <name>What's New Versus Yet Another VPN?</name>
        <t>
          Conventional VPNs and overlay networks typically retain the assumption that services listen on IP:port
          tuples, even if those ports are only reachable within a private address space or through a gateway.
          QUIC <xref target="RFC9000"/>, TLS 1.3 <xref target="RFC8446"/>, HIP <xref target="RFC7401"/>, and systems such
          as Tor <xref target="Tor"/> demonstrate that identity, encryption, and rendezvous can be decoupled from raw
          addressing semantics, but they stop short of removing listening ports entirely.
        </t>
        <ul>
          <li><t><strong>No listeners</strong> at endpoints.</t></li>
          <li><t><strong>Identity-as-address</strong> via identities (e.g., canonical and ephemeral identities) rather than IP:port.</t></li>
          <li><t><strong>Block-level reliability</strong> with selective retransmission (transport-level design goal).</t></li>
          <li><t><strong>Pantheon policy plane</strong> encoding purpose, context, and validity into every session.</t></li>
        </ul>
      </section>
    </section>

    <section anchor="terminology">
      <name>Terminology</name>
      <t>
        <strong>Requirements Language:</strong>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
        "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted
        as described in <xref target="RFC2119"/> and <xref target="RFC8174"/> when, and only when,
        they appear in all capitals.
      </t>

      <t>
        This Internet-Draft is primarily architectural; requirement language is used sparingly and only where
        behaviour is intentionally specified.
      </t>

      <list style="hanging">
        <t hangText="EP">Endpoint. A host or service that participates in UZPIF by initiating outbound sessions.</t>
        <t hangText="RN">Rendezvous Node. A mediator that accepts outbound sessions and stitches permitted flows.</t>
        <t hangText="Pantheon">An identity, attestation, and policy plane that issues credentials and session grants.</t>
        <t hangText="HIL">Host Identity Layer. A compatibility layer intended to support legacy applications over identity-centric sessions.</t>
        <t hangText="CID">Canonical Identity. A long-term cryptographic identity used to identify an EP (or a delegated sub-identity).</t>
        <t hangText="EID">Ephemeral Identity. A short-lived identity used for sessions, derived or issued under policy.</t>
        <t hangText="ZPIT">Zero-Port Interconnect Tunnel. An end-to-end encrypted tunnel stitched via one or more RNs.</t>
      </list>
    </section>

    <section anchor="core-architecture">
      <name>Core Architecture</name>

      <section anchor="flow-ep-rn-ep">
        <name>High-Level Flow: EP to RN to EP</name>
        <t>
          In UZPIF, both peers initiate outbound sessions towards an RN.
          After policy evaluation and authorisation, the RN stitches the two sessions into a tunnel (ZPIT) that carries
          end-to-end protected application data.
        </t>
        <figure anchor="fig-high-level-flow">
          <name>High-level communication pattern (outbound-only sessions)</name>
          <artwork><![CDATA[
EP A (Initiator)        RN        EP B (Responder)
    |---- outbound ----->|              |
    |                    |<---- outbound|
    |<==== end-to-end encrypted ZPIT (stitched via RN) ====>|
]]></artwork>
        </figure>
        <t>This figure shows both endpoints initiating outbound sessions to the RN, which stitches them into a single ZPIT.</t>
      </section>

      <section anchor="pantheon-grant-verification">
        <name>Pantheon Grant Verification</name>
        <t>
          Prior to stitching, an EP is expected to obtain a signed authorisation ("Grant") from Pantheon.
          Grants bind identity to purpose and validity constraints, enabling RNs to make consistent policy decisions.
        </t>
        <figure anchor="fig-grant-verification">
          <name>Grant request and issuance flow</name>
          <artwork><![CDATA[
EP                      Pantheon
 |------ Grant Request ------->|
 |<------ Signed Grant --------|
 |
 |---- Grant + CID/EID ----> RN
]]></artwork>
        </figure>
        <t>This figure illustrates the basic grant request and issuance exchange between an EP and Pantheon.</t>
      </section>

      <section anchor="flow-stitching">
        <name>Flow Stitching by the RN</name>
        <t>
          The RN establishes a stitched tunnel only if both peers present acceptable identities and authorisations.
          The RN is assumed to be able to drop, delay, or reorder packets, but is not expected to learn end-to-end
          protected application plaintext.
        </t>
        <figure anchor="fig-flow-stitching">
          <name>Join and stitch establishment</name>
          <artwork><![CDATA[
EP A                RN                 EP B
 |-- Join Request -->|                  |
 |<-- Stitch OK -----|                  |
 |                   |<-- Join Request--|
 |                   |-- Stitch OK ---->|
 |
 |<====== end-to-end encrypted ZPIT (SessionID-bound) ==========>|
]]></artwork>
        </figure>
        <t>This figure shows the RN joining two authorised sessions into a stitched tunnel without learning plaintext.</t>
      </section>

      <section anchor="multi-rn-stitching">
        <name>Multi-RN Stitching for High-Assurance Tenants</name>
        <t>
          UZPIF can be extended to multi-hop stitching, for example where a tenant requires multiple independently
          operated RNs and attestation chains.
          End-to-end protection is expected to remain between endpoints.
        </t>
        <figure anchor="fig-multi-rn">
          <name>Multi-hop stitching with end-to-end authenticated encryption</name>
          <artwork><![CDATA[
EP A -> RN1 -> RN2 -> EP B

EP A <======== end-to-end AEAD protected traffic ========> EP B
]]></artwork>
        </figure>
        <t>This figure depicts a multi-hop RN chain while end-to-end AEAD protection remains between endpoints.</t>
      </section>

    </section>

    <section anchor="pantheon-governance">
      <name>Pantheon: Identity and Governance Model</name>
      <t>
        Pantheon is described here as a global identity, attestation, and policy plane.
        This section sketches the model at a conceptual level; future revisions may refine data structures and
        operational assumptions.
      </t>

      <section anchor="identity-model">
        <name>Identity Model</name>
        <t>Pantheon issues (or authorises issuance of):</t>
        <ul>
          <li><t>long-term signing keys (forming CIDs);</t></li>
          <li><t>ephemeral session keys (forming EIDs); and</t></li>
          <li><t>delegated sub-identities for services or microprocesses.</t></li>
        </ul>
        <t>
          This identity approach is conceptually aligned with HIP's separation of endpoint identities from locators
          <xref target="RFC7401"/>, but elevated to a policy plane.
        </t>
      </section>

      <section anchor="certificate-format">
        <name>Certificate Format</name>
        <t>Pantheon Certificates (PCerts) may include the following conceptual elements:</t>
        <ul>
          <li><t>a CID and public signing key (and optionally a post-quantum key encapsulation key);</t></li>
          <li><t>purpose tags (e.g., service, role, tenant);</t></li>
          <li><t>validity bounds (time or epoch); and</t></li>
          <li><t>optional attestation claims (e.g., hardware trust or enclave measurement).</t></li>
        </ul>
      </section>

      <section anchor="grant-structure">
        <name>Grant Structure</name>
        <t>A Grant is described as a signed assertion binding:</t>
        <ul>
          <li><t>the CID/EID of the requester;</t></li>
          <li><t>the requested peer identity;</t></li>
          <li><t>purpose and action;</t></li>
          <li><t>a time window and replay nonce; and</t></li>
          <li><t>an authorised quality-of-service (QoS) class.</t></li>
        </ul>
      </section>

      <section anchor="attestation-model">
        <name>Attestation Model</name>
        <t>RNs and endpoints may publish attestations such as:</t>
        <ul>
          <li><t>hardware and software measurements;</t></li>
          <li><t>configuration hashes; and</t></li>
          <li><t>policy compliance data.</t></li>
        </ul>
        <t>
          Pantheon is expected to store these in transparency logs, mirroring transparency and verifiability goals in
          broader zero-trust guidance.
          <xref target="NIST-SP800-207"/>
        </t>
      </section>

      <section anchor="caching-rules">
        <name>Caching Rules</name>
        <t>Endpoints may cache:</t>
        <ul>
          <li><t>PCerts for 24 hours;</t></li>
          <li><t>Grants for the shorter of their validity window or session lifetime; and</t></li>
          <li><t>attestation proofs for the duration of RN handshake paths.</t></li>
        </ul>
      </section>

    </section>

    <section anchor="benefits-tradeoffs">
      <name>Benefits and Trade-offs</name>
      <t>
        UZPIF and UZP (<xref target="UZP"/>) intentionally reuse established transport and cryptographic primitives, but change where and how
        they are bound to identity, policy, and reachability.
        In particular, QUIC <xref target="RFC9000"/> and TLS 1.3 <xref target="RFC8446"/> demonstrate encrypted
        transports with modern handshake properties, while UZPIF shifts the reachability model away from listening
        endpoints.
      </t>

      <table anchor="tbl-transport-comparison">
        <name>Comparison of transport architectures</name>
        <thead>
          <tr>
            <th>Dimension</th>
            <th>UZPIF/UZP (<xref target="UZP"/>)</th>
            <th>Traditional TCP/TLS</th>
            <th>QUIC/TLS</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td>Exposure</td>
            <td>No open ports (endpoints are not publicly listening)</td>
            <td>Open ports and/or proxies</td>
            <td>Open ports at network edge</td>
          </tr>
          <tr>
            <td>Identity</td>
            <td>Mandatory cryptographic identity</td>
            <td>Typically TLS-level identity only</td>
            <td>TLS-level identity</td>
          </tr>
          <tr>
            <td>Reliability</td>
            <td>Block-level (design goal)</td>
            <td>Segment-level</td>
            <td>Stream-level</td>
          </tr>
          <tr>
            <td>RN trust</td>
            <td>Drop/delay only (no end-to-end plaintext visibility expected)</td>
            <td>N/A</td>
            <td>N/A</td>
          </tr>
          <tr>
            <td>Latency control</td>
            <td>Deterministic pacing (design goal)</td>
            <td>Congestion control variants (e.g., Reno/CUBIC)</td>
            <td>Congestion control variants (e.g., BBR/CUBIC)</td>
          </tr>
          <tr>
            <td>Legacy applications</td>
            <td>Supported via HIL (intended)</td>
            <td>Native</td>
            <td>Often requires gateways or adaptation</td>
          </tr>
          <tr>
            <td>Post-quantum readiness</td>
            <td>Designed for cryptographic agility</td>
            <td>Inconsistent deployment</td>
            <td>Emerging</td>
          </tr>
        </tbody>
      </table>
    </section>

    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>
        This section sketches attacker classes and example controls.
        It is not a complete security analysis and will evolve with implementation experience.
      </t>

      <t><strong>Attacker classes</strong> include:</t>
      <ul>
        <li><t>Internet-wide scanners;</t></li>
        <li><t>botnets seeking command-and-control beacons;</t></li>
        <li><t>malicious RNs (assumed capable of drop/delay/reorder);</t></li>
        <li><t>insiders with credentials; and</t></li>
        <li><t>traffic analysts performing correlation.</t></li>
      </ul>

      <t>
        Existing rendezvous and overlay systems (e.g., Tor <xref target="Tor"/>) and NAT traversal mechanisms based on
        STUN <xref target="RFC5389"/> and TURN <xref target="RFC5766"/> demonstrate the power of indirection, but they
        still assume exposed or discoverable listeners somewhere in the path.
        UZPIF's design intent is to remove those listeners from the endpoint security model.
      </t>

      <t>Example controls discussed for UZPIF include:</t>
      <ul>
        <li><t>end-to-end authenticated encryption (AEAD);</t></li>
        <li><t>RN and endpoint attestation;</t></li>
        <li><t>puzzles and identity-bound rate limits;</t></li>
        <li><t>multi-RN stitching for higher assurance; and</t></li>
        <li><t>post-quantum readiness and cryptographic agility (see <xref target="NIST-PQC"/>).</t></li>
      </ul>
    </section>

    <section anchor="economics">
      <name>Economics</name>
      <ul>
        <li><t>Capital expenditure reduction: reduced reliance on perimeter appliances and complex DMZ designs.</t></li>
        <li><t>Operational expenditure reduction: fewer ACL/NAT rule changes and less inbound exposure management.</t></li>
        <li><t>Risk reduction: reduced externally visible attack surface.</t></li>
        <li><t>Potential service models: governance and RN validation as managed components.</t></li>
      </ul>
    </section>

    <section anchor="migration-plan">
      <name>Migration Plan for Organisations</name>
      <t>
        UZPIF is intended for incremental deployment alongside existing TCP/TLS and QUIC-based stacks
        <xref target="RFC8446"/> and <xref target="RFC9000"/>.
      </t>
      <ol>
        <li><t><strong>Deploy an RN:</strong> Introduce an outbound-only rendezvous node.</t></li>
        <li><t><strong>Deploy the HIL:</strong> Install the Host Identity Layer on endpoints.</t></li>
        <li><t><strong>Dual-stack operation:</strong> Run UZP (<xref target="UZP"/>) alongside existing TCP/TLS.</t></li>
        <li><t><strong>Cutover:</strong> Migrate services gradually to zero-port operation.</t></li>
      </ol>
    </section>

    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>
        UZPIF's central security claim is that avoiding publicly reachable listeners at endpoints reduces exposure to
        scanning and unsolicited ingress.
        However, the framework introduces reliance on identity, authorisation, and policy evaluation components
        (e.g., Pantheon and RNs) whose compromise or misconfiguration could impact availability and authorisation
        correctness.
      </t>
      <t>
        The threat model in <xref target="threat-model"/> discusses attacker classes and candidate controls.
        Future revisions of this document (and the companion UZP (<xref target="UZP"/>) and TLS-UZP (<xref target="TLS-DPA"/>) documents) are expected to provide a more
        systematic analysis, including key management, revocation, attestation trust, and traffic analysis resistance.
      </t>
    </section>

    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
      <t>UZPIF is an architectural framework and does not define protocol parameters requiring registries.</t>
    </section>

  </middle>

  <back>

    <references>
      <name>Normative References</name>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.2119.xml"/>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8174.xml"/>
    </references>

    <references>
      <name>Informative References</name>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5389.xml"/>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5766.xml"/>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7401.xml"/>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8446.xml"/>
      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9000.xml"/>

      <reference anchor="UZP">
        <front>
          <title>UZP: Universal Zero-Port Transport Protocol</title>
          <author fullname="Benjamin Anthony Fisher"/>
          <date/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dpa-uzp-transport"/>
      </reference>

      <reference anchor="TLS-DPA">
        <front>
          <title>TLS-DPA: An Identity-Bound Security Protocol for Traditional, Overlay, and Zero-Port Transports</title>
          <author fullname="Benjamin Anthony Fisher"/>
          <date/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-dpa-tls-dpa"/>
      </reference>

      <reference anchor="NIST-PQC" target="https://csrc.nist.gov/Projects/post-quantum-cryptography">
        <front>
          <title>NIST Post-Quantum Cryptography Standardization Project</title>
          <author>
            <organization>National Institute of Standards and Technology</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>

      <reference anchor="NIST-SP800-207" target="https://doi.org/10.6028/NIST.SP.800-207">
        <front>
          <title>Zero Trust Architecture</title>
          <author fullname="Scott Rose"/>
          <author fullname="Oliver Borchert"/>
          <author fullname="Stu Mitchell"/>
          <author fullname="Sean Connelly"/>
          <date year="2019"/>
        </front>
        <seriesInfo name="NIST SP" value="800-207"/>
      </reference>

      <reference anchor="Tor" target="https://www.usenix.org/legacy/publications/library/proceedings/sec04/tech/full_papers/dingledine/dingledine.pdf">
        <front>
          <title>Tor: The Second-Generation Onion Router</title>
          <author fullname="Roger Dingledine"/>
          <author fullname="Nick Mathewson"/>
          <author fullname="Paul Syverson"/>
          <date year="2004"/>
        </front>
      </reference>

    </references>

    <section anchor="appendix-a">
      <name>Appendix A: Technical Specification (Excerpt)</name>

      <section anchor="appendix-a-abstract">
        <name>Abstract</name>
        <t>
          UZP (<xref target="UZP"/>) defines an identity-addressed, encrypted-by-default transport protocol for zero-port networking.
          Endpoints do not listen on IP/port tuples; both create outbound sessions to an RN.
        </t>
      </section>

      <section anchor="appendix-a-terminology">
        <name>Terminology</name>
        <ul>
          <li><t>EP - endpoint.</t></li>
          <li><t>RN - rendezvous node.</t></li>
          <li><t>Pantheon - identity/policy authority.</t></li>
          <li><t>HIL - Host Identity Layer.</t></li>
          <li><t>CID - canonical identity.</t></li>
          <li><t>EID - ephemeral identity.</t></li>
          <li><t>ZPIT - stitched tunnel.</t></li>
          <li><t>Block - reliability unit.</t></li>
          <li><t>Frame - payload unit.</t></li>
        </ul>
      </section>

      <section anchor="appendix-a-arch-overview">
        <name>Architectural Overview</name>
        <ol>
          <li><t>EP opens a control channel to an RN.</t></li>
          <li><t>EP authenticates with Pantheon.</t></li>
          <li><t>EP requests a Join for a peer CID.</t></li>
          <li><t>RN validates authorisation and stitches a ZPIT.</t></li>
          <li><t>Data flows with deterministic pacing (transport design goal).</t></li>
        </ol>
      </section>

    </section>

  </back>

</rfc>
