<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bwbr-tsvwg-signaling-use-cases-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.0 -->
  <front>
    <title abbrev="Signaling Use Cases">Signaling Use Cases for Traffic Differentiation</title>
    <seriesInfo name="Internet-Draft" value="draft-bwbr-tsvwg-signaling-use-cases-00"/>
    <author fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="04"/>
    <area>Web and Internet Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>user experience</keyword>
    <keyword>bandwidth</keyword>
    <keyword>priority</keyword>
    <keyword>enriched feedback</keyword>
    <keyword>media streaming</keyword>
    <keyword>realtime media</keyword>
    <keyword>QoS</keyword>
    <keyword>5G</keyword>
    <keyword>Wi-Fi</keyword>
    <keyword>WiFi</keyword>
    <keyword>diffserv</keyword>
    <abstract>
      <?line 70?>

<t>Host-to-network signaling can improve the user experience by informing
the network which flows are more important and which packets within a
flow are more important.  The differentiated service may be provided
at the network (e.g., packet prioritization), the sender (e.g.,
adaptive transmission), or through cooperation of both the sender
and the network.</t>
      <t>This document outlines use-cases that highlight the need for a new
signaling protocol from the receiver to its network elements which
enables different traffic treatment.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://danwing.github.io/signaling-use-cases/draft-wing-tsvwg-signaling-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-bwbr-tsvwg-signaling-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport and Services Working Group Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/danwing/signaling-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Bandwidth constraints exist most predominently at the access network.
Users of those networks run various hosts which run various
applications, each having different needs for the best user
experience.  These requirements are not fixed but change over time
depending on the application and even depending on how the application
is used.</t>
      <t>The simple network diagram below shows where such bandwidth and
performance constraints usually exist with a "B".</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="520" viewBox="0 0 520 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,48 L 8,80" fill="none" stroke="black"/>
            <path d="M 48,48 L 48,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 96,96" fill="none" stroke="black"/>
            <path d="M 152,32 L 152,96" fill="none" stroke="black"/>
            <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
            <path d="M 176,80 L 176,128" fill="none" stroke="black"/>
            <path d="M 200,48 L 200,80" fill="none" stroke="black"/>
            <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,48 L 280,80" fill="none" stroke="black"/>
            <path d="M 336,48 L 336,80" fill="none" stroke="black"/>
            <path d="M 352,32 L 352,56" fill="none" stroke="black"/>
            <path d="M 352,72 L 352,128" fill="none" stroke="black"/>
            <path d="M 368,48 L 368,80" fill="none" stroke="black"/>
            <path d="M 424,48 L 424,80" fill="none" stroke="black"/>
            <path d="M 440,32 L 440,56" fill="none" stroke="black"/>
            <path d="M 440,72 L 440,128" fill="none" stroke="black"/>
            <path d="M 456,48 L 456,80" fill="none" stroke="black"/>
            <path d="M 496,48 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,32 L 152,32" fill="none" stroke="black"/>
            <path d="M 8,48 L 48,48" fill="none" stroke="black"/>
            <path d="M 200,48 L 256,48" fill="none" stroke="black"/>
            <path d="M 280,48 L 336,48" fill="none" stroke="black"/>
            <path d="M 368,48 L 424,48" fill="none" stroke="black"/>
            <path d="M 456,48 L 496,48" fill="none" stroke="black"/>
            <path d="M 48,64 L 64,64" fill="none" stroke="black"/>
            <path d="M 80,64 L 96,64" fill="none" stroke="black"/>
            <path d="M 152,64 L 168,64" fill="none" stroke="black"/>
            <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
            <path d="M 256,64 L 280,64" fill="none" stroke="black"/>
            <path d="M 336,64 L 368,64" fill="none" stroke="black"/>
            <path d="M 424,64 L 456,64" fill="none" stroke="black"/>
            <path d="M 8,80 L 48,80" fill="none" stroke="black"/>
            <path d="M 200,80 L 256,80" fill="none" stroke="black"/>
            <path d="M 280,80 L 336,80" fill="none" stroke="black"/>
            <path d="M 368,80 L 424,80" fill="none" stroke="black"/>
            <path d="M 456,80 L 496,80" fill="none" stroke="black"/>
            <path d="M 96,96 L 152,96" fill="none" stroke="black"/>
            <g class="text">
              <text x="120" y="52">Wi-Fi</text>
              <text x="28" y="68">host</text>
              <text x="72" y="68">B</text>
              <text x="124" y="68">access</text>
              <text x="176" y="68">B</text>
              <text x="228" y="68">router</text>
              <text x="308" y="68">router</text>
              <text x="396" y="68">router</text>
              <text x="476" y="68">host</text>
              <text x="120" y="84">point</text>
              <text x="392" y="116">Transit</text>
              <text x="488" y="116">Content</text>
              <text x="44" y="132">User</text>
              <text x="96" y="132">Network</text>
              <text x="224" y="132">ISP</text>
              <text x="272" y="132">Network</text>
              <text x="392" y="132">Network</text>
              <text x="488" y="132">Network</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
           +------+  |                     |          |
+----+     |Wi-Fi |  |  +------+  +------+ | +------+ | +----+
|host+--B--+access+--B--+router+--+router+---+router+---+host|
+----+     |point |  |  +------+  +------+ | +------+ | +----+
           +------+  |                     |          |
                     |                     | Transit  |  Content
   User Network      |    ISP Network      | Network  |  Network
]]></artwork>
      </artset>
      <t>For traffic sent in either direction, the network network element(s)
immediately prior to the bandwidth constraining link can be augmented
with flow metadata.  Such augmentation allows those network elements
to make autonomous decisions to prioritize, delay, or drop packets
especially to when performing Reactive Management.</t>
      <t>A difficulty with this metadata augmentation is deciding which
metadata to trust.  Traffic arriving from a content provider cannot be
differentiated from traffic arriving from other hosts on the Internet.
The metadata signals from the content provider are more likely to be
authentic but the metadata signals from other hosts may be wrong,
undesired by the local host, or maliciously contain improper metadata.
Attempts to automate identification of content providers have included
HTTP "Host" header inspection and TLS SNI inspection which are
expected to fail as encrypted SNI and privacy-enhancin MASQUE proxies
become more prevalant.  A remaining mechanism to authorize metadata
signals from the content provider is to configure the ISP equipment
with the content network's source IP addresses and provide only that
traffic with differentiated service.  However, such an arrangement
benefits large players (large ISPs and large content network) and
disadvantages small players (and new players).  A more egalitarian
approach would provide the same benefit to all parties -- large and
small -- and also provide richer signaling to further improve user
experience and metadata interoperability. This would allow all parties
to become part of the "Internet fast lane".</t>
      <t>The authorization problem exists with technologies as relatively
simple as DiffServ and the problem persists with many other
recently discussed metadata signaling mechanisms including
embedding information in the UDP payload
(<xref target="I-D.draft-trammell-plus-spec"/>), UDP options
(<xref target="I-D.draft-kaippallimalil-tsvwg-media-hdr-wireless"/>), overloading
the IPv6 Flow Label (<xref target="I-D.draft-cc-v6ops-wlcg-flow-label-marking"/>,
and Hop-by-Hop Options.  One mechanism suggested occasionally is
to encrypt or integrity protect the metadata with a key; such a key
could be established with a signaling protocol, see <xref target="key"/>.</t>
      <t>There is consensus that applications can benefit by signaling
the network (<xref target="IAB"/>, <xref target="ATIS"/>).  This document provides
use-cases to further detail the need of such signaling.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <dl>
        <dt>Intentional Management:</dt>
        <dd>
          <t>network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>network reactions to congestion events, with very short to very long
durations  (e.g., varying wireless and mobile air
interface conditions).</t>
        </dd>
      </dl>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <section anchor="priority-between-flows-inter-flow">
        <name>Priority Between Flows (Inter-Flow)</name>
        <t>Certain flows being received by an host or by an application are less or more important than other
flows.  For example, a host downloading a software update is generally considered less important
than another host doing interactive audio/video or gaming.  By signaling the relative importance
of flows to a network element (e.g., router, MASQUE proxy), the network element can (de-)prioritize
those flows to best accomodate the needs of the various applications (on a single host) and
between hosts on a network.</t>
        <section anchor="abuse-and-constraints">
          <name>Abuse and Constraints</name>
          <t>It is important that not every flow be prioritized; otherwise, the
network devolves into the best-effort network that existed prior to
metadata signaling. It is a requirement that mechanisms exist to
prevent this occurrence. The mechanism might be simple, for example a
cellular network might allow one flow from a subscriber to declare
itself as important; other flows with that subscriber are denied
attempts to prioritize themselves.  The mechanism might be more
complex where authentication and authorization is performed by an
enterprise network which, itself, decides which flows are important
based on its policy and only the enterprise network communicates flow
priorities to the ISP network.  The enterprise might prioritize
certain users (e.g., IT staff, CEO), certain equipment (audio/video
equipment in a conference room), or whatever its policies it might
want.</t>
          <section anchor="interactive-media">
            <name>Interactive Media</name>
            <t>Examples: VoIP, gaming, virtual desktop.</t>
            <t>Requirement:  Signal the flow needs low jitter and low delay.  However, the network can only provide
a limited amount of low jitter/low delay to each host, maybe as few as one.  This requires signaling
feedback indicating that low jitter and low delay flows are already subscribed to other hosts. In
response, the user and the application will likely continue, occasionally re-attempting to get the
desired quality of service from the network.</t>
            <t>Todo: this section on cooperation needs editing.</t>
          </section>
          <section anchor="bulk-data-transfer">
            <name>Bulk Data Transfer</name>
            <t>Examples: backup/restore, software update, RSS feed update, email</t>
            <t>Requirement: Signal the flow as below best-effort.</t>
          </section>
        </section>
      </section>
      <section anchor="priority-within-a-flow-intra-flow">
        <name>Priority Within a Flow (Intra-Flow)</name>
        <t>Interactive Audio/Video has long been using <xref target="RTP"/> which
runs over UDP.  As described in <xref section="2.3.7.2" sectionFormat="of" target="RFC7478"/>, there
is value in differentiating between voice, video and data.  Today's
video streaming is exclusively over TCP but will migrate to QUIC and
eventually is likely to support unreliable transport (<xref target="RFC9221"/>,
<xref target="I-D.draft-kpugin-rush"/>).  With unreliable transport of video in
RTP or QUIC, it is beneficial to differentiate the important video
keyframes from other video frames.  Other applications such as gaming
and remote desktop also benefit from differentiating their packets to
the network.</t>
        <t>Many of these flows do not originate from a content provider's network.
Thus, the flows originate from an IP address that is not known before
connection establishment, so there needs to be a way for the client
to authorize the network elements to honor the metadata of those
packets.</t>
      </section>
      <section anchor="key">
        <name>Key Establishment</name>
        <t>Various proposals have suggested establishing a key to validate
per-packet metadata or to decrypt per-packet metadata.  However, most
proposals have not specified how this key would be established.  A
signaling protocol from the receiving host to its ISP could establish
such a key. The host can then convey the key to the sending host to
use to integrity protect or encrypt the per-packet metadata.</t>
        <ul empty="true">
          <li>
            <t>Note: The CPU overhead of validating or decrypting such per-packet metadata
needs to be carefully considered by the signaling protocol proposing such
keying.</t>
          </li>
        </ul>
      </section>
      <section anchor="metadata-versioncapability-exchange">
        <name>Metadata Version/Capability Exchange</name>
        <t>The sender has to convey metadata in a way that is understood by the
various network elements on the path -- each of which might be
operated by different entities and have different capabilities.  For
example, the Wi-Fi access point might be operated by an enterprise
network, hotel, or home user, whereas the ISP's router is operated by
the ISP.  Each of those might support different versions of the same
metadata, or might need the metadata expressed in different ways.</t>
        <t>The signaling protocol would provide a way to learn the needs of those
networks, and provide metadata signaling satisfying most or all of their
needs.</t>
      </section>
    </section>
    <section anchor="requirements-summary">
      <name>Requirements Summary</name>
      <t>TODO summary.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="ATIS" target="https://access.atis.org/higherlogic/ws/public/download/72240">
        <front>
          <title>Content Classification for Traffic Optimization</title>
          <author>
            <organization/>
          </author>
          <date year="2023"/>
        </front>
      </reference>
      <reference anchor="I-D.draft-trammell-plus-spec">
        <front>
          <title>Path Layer UDP Substrate Specification</title>
          <author fullname="Brian Trammell" initials="B." surname="Trammell">
            <organization>ETH Zurich</organization>
          </author>
          <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
            <organization>ETH Zurich</organization>
          </author>
          <date day="13" month="March" year="2017"/>
          <abstract>
            <t>   This document specifies a common Path Layer UDP Substrate (PLUS) wire
   image for encrypted transport protocols carried over UDP.  The base
   PLUS header carries information for driving a minimal state machine
   at middleboxes described in [I-D.trammell-plus-statefulness], and
   provides optional exposure of additional information to devices along
   the path using the mechanism described in
   [I-D.trammell-plus-abstract-mech].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-trammell-plus-spec-01"/>
      </reference>
      <reference anchor="I-D.draft-kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="14" month="February" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
      </reference>
      <reference anchor="I-D.draft-cc-v6ops-wlcg-flow-label-marking">
        <front>
          <title>Use of the IPv6 Flow Label for WLCG Packet Marking</title>
          <author fullname="Dale W. Carder" initials="D. W." surname="Carder">
            <organization>Energy Sciences Network</organization>
          </author>
          <author fullname="Tim Chown" initials="T." surname="Chown">
            <organization>Jisc</organization>
          </author>
          <author fullname="Shawn McKee" initials="S." surname="McKee">
            <organization>University of Michigan</organization>
          </author>
          <author fullname="Marian Babik" initials="M." surname="Babik">
            <organization>CERN</organization>
          </author>
          <date day="10" month="July" year="2023"/>
          <abstract>
            <t>   This document describes an experimentally deployed approach currently
   used within the Worldwide Large Hadron Collider Computing Grid (WLCG)
   to mark packets with their project (experiment) and application.  The
   marking uses the 20-bit IPv6 Flow Label in each packet, with 15 bits
   used for semantics (community and activity) and 5 bits for entropy.
   Alternatives, in particular use of IPv6 Extension Headers (EH), were
   considered but found to not be practical.  The WLCG is one of the
   largest worldwide research communities and has adopted IPv6 heavily
   for movement of many hundreds of PB of data annually, with the
   ultimate goal of running IPv6 only.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-cc-v6ops-wlcg-flow-label-marking-02"/>
      </reference>
      <reference anchor="IAB">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RTP">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.draft-kpugin-rush">
        <front>
          <title>RUSH - Reliable (unreliable) streaming protocol</title>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Facebook</organization>
          </author>
          <author fullname="Alan Frindell" initials="A." surname="Frindell">
            <organization>Facebook</organization>
          </author>
          <author fullname="Jorge Cenzano Ferret" initials="J. C." surname="Ferret">
            <organization>Facebook</organization>
          </author>
          <author fullname="Jake Weissman" initials="J." surname="Weissman">
            <organization>Facebook</organization>
          </author>
          <date day="10" month="May" year="2023"/>
          <abstract>
            <t>   RUSH is an application-level protocol for ingesting live video.  This
   document describes the protocol and how it maps onto QUIC.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the mailing list (), which
   is archived at .

   Source for this draft and an issue tracker can be found at
   https://github.com/afrind/draft-rush.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kpugin-rush-02"/>
      </reference>
    </references>
    <?line 271?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
