<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.11 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-panrg-path-properties-06" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.10.0 -->
  <front>
    <title abbrev="Path Properties">A Vocabulary of Path Properties</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-panrg-path-properties-06"/>
    <author initials="T." surname="Enghardt" fullname="Theresa Enghardt">
      <organization>Netflix</organization>
      <address>
        <email>ietf@tenghardt.net</email>
      </address>
    </author>
    <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
      <organization>ETH Zürich</organization>
      <address>
        <email>cyrill.kraehenbuehl@inf.ethz.ch</email>
      </address>
    </author>
    <date year="2022" month="September" day="22"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Path properties express information about paths across a network and the services provided via such paths.
In a path-aware network, path properties may be fully or partially available to entities such as endpoints.
This document defines and categorizes path properties.
Furthermore, the document specifies several path properties which might be useful to endpoints or other entities,
e.g., for selecting between paths or for invoking some of the provided services.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
      "Path-Aware Networking Research Group" mailing list (PANRG),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/panrg/"/>.
    Subscription information is at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/panrg/path-properties/"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The current Internet architecture does not explicitly support endpoint discovery of forwarding paths through the network as well as the discovery of properties and services associated with these paths.
Path-aware networking, as defined in Section 1.1 of <xref target="RFC9217" format="default"/>, describes
"endpoint discovery of the properties of paths they use for communication across an internetwork, and endpoint reaction to these properties that affects routing and/or data transfer".
This document provides a generic definition of path properties, addressing the first of the questions in path-aware networking <xref target="RFC9217" format="default"/>.</t>
      <t>As terms related to paths have been used with different meanings in different areas of networking, first, this document provides a common terminology to define paths, path elements, and flows. Based on these terms, the document defines path properties.
Then, this document provides some examples of use cases for path properties.
Finally, the document lists several path properties that may be useful for the mentioned use cases.</t>
      <t>Note that this document does not assume that any of the listed path properties are actually available to any entity. The question of how entities can discover and distribute path properties in a trustworthy way is out of scope for this document.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <dl>
        <dt>
Entity:  </dt>
        <dd>
          <t>A physical or virtual device or function, or a collection of devices or functions, which plays a role related to path-aware networking for particular paths and flows.
An entity can be on-path or off-path: On the path, an entity may participate in forwarding the flow, i.e., what may be called data plane functionality.
On or off the path, an entity may influence aspects of how the flow is forwarded, i.e., what may be called control plane functionality, such as Path Selection or Service Invocation.
An entity influencing forwarding aspects is usually aware of path properties, e.g., by observing or measuring them or by learning them from another entity.</t>
        </dd>
        <dt>
Node:  </dt>
        <dd>
          <t>An on-path entity which processes packets, e.g., sends, receives, forwards, or modifies them. A node may be physical or virtual, e.g., a physical device, a service function provided as a virtual element, or even a single queue within a switch. A node may also be an entity which consists of a collection of devices or functions, e.g., an entire Autonomous System (AS).</t>
        </dd>
        <dt>
Link:  </dt>
        <dd>
          <t>A medium or communication facility that connects two or more nodes with each other. A link enables a node to send packets to other nodes.
Links can be physical, e.g., a Wi-Fi network which connects an Access Point to stations, or virtual, e.g., a virtual switch which connects two virtual machines hosted on the same physical machine. A link is unidirectional. As such, bidirectional communication can be modeled as two links between the same nodes in opposite directions.</t>
        </dd>
        <dt>
Path element:  </dt>
        <dd>
          <t>Either a node or a link. For example, a path element can be an Abstract Network Element (ANE) as defined in <xref target="I-D.ietf-alto-path-vector" format="default"/>.</t>
        </dd>
        <dt>
Path:  </dt>
        <dd>
          <t>A sequence of adjacent path elements over which a packet can be transmitted, starting and ending with a node.
</t>
          <t>Paths are unidirectional and time-dependent, i.e., the sequence of path elements over which packets are sent from one node to another may change.</t>
          <t>The representation of a path and its properties may depend on the entity considering the path.
On the one hand, the representation may differ due to entities having partial visibility of path elements comprising a path or their visibility changing over time.
On the other hand, the representation may differ due to treating path elements at different levels of abstraction.
For example, a path may be given as a sequence of physical nodes and the links connecting these nodes, a sequence of logical nodes such as a sequence of ASes or an Explicit Route Object (ERO), or only consist of a specific source and destination which is known to be reachable from that source.</t>
          <t>A multicast or broadcast setting, where a packet is sent by one node and received by multiple nodes, is described by multiple paths over which the packet is sent, one path for each combination of sending and receiving node; these paths do not have to be disjoint.</t>
        </dd>
        <dt>
Endpoint:  </dt>
        <dd>
          <t>The endpoints of a path are the first and the last node on the path. For example, an endpoint can be a host as defined in <xref target="RFC1122" format="default"/>, which can be a client (e.g., a node running a web browser) or a server (e.g., a node running a web server).</t>
        </dd>
        <dt>
Reverse Path:  </dt>
        <dd>
          <t>The path that is used by a remote node in the context of bidirectional communication.</t>
        </dd>
        <dt>
Subpath:  </dt>
        <dd>
          <t>Given a path, a subpath is a sequence of adjacent path elements of this path.</t>
        </dd>
        <dt>
Flow:  </dt>
        <dd>
          <t>One or multiple packets to which the traits of a path or set of subpaths may be applied in a functional sense. For example, a flow can consist of all packets sent within a TCP session with the same five-tuple between two hosts, or it can consist of all packets sent on the same physical link.</t>
        </dd>
        <dt>
Property:  </dt>
        <dd>
          <t>A trait of one or a sequence of path elements, or a trait of a flow with respect to one or a sequence of path elements. An example of a link property is the maximum data rate that can be sent over the link. An example of a node property is the administrative domain that the node belongs to. An example of a property of a flow with respect to a subpath is the aggregated one-way delay of the flow being sent from one node to another node over this subpath.
A property is thus described by a tuple containing the path element(s), the flow or an empty set if no packets are relevant for the property, the name of the property (e.g., maximum data rate), and the value of the property (e.g., 1Gbps).</t>
        </dd>
        <dt>
Aggregated property:  </dt>
        <dd>
          <t>A collection of multiple values of a property into a single value, according to a function. A property can be aggregated over multiple path elements (i.e., a subpath), e.g., the MTU of a path as the minimum MTU of all links on the path, over multiple packets (i.e., a flow), e.g., the median one-way latency of all packets between two nodes, or over both, e.g., the mean of the queueing delays of a flow on all nodes along a path.
The aggregation function can be numerical, e.g., median, sum, minimum, it can be logical, e.g., "true if all are true", "true if at least 50% of values are true", or an arbitrary function which maps multiple input values to an output value.</t>
        </dd>
        <dt>
Observed property:  </dt>
        <dd>
          <t>A property that is observed for a specific path element, subpath, or path, e.g., using measurements. For example, the one-way delay of a specific packet transmitted from one node to another node can be measured.</t>
        </dd>
        <dt>
Assessed property:  </dt>
        <dd>
          <t>An approximate calculation or assessment of the value of a property. An assessed property includes the reliability of the calculation or assessment. The notion of reliability depends on the property.
For example, a path property based on an approximate calculation may describe the expected median one-way latency of packets sent on a path within the next second, including the confidence level and interval. A non-numerical assessment may instead include the likelihood that the property holds.</t>
        </dd>
        <dt>
Target property:  </dt>
        <dd>
          <t>An objective that is set for a property over a path element, subpath, or path.
Note that a target property can be set for observed properties, such as one-way delay, but also for properties that cannot be observed by the entity setting the target, such as inclusion of certain nodes on a path.</t>
        </dd>
      </dl>
      <section anchor="terminology-usage-for-specific-technologies" numbered="true" toc="default">
        <name>Terminology usage for specific technologies</name>
        <t>The terminology defined in this document is intended to be general and applicable to existing and future path-aware technologies.
Using this terminology, a path-aware technology can define and consider specific path elements and path properties on a specific level of abstraction.
For instance, a technology may define path elements as IP routers, e.g., in source routing (<xref target="RFC1940" format="default"/>). Alternatively, it may consider path elements on a different layer of the Internet Architecture (<xref target="RFC1122" format="default"/>) or as a collection of entities not tied to a specific layer, such as an AS or an ERO.
Even within a single path-aware technology, specific definitions might differ depending on the context in which they are used.
For example, the endpoints might be the communicating hosts in the context of the transport layer, ASes that contain the hosts in the context of routing, or specific applications in the context of the application layer.</t>
      </section>
    </section>
    <section anchor="use-cases" numbered="true" toc="default">
      <name>Use Cases for Path Properties</name>
      <t>When a path-aware network exposes path properties to endpoints or other entities,
these entities may use this information to achieve different goals.
This section lists several use cases for path properties.</t>
      <t>Note that this is not an exhaustive list, as with every new technology and protocol, novel use cases may emerge, and new path properties may become relevant.
Moreover, for any particular technology, entities may have visibility of and control over different path elements and path properties, and consider them on different levels of abstraction.
Therefore, a new technology may implement an existing use case related to different path elements or on a different level of abstraction.</t>
      <section anchor="path-selection" numbered="true" toc="default">
        <name>Path Selection</name>
        <t>Nodes may be able to send flows via one (or a subset) out of multiple possible paths, and an entity may be able to influence the decision which path(s) to use.
Path Selection may be feasible if there are several paths to the same destination (e.g., in case of a mobile device with two wireless interfaces, both providing a path), or if there are several destinations, and thus several paths, providing the same service (e.g., Application-Layer Traffic Optimization (ALTO) <xref target="RFC5693" format="default"/>, an application layer peer-to-peer protocol allowing endpoints a better-than-random peer selection).
Entities may select their paths to fulfill a specific goal by specifying target properties for their selected paths, e.g., related to performance or security.</t>
        <t>Target properties relating to network performance typically refer to observed properties, such as One-Way Delay, One-Way Packet Loss, and Link Capacity.
Entities then select paths based on their target property and the assessed property of the available paths that best match the application requirements.
For such performance-related target properties, the observed property is similar to a service level indicator (SLI) and the assessed property is similar to a service level objective (SLO) for IETF network slices <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.
As an example path selection strategy, for sending a small delay-sensitive query, an entity may select a path with a short One-Way Delay, while for retrieving a large file, it may select a path with high Link Capacities on all links.</t>
        <t>It is also possible for an entity to set target properties which it cannot (directly) observe, similar to service level expectations (SLEs) for IETF network slices <xref target="I-D.ietf-teas-ietf-network-slices" format="default"/>.
For example, this can apply to security-related target properties and path selection, such as allowing or disallowing sending flows over paths that involve specific networks or nodes to enforce traffic policies or mandating that all enterprise traffic goes through a specific firewall.</t>
        <t>Care needs to be taken when selecting paths based on observed path properties, as path properties that were previously measured may not be helpful in predicting current or future path properties and such path selection may lead to unintended feedback loops. Also, there may be trade-offs between path properties (e.g., One-Way Delay and Link Capacity), and entities may influence these trade-offs with their choices.</t>
        <t>As a baseline, a path selection algorithm should aim to not perform worse than the default case most of the time.</t>
        <t>Path selection can be done either by the communicating node(s) or by other entities within the network:
A network (e.g., an AS) can adjust its path selection for internal or external routing based on path properties.
In BGP, the Multi Exit Discriminator (MED) attribute is used in the decision-making process to select which path to choose among those having the same AS PATH length and origin <xref target="RFC4271" format="default"/>; in a path-aware network, instead of using this single MED value, other properties such as Link Capacity or Link Usage could additionally be used to improve load balancing or performance <xref target="I-D.ietf-idr-performance-routing" format="default"/>.</t>
      </section>
      <section anchor="protocol-selection" numbered="true" toc="default">
        <name>Protocol Selection</name>
        <t>Before sending data over a specific path, an entity may select an appropriate protocol or configure protocol parameters depending on path properties.
For example, an endpoint may cache state on whether a path allows the use of QUIC <xref target="RFC9000" format="default"/> and if so, first attempt to connect using QUIC before falling back to another protocol when connecting over this path again.
A video streaming application may choose an (initial) video quality based on the achievable data rate or the monetary cost of sending data (e.g., volume-base or flat-rate cost model).</t>
      </section>
      <section anchor="service-invocation" numbered="true" toc="default">
        <name>Service Invocation</name>
        <t>In addition to path or protocol selection, an entity may choose to invoke additional functions in the context of Service Function Chaining <xref target="RFC7665" format="default"/>, which may influence what nodes are on the path.
For example, a 0-RTT Transport Converter <xref target="RFC8803" format="default"/> will be involved in a path only when invoked by an endpoint; such invocation will lead to the use of MPTCP <xref target="RFC8684" format="default"/> or TCPinc <xref target="RFC8547" format="default"/> <xref target="RFC8548" format="default"/> capabilities while such use is not supported via the default forwarding path.
Another example is a connection which is composed of multiple streams where each stream has specific service requirements. An endpoint may decide to invoke a given service function (e.g., transcoding) only for some streams while others are not processed by that service function.</t>
      </section>
    </section>
    <section anchor="examples-of-path-properties" numbered="true" toc="default">
      <name>Examples of Path Properties</name>
      <t>This Section gives some examples of path properties which may be useful, e.g., for the use cases described in <xref target="use-cases" format="default"/>.</t>
      <t>Within the context of any particular technology, available path properties may differ
as entities have insight into and are able to influence different path elements and path properties.
For example, an endpoint may have some visibility into path elements that are on a low level of abstraction and close, e.g., individual nodes within the first few hops, or it may have visibility into path elements that are far away and/or on a higher level of abstraction, e.g., the list of ASes traversed.
This visibility may depend on factors such as the physical or network distance or the existence of trust or contractual relationships between the endpoint and the path element(s).
A path property can be defined relative to individual path elements, a sequence of path elements, or "end-to-end", i.e., relative to a path that comprises of two endpoints and a single virtual link connecting them.</t>
      <t>Path properties may be relatively dynamic, e.g., the one-way delay of a packet sent over a specific path, or non-dynamic, e.g., the MTU of an Ethernet link which only changes infrequently.
Usefulness over time differs depending on how dynamic a property is:
The merit of a momentarily observed dynamic path propety may diminish greatly as time goes on, e.g.,
it is possible for the observed values of One-Way Delay to change on timescales which are shorter than the One-Way Delay between the measurement point and an entity making a decision such as Path Selection, which may cause the measurement to be outdated when it reaches the decision-making entity. Therefore, consumers of dynamic path properties need to apply caution when using them, e.g., by aggregating them appropriately or dampening their changes to avoiding oscillation.
In contrast, the observed value of a less dynamic path property might stay relevant for a longer period of time, e.g. a NAT typically stays on a specific path during the lifetime of a connection involving packets sent over this path.</t>
      <dl>
        <dt>
Access Technology:  </dt>
        <dd>
          <t>The physical or link layer technology used for transmitting or receiving a flow on one or multiple path elements. If known, the Access Technology may be given as an abstract link type, e.g., as Wi-Fi, Wired Ethernet, or Cellular. It may also be given as a specific technology used on a link, e.g., 2G, 3G, 4G, or 5G cellular, or 802.11a, b, g, n, or ac Wi-Fi. Other path elements relevant to the access technology may include nodes related to processing packets on the physical or link layer, such as elements of a cellular backbone network. Note that there is no common registry of possible values for this property.</t>
        </dd>
        <dt>
Monetary Cost:  </dt>
        <dd>
          <t>The price to be paid to transmit or receive a specific flow across a network to which one or multiple path elements belong.</t>
        </dd>
        <dt>
Service function:  </dt>
        <dd>
          <t>A service function that a path element applies to a flow, see <xref target="RFC7665" format="default"/>. Examples of abstract service functions include firewalls, Network Address Translation (NAT), and TCP optimizers. Some stateful service functions, such as NAT, need to observe the same flow in both directions, e.g., by being an element of both the path and the reverse path.</t>
        </dd>
        <dt>
Transparency:  </dt>
        <dd>
          <t>When a node performs an action A on a flow F, the node is transparent to F with respect to some (meta-)information M if the node performs A independently of M.
M can for example be the existence of a protocol (header) in a packet or the content of a protocol header, payload, or both.
For example, A can be blocking packets or reading and modifying (other protocol) headers or payloads.
Transparency can be modeled using a function f, which takes as input F and M and outputs the action taken by the node.
If a taint analysis shows that the output of f is not tainted (impacted) by M or if the output of f is constant for arbitrary values of M, then the node is considered to be transparent.
An IP router could be transparent to transport protocol headers such as TCP/UDP but not transparent to IP headers since its forwarding behavior depends on the IP headers.
A firewall that only allows outgoing TCP connections by blocking all incoming TCP SYN packets regardless of their IP address is transparent to IP but not to TCP headers.
Finally, a NAT that actively modifies IP and TCP/UDP headers based on their content is not transparent to either IP or TCP/UDP headers.
Note that according to this definition, a node that modifies packets in accordance with the endpoints, such as a transparent HTTP proxy, as defined in <xref target="RFC2616" format="default"/>, and a node listening and reacting to implicit or explicit signals, see <xref target="RFC8558" format="default"/>, are not considered transparent.</t>
        </dd>
        <dt>
Administrative Domain:  </dt>
        <dd>
          <t>The identity of an individual or an organization that owns a path element (or several path elements).
Examples of administrative domains are an IGP area, an AS, or a service provider network.</t>
        </dd>
        <dt>
Routing Domain Identifier:  </dt>
        <dd>
          <t>An identifier indicating the routing domain of a path element.
Path elements in the same routing domain are in the same administrative domain and use a common routing protocol to communicate with each other.
An example of a routing domain identifier is the globally unique autonomous system number (ASN) as defined in <xref target="RFC1930" format="default"/>.</t>
        </dd>
        <dt>
Disjointness:  </dt>
        <dd>
          <t>For a set of two paths or subpaths, the number of shared path elements can be a measure of intersection (e.g., Jaccard coefficient, which is the number of shared elements divided by the total number of elements). Conversely, the number of non-shared path elements can be a measure of disjointness (e.g., 1 - Jaccard coefficient). A multipath protocol might use disjointness as a metric to reduce the number of single points of failure.</t>
        </dd>
        <dt>
Symmetric Path:  </dt>
        <dd>
          <t>Two paths are symmetric if the path and its reverse path consist of the same path elements on the same level of abstraction, but in reverse order.
For example, a path which consists of layer 3 switches and links between them and a reverse path with the same path elements but in reverse order are considered "routing" symmetric, as the same path elements on the same level of abstraction (IP forwarding) are traversed in the opposite direction.</t>
        </dd>
        <dt>
Path MTU:  </dt>
        <dd>
          <t>The maximum size, in octets, of an IP packet that can be transmitted without fragmentation.</t>
        </dd>
        <dt>
Transport Protocols available:  </dt>
        <dd>
          <t>Whether a specific transport protocol can be used to establish a connection over a path or subpath, e.g., whether the path is QUIC-capable or MPTCP-capable, based on cached knowledge.</t>
        </dd>
        <dt>
Protocol Features available:  </dt>
        <dd>
          <t>Whether a specific protocol feature is available over a path or subpath, e.g., Explicit Congestion Notification (ECN), or TCP Fast Open.</t>
        </dd>
      </dl>
      <t>Some path properties express the performance of the transmission of a packet or flow over a link or subpath.
Such transmission performance properties can be observed or assessed, e.g., by endpoints or by path elements on the path, or they may be available as cost metrics, see <xref target="I-D.ietf-alto-performance-metrics" format="default"/>.
Transmission performance properties may be made available in an aggregated form, such as averages or minimums.
Properties related to a path element which constitutes a single layer 2 domain are abstracted from the used physical and link layer technology, similar to <xref target="RFC8175" format="default"/>.</t>
      <dl>
        <dt>
Link Capacity:  </dt>
        <dd>
          <t>The link capacity is the maximum data rate at which data that was sent over a link can correctly be received at the node adjacent to the link.
This property is analogous to the link capacity defined in <xref target="RFC5136" format="default"/> and <xref target="RFC9097" format="default"/> but not restricted to IP-layer traffic.</t>
        </dd>
        <dt>
Link Usage:  </dt>
        <dd>
          <t>The link usage is the actual data rate at which data that was sent over a link is correctly received at the node adjacent to the link.
This property is analogous to the link usage defined in <xref target="RFC5136" format="default"/> and <xref target="RFC9097" format="default"/> but not restricted to IP-layer traffic.</t>
        </dd>
        <dt>
One-Way Delay:  </dt>
        <dd>
          <t>The one-way delay is the delay between a node sending a packet and another node on the same path receiving the packet.
This property is analogous to the one-way delay defined in <xref target="RFC7679" format="default"/> but not restricted to IP-layer traffic.</t>
        </dd>
        <dt>
One-Way Delay Variation:  </dt>
        <dd>
          <t>The variation of the one-way delays within a flow.
This property is similar to the one-way delay variation defined in <xref target="RFC3393" format="default"/> but not restricted to IP-layer traffic and defined for packets on the same flow instead of packets sent between a source and destination IP address.</t>
        </dd>
        <dt>
One-Way Packet Loss:  </dt>
        <dd>
          <t>Packets sent by a node but not received by another node on the same path after a certain time interval are considered lost.
This property is analogous to the one-way loss defined in <xref target="RFC7680" format="default"/> but not restricted to IP-layer traffic.
Metrics such as loss patterns <xref target="RFC3357" format="default"/> and loss episodes <xref target="RFC6534" format="default"/> can be expressed as aggregated properties.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>If entities are basing policy or path selection decisions on path properties, they need to rely on the accuracy of path properties that other devices communicate to them.
In order to be able to trust such path properties, entities may need to establish a trust relationship or be able to verify the authenticity, integrity, and correctness of path properties received from another entity.</t>
      <t>Security related properties such as confidentiality and integrity protection of payloads are difficult to characterize since they are only meaningful with respect to a threat model which depends on the use case, application, environment, and other factors.
Likewise, properties for trust relations between entities cannot be meaningfully defined without a concrete threat model, and defining a threat model is out of scope for this draft.
Properties related to confidentiality, integrity, and trust are orthogonal to the path terminology and path properties defined in this document.
Such properties are tied to the communicating nodes and the protocols they use (e.g., client and server using HTTPS, or client and remote network node using VPN) while the path is typically oblivious to them.
Intuitively, the path describes what function the network applies to packets, while confidentiality, integrity, and trust describe what function the communicating parties apply to packets.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.ietf-idr-performance-routing">
        <front>
          <title>Performance-based BGP Routing Mechanism</title>
          <author fullname="Xiaohu Xu" initials="X." surname="Xu">
            <organization>Alibaba, Inc</organization>
          </author>
          <author fullname="Shraddha Hegde" initials="S." surname="Hegde">
            <organization>Juniper</organization>
          </author>
          <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
            <organization>Cisco</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>France Telecom</organization>
          </author>
          <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
            <organization>France Telecom</organization>
          </author>
          <date day="22" month="December" year="2020"/>
          <abstract>
            <t>   The current BGP specification doesn't use network performance metrics
   (e.g., network latency) in the route selection decision process.
   This document describes a performance-based BGP routing mechanism in
   which network latency metric is taken as one of the route selection
   criteria.  This routing mechanism is useful for those server
   providers with global reach to deliver low-latency network
   connectivity services to their customers.


            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-performance-routing-03"/>
      </reference>
      <reference anchor="I-D.ietf-alto-path-vector">
        <front>
          <title>An ALTO Extension: Path Vector</title>
          <author fullname="Kai Gao" initials="K." surname="Gao">
            <organization>Sichuan University</organization>
          </author>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung</organization>
          </author>
          <author fullname="Sabine Randriamasy" initials="S." surname="Randriamasy">
            <organization>Nokia Bell Labs</organization>
          </author>
          <author fullname="Y. Richard Yang" initials="Y. R." surname="Yang">
            <organization>Yale University</organization>
          </author>
          <author fullname="Jingxuan Zhang" initials="J." surname="Zhang">
            <organization>Tongji University</organization>
          </author>
          <date day="20" month="March" year="2022"/>
          <abstract>
            <t>   This document is an extension to the base Application-Layer Traffic
   Optimization (ALTO) protocol.  It extends the ALTO Cost Map and ALTO
   Property Map services so that an application can decide which
   endpoint(s) to connect based on not only numerical/ordinal cost
   values but also fine-grained abstract information of the paths.  This
   is useful for applications whose performance is impacted by specified
   components of a network on the end-to-end paths, e.g., they may infer
   that several paths share common links and prevent traffic bottlenecks
   by avoiding such paths.  This extension introduces a new abstraction
   called Abstract Network Element (ANE) to represent these components
   and encodes a network path as a vector of ANEs.  Thus, it provides a
   more complete but still abstract graph representation of the
   underlying network(s) for informed traffic optimization among
   endpoints.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-alto-path-vector-25"/>
      </reference>
      <reference anchor="I-D.ietf-alto-performance-metrics">
        <front>
          <title>ALTO Performance Cost Metrics</title>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Y. Richard Yang" initials="Y. R." surname="Yang">
            <organization>Yale University</organization>
          </author>
          <author fullname="Young Lee" initials="Y." surname="Lee">
            <organization>Samsung</organization>
          </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
            <organization>Huawei</organization>
          </author>
          <author fullname="Sabine Randriamasy" initials="S." surname="Randriamasy">
            <organization>Nokia Bell Labs</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <date day="21" month="March" year="2022"/>
          <abstract>
            <t>   The cost metric is a basic concept in Application-Layer Traffic
   Optimization (ALTO), and different applications may use different
   types of cost metrics.  Since the ALTO base protocol (RFC 7285)
   defines only a single cost metric (namely, the generic "routingcost"
   metric), if an application wants to issue a cost map or an endpoint
   cost request in order to identify a resource provider that offers
   better performance metrics (e.g., lower delay or loss rate), the base
   protocol does not define the cost metric to be used.

   This document addresses this issue by extending the specification to
   provide a variety of network performance metrics, including network
   delay, delay variation (a.k.a, jitter), packet loss rate, hop count,
   and bandwidth.

   There are multiple sources (e.g., estimation based on measurements or
   service-level agreement) to derive a performance metric.  This
   document introduces an additional "cost-context" field to the ALTO
   "cost-type" field to convey the source of a performance metric.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-alto-performance-metrics-28"/>
      </reference>
      <reference anchor="I-D.ietf-teas-ietf-network-slices">
        <front>
          <title>Framework for IETF Network Slices</title>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="John Drake" initials="J." surname="Drake">
            <organization>Juniper Networks</organization>
          </author>
          <author fullname="Reza Rokui" initials="R." surname="Rokui">
            <organization>Ciena</organization>
          </author>
          <author fullname="Shunsuke Homma" initials="S." surname="Homma">
            <organization>NTT</organization>
          </author>
          <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
            <organization>Microsoft Inc.</organization>
          </author>
          <date day="3" month="August" year="2022"/>
          <abstract>
            <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term "IETF Network
   Slice" and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-teas-ietf-network-slices-14"/>
      </reference>
      <reference anchor="RFC1930">
        <front>
          <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
          <author fullname="J. Hawkinson" initials="J." surname="Hawkinson">
            <organization/>
          </author>
          <author fullname="T. Bates" initials="T." surname="Bates">
            <organization/>
          </author>
          <date month="March" year="1996"/>
          <abstract>
            <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="6"/>
        <seriesInfo name="RFC" value="1930"/>
        <seriesInfo name="DOI" value="10.17487/RFC1930"/>
      </reference>
      <reference anchor="RFC2616">
        <front>
          <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
          <author fullname="R. Fielding" initials="R." surname="Fielding">
            <organization/>
          </author>
          <author fullname="J. Gettys" initials="J." surname="Gettys">
            <organization/>
          </author>
          <author fullname="J. Mogul" initials="J." surname="Mogul">
            <organization/>
          </author>
          <author fullname="H. Frystyk" initials="H." surname="Frystyk">
            <organization/>
          </author>
          <author fullname="L. Masinter" initials="L." surname="Masinter">
            <organization/>
          </author>
          <author fullname="P. Leach" initials="P." surname="Leach">
            <organization/>
          </author>
          <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
            <organization/>
          </author>
          <date month="June" year="1999"/>
          <abstract>
            <t>HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1", and is an update to RFC 2068.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2616"/>
        <seriesInfo name="DOI" value="10.17487/RFC2616"/>
      </reference>
      <reference anchor="RFC3357">
        <front>
          <title>One-way Loss Pattern Sample Metrics</title>
          <author fullname="R. Koodli" initials="R." surname="Koodli">
            <organization/>
          </author>
          <author fullname="R. Ravikanth" initials="R." surname="Ravikanth">
            <organization/>
          </author>
          <date month="August" year="2002"/>
        </front>
        <seriesInfo name="RFC" value="3357"/>
        <seriesInfo name="DOI" value="10.17487/RFC3357"/>
      </reference>
      <reference anchor="RFC3393">
        <front>
          <title>IP Packet Delay Variation Metric for IP Performance Metrics (IPPM)</title>
          <author fullname="C. Demichelis" initials="C." surname="Demichelis">
            <organization/>
          </author>
          <author fullname="P. Chimento" initials="P." surname="Chimento">
            <organization/>
          </author>
          <date month="November" year="2002"/>
        </front>
        <seriesInfo name="RFC" value="3393"/>
        <seriesInfo name="DOI" value="10.17487/RFC3393"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC5136">
        <front>
          <title>Defining Network Capacity</title>
          <author fullname="P. Chimento" initials="P." surname="Chimento">
            <organization/>
          </author>
          <author fullname="J. Ishac" initials="J." surname="Ishac">
            <organization/>
          </author>
          <date month="February" year="2008"/>
          <abstract>
            <t>Measuring capacity is a task that sounds simple, but in reality can be quite complex.  In addition, the lack of a unified nomenclature on this subject makes it increasingly difficult to properly build, test, and use techniques and tools built around these constructs.  This document provides definitions for the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling between a source and destination in an IP network.  By doing so, we hope to provide a common framework for the discussion and analysis of a diverse set of current and future estimation techniques.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5136"/>
        <seriesInfo name="DOI" value="10.17487/RFC5136"/>
      </reference>
      <reference anchor="RFC5693">
        <front>
          <title>Application-Layer Traffic Optimization (ALTO) Problem Statement</title>
          <author fullname="J. Seedorf" initials="J." surname="Seedorf">
            <organization/>
          </author>
          <author fullname="E. Burger" initials="E." surname="Burger">
            <organization/>
          </author>
          <date month="October" year="2009"/>
          <abstract>
            <t>Distributed applications -- such as file sharing, real-time communication, and live and on-demand media streaming -- prevalent on the Internet use a significant amount of network resources.  Such applications often transfer large amounts of data through connections established between nodes distributed across the Internet with little knowledge of the underlying network topology.  Some applications are so designed that they choose a random subset of peers from a larger set with which to exchange data.  Absent any topology information guiding such choices, or acting on suboptimal or local information obtained from measurements and statistics, these applications often make less than desirable choices.</t>
            <t>This document discusses issues related to an information-sharing service that enables applications to perform better-than-random peer selection.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5693"/>
        <seriesInfo name="DOI" value="10.17487/RFC5693"/>
      </reference>
      <reference anchor="RFC6534">
        <front>
          <title>Loss Episode Metrics for IP Performance Metrics (IPPM)</title>
          <author fullname="N. Duffield" initials="N." surname="Duffield">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." surname="Morton">
            <organization/>
          </author>
          <author fullname="J. Sommers" initials="J." surname="Sommers">
            <organization/>
          </author>
          <date month="May" year="2012"/>
          <abstract>
            <t>The IETF has developed a one-way packet loss metric that measures the loss rate on a Poisson and Periodic probe streams between two hosts. However, the impact of packet loss on applications is, in general, sensitive not just to the average loss rate but also to the way in which packet losses are distributed in loss episodes (i.e., maximal sets of consecutively lost probe packets).  This document defines one-way packet loss episode metrics, specifically, the frequency and average duration of loss episodes and a probing methodology under which the loss episode metrics are to be measured.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6534"/>
        <seriesInfo name="DOI" value="10.17487/RFC6534"/>
      </reference>
      <reference anchor="RFC7665">
        <front>
          <title>Service Function Chaining (SFC) Architecture</title>
          <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern">
            <organization/>
          </author>
          <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro">
            <organization/>
          </author>
          <date month="October" year="2015"/>
          <abstract>
            <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7665"/>
        <seriesInfo name="DOI" value="10.17487/RFC7665"/>
      </reference>
      <reference anchor="RFC7679">
        <front>
          <title>A One-Way Delay Metric for IP Performance Metrics (IPPM)</title>
          <author fullname="G. Almes" initials="G." surname="Almes">
            <organization/>
          </author>
          <author fullname="S. Kalidindi" initials="S." surname="Kalidindi">
            <organization/>
          </author>
          <author fullname="M. Zekauskas" initials="M." surname="Zekauskas">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
            <organization/>
          </author>
          <date month="January" year="2016"/>
          <abstract>
            <t>This memo defines a metric for one-way delay of packets across Internet paths.  It builds on notions introduced and discussed in the IP Performance Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be familiar with that document.  This memo makes RFC 2679 obsolete.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="81"/>
        <seriesInfo name="RFC" value="7679"/>
        <seriesInfo name="DOI" value="10.17487/RFC7679"/>
      </reference>
      <reference anchor="RFC7680">
        <front>
          <title>A One-Way Loss Metric for IP Performance Metrics (IPPM)</title>
          <author fullname="G. Almes" initials="G." surname="Almes">
            <organization/>
          </author>
          <author fullname="S. Kalidindi" initials="S." surname="Kalidindi">
            <organization/>
          </author>
          <author fullname="M. Zekauskas" initials="M." surname="Zekauskas">
            <organization/>
          </author>
          <author fullname="A. Morton" initials="A." role="editor" surname="Morton">
            <organization/>
          </author>
          <date month="January" year="2016"/>
          <abstract>
            <t>This memo defines a metric for one-way loss of packets across Internet paths.  It builds on notions introduced and discussed in the IP Performance Metrics (IPPM) Framework document, RFC 2330; the reader is assumed to be familiar with that document.  This memo makes RFC 2680 obsolete.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="82"/>
        <seriesInfo name="RFC" value="7680"/>
        <seriesInfo name="DOI" value="10.17487/RFC7680"/>
      </reference>
      <reference anchor="RFC8175">
        <front>
          <title>Dynamic Link Exchange Protocol (DLEP)</title>
          <author fullname="S. Ratliff" initials="S." surname="Ratliff">
            <organization/>
          </author>
          <author fullname="S. Jury" initials="S." surname="Jury">
            <organization/>
          </author>
          <author fullname="D. Satterwhite" initials="D." surname="Satterwhite">
            <organization/>
          </author>
          <author fullname="R. Taylor" initials="R." surname="Taylor">
            <organization/>
          </author>
          <author fullname="B. Berry" initials="B." surname="Berry">
            <organization/>
          </author>
          <date month="June" year="2017"/>
          <abstract>
            <t>When routing devices rely on modems to effect communications over wireless links, they need timely and accurate knowledge of the characteristics of the link (speed, state, etc.) in order to make routing decisions.  In mobile or other environments where these characteristics change frequently, manual configurations or the inference of state through routing or transport protocols does not allow the router to make the best decisions.  This document introduces a new protocol called the Dynamic Link Exchange Protocol (DLEP), which provides a bidirectional, event-driven communication channel between the router and the modem to facilitate communication of changing link characteristics.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8175"/>
        <seriesInfo name="DOI" value="10.17487/RFC8175"/>
      </reference>
      <reference anchor="RFC8547">
        <front>
          <title>TCP-ENO: Encryption Negotiation Option</title>
          <author fullname="A. Bittau" initials="A." surname="Bittau">
            <organization/>
          </author>
          <author fullname="D. Giffin" initials="D." surname="Giffin">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="D. Mazieres" initials="D." surname="Mazieres">
            <organization/>
          </author>
          <author fullname="E. Smith" initials="E." surname="Smith">
            <organization/>
          </author>
          <date month="May" year="2019"/>
          <abstract>
            <t>Despite growing adoption of TLS, a significant fraction of TCP traffic on the Internet remains unencrypted.  The persistence of unencrypted traffic can be attributed to at least two factors. First, some legacy protocols lack a signaling mechanism (such as a STARTTLS command) by which to convey support for encryption, thus making incremental deployment impossible.  Second, legacy applications themselves cannot always be upgraded and therefore require a way to implement encryption transparently entirely within the transport layer.  The TCP Encryption Negotiation Option (TCP-ENO) addresses both of these problems through a new TCP option kind providing out-of-band, fully backward-compatible negotiation of encryption.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8547"/>
        <seriesInfo name="DOI" value="10.17487/RFC8547"/>
      </reference>
      <reference anchor="RFC8548">
        <front>
          <title>Cryptographic Protection of TCP Streams (tcpcrypt)</title>
          <author fullname="A. Bittau" initials="A." surname="Bittau">
            <organization/>
          </author>
          <author fullname="D. Giffin" initials="D." surname="Giffin">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="D. Mazieres" initials="D." surname="Mazieres">
            <organization/>
          </author>
          <author fullname="Q. Slack" initials="Q." surname="Slack">
            <organization/>
          </author>
          <author fullname="E. Smith" initials="E." surname="Smith">
            <organization/>
          </author>
          <date month="May" year="2019"/>
          <abstract>
            <t>This document specifies "tcpcrypt", a TCP encryption protocol designed for use in conjunction with the TCP Encryption Negotiation Option (TCP-ENO).  Tcpcrypt coexists with middleboxes by tolerating resegmentation, NATs, and other manipulations of the TCP header.  The protocol is self-contained and specifically tailored to TCP implementations, which often reside in kernels or other environments in which large external software dependencies can be undesirable. Because the size of TCP options is limited, the protocol requires one additional one-way message latency to perform key exchange before application data can be transmitted.  However, the extra latency can be avoided between two hosts that have recently established a previous tcpcrypt connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8548"/>
        <seriesInfo name="DOI" value="10.17487/RFC8548"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie">
            <organization/>
          </author>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals.  For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear.  Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements.  In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels.  Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC8684">
        <front>
          <title>TCP Extensions for Multipath Operation with Multiple Addresses</title>
          <author fullname="A. Ford" initials="A." surname="Ford">
            <organization/>
          </author>
          <author fullname="C. Raiciu" initials="C." surname="Raiciu">
            <organization/>
          </author>
          <author fullname="M. Handley" initials="M." surname="Handley">
            <organization/>
          </author>
          <author fullname="O. Bonaventure" initials="O." surname="Bonaventure">
            <organization/>
          </author>
          <author fullname="C. Paasch" initials="C." surname="Paasch">
            <organization/>
          </author>
          <date month="March" year="2020"/>
          <abstract>
            <t>TCP/IP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a TCP/IP session would improve resource usage within the network and thus improve user experience through higher throughput and improved resilience to network failure.</t>
            <t>Multipath TCP provides the ability to simultaneously use multiple paths between peers. This document presents a set of extensions to traditional TCP to support multipath operation. The protocol offers the same type of service to applications as TCP (i.e., a reliable bytestream), and it provides the components necessary to establish and use multiple TCP flows across potentially disjoint paths.</t>
            <t>This document specifies v1 of Multipath TCP, obsoleting v0 as specified in RFC 6824, through clarifications and modifications primarily driven by deployment experience.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8684"/>
        <seriesInfo name="DOI" value="10.17487/RFC8684"/>
      </reference>
      <reference anchor="RFC8803">
        <front>
          <title>0-RTT TCP Convert Protocol</title>
          <author fullname="O. Bonaventure" initials="O." role="editor" surname="Bonaventure">
            <organization/>
          </author>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair">
            <organization/>
          </author>
          <author fullname="S. Gundavelli" initials="S." surname="Gundavelli">
            <organization/>
          </author>
          <author fullname="S. Seo" initials="S." surname="Seo">
            <organization/>
          </author>
          <author fullname="B. Hesmans" initials="B." surname="Hesmans">
            <organization/>
          </author>
          <date month="July" year="2020"/>
          <abstract>
            <t>This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert).</t>
            <t>This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever).</t>
            <t>This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8803"/>
        <seriesInfo name="DOI" value="10.17487/RFC8803"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
            <organization/>
          </author>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
            <organization/>
          </author>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9097">
        <front>
          <title>Metrics and Methods for One-Way IP Capacity</title>
          <author fullname="A. Morton" initials="A." surname="Morton">
            <organization/>
          </author>
          <author fullname="R. Geib" initials="R." surname="Geib">
            <organization/>
          </author>
          <author fullname="L. Ciavattone" initials="L." surname="Ciavattone">
            <organization/>
          </author>
          <date month="November" year="2021"/>
          <abstract>
            <t>This memo revisits the problem of Network Capacity Metrics first examined in RFC 5136. This memo specifies a more practical Maximum IP-Layer Capacity Metric definition catering to measurement and outlines the corresponding Methods of Measurement.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9097"/>
        <seriesInfo name="DOI" value="10.17487/RFC9097"/>
      </reference>
      <reference anchor="RFC9217">
        <front>
          <title>Current Open Questions in Path-Aware Networking</title>
          <author fullname="B. Trammell" initials="B." surname="Trammell">
            <organization/>
          </author>
          <date month="March" year="2022"/>
          <abstract>
            <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
            <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9217"/>
        <seriesInfo name="DOI" value="10.17487/RFC9217"/>
      </reference>
      <reference anchor="RFC1122">
        <front>
          <title>Requirements for Internet Hosts - Communication Layers</title>
          <author fullname="R. Braden" initials="R." role="editor" surname="Braden">
            <organization/>
          </author>
          <date month="October" year="1989"/>
          <abstract>
            <t>This RFC is an official specification for the Internet community.  It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="3"/>
        <seriesInfo name="RFC" value="1122"/>
        <seriesInfo name="DOI" value="10.17487/RFC1122"/>
      </reference>
      <reference anchor="RFC1940">
        <front>
          <title>Source Demand Routing: Packet Format and Forwarding Specification (Version 1)</title>
          <author fullname="D. Estrin" initials="D." surname="Estrin">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." surname="Li">
            <organization/>
          </author>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <author fullname="K. Varadhan" initials="K." surname="Varadhan">
            <organization/>
          </author>
          <author fullname="D. Zappala" initials="D." surname="Zappala">
            <organization/>
          </author>
          <date month="May" year="1996"/>
          <abstract>
            <t>The purpose of SDRP is to support source-initiated selection of routes to complement the route selection provided by existing routing protocols for both inter-domain and intra-domain routes.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1940"/>
        <seriesInfo name="DOI" value="10.17487/RFC1940"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>Thanks to the Path-Aware Networking Research Group for the discussion and feedback. Specifically, thanks to Mohamed Boucadair for the detailed review and various text suggestions, thanks to Brian Trammell for suggesting the flow definition, thanks to Adrian Perrig and Matthias Rost for the detailed feedback, thanks to Paul Hoffman for the editorial changes, thanks to Luis M. Contreras and Jake Holland for the reviews, and thanks to Spencer Dawkins for the comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
