<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rwbr-sconepro-flow-metadata-02" category="std" consensus="true" submissionType="IETF" tocDepth="9" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Flow Metadata">Flow Metadata for Collaborative Host/Network Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-rwbr-sconepro-flow-metadata-02"/>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Luis Miguel Contreras Murillo">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="26"/>
    <area>Network</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>user experience</keyword>
    <keyword>bandwidth</keyword>
    <keyword>priority</keyword>
    <keyword>enriched feedback</keyword>
    <keyword>media streaming</keyword>
    <keyword>realtime media</keyword>
    <keyword>QoS</keyword>
    <keyword>5G</keyword>
    <keyword>Wi-Fi</keyword>
    <keyword>WiFi</keyword>
    <keyword>DTLS Connection Identifier</keyword>
    <keyword>DTLS-SRTP</keyword>
    <keyword>QUIC Connection Identifier</keyword>
    <keyword>QUIC</keyword>
    <abstract>
      <?line 87?>

<t>This document defines per-flow and per-packet metadata for both
network-to-host and host-to-network signaling in Concise Data Definition Language (CDDL) which
expresses both CBOR and JSON.  The common metadata definition allows interworking between
signaling protocols with high fidelity. The metadata is also self-
describing to improve interpretation by network elements and
endpoints while reducing the need for version negotiation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/metadata/draft-rwbr-flow-metadata.md.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rwbr-sconepro-flow-metadata/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TSV Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/metadata"/>.</t>
    </note>
  </front>
  <middle>
    <?line 97?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Historically, metadata is defined within each protocol. While this can
be very efficient on the wire (e.g., DSCP consumes only 6 bits) it
suffers from inability to authorize or authenticate the metadata
signaling. But the more significant problem is inability to interwork
between signaling protocols because each have different definitions.
Such interworking is often needed when the metadata signaling protocol
for packets leaving a network differs from the metadata signaling
protocol entering a different network. For example, important packets
leaving a server and its network might be marked with DSCP (as the
sending host is known and trusted) but the receiving network doesn't
trust the DSCP bits in received packets because there is no
authorization or authentication for differential treatment.</t>
      <t>This document does not assume nor require that all on-path network elements must
understand the meaning associated with signaled metadata. Only a few network nodes
would need to be upgraded to support the metadata signaling.</t>
      <t>By using the same metadata, both networks can communicate how packets
should be treated and use their own signaling mechanism with their
network elements (e.g., routers or proxies). Readers should refer to
<xref section="7.2" sectionFormat="of" target="I-D.rwbr-tsvwg-signaling-use-cases"/> for a discussion about why application- and protocol-specific signaling channels are</t>
      <t>Both the above use cases are improved by metadata described in this document. This
document is a companion to host-to-network signaling the metadata itself, such as:</t>
      <ul spacing="normal">
        <li>
          <t>UDP Options (e.g., <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>, <xref target="I-D.reddy-tsvwg-explcit-signal"/>),</t>
        </li>
        <li>
          <t>IPv6 Hop-by-Hop Options (<xref section="4.3" sectionFormat="of" target="RFC8200"/>),</t>
        </li>
        <li>
          <t>SCONE Protocol (<xref target="SCONEPRO"/>), or</t>
        </li>
        <li>
          <t>QUIC CID mapping (<xref target="I-D.wing-cidfi"/>).</t>
        </li>
      </ul>
      <t><xref target="I-D.herbert-host2netsig"/> provides an analysis of most of those metadata signaling mechanisms.</t>
      <t>This document does not assume nor preclude any companion signaling protocol.
Also, the document does not preclude API-based approaches to
control flows, packets, applications, etc. that are bound to a given metadata and which
will benefit from the differentiated behavior. As such, <strong>the metadata in this document is defined to be independent of the
signaling protocol</strong> (<xref target="sec-meta"/>). In doing so, we ensure that consistent
metadata definitions are used by the various signaling protocols. Also,
this approach allows to factorize key considerations such as security and operational
considerations. This approach also ease passing policies between controllers of domains involved in packet delivery (e.g., RAN, Core, network slicing <xref target="RFC9543"/>, and Transport domains).</t>
      <t>The metadata is described using Concise Data Definition Language (CDDL) <xref target="CDDL"/> which can be expressed
in both <xref target="JSON"/> and binary using <xref target="CBOR"/>.  Both
the JSON and CBOR encodings are self-describing.  It is out of scope
of this document to define how the proposed encoding will be mapped to
a specific signaling protocol.</t>
      <!--
Some applications use heuristics to determine rate-limiting policy. This document
proposes an explicit approach that is meant to share more granular information
so that these application adjusts their behavior in a timely manner (e.g., anticipate congestion).

The application metadata defined in this document primary target signals
that are meant to soften implications of reactive policies. Also, these
metadata provide hints to guide the enforcement of those policies on **packets within a flow, not between
distinct flows or applications**.
-->

<t>If the companion signaling protocol supports host-to-network metadata,
individual packets within a flow can contain metadata describing their
drop preference or their reliability. The network elements aware of
this metadata can apply preferential or differential treatment to those
packets, within the same flow, during a 'reactive traffic policy' event. It is also assumed
that such network elements are provisioned with local policy that
guides their behavior jointly with a signaled metadata. Examples of
metadata signaling for video streaming and for remote desktop are
provided in <xref target="examples-h2n"/>.</t>
      <t>For network-to-host metadata, a host can be informed of network
policy for nominal downlink bandwidth. Certain applications,
such as most especially video streaming applications, can use
that information to optimize their video streaming bandwidth to
fit within that policy.</t>
      <t>To track metadata that are defined for host/network signalling,
a new IANA registry is defined: "Flow Metadata Registry" <xref target="sec-fmr"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses the following terms:</t>
      <dl>
        <dt>Reactive policy:</dt>
        <dd>
          <t>Treatment given to a flow when an exceptional event occurs, such as
diminished throughput to the host caused by radio interference or weak
radio signal, congestion on the network caused by other users or other
applications on the same host, denial of service attacks, etc. Characterizing such exceptional events
is deployment-specific.</t>
        </dd>
        <dt>Intentional policy:</dt>
        <dd>
          <t>Configured bandwidth, pps, or similar throughput constraints applied
to a flow, application, host, or subscriber.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-meta">
      <name>Metadata Structure</name>
      <t>The metadata is described in CDDL <xref target="RFC8610"/> format shown in <xref target="meta-cddl"/>.</t>
      <figure anchor="meta-cddl">
        <name>CDDL Structure of the Metadata</name>
        <sourcecode type="cddl"><![CDATA[
; one or more metadata can be signaled.
metadata = {
  metadata-type: (0..1), ; 0 is Network Metadata
                         ; 1 is Application Metadata
  * $$metadata-extensions
}

; Application Metadata

$$metadata-extensions //= (
; true indicates packet of high importance
; false indicates packet of low importance
  importance: bool,
; Packets can be tagged as reliable (true) or unreliable (false)
  reliable: bool,
; Packets can be tagged as preference to keep (true) or discard (false)
  prefer-keep: bool
; Has a meaning only for packets marked as reliable
; True indicates realtime
; False indicates bulk (non-realtime)
  realtime: bool
)

; Network Metadata

; Provides information about the nominal downlink bitrate
; Returning a value set to 0 (or a very low value) should trigger
; the host to seek for better paths.

bitrate =  [+ nrlp]

nrlp =  {
  ? scope: unit,
  ? tc: uint,
  cir: uint,  ; Mbps
  cbs: uint,  ; bytes
  ? eir: uint,  ; Mbps
  ? ebs: uint,  ; bytes
  ? pir: uint,  ; Mbps
  ? pbs: uint  ; bytes
}

$$metadata-extensions //= (
   ? downlinkBitrate => nrlp,
; Indicates whether a flow is to be offloaded to alternate
; available paths.
   pref-alt-path: bool
)

downlinkBitrate = "downlinkBitrate"
burst-d = "burst-info"
]]></sourcecode>
      </figure>
      <t>The structure shown in <xref target="meta-cddl"/> does not assume that the metadata
will be encoded as a single blob when mapped to a signaling protocol or
that all the metadata components will be mapped. Such matters
are specific to the individual signaling protocols and deployment contexts.</t>
      <t>New metadata for collaborative host/network signaling <bcp14>MUST</bcp14> be registered
in the IANA registry, "Flow Metadata Registry" <xref target="sec-fmr"/>.</t>
      <t>More details about each of these metadata are provided in <xref target="sec-h2n"/> and <xref target="sec-n2h"/>.
Both client and network intended behaviors are specified for each
metadata.</t>
    </section>
    <section anchor="sec-h2n">
      <name>Host-to-Network Metadata</name>
      <t>Metadata is characterized into two different nature:</t>
      <dl>
        <dt>Network Metadata:</dt>
        <dd>
          <t>This consists of metadata that specifies how a network element should treat that packet. The network metadata comprises of the importance metadata. This field indicates whether a packet is more important or less important.</t>
        </dd>
        <dt>Application Metadata:</dt>
        <dd>
          <t>This consists of metadata that specifies how the application treats that packet. The appplication metadata comprises of two components: Keep/Discard and Reliable/Unreliable.</t>
        </dd>
      </dl>
      <section anchor="sec-importance">
        <name>Packet Importance ('Importance')</name>
        <t>The "Importance" metadata signifies if the packet is of more important (true) or
less important (false) by the host, relative to other packets in the
same flow. Importance belongs to Network Metadata.</t>
        <t>An application would mark a packet as important when it needs the
network to treat the packet with greater preference compared to the
unmarked packets or to packets marked important=false (of the same
flow). This tagging does not provide more privileges to an application
with regards to resources usage compared to the absence of signal. An
example of this interpretation is specified in <xref target="examples-h2n"/>.</t>
        <section anchor="network-treatment">
          <name>Network Treatment</name>
          <t>During a reactive policy event, a network element is encouraged to
discard packets marked importance=false in favor of packets marked
importance=true, for the same flow.</t>
        </section>
      </section>
      <section anchor="packet-type-reliableunreliable-packettype">
        <name>Packet Type - Reliable/Unreliable ('PacketType')</name>
        <t>The "Reliable" metadata indicates if a packet is reliably transmitted by the host.</t>
        <ul spacing="normal">
          <li>
            <t>Reliable packets are re-transmitted by the underlying transport
(e.g., TCP <xref target="RFC9293"/> or <xref target="QUIC"/>) or re-transmitted by the appplication (e.g., <xref target="RELIABLE-RTP"/>, NTP).</t>
          </li>
          <li>
            <t>Unreliable packets are not re-transmitted by the transport
(e.g., UDP, <xref target="RTP"/>, <xref target="LOSSY-QUIC"/>) and also not re-transmitted by the application (e.g., <xref target="RTP"/>).</t>
          </li>
        </ul>
        <t>Packets marked reliable, if delayed excessively or dropped outright, will be re-transmitted (up to a maximum retries) by the sender application, appearing on the network again. Thus, delaying or discarding such packets does not reduce the amount of transmitted data in a network; it only defers when it appears on the network.</t>
        <t>Reliable/Unreliable belongs to Application Metadata.</t>
        <section anchor="network-treatment-1">
          <name>Network Treatment</name>
          <t>During a reactive policy event, dropping unreliable traffic is preferred over dropping reliable
traffic. The reliable traffic will be re-transmitted by the sender so dropping such traffic
only defers it until later, but this deferral can be useful.</t>
        </section>
      </section>
      <section anchor="packet-nature-packetnature">
        <name>Packet Nature ('PacketNature')</name>
        <t>This metadata indicates discard preference for unreliable traffic and reliable traffic, as detailed below.</t>
        <section anchor="unreliable-traffic">
          <name>Unreliable Traffic</name>
          <t>Packets are marked with 'prefer-keep' set to either true or false. When set to true, it indicates a preference to keep the packet. Conversely, when set to false, it signals that the packet may be subject to discard based on a reactive policy.</t>
          <t>Many flows contain a mix of important packets and less-important packets, but applications
seldom signal that difference themselves let alone signal the difference to the network.
Rather, applications send everything over a reliable transport (TCP or QUIC) and leave it
at that, as evidenced by video streaming using TCP.</t>
          <t>With the advent of <xref target="LOSSY-QUIC"/>, applications can send both <xref target="QUIC"/> reliable traffic and
<xref target="LOSSY-QUIC"/> unreliable traffic <xref target="LOSSY-QUIC"/> on the same 5-tuple.  With
host-to-network metadata signaling, the network can become an active assistant in such
flows during a reactive policy event by endeavouring to send the more-important 'prefer-keep'
traffic at the expense of the less-important 'may-discard' traffic.</t>
          <t>The reason why an application transmits a packet marked as 'prefer-keep' set to false, when the
application has the capability to avoid sending that packet, is application-specific.</t>
          <section anchor="network-treatment-2">
            <name>Network Treatment</name>
            <t>During a reactive policy event, dropping packets with 'prefer-keep' set to false is preferred
over dropping 'prefer-keep' set to true packets.
Absent such discard preference indication, the network element will blindly drop packets during a reactive policy event.</t>
          </section>
        </section>
        <section anchor="reliable-traffic">
          <name>Reliable Traffic</name>
          <t>For reliable traffic, "realtime" metadata indicates whether the packet belongs to bulk or real-time traffic.</t>
          <t>An application such as a web browser might mark certain flows as realtime (e.g., the flow is
related to dynamically updating a search box and quick responses help the user experience)
and other flows as bulk (e.g., file download, file upload).</t>
          <section anchor="network-treatment-3">
            <name>Network Treatment</name>
            <t>Realtime traffic prefers lower latency network paths and bulk traffic prefers high throughoupt paths.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="sec-n2h">
      <name>Network to Host Metadata</name>
      <section anchor="sec-dbr">
        <name>Downlink Bitrate ('DownlinkBitrate')</name>
        <t>Monthly data quotas on cellular networks can be easily exceeded by video streaming, in particular, if the
client chooses excessively high quality or routinely abandons watching videos that were
downloaded. The network can assist the client by informing the client of the network's
bandwidth policy.</t>
        <t>If the video is encoded with variable bitrate, the bitrate cannot exceed the indicated
bitrate.</t>
        <dl>
          <dt>Scope:</dt>
          <dd>
            <t>Specifies whether the policy is per host, per subscriber, etc.</t>
          </dd>
          <dt/>
          <dd>
            <t>The following values are supported:
</t>
            <artwork><![CDATA[
*  "0": Subscriber
*  "1": Host
*  2-15: Unassigned values.
]]></artwork>
          </dd>
          <dt>TC:</dt>
          <dd>
            <t>Specifies a traffic category to which this policy applies.</t>
          </dd>
          <dt/>
          <dd>
            <t>The following values are supported:
</t>
            <artwork><![CDATA[
*  "0": All traffic. This is the default value.
*  "1": Streaming
*  "2": Realtime
*  "3": Bulk trafic
*  4-255: Unassigned values
]]></artwork>
          </dd>
          <dt>Committed Information Rate (CIR) (Mbps):</dt>
          <dd>
            <t>Specifies the maximum number of bits that a network can send during one
second over an attachment circuit for a traffic category.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is mandatory.</t>
          </dd>
          <dt>Committed Burst Size (CBS) (bytes):</dt>
          <dd>
            <t>Specifies the maximum burst size that can be transmitted at CIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greated than zero.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is mandatory.</t>
          </dd>
          <dt>Excess Information Rate (EIR) (Mbps):</dt>
          <dd>
            <t>Specifies the maximum number of bits that a network can send
during one second for a traffic category that is out of profile.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Excess Burst Size (EBS) (bytes):</dt>
          <dd>
            <t>Indicates that maximum excess burst size that is allowed while not
complying with the CIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Peak Information Rate (PIR) (Mbps):</dt>
          <dd>
            <t>Traffic that exceeds the CIR and the CBS is metered to the PIR.</t>
          </dd>
          <dt/>
          <dd>
            <t>This parameter is optional.</t>
          </dd>
          <dt>Peak Burst Size (PBS) (bytes):</dt>
          <dd>
            <t>Specifies the maximum burst size that can be transmitted at PIR.</t>
          </dd>
          <dt/>
          <dd>
            <t><bcp14>MUST</bcp14> be greater than zero, if present.</t>
          </dd>
        </dl>
        <section anchor="units">
          <name>Units</name>
          <t>Bitrates are expressed in Mbps and burst in bytes.</t>
        </section>
        <section anchor="host-treatment">
          <name>Host Treatment</name>
          <t>The host chooses a video streaming bitrate at or below the signaled rate.</t>
          <t>The host may also choose to signal the received bitrate to the remote peer. The remote
peer will adapt its transmission behavior to comply with the received bitrate.</t>
          <t>An example of the encoding is provided in <xref target="examples-n2h"/>.</t>
        </section>
      </section>
      <section anchor="prefer-alternate-path-pref-alt-path">
        <name>Prefer Alternate Path ('pref-alt-path')</name>
        <t>There are also crisis cases where nominal network resources cannot be
used at maximum to handle packets. A network would thus seek to offload some of the
traffic during these events. Under such exceptional events, a network
element may signal to a host that it is preferrable to use alternate
paths, if available. An alternate path is typically an alternate network
attachment.  After the crisis has subsided, the network should signal
with pref-alt-path=false.</t>
        <t>The 'pref-alt-path' metadata may be sent together with the bitrate metadata (<xref target="sec-dbr"/>) set to a very low value.</t>
        <section anchor="host-treatment-1">
          <name>Host Treatment</name>
          <t>The host offloads its connections to alternate available paths.</t>
        </section>
      </section>
    </section>
    <section anchor="guidance-for-mapping-metadata-to-specific-signaling-protocols">
      <name>Guidance For Mapping Metadata to Specific Signaling Protocols</name>
      <t>TBC.</t>
    </section>
    <section anchor="implementation-impact-of-metadata">
      <name>Implementation Impact of Metadata</name>
      <section anchor="reliableunreliable-set-by-the-respective-transport-level-protocol">
        <name>Reliable/Unreliable set by the respective transport level protocol</name>
        <t>TCP <xref target="RFC9293"/> is a reliable transport protocol, while UDP <xref target="RFC0768"/> provides a minimal, unreliable, best-effort, message-passing transport to applications and other protocols (such as tunnels) that wish to operate over IP <xref target="RFC8085"/>. Protocols built over UDP may implement reliability features at the "application" layer if such a transport feature is needed <xref target="RFC8304"/>. For example, streams of reliable application data are sent using STREAM QUIC frames (<xref section="19.8" sectionFormat="of" target="RFC9000"/>), while application data that do not require retransmission can be carried in DATAGRAM QUIC frames <xref target="RFC9221"/>. Applications that are utilizing such a protocol, will have to choose the delivery service (reliable or loss-tolerant) based upon the nature of the packet being sent -- loss-tolerant packet cannot be carried in a reliable frame and vice-versa. Hence, based on the transport service being invoked, setting of the reliable/unreliable metadata entry can be offloaded to the underlying transport protocol, unless specifically overridden by the application.</t>
      </section>
      <section anchor="offloading-loss-avoidance-to-the-network">
        <name>Offloading Loss-Avoidance to the network</name>
        <t>Network nodes, upon learning of the nature of a packet (reliable/prefer-keep) can choose to implement loss avoidance algorithms between hops where there is packet loss detected (e.g., using out-of-band or in-band QoS measurement, which is out of the scope of this document). By doing so, end-to-end retransmissions can be reduced/avoided thereby minimizing the need for handling loss at the application layer using protocols such as <xref target="RFC7198"/>, <xref target="RFC7197"/>, or <xref target="RFC7104"/>.</t>
      </section>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <section anchor="impact-on-network-operation">
        <name>Impact on Network Operation</name>
        <t>TBC.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Metadata increases the information available to attackers to distinguish important packets from less-important packets, which the attacker might use to attack such packets (e.g., prevent their delivery) or attempt to decrypt those packets. It is <bcp14>RECOMMENDED</bcp14> to encrypt or obfuscate the metadata information so it is only available to hosts and to authorized network elements, while maintaining minimal resource consumption. The method of encryption or obfuscation is not described in this document but rather in other documents describing how this metadata is encoded and exchanged amongst hosts and network elements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="metadata-for-collaborative-hostnetwork-signaling-registry-group">
        <name>Metadata for Collaborative Host/Network Signaling Registry Group</name>
        <t>This document requests IANA to create a new registry group, entitled "Metadata for Collaborative Host/Network Signaling".</t>
      </section>
      <section anchor="sec-fmr">
        <name>Flow Metadata Registry</name>
        <t>IANA is requested to create a new registry, entitled "Flow Metadata Registry", under the "Metadata for Collaborative Host/Network Signaling" registry group.
This registry is inspired by the "Performance Metrics Registry" created by <xref target="RFC8911"/>. The structure of the registry is as follows:</t>
        <dl>
          <dt>Identifier:</dt>
          <dd>
            <t>A numeric identifier for the registered metadata.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Identifier 0 is Reserved.</t>
          </dd>
          <dt/>
          <dd>
            <t>The Identifier values from 250 to 255 are reserved for private or experimental use.</t>
          </dd>
          <dt>Name:</dt>
          <dd>
            <t>Name of the registered metadata.</t>
          </dd>
          <dt>Description:</dt>
          <dd>
            <t>Provides a description of the intended use of the registered metadata.</t>
          </dd>
          <dt>Reference:</dt>
          <dd>
            <t>Lists the authoritative reference that specifies the registered metadata.</t>
          </dd>
          <dt>Version:</dt>
          <dd>
            <t>Tracks the current version of the metadata.</t>
          </dd>
          <dt/>
          <dd>
            <t>The initial version of a new registered metadata <bcp14>MUST</bcp14> be 1.0.</t>
          </dd>
          <dt/>
          <dd>
            <t>IANA will bump the version when a new RFC that changes the format/semantic of a registered entry.</t>
          </dd>
        </dl>
        <t>The initial values of the registry are listed in <xref target="initial-reg"/>.</t>
        <table anchor="initial-reg">
          <name>Initial Values</name>
          <thead>
            <tr>
              <th align="center">Identifier</th>
              <th align="center">Name</th>
              <th align="left">Description</th>
              <th align="center">Reference</th>
              <th align="center">Version</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="center"> </td>
              <td align="left">Reserved</td>
              <td align="center">This-Document</td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="center">Importance</td>
              <td align="left">Indicates the level of importance of a packet in a flow</td>
              <td align="center">This-Document</td>
              <td align="center">1.0</td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="center">PacketType</td>
              <td align="left">Indicates whether a packet is reliably or unreliably transmitted</td>
              <td align="center">This-Document</td>
              <td align="center">1.0</td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="center">PacketNature</td>
              <td align="left">Indicates a discard preference</td>
              <td align="center">This-Document</td>
              <td align="center">1.0</td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="center">DownlinkBitrate</td>
              <td align="left">Specifies the maximum downlink bitrate</td>
              <td align="center">This-Document</td>
              <td align="center">1.0</td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="center">PreferAltPath</td>
              <td align="left">Sollicits the hosts to use an alternate path if available</td>
              <td align="center">This-Document</td>
              <td align="center">1.0</td>
            </tr>
            <tr>
              <td align="center">250-255</td>
              <td align="center">Exp</td>
              <td align="left">Reserved for private use</td>
              <td align="center">This-Document</td>
              <td align="center">1.0</td>
            </tr>
          </tbody>
        </table>
        <t>New values in the 6-99 range can be assigned using "Standards Action" policy (<xref section="4.9" sectionFormat="of" target="RFC8126"/>).</t>
        <t>Values in the 100-149 range can be assigned using "Expert Review" policy (<xref section="4.5" sectionFormat="of" target="RFC8126"/>).</t>
        <t>Values in the 150-249 range can be assigned using "First Come First Served" (<xref section="4.4" sectionFormat="of" target="RFC8126"/>). This range can be, e.g., used by other SDOs to register metadata that are specific to their domain and which is not used outside that scope.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="CDDL">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="LOSSY-QUIC">
          <front>
            <title>An Unreliable Datagram Extension to QUIC</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9221"/>
          <seriesInfo name="DOI" value="10.17487/RFC9221"/>
        </reference>
        <reference anchor="RTP">
          <front>
            <title>RTP: A Transport Protocol for Real-Time Applications</title>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="S. Casner" initials="S." surname="Casner"/>
            <author fullname="R. Frederick" initials="R." surname="Frederick"/>
            <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="64"/>
          <seriesInfo name="RFC" value="3550"/>
          <seriesInfo name="DOI" value="10.17487/RFC3550"/>
        </reference>
        <reference anchor="RELIABLE-RTP">
          <front>
            <title>RTP Retransmission Payload Format</title>
            <author fullname="J. Rey" initials="J." surname="Rey"/>
            <author fullname="D. Leon" initials="D." surname="Leon"/>
            <author fullname="A. Miyazaki" initials="A." surname="Miyazaki"/>
            <author fullname="V. Varsa" initials="V." surname="Varsa"/>
            <author fullname="R. Hakenberg" initials="R." surname="Hakenberg"/>
            <date month="July" year="2006"/>
            <abstract>
              <t>RTP retransmission is an effective packet loss recovery technique for real-time applications with relaxed delay bounds. This document describes an RTP payload format for performing retransmissions. Retransmitted RTP packets are sent in a separate stream from the original RTP stream. It is assumed that feedback from receivers to senders is available. In particular, it is assumed that Real-time Transport Control Protocol (RTCP) feedback as defined in the extended RTP profile for RTCP-based feedback (denoted RTP/AVPF) is available in this memo. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4588"/>
          <seriesInfo name="DOI" value="10.17487/RFC4588"/>
        </reference>
        <reference anchor="SCONEPRO" target="https://datatracker.ietf.org/group/sconepro/about/">
          <front>
            <title>SCONEPRO Working Group Charter</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="February" day="02"/>
          </front>
        </reference>
        <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
          <front>
            <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="17" month="March" year="2024"/>
            <abstract>
              <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
        </reference>
        <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
          <front>
            <title>Media Handling Considerations for Wireless Networks</title>
            <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
              <organization>Tencent America LLC</organization>
            </author>
            <date day="14" month="February" year="2024"/>
            <abstract>
              <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
        </reference>
        <reference anchor="I-D.reddy-tsvwg-explcit-signal">
          <front>
            <title>An Approach for Encrypted Transport Protocol Path Explicit Signals</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document defines a mechanism for endpoints to explicitly signal
   encrypted metadata to the network, and the network to signal its
   ability to accommodate that metadata back to the endpoints.  This
   mechanism can be used where the endpoints desire that some network
   elements along the path receive these explicit signals.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tsvwg-explcit-signal-01"/>
        </reference>
        <reference anchor="RFC8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="I-D.wing-cidfi">
          <front>
            <title>Framework for CID Flow Indicator (CIDFI)</title>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="14" month="December" year="2023"/>
            <abstract>
              <t>   Host-to-network signaling and network-to-host signaling can improve
   the user experience to adapt to network's constraints and share
   expected application needs, and thus to provide differentiated
   service to a flow and to packets within a flow.  The differentiated
   service may be provided at the network (e.g., packet prioritization),
   the server (e.g., adaptive transmission), or both.

   This document describes how clients can communicate with their nearby
   network elements so they can learn network constraints.  Optionally,
   with QUIC server support their incoming QUIC packets can be mapped to
   metadata about their contents so packet importance can influence both
   intentional and reactive management policies.  The framework handles
   both directions of a flow.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wing-cidfi-04"/>
        </reference>
        <reference anchor="I-D.herbert-host2netsig">
          <front>
            <title>Host to Network Signaling</title>
            <author fullname="Tom Herbert" initials="T." surname="Herbert">
              <organization>SiPanda</organization>
            </author>
            <date day="4" month="October" year="2023"/>
            <abstract>
              <t>   This document discusses the motivations, use cases, and requirements
   for Host to Network Signaling.  In Host to Network Signaling, hosts
   annotate packets with information that is intended for consumption by
   on-path elements.  Signals may be used to request services on a per
   packet basis from on-path elements, to request admission into the
   network, or to provide diagnostics and tracing information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-herbert-host2netsig-00"/>
        </reference>
        <reference anchor="RFC9543">
          <front>
            <title>A Framework for Network Slices in Networks Built from IETF Technologies</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." role="editor" surname="Drake"/>
            <author fullname="R. Rokui" initials="R." surname="Rokui"/>
            <author fullname="S. Homma" initials="S." surname="Homma"/>
            <author fullname="K. Makhijani" initials="K." surname="Makhijani"/>
            <author fullname="L. Contreras" initials="L." surname="Contreras"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document describes network slicing in the context of networks built from IETF technologies. It defines the term "IETF Network Slice" to describe this type of network slice and establishes the general principles of network slicing in the IETF context.</t>
              <t>The document discusses the general framework for requesting and operating IETF Network Slices, the characteristics of an IETF Network Slice, the necessary system components and interfaces, and the mapping of abstract requests to more specific technologies. The document also discusses related considerations with monitoring and security.</t>
              <t>This document also provides definitions of related terms to enable consistent usage in other IETF documents that describe or use aspects of IETF Network Slices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9543"/>
          <seriesInfo name="DOI" value="10.17487/RFC9543"/>
        </reference>
        <reference anchor="JSON">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="CBOR">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC0768">
          <front>
            <title>User Datagram Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel"/>
            <date month="August" year="1980"/>
          </front>
          <seriesInfo name="STD" value="6"/>
          <seriesInfo name="RFC" value="768"/>
          <seriesInfo name="DOI" value="10.17487/RFC0768"/>
        </reference>
        <reference anchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author fullname="L. Eggert" initials="L." surname="Eggert"/>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="G. Shepherd" initials="G." surname="Shepherd"/>
            <date month="March" year="2017"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms. This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP. Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic. They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="RFC8304">
          <front>
            <title>Transport Features of the User Datagram Protocol (UDP) and Lightweight UDP (UDP-Lite)</title>
            <author fullname="G. Fairhurst" initials="G." surname="Fairhurst"/>
            <author fullname="T. Jones" initials="T." surname="Jones"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This is an informational document that describes the transport protocol interface primitives provided by the User Datagram Protocol (UDP) and the Lightweight User Datagram Protocol (UDP-Lite) transport protocols. It identifies the datagram services exposed to applications and how an application can configure and use the features offered by the Internet datagram transport service. RFC 8303 documents the usage of transport features provided by IETF transport protocols, describing the way UDP, UDP-Lite, and other transport protocols expose their services to applications and how an application can configure and use the features that make up these services. This document provides input to and context for that document, as well as offers a road map to documentation that may help users of the UDP and UDP-Lite protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8304"/>
          <seriesInfo name="DOI" value="10.17487/RFC8304"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC9221">
          <front>
            <title>An Unreliable Datagram Extension to QUIC</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9221"/>
          <seriesInfo name="DOI" value="10.17487/RFC9221"/>
        </reference>
        <reference anchor="RFC7198">
          <front>
            <title>Duplicating RTP Streams</title>
            <author fullname="A. Begen" initials="A." surname="Begen"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>Packet loss is undesirable for real-time multimedia sessions but can occur due to a variety of reasons including unplanned network outages. In unicast transmissions, recovering from such an outage can be difficult depending on the outage duration, due to the potentially large number of missing packets. In multicast transmissions, recovery is even more challenging as many receivers could be impacted by the outage. For this challenge, one solution that does not incur unbounded delay is to duplicate the packets and send them in separate redundant streams, provided that the underlying network satisfies certain requirements. This document explains how Real-time Transport Protocol (RTP) streams can be duplicated without breaking RTP or RTP Control Protocol (RTCP) rules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7198"/>
          <seriesInfo name="DOI" value="10.17487/RFC7198"/>
        </reference>
        <reference anchor="RFC7197">
          <front>
            <title>Duplication Delay Attribute in the Session Description Protocol</title>
            <author fullname="A. Begen" initials="A." surname="Begen"/>
            <author fullname="Y. Cai" initials="Y." surname="Cai"/>
            <author fullname="H. Ou" initials="H." surname="Ou"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>A straightforward approach to provide protection against packet losses due to network outages with a longest duration of T time units is to duplicate the original packets and send each copy separated in time by at least T time units. This approach is commonly referred to as "time-shifted redundancy", "temporal redundancy", or simply "delayed duplication". This document defines an attribute to indicate the presence of temporally redundant media streams and the duplication delay in the Session Description Protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7197"/>
          <seriesInfo name="DOI" value="10.17487/RFC7197"/>
        </reference>
        <reference anchor="RFC7104">
          <front>
            <title>Duplication Grouping Semantics in the Session Description Protocol</title>
            <author fullname="A. Begen" initials="A." surname="Begen"/>
            <author fullname="Y. Cai" initials="Y." surname="Cai"/>
            <author fullname="H. Ou" initials="H." surname="Ou"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>Packet loss is undesirable for real-time multimedia sessions, but it can occur due to congestion or other unplanned network outages. This is especially true for IP multicast networks, where packet loss patterns can vary greatly between receivers. One technique that can be used to recover from packet loss without incurring unbounded delay for all the receivers is to duplicate the packets and send them in separate redundant streams. This document defines the semantics for grouping redundant streams in the Session Description Protocol (SDP). The semantics defined in this document are to be used with the SDP Grouping Framework. Grouping semantics at the Synchronization Source (SSRC) level are also defined in this document for RTP streams using SSRC multiplexing.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7104"/>
          <seriesInfo name="DOI" value="10.17487/RFC7104"/>
        </reference>
        <reference anchor="RFC8911">
          <front>
            <title>Registry for Performance Metrics</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="P. Eardley" initials="P." surname="Eardley"/>
            <author fullname="A. Morton" initials="A." surname="Morton"/>
            <author fullname="A. Akhter" initials="A." surname="Akhter"/>
            <date month="November" year="2021"/>
            <abstract>
              <t>This document defines the format for the IANA Registry of Performance
Metrics. This document also gives a set of guidelines for Registered
Performance Metric requesters and reviewers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8911"/>
          <seriesInfo name="DOI" value="10.17487/RFC8911"/>
        </reference>
        <reference anchor="I-D.kwbdgrr-tsvwg-net-collab-rqmts">
          <front>
            <title>Requirements for Network Collaboration Signaling</title>
            <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
              <organization>Tencent America LLC</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="7" month="June" year="2024"/>
            <abstract>
              <t>   Wireless networks (e.g., cellular or WLAN) experience significant but
   transient variations in link quality and have policy constraints
   (e.g., bandwidth) that affect user experience.  Collaborative
   signaling (e.g., host-to-network and server-to-network) can improve
   the user experience by informing the network about the nature and
   relative importance of packets (frames, streams, etc.) without having
   to disclose the content of the packets.  Moreover, the collaborative
   signalling may be enabled so that hosts are aware of the network's
   treatment of incoming packets.  Also, host-to-network collaboration
   can be put in place without revealing the identity of the remote
   servers.  This collaboration allows for differentiated services at
   the network (e.g., packet discard preference), the sender (e.g.,
   adaptive transmission), or through cooperation of server / host and
   the network.

   This document lists some use cases that illustrate the need for a
   mechanism to share metadata and outlines requirements for both host-
   to-network (and vice versa) and server-to-network (and vice versa).
   The document focuses on intra-flow or flows bound to the same user.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-01"/>
        </reference>
      </references>
    </references>
    <?line 545?>

<section anchor="examples-h2n">
      <name>Examples of Host-to-Network Metadata Encoding</name>
      <section anchor="example-video-streaming">
        <name>Video Streaming</name>
        <t>Video Streaming Metadata:</t>
        <t>The use case requirements for <xref target="_table-video-streaming"/> is explained in detail in <xref target="I-D.kwbdgrr-tsvwg-net-collab-rqmts"/>. The audio is more important than video (importance=high, PT=keep, RU=reliable), video key frames
have middle importance (importance=low, PT=discard, RU=reliable), and both types
of video delta frames (P-frame and B-frame) have least importance (importance=low, PT=discard, RU=unreliable).</t>
        <t>The metadata for the use case is defined as follows:</t>
        <table anchor="_table-video-streaming">
          <name>Example Values for Video Streaming Metadata</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">video I-frame (key frame)</td>
              <td align="center">low</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">video delta P-frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">video delta B-frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">audio</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
          </tbody>
        </table>
        <t>The encoding of the metadata in CDDL for the traffic will look like:
Video I-frame:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": false,
    "reliable": true,
    "realtime": true
  }
}
]]></sourcecode>
        <t>Audio:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": true,
    "reliable": true,
    "realtime": true
  }
}
]]></sourcecode>
        <t>Video delta P-frame:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": false,
    "reliable": false,
    "prefer-keep": false
  }
}
]]></sourcecode>
      </section>
      <section anchor="example-interactive-av">
        <name>Interactive Media</name>
        <t>Based on metadata types listed in this document, the host to network metadata parameters for interactive media type is given below.</t>
        <t>Interactive A/V, downstream Metadata:</t>
        <table anchor="_table-interactive-av-downstream">
          <name>Example Values for Interactive A/V, downstream</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">video key frame</td>
              <td align="center">low</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">video delta frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">audio</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
          </tbody>
        </table>
        <table anchor="_table-video-av-upstream">
          <name>Example Values for Interactive A/V, upstream</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">video key frame</td>
              <td align="center">low</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">video delta frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">audio</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
          </tbody>
        </table>
        <t>Many interactive audio/video applications also support sharing the presenter's
screen, file, video, or pictures.  During this sharing the presenter's video
is less important but the screen or picture is more important.  This change
of imporance can be conveyed in metadata to the network, as in the table
below:</t>
        <t>Interactive A/V, upstream Metadata:</t>
        <table anchor="_table-video-av-sharing">
          <name>Example Values for Interactive A/V with picture sharing, upstream</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">video key frame</td>
              <td align="center">low</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">video delta frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">audio</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">picture sharing</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
          </tbody>
        </table>
        <t>In many scenarios a game or VoIP application will want to signal different
metadata for the same type of packet in each direction.  For example, for
a game, video in the server-to-client direction might be more important
than audio, whereas input devices (e.g., keystrokes) might be more important
than audio.</t>
        <ul empty="true">
          <li>
            <t>Todo: finish the encoding section for more metadata represented above.</t>
          </li>
        </ul>
        <t>Encoding:</t>
        <t>Video key frame:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": false,
    "reliable": true,
    "realtime": true
  }
}
]]></sourcecode>
        <t>Video delta frame:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": false,
    "reliable": false,
    "prefer-keep": false
  }
}
]]></sourcecode>
        <t>Audio:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": true,
    "reliable": true,
    "realtime": true
  }
}
]]></sourcecode>
      </section>
      <section anchor="example-ls">
        <name>Live Streaming</name>
        <t>Based on metadata types listed in this document, the host to network metadata parameters for interactive media type is given below.</t>
        <t>Metadata for live-streaming that prefers video over audio: (eg. Superbowl game coverage)</t>
        <table anchor="_table-video-livestream">
          <name>Example Values for live streaming of video preferred event</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">video key frame</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">video delta frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">audio</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
          </tbody>
        </table>
        <t>Metadata for live-streaming that prefers audio over video: (eg. Music Concert)</t>
        <table anchor="_table-audio-livestream">
          <name>Example Values for live streaming of audio preferred event</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">video key frame</td>
              <td align="center">low</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
            <tr>
              <td align="center">video delta frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
            </tr>
            <tr>
              <td align="center">audio</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="example-rdt">
        <name>Remote Desktop Virtualization</name>
        <t>Example packet metadata for Desktop Virtualization (like Citrix
Virtual Apps and Desktops - CVAD) application.</t>
        <t>Remote Desktop Virtualization Metadata:</t>
        <t>The use case requirements for the below table is explained in detail in <xref target="I-D.kwbdgrr-tsvwg-net-collab-rqmts"/>. The metadata for the use case is defined as follows:</t>
        <table anchor="_table-desktop-virtualization-s2c">
          <name>Example Values for Remote Desktop Virtualization Metadata, server to client</name>
          <thead>
            <tr>
              <th align="center">Traffic type</th>
              <th align="center">Importance</th>
              <th align="center">PacketNature</th>
              <th align="center">PacketType</th>
              <th align="center">Comments</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">Glyph critical</td>
              <td align="center">high</td>
              <td align="center">realtime</td>
              <td align="center">reliable</td>
              <td align="center">The frames that form the base for the image is more critical and needs to be transmitted as reliably as possible. Retransmits of these are harmful to the UX.**</td>
            </tr>
            <tr>
              <td align="center">Interactive (or streaming) audio</td>
              <td align="center">high</td>
              <td align="center">keep</td>
              <td align="center">unreliable</td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="center">Haptic feedback</td>
              <td align="center">high</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
              <td align="center">Virtualizing haptic feedback is real-time and high importance although the feedback being delivered late is of no use. So dropping the packet altogether and not retransmitting it makes more sense</td>
            </tr>
            <tr>
              <td align="center">Interactive (or streaming) video key frame</td>
              <td align="center">low</td>
              <td align="center">keep</td>
              <td align="center">unreliable</td>
              <td align="center">Video key frames form the base frames of a video upon which the next 'n' timeframe of video updates is applied on. These frames, are hence, critical and without them, the video would not be coherent until the next critical frame is received. Retransmits of these are harmful to the UX. ***</td>
            </tr>
            <tr>
              <td align="center">File copy</td>
              <td align="center">low</td>
              <td align="center">bulk</td>
              <td align="center">reliable</td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="center">Interactive (or streaming) video predictive frame</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">unreliable</td>
              <td align="center">Video predictive frames can be lost, which would result in minor glitch but not compromise the user activity and video would still be coherent and useful. The reception of subsequent video key frame would mitigate the loss in quality caused by lost predictive frames.</td>
            </tr>
            <tr>
              <td align="center">Glyph smoothing</td>
              <td align="center">low</td>
              <td align="center">discard</td>
              <td align="center">Unreliable</td>
              <td align="center">The smoothing elements of the glyph can be lost and would still present a recognizable image, although with a lesser quality. Hence, these can be marked as loss tolerant as the user action is still completed with a small compromise to the UX. Moreover, with the reception of the next glyph critical frame would mitigate the loss in quality caused by lost glyph smoothing elements.</td>
            </tr>
          </tbody>
        </table>
        <t>Encoding:</t>
        <t>Glyph critical:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": true,
    "reliable": true,
    "realtime": true
  }
}
]]></sourcecode>
        <t>Glyph smoothing:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": false,
    "reliable": false,
    "prefer-keep": false
  }
}
]]></sourcecode>
        <t>Interactive Audio:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": true,
    "reliable": false,
    "prefer-keep": true
  }
}
]]></sourcecode>
        <t>Haptic feedback:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": true,
    "reliable": false,
    "prefer-keep": false
  }
}
]]></sourcecode>
        <t>File copy:</t>
        <sourcecode type="cddl"><![CDATA[
metadata = {
  "metadata-type": 1,
  "Application Metadata": {
    "importance": false,
    "reliable": true,
    "realtime": false
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples-n2h">
      <name>Example of Network-to-Host Metadata for Video Streaming</name>
      <t>A network element can signal the maximum bandwidth allowed for video streaming. Typically,
this policy limit exists in cellular networks.</t>
      <t>The example shown in <xref target="ex-video-bitrate"/> indicates a CIR (1 Mbps) for the requesting
user:</t>
      <figure anchor="ex-video-bitrate">
        <name>Example of Network-to-Host Metadata for Video Streaming</name>
        <artwork><![CDATA[
{
  "downlinkBitrate": {
    "cir": 1
  }
}
]]></artwork>
      </figure>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
