<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.11 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-panrg-path-properties-07" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.10.0 -->
  <front>
    <title abbrev="Path Properties">A Vocabulary of Path Properties</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-panrg-path-properties-07"/>
    <author initials="R." surname="Enghardt" fullname="Reese Enghardt">
      <organization>Netflix</organization>
      <address>
        <email>ietf@tenghardt.net</email>
      </address>
    </author>
    <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
      <organization>ETH Zürich</organization>
      <address>
        <email>cyrill.kraehenbuehl@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2023" month="January" day="24"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document is a product of the Path Aware Networking Research Group (PANRG).
Path properties express information about paths across a network and the services provided via such paths.
In a path-aware network, path properties may be fully or partially available to entities such as endpoints.
This document defines and categorizes path properties.
Furthermore, the document specifies several path properties which might be useful to endpoints or other entities,
e.g., for selecting between paths or for invoking some of the provided services.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
      "Path-Aware Networking Research Group" mailing list (PANRG),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/panrg/"/>.
    Subscription information is at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/panrg/path-properties/"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The current Internet architecture does not explicitly support endpoint discovery of forwarding paths through the network as well as the discovery of properties and services associated with these paths.
Path-aware networking, as defined in Section 1.1 of <xref target="RFC9217" format="default"/>, describes
"endpoint discovery of the properties of paths they use for communication across an internetwork, and endpoint reaction to these properties that affects routing and/or data transfer".
This document provides a generic definition of path properties, addressing the first of the questions in path-aware networking <xref target="RFC9217" format="default"/>.</t>
      <t>As terms related to paths have been used with different meanings in different areas of networking, first, this document provides a common terminology to define paths, path elements, and flows. Based on these terms, the document defines path properties.
Then, this document provides some examples of use cases for path properties.
Finally, the document lists several path properties that may be useful for the mentioned use cases.</t>
      <t>Note that this document does not assume that any of the listed path properties are actually available to any entity. The question of how entities can discover and distribute path properties in a trustworthy way is out of scope for this document.</t>
      <t>This document represents the consensus of the Path Aware Networking Research Group (PANRG).</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <dl>
        <dt>
Entity:  </dt>
        <dd>
          <t>A physical or virtual device or function, or a collection of devices or functions, which plays a role related to path-aware networking for particular paths and flows.
An entity can be on-path or off-path: On the path, an entity may participate in forwarding the flow, i.e., what may be called data plane functionality.
On or off the path, an entity may influence aspects of how the flow is forwarded, i.e., what may be called control plane functionality, such as Path Selection or Service Invocation.
An entity influencing forwarding aspects is usually aware of path properties, e.g., by observing or measuring them or by learning them from another entity.</t>
        </dd>
        <dt>
Node:  </dt>
        <dd>
          <t>An on-path entity which processes packets, e.g., sends, receives, forwards, or modifies them. A node may be physical or virtual, e.g., a physical device, a service function provided as a virtual element, or even a single queue within a switch. A node may also be an entity which consists of a collection of devices or functions, e.g., an entire Autonomous System (AS).</t>
        </dd>
        <dt>
Link:  </dt>
        <dd>
          <t>A medium or communication facility that connects two or more nodes with each other. A link enables a node to send packets to other nodes.
Links can be physical, e.g., a Wi-Fi network which connects an Access Point to stations, or virtual, e.g., a virtual switch which connects two virtual machines hosted on the same physical machine. A link is unidirectional. As such, bidirectional communication can be modeled as two links between the same nodes in opposite directions.</t>
        </dd>
        <dt>
Path element:  </dt>
        <dd>
          <t>Either a node or a link. For example, a path element can be an Abstract Network Element (ANE) as defined in <xref target="I-D.ietf-alto-path-vector" format="default"/>.</t>
        </dd>
        <dt>
Path:  </dt>
        <dd>
          <t>A sequence of adjacent path elements over which a packet can be transmitted, starting and ending with a node.
</t>
          <t>Paths are unidirectional and time-dependent, i.e., the sequence of path elements over which packets are sent from one node to another may change.</t>
          <t>The representation of a path and its properties may depend on the entity considering the path.
On the one hand, the representation may differ due to entities having partial visibility of path elements comprising a path or their visibility changing over time.
On the other hand, the representation may differ due to treating path elements at different levels of abstraction.
For example, a path may be given as a sequence of physical nodes and the links connecting these nodes, a sequence of logical nodes such as a sequence of ASes or an Explicit Route Object (ERO), or only consist of a specific source and destination which is known to be reachable from that source.</t>
          <t>A multicast or broadcast setting, where a packet is sent by one node and received by multiple nodes, is described by multiple paths over which the packet is sent, one path for each combination of sending and receiving node; these paths do not have to be disjoint.</t>
        </dd>
        <dt>
Endpoint:  </dt>
        <dd>
          <t>The endpoints of a path are the first and the last node on the path. For example, an endpoint can be a host as defined in <xref target="RFC1122" format="default"/>, which can be a client (e.g., a node running a web browser) or a server (e.g., a node running a web server).</t>
        </dd>
        <dt>
Reverse Path:  </dt>
        <dd>
          <t>The path that is used by a remote node in the context of bidirectional communication.</t>
        </dd>
        <dt>
Subpath:  </dt>
        <dd>
          <t>Given a path, a subpath is a sequence of adjacent path elements of this path.</t>
        </dd>
        <dt>
Flow:  </dt>
        <dd>
          <t>One or multiple packets to which the traits of a path or set of subpaths may be applied in a functional sense. For example, a flow can consist of all packets sent within a TCP session with the same five-tuple between two hosts, or it can consist of all packets sent on the same physical link.</t>
        </dd>
        <dt>
Property:  </dt>
        <dd>
          <t>A trait of one or a sequence of path elements, or a trait of a flow with respect to one or a sequence of path elements. An example of a link property is the maximum data rate that can be sent over the link. An example of a node property is the administrative domain that the node belongs to. An example of a property of a flow with respect to a subpath is the aggregated one-way delay of the flow being sent from one node to another node over this subpath.
A property is thus described by a tuple containing the path element(s), the flow or an empty set if no packets are relevant for the property, the name of the property (e.g., maximum data rate), and the value of the property (e.g., 1Gbps).</t>
        </dd>
        <dt>
Aggregated property:  </dt>
        <dd>
          <t>A collection of multiple values of a property into a single value, according to a function. A property can be aggregated over multiple path elements (i.e., a subpath), e.g., the MTU of a path as the minimum MTU of all links on the path, over multiple packets (i.e., a flow), e.g., the median one-way latency of all packets between two nodes, or over both, e.g., the mean of the queueing delays of a flow on all nodes along a path.
The aggregation function can be numerical, e.g., median, sum, minimum, it can be logical, e.g., "true if all are true", "true if at least 50% of values are true", or an arbitrary function which maps multiple input values to an output value.</t>
        </dd>
        <dt>
Observed property:  </dt>
        <dd>
          <t>A property that is observed for a specific path element, subpath, or path, e.g., using measurements. For example, the one-way delay of a specific packet transmitted from one node to another node can be measured.</t>
        </dd>
        <dt>
Assessed property:  </dt>
        <dd>
          <t>An approximate calculation or assessment of the value of a property. An assessed property includes the reliability of the calculation or assessment. The notion of reliability depends on the property.
For example, a path property based on an approximate calculation may describe the expected median one-way latency of packets sent on a path within the next second, including the confidence level and interval. A non-numerical assessment may instead include the likelihood that the property holds.</t>
        </dd>
        <dt>
Target property:  </dt>
        <dd>
          <t>An objective that is set for a property over a path element, subpath, or path.
Note that a target property can be set for observed properties, such as one-way delay, but also for properties that cannot be observed by the entity setting the target, such as inclusion of certain nodes on a path.</t>
        </dd>
      </dl>
      <section anchor="terminology-usage-for-specific-technologies" numbered="true" toc="default">
        <name>Terminology usage for specific technologies</name>
        <t>The terminology defined in this document is intended to be general and applicable to existing and future path-aware technologies.
Using this terminology, a path-aware technology can define and consider specific path elements and path properties on a specific level of abstraction.
For instance, a technology may define path elements as IP routers, e.g., in source routing (<xref target="RFC1940" format="default"/>). Alternatively, it may consider path elements on a different layer of the Internet Architecture (<xref target="RFC1122" format="default"/>) or as a collection of entities not tied to a specific layer, such as an AS or an ERO.
Even within a single path-aware technology, specific definitions might differ depending on the context in which they are used.
For example, the endpoints might be the communicating hosts in the context of the transport layer, ASes that contain the hosts in the context of routing, or specific applications in the context of the application layer.</t>
      </section>
    </section>
    <section anchor="use-cases" numbered="true" toc="default">
      <name>Use Cases for Path Properties</name>
      <t>When a path-aware network exposes path properties to endpoints or other entities,
these entities may use this information to achieve different goals.
This section lists several use cases for path properties.</t>
      <t>Note that this is not an exhaustive list, as with every new technology and protocol, novel use cases may emerge, and new path properties may become relevant.
Moreover, for any particular technology, entities may have visibility of and control over different path elements and path properties, and consider them on different levels of abstraction.
Therefore, a new technology may implement an existing use case related to different path elements or on a different level of abstraction.</t>
      <section anchor="path-selection" numbered="true" toc="default">
        <name>Path Selection</name>
        <t>Nodes may be able to send flows via one (or a subset) out of multiple possible paths, and an entity may be able to influence the decision which path(s) to use.
Path Selection may be feasible if there are several paths to the same destination (e.g., in case of a mobile device with two wireless interfaces, both providing a path), or if there are several destinations, and thus several paths, providing the same service (e.g., Application-Layer Traffic Optimization (ALTO) <xref target="RFC5693" format="default"/>, an application layer peer-to-peer protocol allowing endpoints a better-than-random peer selection).
Entities can express their intent to achieve a specific goal by specifying target properties for their paths, e.g., related to performance or security.
Then, paths can be selected which best meet the target properties, e.g., the entity can select these paths from all available paths or express the target properties to the network and rely on the network to select appropriate paths.</t>
        <t>Target properties relating to network performance typically refer to observed properties, such as One-Way Delay, One-Way Packet Loss, and Link Capacity.
Entities then select paths based on their target property and the assessed property of the available paths that best match the application requirements.
For such performance-related target properties, the observed property is similar to a service level indicator (SLI) and the assessed property is similar to a service level objective (SLO) for IETF network slices <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.
As an example path selection strategy, for sending a small delay-sensitive query, an entity may select a path with a short One-Way Delay, while for retrieving a large file, it may select a path with high Link Capacities on all links.</t>
        <t>It is also possible for an entity to set target properties which it cannot (directly) observe, similar to service level expectations (SLEs) for IETF network slices <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.
For example, this can apply to security-related target properties and path selection, such as allowing or disallowing sending flows over paths that involve specific networks or nodes to enforce traffic policies or mandating that all enterprise traffic goes through a specific firewall.</t>
        <t>Care needs to be taken when selecting paths based on observed path properties, as path properties that were previously measured may not be helpful in predicting current or future path properties and such path selection may lead to unintended feedback loops. Also, there may be trade-offs between path properties (e.g., One-Way Delay and Link Capacity), and entities may influence these trade-offs with their choices.
Finally, path selection may impact fairness.
For example, if multiple entities concurrently attempt to meet their target properties using the same network resources, one entity's choices may influence the conditions on the path as experienced by flows of another entity.</t>
        <t>As a baseline, a path selection algorithm should aim to not perform worse than the default case most of the time.</t>
        <t>Path selection can be done either by the communicating node(s) or by other entities within the network:
A network (e.g., an AS) can adjust its path selection for internal or external routing based on path properties.
In BGP, the Multi Exit Discriminator (MED) attribute is used in the decision-making process to select which path to choose among those having the same AS PATH length and origin <xref target="RFC4271" format="default"/>; in a path-aware network, instead of using this single MED value, other properties such as Link Capacity or Link Usage could additionally be used to improve load balancing or performance <xref target="I-D.ietf-idr-performance-routing" format="default"/>.</t>
      </section>
      <section anchor="protocol-selection" numbered="true" toc="default">
        <name>Protocol Selection</name>
        <t>Before sending data over a specific path, an entity may select an appropriate protocol or configure protocol parameters depending on path properties.
For example, an endpoint may cache state on whether a path allows the use of QUIC <xref target="RFC9000" format="default"/> and if so, first attempt to connect using QUIC before falling back to another protocol when connecting over this path again.
A video streaming application may choose an (initial) video quality based on the achievable data rate or the monetary cost of sending data (e.g., volume-base or flat-rate cost model).</t>
      </section>
      <section anchor="service-invocation" numbered="true" toc="default">
        <name>Service Invocation</name>
        <t>In addition to path or protocol selection, an entity may choose to invoke additional functions in the context of Service Function Chaining <xref target="RFC7665" format="default"/>, which may influence what nodes are on the path.
For example, a 0-RTT Transport Converter <xref target="RFC8803" format="default"/> will be involved in a path only when invoked by an endpoint; such invocation will lead to the use of MPTCP <xref target="RFC8684" format="default"/> or TCPinc <xref target="RFC8547" format="default"/> <xref target="RFC8548" format="default"/> capabilities while such use is not supported via the default forwarding path.
Another example is a connection which is composed of multiple streams where each stream has specific service requirements. An endpoint may decide to invoke a given service function (e.g., transcoding) only for some streams while others are not processed by that service function.</t>
      </section>
    </section>
    <section anchor="examples-of-path-properties" numbered="true" toc="default">
      <name>Examples of Path Properties</name>
      <t>This Section gives some examples of path properties which may be useful, e.g., for the use cases described in <xref target="use-cases" format="default"/>.</t>
      <t>Within the context of any particular technology, available path properties may differ
as entities have insight into and are able to influence different path elements and path properties.
For example, an endpoint may have some visibility into path elements that are on a low level of abstraction and close, e.g., individual nodes within the first few hops, or it may have visibility into path elements that are far away and/or on a higher level of abstraction, e.g., the list of ASes traversed.
This visibility may depend on factors such as the physical or network distance or the existence of trust or contractual relationships between the endpoint and the path element(s).
A path property can be defined relative to individual path elements, a sequence of path elements, or "end-to-end", i.e., relative to a path that comprises of two endpoints and a single virtual link connecting them.</t>
      <t>Path properties may be relatively dynamic, e.g., the one-way delay of a packet sent over a specific path, or non-dynamic, e.g., the MTU of an Ethernet link which only changes infrequently.
Usefulness over time differs depending on how dynamic a property is:
The merit of a momentarily observed dynamic path propety may diminish greatly as time goes on, e.g.,
it is possible for the observed values of One-Way Delay to change on timescales which are shorter than the One-Way Delay between the measurement point and an entity making a decision such as Path Selection, which may cause the measurement to be outdated when it reaches the decision-making entity. Therefore, consumers of dynamic path properties need to apply caution when using them, e.g., by aggregating them appropriately or dampening their changes to avoiding oscillation.
In contrast, the observed value of a less dynamic path property might stay relevant for a longer period of time, e.g. a NAT typically stays on a specific path during the lifetime of a connection involving packets sent over this path.</t>
      <dl>
        <dt>
Access Technology:  </dt>
        <dd>
          <t>The physical or link layer technology used for transmitting or receiving a flow on one or multiple path elements. If known, the Access Technology may be given as an abstract link type, e.g., as Wi-Fi, Wired Ethernet, or Cellular. It may also be given as a specific technology used on a link, e.g., 2G, 3G, 4G, or 5G cellular, or 802.11a, b, g, n, or ac Wi-Fi. Other path elements relevant to the access technology may include nodes related to processing packets on the physical or link layer, such as elements of a cellular backbone network. Note that there is no common registry of possible values for this property.</t>
        </dd>
        <dt>
Monetary Cost:  </dt>
        <dd>
          <t>The price to be paid to transmit or receive a specific flow across a network to which one or multiple path elements belong.</t>
        </dd>
        <dt>
Service function:  </dt>
        <dd>
          <t>A service function that a path element applies to a flow, see <xref target="RFC7665" format="default"/>. Examples of abstract service functions include firewalls, Network Address Translation (NAT), and TCP optimizers. Some stateful service functions, such as NAT, need to observe the same flow in both directions, e.g., by being an element of both the path and the reverse path.</t>
        </dd>
        <dt>
Transparency:  </dt>
        <dd>
          <t>When a node performs an action A on a flow F, the node is transparent to F with respect to some (meta-)information M if the node performs A independently of M.
M can for example be the existence of a protocol (header) in a packet or the content of a protocol header, payload, or both.
For example, A can be blocking packets or reading and modifying (other protocol) headers or payloads.
Transparency can be modeled using a function f, which takes as input F and M and outputs the action taken by the node.
If a taint analysis shows that the output of f is not tainted (impacted) by M or if the output of f is constant for arbitrary values of M, then the node is considered to be transparent.
An IP router could be transparent to transport protocol headers such as TCP/UDP but not transparent to IP headers since its forwarding behavior depends on the IP headers.
A firewall that only allows outgoing TCP connections by blocking all incoming TCP SYN packets regardless of their IP address is transparent to IP but not to TCP headers.
Finally, a NAT that actively modifies IP and TCP/UDP headers based on their content is not transparent to either IP or TCP/UDP headers.
Note that according to this definition, a node that modifies packets in accordance with the endpoints, such as a transparent HTTP proxy, as defined in <xref target="RFC2616" format="default"/>, and a node listening and reacting to implicit or explicit signals, see <xref target="RFC8558" format="default"/>, are not considered transparent.</t>
        </dd>
        <dt>
Administrative Domain:  </dt>
        <dd>
          <t>The identity of an individual or an organization that owns a path element (or several path elements).
Examples of administrative domains are an IGP area, an AS, or a service provider network.</t>
        </dd>
        <dt>
Routing Domain Identifier:  </dt>
        <dd>
          <t>An identifier indicating the routing domain of a path element.
Path elements in the same routing domain are in the same administrative domain and use a common routing protocol to communicate with each other.
An example of a routing domain identifier is the globally unique autonomous system number (ASN) as defined in <xref target="RFC1930" format="default"/>.</t>
        </dd>
        <dt>
Disjointness:  </dt>
        <dd>
          <t>For a set of two paths or subpaths, the number of shared path elements can be a measure of intersection (e.g., Jaccard coefficient, which is the number of shared elements divided by the total number of elements). Conversely, the number of non-shared path elements can be a measure of disjointness (e.g., 1 - Jaccard coefficient). A multipath protocol might use disjointness as a metric to reduce the number of single points of failure.</t>
        </dd>
        <dt>
Symmetric Path:  </dt>
        <dd>
          <t>Two paths are symmetric if the path and its reverse path consist of the same path elements on the same level of abstraction, but in reverse order.
For example, a path which consists of layer 3 switches and links between them and a reverse path with the same path elements but in reverse order are considered "routing" symmetric, as the same path elements on the same level of abstraction (IP forwarding) are traversed in the opposite direction.</t>
        </dd>
        <dt>
Path MTU:  </dt>
        <dd>
          <t>The maximum size, in octets, of an IP packet that can be transmitted without fragmentation.</t>
        </dd>
        <dt>
Transport Protocols available:  </dt>
        <dd>
          <t>Whether a specific transport protocol can be used to establish a connection over a path or subpath, e.g., whether the path is QUIC-capable or MPTCP-capable, based on cached knowledge.</t>
        </dd>
        <dt>
Protocol Features available:  </dt>
        <dd>
          <t>Whether a specific protocol feature is available over a path or subpath, e.g., Explicit Congestion Notification (ECN), or TCP Fast Open.</t>
        </dd>
      </dl>
      <t>Some path properties express the performance of the transmission of a packet or flow over a link or subpath.
Such transmission performance properties can be observed or assessed, e.g., by endpoints or by path elements on the path, or they may be available as cost metrics, see <xref target="I-D.ietf-alto-performance-metrics" format="default"/>.
Transmission performance properties may be made available in an aggregated form, such as averages or minimums.
Properties related to a path element which constitutes a single layer 2 domain are abstracted from the used physical and link layer technology, similar to <xref target="RFC8175" format="default"/>.</t>
      <dl>
        <dt>
Link Capacity:  </dt>
        <dd>
          <t>The link capacity is the maximum data rate at which data that was sent over a link can correctly be received at the node adjacent to the link.
This property is analogous to the link capacity defined in <xref target="RFC5136" format="default"/> and <xref target="RFC9097" format="default"/> but not restricted to IP-layer traffic.</t>
        </dd>
        <dt>
Link Usage:  </dt>
        <dd>
          <t>The link usage is the actual data rate at which data that was sent over a link is correctly received at the node adjacent to the link.
This property is analogous to the link usage defined in <xref target="RFC5136" format="default"/> and <xref target="RFC9097" format="default"/> but not restricted to IP-layer traffic.</t>
        </dd>
        <dt>
One-Way Delay:  </dt>
        <dd>
          <t>The one-way delay is the delay between a node sending a packet and another node on the same path receiving the packet.
This property is analogous to the one-way delay defined in <xref target="RFC7679" format="default"/> but not restricted to IP-layer traffic.</t>
        </dd>
        <dt>
One-Way Delay Variation:  </dt>
        <dd>
          <t>The variation of the one-way delays within a flow.
This property is similar to the one-way delay variation defined in <xref target="RFC3393" format="default"/> but not restricted to IP-layer traffic and defined for packets on the same flow instead of packets sent between a source and destination IP address.</t>
        </dd>
        <dt>
One-Way Packet Loss:  </dt>
        <dd>
          <t>Packets sent by a node but not received by another node on the same path after a certain time interval are considered lost.
This property is analogous to the one-way loss defined in <xref target="RFC7680" format="default"/> but not restricted to IP-layer traffic.
Metrics such as loss patterns <xref target="RFC3357" format="default"/> and loss episodes <xref target="RFC6534" format="default"/> can be expressed as aggregated properties.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>If entities are basing policy or path selection decisions on path properties, they need to rely on the accuracy of path properties that other devices communicate to them.
In order to be able to trust such path properties, entities may need to establish a trust relationship or be able to verify the authenticity, integrity, and correctness of path properties received from another entity.</t>
      <t>Entities that reveal their target path properties to the network can negatively impact their own privacy, e.g., if the target property leaks personal information about a user, such as their identity or which (type of) application is used.
Such information could then allow network operators to block or re-prioritize traffic for certain users and/or application.
Conversely, if privacy enhancing technologies, e.g., MASQUE proxies <xref target="RFC9298" format="default"/>, are used on a path, the path may only be partially visible to any single entity.
This may diminish the usefulness of path-aware technologies over this path.
Security related properties such as confidentiality and integrity protection of payloads are difficult to characterize since they are only meaningful with respect to a threat model which depends on the use case, application, environment, and other factors.
Likewise, properties for trust relations between entities cannot be meaningfully defined without a concrete threat model, and defining a threat model is out of scope for this draft.
Properties related to confidentiality, integrity, and trust are orthogonal to the path terminology and path properties defined in this document.
Such properties are tied to the communicating nodes and the protocols they use (e.g., client and server using HTTPS, or client and remote network node using VPN) while the path is typically oblivious to them.
Intuitively, the path describes what function the network applies to packets, while confidentiality, integrity, and trust describe what function the communicating parties apply to packets.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.ietf-idr-performance-routing">
        <front>
          <title>Performance-based BGP Routing Mechanism</title>
          <author fullname="Xiaohu Xu" initials="X." surname="Xu">
            <organization>Alibaba, Inc</organization>
          </author>
          <author fullname="Shraddha Hegde" initials="S." surname="Hegde">
            <organization>Juniper</organization>
          </author>
          <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
            <organization>Cisco</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>France Telecom</organization>
          </author>
          <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
            <organization>France Telecom</organization>
          </author>
          <date day="22" month="December" year="2020"/>
          <abstract>
            <t>   The current BGP specification doesn't use network performance metrics
   (e.g., network latency) in the route selection decision process.
   This document describes a performance-based BGP routing mechanism in
   which network latency metric is taken as one of the route selection
   criteria.  This routing mechanism is useful for those server
   providers with global reach to deliver low-latency network
   connectivity services to their customers.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-performance-routing-03"/>
      </reference>
      <reference anchor="I-D.ietf-alto-path-vector">
        <front>
          <title>An Extension for Application-Layer Traffic Optimization (ALTO): Path Vector</title>
          <author fullname="Kai Gao" initials="K." surname="Gao">
            <organization>Sichuan University</organization>
          </author>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung</organization>
          </author>
          <author fullname="Sabine Randriamasy" initials="S." surname="Randriamasy">
            <organization>Nokia Bell Labs</organization>
          </author>
          <author fullname="Y. Richard Yang" initials="Y. R." surname="Yang">
            <organization>Yale University</organization>
          </author>
          <author fullname="Jingxuan Zhang" initials="J." surname="Zhang">
            <organization>Tongji University</organization>
          </author>
          <date day="20" month="March" year="2022"/>
          <abstract>
            <t>This document is an extension to the base Application-Layer Traffic Optimization (ALTO) protocol.  It extends the ALTO cost map and ALTO property map services so that an application can decide to which endpoint(s) to connect based not only on numerical/ordinal cost values but also on fine-grained abstract information regarding the paths.  This is useful for applications whose performance is impacted by specific components of a network on the end-to-end paths, e.g., they may infer that several paths share common links and prevent traffic bottlenecks by avoiding such paths.  This extension introduces a new abstraction called the "Abstract Network Element" (ANE) to represent these components and encodes a network path as a vector of ANEs.  Thus, it provides a more complete but still abstract graph representation of the underlying network(s) for informed traffic optimization among endpoints.
            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-alto-path-vector-25"/>
      </reference>
      <reference anchor="I-D.ietf-alto-performance-metrics">
        <front>
          <title>ALTO Performance Cost Metrics</title>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Y. Richard Yang" initials="Y. R." surname="Yang">
            <organization>Yale University</organization>
          </author>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei</organization>
          </author>
          <author fullname="Sabine Randriamasy" initials="S." surname="Randriamasy">
            <organization>Nokia Bell Labs</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <date day="21" month="March" year="2022"/>
          <abstract>
            <t>   The cost metric is a basic concept in Application-Layer Traffic
   Optimization (ALTO), and different applications may use different
   types of cost metrics.  Since the ALTO base protocol (RFC 7285)
   defines only a single cost metric (namely, the generic "routingcost"
   metric), if an application wants to issue a cost map or an endpoint
   cost request in order to identify a resource provider that offers
   better performance metrics (e.g., lower delay or loss rate), the base
   protocol does not define the cost metric to be used.

   This document addresses this issue by extending the specification to
   provide a variety of network performance metrics, including network
   delay, delay variation (a.k.a, jitter), packet loss rate, hop count,
   and bandwidth.

   There are multiple sources (e.g., estimation based on measurements or
   service-level agreement) to derive a performance metric.  This
   document introduces an additional "cost-context" field to the ALTO
   "cost-type" field to convey the source of a performance metric.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-alto-performance-metrics-28"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ietf-network-slices">
        <front>
          <title>A Framework for IETF Network Slices</title>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Shunsuke Homma" initials="S." surname="Homma">
            <organization>NTT</organization>
          </author>
          <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Microsoft Inc.</organization>
          </author>
          <date day="21" month="January" year="2023"/>
          <abstract>
            <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-19"/>
      </reference>
      <reference anchor="RFC1930">
        <front>
          <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
          <author fullname="J. Hawkinson" initials="J." surname="Hawkinson">
            <organization/>
          </author>
          <author fullname="T. Bates" initials="T." surname="Bates">
            <organization/>
          </author>
          <date month="March" year="1996"/>
          <abstract>
            <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="6"/>
        <seriesInfo name="RFC" value="1930"/>
        <seriesInfo name="DOI" value="10.17487/RFC1930"/>
      </reference>
      <reference anchor="RFC2616">
        <front>
          <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
          <author fullname="R. Fielding" initials="R." surname="Fielding">
            <organization/>
          </author>
          <author fullname="J. Gettys" initials="J." surname="Gettys">
            <organization/>
          </author>
          <author fullname="J. Mogul" initials="J." surname="Mogul">
            <organization/>
          </author>
          <author fullname="H. Frystyk" initials="H." surname="Frystyk">
            <organization/>
          </author>
          <author fullname="L. Masinter" initials="L." surname="Masinter">
            <organization/>
          </author>
          <author fullname="P. Leach" initials="P." surname="Leach">
            <organization/>
          </author>
          <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
            <organization/>
          </author>
          <date month="June" year="1999"/>
          <abstract>
            <t>HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1", and is an update to RFC 2068.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2616"/>
        <seriesInfo name="DOI" value="10.17487/RFC2616"/>
      </reference>
      <reference anchor="RFC3357">
        <front>
          <title>One-way Loss Pattern Sample Metrics</title>
          <author fullname="R. Koodli" initials="R." surname="Koodli">
            <organization/>
          </author>
          <author fullname="R. Ravikanth" initials="R." surname="Ravikanth">
            <organization/>
          </author>
          <date month="August" year="2002"/>
        </front>
        <seriesInfo name="RFC" value="3357"/>
        <seriesInfo name="DOI" value="10.17487/RFC3357"/>
      </reference>
      <reference anchor="RFC3393">
        <front>
          <title>IP Packet Delay Variation Metric for IP Performance Metrics (IPPM)</title>
          <author fullname="C. Demichelis" initials="C." surname="Demichelis">
            <organization/>
          </author>
          <author fullname="P. Chimento" initials="P." surname="Chimento">
            <organization/>
          </author>
          <date month="November" year="2002"/>
        </front>
        <seriesInfo name="RFC" value="3393"/>
        <seriesInfo name="DOI" value="10.17487/RFC3393"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC5136">
        <front>
          <title>Defining Network Capacity</title>
          <author fullname="P. Chimento" initials="P." surname="Chimento">
            <organization/>
          </author>
          <author fullname="J. Ishac" initials="J." surname="Ishac">
            <organization/>
          </author>
          <date month="February" year="2008"/>
          <abstract>
            <t>Measuring capacity is a task that sounds simple, but in reality can be quite complex.  In addition, the lack of a unified nomenclature on this subject makes it increasingly difficult to properly build, test, and use techniques and tools built around these constructs.  This document provides definitions for the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling between a source and destination in an IP network.  By doing so, we hope to provide a common framework for the discussion and analysis of a diverse set of current and future estimation techniques.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5136"/>
        <seriesInfo name="DOI" value="10.17487/RFC5136"/>
      </reference>
      <reference anchor="RFC5693">
        <front>
          <title>Application-Layer Traffic Optimization (ALTO) Problem Statement</title>
          <author fullname="J. Seedorf" initials="J." surname="Seedorf">
            <organization/>
          </author>
          <author fullname="E. Burger" initials="E." surname="Burger">
            <organization/>
          </author>
          <date month="October" year="2009"/>
          <abstract>
            <t>Distributed applications -- such as file sharing, real-time communication, and live and on-demand media streaming -- prevalent on the Internet use a significant amount of network resources.  Such applications often transfer large amounts of data through connections established between nodes distributed across the Internet with little knowledge of the underlying network topology.  Some applications are so designed that they choose a random subset of peers from a larger set with which to exchange data.  Absent any topology information guiding such choices, or acting on suboptimal or local information obtained from measurements and statistics, these applications often make less than desirable choices.</t>
            <t>This document discusses issues related to an information-sharing service that enables applications to perform better-than-random peer selection.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5693"/>
        <seriesInfo name="DOI" value="10.17487/RFC5693"/>
      </reference>
      <reference anchor="RFC6534">
        <front>
          <title>Loss Episode Metrics for IP Performance Metrics (IPPM)</title>
          <author fullname="N. Duffield" initials="N." surname="Duffield">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." surname="Morton">
            <organization/>
          </author>
          <author fullname="J. Sommers" initials="J." surname="Sommers">
            <organization/>
          </author>
          <date month="May" year="2012"/>
          <abstract>
            <t>The IETF has developed a one-way packet loss metric that measures the loss rate on a Poisson and Periodic probe streams between two hosts. However, the impact of packet loss on applications is, in general, sensitive not just to the average loss rate but also to the way in which packet losses are distributed in loss episodes (i.e., maximal sets of consecutively lost probe packets).  This document defines one-way packet loss episode metrics, specifically, the frequency and average duration of loss episodes and a probing methodology under which the loss episode metrics are to be measured.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6534"/>
        <seriesInfo name="DOI" value="10.17487/RFC6534"/>
      </reference>
      <reference anchor="RFC7665">
        <front>
          <title>Service Function Chaining (SFC) Architecture</title>
          <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern">
            <organization/>
          </author>
          <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro">
            <organization/>
          </author>
          <date month="October" year="2015"/>
          <abstract>
            <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7665"/>
        <seriesInfo name="DOI" value="10.17487/RFC7665"/>
      </reference>
      <reference anchor="RFC7679">
        <front>
          <title>A One-Way Delay Metric for IP Performance Metrics (IPPM)</title>
          <author fullname="G. Almes" initials="G." surname="Almes">
            <organization/>
          </author>
          <author fullname="S. Kalidindi" initials="S." surname="Kalidindi">
            <organization/>
          </author>
          <author fullname="M. Zekauskas" initials="M." surname="Zekauskas">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
            <organization/>
          </author>
          <date month="January" year="2016"/>
          <abstract>
            <t>This memo defines a metric for one-way delay of packets across Internet paths.  It builds on notions introduced and discussed in the IP Performance Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be familiar with that document.  This memo makes RFC 2679 obsolete.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="81"/>
        <seriesInfo name="RFC" value="7679"/>
        <seriesInfo name="DOI" value="10.17487/RFC7679"/>
      </reference>
      <reference anchor="RFC7680">
        <front>
          <title>A One-Way Loss Metric for IP Performance Metrics (IPPM)</title>
          <author fullname="G. Almes" initials="G." surname="Almes">
            <organization/>
          </author>
          <author fullname="S. Kalidindi" initials="S." surname="Kalidindi">
            <organization/>
          </author>
          <author fullname="M. Zekauskas" initials="M." surname="Zekauskas">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
            <organization/>
          </author>
          <date month="January" year="2016"/>
          <abstract>
            <t>This memo defines a metric for one-way loss of packets across Internet paths.  It builds on notions introduced and discussed in the IP Performance Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be familiar with that document.  This memo makes RFC 2680 obsolete.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="82"/>
        <seriesInfo name="RFC" value="7680"/>
        <seriesInfo name="DOI" value="10.17487/RFC7680"/>
      </reference>
      <reference anchor="RFC8175">
        <front>
          <title>Dynamic Link Exchange Protocol (DLEP)</title>
          <author fullname="S. Ratliff" initials="S." surname="Ratliff">
            <organization/>
          </author>
          <author fullname="S. Jury" initials="S." surname="Jury">
            <organization/>
          </author>
          <author fullname="D. Satterwhite" initials="D." surname="Satterwhite">
            <organization/>
          </author>
          <author fullname="R. Taylor" initials="R." surname="Taylor">
            <organization/>
          </author>
          <author fullname="B. Berry" initials="B." surname="Berry">
            <organization/>
          </author>
          <date month="June" year="2017"/>
          <abstract>
            <t>When routing devices rely on modems to effect communications over wireless links, they need timely and accurate knowledge of the characteristics of the link (speed, state, etc.) in order to make routing decisions.  In mobile or other environments where these characteristics change frequently, manual configurations or the inference of state through routing or transport protocols does not allow the router to make the best decisions.  This document introduces a new protocol called the Dynamic Link Exchange Protocol (DLEP), which provides a bidirectional, event-driven communication channel between the router and the modem to facilitate communication of changing link characteristics.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8175"/>
        <seriesInfo name="DOI" value="10.17487/RFC8175"/>
      </reference>
      <reference anchor="RFC8547">
        <front>
          <title>TCP-ENO: Encryption Negotiation Option</title>
          <author fullname="A. Bittau" initials="A." surname="Bittau">
            <organization/>
          </author>
          <author fullname="D. Giffin" initials="D." surname="Giffin">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="D. Mazieres" initials="D." surname="Mazieres">
            <organization/>
          </author>
          <author fullname="E. Smith" initials="E." surname="Smith">
            <organization/>
          </author>
          <date month="May" year="2019"/>
          <abstract>
            <t>Despite growing adoption of TLS, a significant fraction of TCP traffic on the Internet remains unencrypted.  The persistence of unencrypted traffic can be attributed to at least two factors. First, some legacy protocols lack a signaling mechanism (such as a STARTTLS command) by which to convey support for encryption, thus making incremental deployment impossible.  Second, legacy applications themselves cannot always be upgraded and therefore require a way to implement encryption transparently entirely within the transport layer.  The TCP Encryption Negotiation Option (TCP-ENO) addresses both of these problems through a new TCP option kind providing out-of-band, fully backward-compatible negotiation of encryption.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8547"/>
        <seriesInfo name="DOI" value="10.17487/RFC8547"/>
      </reference>
      <reference anchor="RFC8548">
        <front>
          <title>Cryptographic Protection of TCP Streams (tcpcrypt)</title>
          <author fullname="A. Bittau" initials="A." surname="Bittau">
            <organization/>
          </author>
          <author fullname="D. Giffin" initials="D." surname="Giffin">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="D. Mazieres" initials="D." surname="Mazieres">
            <organization/>
          </author>
          <author fullname="Q. Slack" initials="Q." surname="Slack">
            <organization/>
          </author>
          <author fullname="E. Smith" initials="E." surname="Smith">
            <organization/>
          </author>
          <date month="May" year="2019"/>
          <abstract>
            <t>This document specifies "tcpcrypt", a TCP encryption protocol designed for use in conjunction with the TCP Encryption Negotiation Option (TCP-ENO).  Tcpcrypt coexists with middleboxes by tolerating resegmentation, NATs, and other manipulations of the TCP header.  The protocol is self-contained and specifically tailored to TCP implementations, which often reside in kernels or other environments in which large external software dependencies can be undesirable. Because the size of TCP options is limited, the protocol requires one additional one-way message latency to perform key exchange before application data can be transmitted.  However, the extra latency can be avoided between two hosts that have recently established a previous tcpcrypt connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8548"/>
        <seriesInfo name="DOI" value="10.17487/RFC8548"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie">
            <organization/>
          </author>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals.  For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear.  Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements.  In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels.  Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC8684">
        <front>
          <title>TCP Extensions for Multipath Operation with Multiple Addresses</title>
          <author fullname="A. Ford" initials="A." surname="Ford">
            <organization/>
          </author>
          <author fullname="C. Raiciu" initials="C." surname="Raiciu">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="O. Bonaventure" initials="O." surname="Bonaventure">
            <organization/>
          </author>
          <author fullname="C. Paasch" initials="C." surname="Paasch">
            <organization/>
          </author>
          <date month="March" year="2020"/>
          <abstract>
            <t>TCP/IP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a TCP/IP session would improve resource usage within the network and thus improve user experience through higher throughput and improved resilience to network failure.</t>
            <t>Multipath TCP provides the ability to simultaneously use multiple paths between peers. This document presents a set of extensions to traditional TCP to support multipath operation. The protocol offers the same type of service to applications as TCP (i.e., a reliable bytestream), and it provides the components necessary to establish and use multiple TCP flows across potentially disjoint paths.</t>
            <t>This document specifies v1 of Multipath TCP, obsoleting v0 as specified in RFC 6824, through clarifications and modifications primarily driven by deployment experience.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8684"/>
        <seriesInfo name="DOI" value="10.17487/RFC8684"/>
      </reference>
      <reference anchor="RFC8803">
        <front>
          <title>0-RTT TCP Convert Protocol</title>
          <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure">
            <organization/>
          </author>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
            <organization/>
          </author>
          <author fullname="S. Gundavelli" initials="S." surname="Gundavelli">
            <organization/>
          </author>
          <author fullname="S. Seo" initials="S." surname="Seo">
            <organization/>
          </author>
          <author fullname="B. Hesmans" initials="B." surname="Hesmans">
            <organization/>
          </author>
          <date month="July" year="2020"/>
          <abstract>
            <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
            <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
            <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8803"/>
        <seriesInfo name="DOI" value="10.17487/RFC8803"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
            <organization/>
          </author>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
            <organization/>
          </author>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9097">
        <front>
          <title>Metrics and Methods for One-Way IP Capacity</title>
          <author fullname="A. Morton" initials="A." surname="Morton">
            <organization/>
          </author>
          <author fullname="R. Geib" initials="R." surname="Geib">
            <organization/>
          </author>
          <author fullname="L. Ciavattone" initials="L." surname="Ciavattone">
            <organization/>
          </author>
          <date month="November" year="2021"/>
          <abstract>
            <t>This memo revisits the problem of Network Capacity Metrics first examined in RFC 5136. This memo specifies a more practical Maximum IP-Layer Capacity Metric definition catering to measurement and outlines the corresponding Methods of Measurement.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9097"/>
        <seriesInfo name="DOI" value="10.17487/RFC9097"/>
      </reference>
      <reference anchor="RFC9217">
        <front>
          <title>Current Open Questions in Path-Aware Networking</title>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <date month="March" year="2022"/>
          <abstract>
            <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
            <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9217"/>
        <seriesInfo name="DOI" value="10.17487/RFC9217"/>
      </reference>
      <reference anchor="RFC9298">
        <front>
          <title>Proxying UDP in HTTP</title>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi">
            <organization/>
          </author>
          <date month="August" year="2022"/>
          <abstract>
            <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9298"/>
        <seriesInfo name="DOI" value="10.17487/RFC9298"/>
      </reference>
      <reference anchor="RFC1122">
        <front>
          <title>Requirements for Internet Hosts - Communication Layers</title>
          <author fullname="R. Braden" initials="R." role="editor" surname="Braden">
            <organization/>
          </author>
          <date month="October" year="1989"/>
          <abstract>
            <t>This RFC is an official specification for the Internet community.  It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="3"/>
        <seriesInfo name="RFC" value="1122"/>
        <seriesInfo name="DOI" value="10.17487/RFC1122"/>
      </reference>
      <reference anchor="RFC1940">
        <front>
          <title>Source Demand Routing: Packet Format and Forwarding Specification (Version 1)</title>
          <author fullname="D. Estrin" initials="D." surname="Estrin">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." surname="Li">
            <organization/>
          </author>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <author fullname="K. Varadhan" initials="K." surname="Varadhan">
            <organization/>
          </author>
          <author fullname="D. Zappala" initials="D." surname="Zappala">
            <organization/>
          </author>
          <date month="May" year="1996"/>
          <abstract>
            <t>The purpose of SDRP is to support source-initiated selection of routes to complement the route selection provided by existing routing protocols for both inter-domain and intra-domain routes.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1940"/>
        <seriesInfo name="DOI" value="10.17487/RFC1940"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>Thanks to the Path-Aware Networking Research Group for the discussion and feedback. Specifically, thanks to Mohamed Boucadair for the detailed review, various text suggestions, and shepherding, thanks to Brian Trammell for suggesting the flow definition, and thanks to Luis M. Contreras, Spencer Dawkins, Paul Hoffman, Jake Holland, Colin Perkins, Adrian Perrig, and Matthias Rost for the reviews, comments, and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
