<?xml version="1.0" encoding="US-ASCII"?>
	<!-- 
	     draft-rfcxml-general-template-annotated-00
	  
	     This template includes examples of most of the features of RFCXML with comments explaining 
	     how to customise them, and examples of how to achieve specific formatting.
	     
	     Documentation is at https://authors.ietf.org/en/templates-and-schemas
	-->
	<?xml-model href="rfc7991bis.rnc"?>  <!-- Required for schema validation and schema-aware editing -->
	<!-- <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> --> 
	<!-- This third-party XSLT can be enabled for direct transformations in XML processors, including most browsers -->
	
	<!DOCTYPE rfc [
	  <!ENTITY nbsp    "&#160;">
	  <!ENTITY zwsp   "&#8203;">
	  <!ENTITY nbhy   "&#8209;">
	  <!ENTITY wj     "&#8288;">
					]>
	
	<!-- Extra statement used by XSLT processors to control the output style. -->
	<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
	<!-- Processing Instructions- PIs (for a complete list and description,
	     see file http://xml.resource.org/authoring/README.html.
	     You may find that some sphisticated editors are not able to edit PIs when palced here.
	     An alternative position is just inside the rfc elelment as noted below. -->
	<!-- Some of the more generally applicable PIs that most I-Ds might want to use -->
	<!-- Try to enforce the ID-nits conventions and DTD validity -->
	<?rfc strict="yes" ?>
	<!-- Items used when reviewing the document -->
	<!-- Controls display of <cref> elements -->
	<?rfc comments="yes" ?>
	<!-- When no, put comments at end in comments section,
	     otherwise, put inline -->
	<?rfc inline="yes" ?>
	<!-- When yes, insert editing marks: editing marks consist of a 
	     string such as <29> printed in the blank line at the 
	     beginning of each paragraph of text. -->
	<?rfc editing="no" ?>
	<!-- Create Table of Contents (ToC) and set some options for it.  
	     Note the ToC may be omitted for very short documents,but idnits insists on a ToC 
	     if the document has more than 15 pages. -->
	<?rfc toc="yes"?>
	<?rfc tocompact="yes"?>
	<!-- If "yes" eliminates blank lines before main section entries. -->
	<?rfc tocdepth="3"?>
	<!-- Sets the number of levels of sections/subsections... in ToC.
	   Can be overridden by 'toc="include"/"exclude"' on the section
	   element-->
	<!-- Choose the options for the references. 
	     Some like symbolic tags in the references (and citations) and others prefer 
	     numbers. The RFC Editor always uses symbolic tags.
	     The tags used are the anchor attributes of the references. -->
	<?rfc symrefs="yes"?>
	<?rfc sortrefs="yes" ?>
	<!-- If "yes", causes the references to be sorted in order of tags.
				 This doesn't have any effect unless symrefs is "yes"
	          also. --> 
	<!-- These two save paper: Just setting compact to "yes" makes savings by not starting each 
	     main section on a new page but does not omit the blank lines between list items. 
	     If subcompact is also "yes" the blank lines between list items are also omitted. -->
	<?rfc compact="yes" ?>
	<?rfc subcompact="no" ?>
	<!-- end of list of popular I-D processing instructions -->
	
	<!-- Information about the document.
	     category values: std, bcp, info, exp, and historic
	     For Internet-Drafts, specify attribute "ipr".
	         original ipr values are: full3978, noModification3978, noDerivatives3978), 
	         2008 IETF Trust versions: trust200811, noModificationTrust200811, noDerivativeTrust200811
	         2009/Current: trust200902, noModificationTrust200902, noDerivativesTrust200902, pre5378Trust200902
	     Also for Internet-Drafts, you must specify a value for attributes "docName" which is 
	        typically the file name under which it is filed but need not be.
	     If relevant, "iprExtract" may be specified to denote the anchor attribute value of a
	        section that can be extracted for separate publication, it is only useful when the value
	        of "ipr" does not give the Trust full rights.
	     "updates" and "obsoletes" attributes can also be specified here, their arguments are
	        comma-separated lists of RFC numbers (just the numbers) -->
	<rfc
	  xmlns:xi="http://www.w3.org/2001/XInclude"
	  category="info"
	  docName="draft-livingood-low-latency-deployment-05"
	  ipr="trust200902"
	  obsoletes=""
	  updates=""
	  submissionType="independent"
	  xml:lang="en"
	  version="3">
	
	
	  <!-- ***** FRONT MATTER ***** -->
	
	  <front>
	
	    <title abbrev="ISP Dual Queue Networking Deployment Recommendations">ISP Dual Queue Networking Deployment Recommendations</title>
	    <seriesInfo name="Internet-Draft" value="draft-livingood-low-latency-deployment-05"/>
	
	    <!-- add 'role="editor"' below for the editors if appropriate -->
	    <author fullname="Jason Livingood" initials="J" surname="Livingood">
		   <organization>
	           Comcast
	       </organization>
	      <address>
	        <postal>
	          <city>Philadelphia</city> <region>PA</region>
	          <country>USA</country>
	        </postal>
	        <email>jason_livingood@comcast.com</email>
	      </address>
	    </author>
	
	    <date month="April" day="18" year="2024"/>
	
	    <!-- Meta-data Declarations -->
	    <!-- WG name at the upper left corner of the doc,
	         IETF fine for individual submissions.  You can also
	         omit this element in which case it defaults to "Network Working Group" -
	         a hangover from the ancient history of the IETF! -->
	    <workgroup>Independent Stream</workgroup>
	
		<!-- You can add <keyword/> elements here.  They will be incorporated into HTML output
	         files in a meta tag but they have no effect on text or nroff output. -->
		<!-- <keyword>Text</keyword> (as many of those elements as needed -->
	
		
	    <abstract>
	      <t>The IETF's Transport Area Working Group (TSVWG) has finalized experimental RFCs for Low Latency, 
	      Low Loss, Scalable Throughput (L4S) and new Non-Queue-Building (NQB) per hop behavior. 
	      These documents do a good job of describing a new architecture 
	      and protocol for deploying low latency networking. 
          But as is normal for many such standards, especially those in experimental status, 
	      certain deployment decisions are ultimately left to implementers. This document explores the potential 
	      implications of key deployment decisions and makes recommendations for those decisions that may help drive 
	      adoption.</t>
	    </abstract>
	
		<!-- Note here if needed
		   <note title=""><t> .... </t></note> -->
		
	  </front>
	
	  <middle>
	    <section title="Introduction">
			    
		<t>The IETF's Transport Area Working Group (TSVWG) has finalized experimental RFCs for Low Latency, 
		Low Loss, Scalable Throughput (L4S) and Non-Queue-Building (NQB) per hop behavior <xref target="RFC9330"/> 
		<xref target="RFC9331"/> <xref target="RFC9332"/> 
		<xref target="I-D.ietf-tsvwg-l4sops"/> <xref target="I-D.ietf-tsvwg-nqb"/> 
		<xref target="I-D.ietf-tsvwg-dscp-considerations"/>. These documents do a good job of describing 
		a new architecture and protocol for deploying low latency networking. 
		But as is normal for many such standards, especially those in 
		experimental status, certain deployment decisions are ultimately left to implementers.</t>
		
		<t>This document explores the potential implications of key deployment decisions and makes 
		recommendations for those decisions that may help drive adoption. In particular, there are best practices based 
        on prior experience 
		as a network operator that should be considered and there are network neutrality types of considerations 
		as well. These technologies are benign on their own, but the way they are operationally implemented can 
		determine whether they are ultimately perceived positively and adopted by the broader Internet ecosystem. 
		That is a key issue for low latency networking, because the more applications developers and edge platforms that adopt 
		new packet marking for low latency traffic, then the greater the value to end users, so ensuring it is received well 
		is key to driving strong initial adoption.</t>
		
		<t>It is worth stating though that these decisions are not embedded in or inherent to L4S and NQB per se, but are decisions 
		that can change depending upon differing technical, regulatory, business or other requirements. Even two network operators with the 
		same type of access technology and in the same market area may choose to implement in different ways. Nevertheless, this document 
		suggests that certain specific deployment decisions can help maximize the value of low latency networking to both users and 
		network operators.</t> 
		
		<t>It is also apparent from the IETF's work that it is clear that nearly all modern application types need low latency 
			to some degree and that applications are best positioned to express their needs via application code and packet marking. 
			Furthermore, unlike with bandwidth priority on a highly/fully utilized link, low latency networking can better 
			balance the needs of different types of best effort flows (with some caveats - see <xref target="NewThinking"/>).
			</t>
		
		<t>For additional background on latency and why latency matters so much to the Internet, please read <xref target="BITAG"/></t>
		  
	    <!--  <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
	      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
	      document are to be interpreted as described in
		  <xref target="RFC2119">RFC 2119</xref>.</t> -->
	
	    </section>
	    
	    <section title="A New Understanding of Application Needs">
		    
		    
		    
		    <t>In the course of working to improve the responsiveness of network protocols, the IETF 
			    concluded with their L4S and NQB work that there were fundamentally two types of Internet traffic 
			    and that these two major traffic types could benefit from having separate network processing queues 
			    in order to improve the way the Internet works for all applications, and especially for interactive applications.</t>
			    
			    <t>One of the two major traffic types is Queue Building (QB) - things like file downloads and 
				    backups that are designed utilize as much network capacity as possible but with which users 
				    are usually not interacting with in 
			    real-time. The other was Non-Queue-Building (NQB) - such as DNS lookups, voice interaction 
			    with artificial intelligence (AI) assistants, video conferencing, gaming, and so on. NQB 
			    flows tend to be ones where the end user is sensitive to any delays.</t>
			    
			    
				<t>Thus, the IETF created specifications for how two different network processing 
					queues. Early results, such as from the IETF-114 hackathon 
					<xref target="IETF-114-Slides"/>, 
					demonstrate that L4S and NQB (a.k.a. dual queue networking, and simply "low latency networking" hereafter) can work 
					across a variety of access network technologies and deliver 
					extraordinary levels of responsiveness for a variety of applications. It seems likely that 
					this new capability will enable entirely new classes of applications to become possible, 
					driving a wave of new Internet innovation, while also improving the applications people use 
					today.</t>
					

		</section>
		
		<section title="New Thinking on Low Latency Packet Processing" anchor="NewThinking">
			<t>The Introduction says that unlike with bandwidth priority on a highly/fully utilized link, low latency networking can better 
				balance the needs of different types of best effort flows.
			But this bears a bit of further discussion to understand more fully.</t>
			
			<t>L4S does *not* provide low latency in the same way as previous technologies like DiffServ Quality of Service (QoS). That prior 
			QoS approach used packet 
prioritization, where it was possible to assign a higher relative priority to certain application traffic, such as Voice over IP (VoIP) telephony. 
This approach could provide consistent and relatively low latency by assigning high priority to a partition of the capacity of a link, and then policing the 
rate of packets using that partition. This traditional approach to QoS is hierarchical in nature.</t>
			
			<t>That QoS approach 
			is to some extent predicated on an idea that network capacity is 
			very limited and that links are often highly utilized. But in today's Internet, it is increasingly the case that there is an 
			abundance of capacity to end users (e.g., symmetric 1 Gbps), which makes such traditional QoS approaches ineffective in 
			delivering ever-lower latency. This new low latency networking approach is not based on hierarchical QoS prioritization. 
			Rather, it is built upon conditional 
			priority scheduling between its two queues that operate at best effort QoS priority.</t>
			
		</section>
	    
	    <section title="Network Neutrality and Low Latency Networking">
		    <t>Network Neutrality (a.k.a. Net Neutrality, and NN hereafter) is a concept that can mean a variety 
		    of things within a country, as well as between different countries, based on 
		    different opinions, market structures, business practices, laws, and regulations. Generally speaking, 
		    NN means that Internet Service Providers (ISPs) should not limit user choice or affect competition between 
			application providers. In the context of the United States' marketplace, it has come to mean that ISPs 
			should not block, throttle, or deprioritize lawful application traffic, and should not engage in paid 
			prioritization, among other things. The meaning of NN can be complex and ever changing, so the specific 
			details are out of scope for this document. Despite that, NN concerns certainly bear on the deployment 
			of new technologies by ISPs in many countries and so should be taken into account in making deployment 
			design decisions.</t>

			<t>It is also possible that there can be confusion - for people who are not deep in this highly technical subject - 
			between prioritization, provisioned 
		    end user capacity (throughput or bandwidth), and low latency networking. As it is envisioned in the design of the 
		    protocols, the addition of a low latency packet processing queue at a network link is merely a second 
		    packet queue and does not mean that this queue is hierarchically prioritized or that it has more 
		    capacity. Thus, a low latency queue does not create a so-called "fast lane" (in the way that 
		    this term is used in policy-related discussions in the U.S. to describe higher than best effort priority or greater 
			capacity being assigned to some traffic compared to default traffic) - 
		    but there are certainly other NN considerations in the operational implementation worth exploring.</t>
			
			<t>In short: implemented right, low latency networking is fully-aligned with net neutrality and has no 
			impact on user choice and competition.</t>

			<t>The principles below describe guidelines for a user-centric, application-agnostic, and monetizable implementation of  
			low latency networking that is aligned with NN frameworks and interpretations, at least in the U.S. and Europe.</t>

			<section title="Application-Agnostic Low Latency Networking">

			<t>A key principle of NN is that all applications should be treated the same by ISPs. As such, any application 
			should be able to request access to low latency networking using the available marking techniques, and the 
			network should forward packets through a low latency queue only based on such markings, without inferring 
			or taking into consideration from which application certain packets originate.</t>

			</section>

			<section title="User-Centric Monetization, Not Application Provider Monetization">

			<t>To incentivize low latency networking deployments, ISPs should be able to monetize it in some way, such as 
			by enabling it on specific tiers of service. This could be misinterpreted as paid prioritization. To avoid such 
			conflicts or misinterpretations, ISPs should charge users (and not application providers) for access to 
			low latency networking, and follow common charging regimes used for best-effort services. For example, 
			different price-points may be achieved by adjusting the throughput, monthly data allowance, in home network 
			equipment maintenance, in home network services (e.g., parental controls), provision of low latency networking, 
			or other service attributes. Thus, ISPs should not limit the number or types of applications that can access low 
			latency networking, as this would eventually conflict with the application-agnostic requirement.</t>

			</section>

	    
			<section title="Prioritization: Same Best Effort Priority for All Traffic">
		    	<t>A key aspect of NN is that traffic to certain Internet destinations or for certain 
			    applications should not be prioritized over other Internet traffic. This means in practice that all Internet traffic 
			    in an ISP network should be carried at the same (best effort) priority and that any network management practices 
			    imposed by the network should be protocol (application) agnostic. Low latency networking is fully consistent with this aspect of NN, 
			    because it is designed so that all traffic is treated on a best effort basis in the ISP network (this is not necessarily 
			    be the case for a user's in-home Wi-Fi network due to the particulars of how the IEEE 802.11 wireless protocol <xref target="IEEE"/> functions at the current 
			    time - see <xref target="RFC8325"/>).</t>
			    
			    <t>In addition, as noted above, unlike with bandwidth priority on a highly/fully utilized link, low latency networking can better 
				balance the needs of different types of best effort flows.</t>
	    	</section>
	    
			<section title="Throughput: Shared Across All Traffic">
		    	<t>Low latency networking is also consistent with the NN goal of not creating a fast lane, because the same end user 
			    	throughput in an ISP access network is shared between both classic and low latency (L4S/NQB) queues. Thus, 
			    	applications do not get access to greater throughput depending on whether or not the leverage 
			    	low latency networking.</t>
	    	</section>
	    	
	    	<section title="Can Work on All Types of Network Technology">
		    	<t>Ultimately, the emergence of low latency networking represents a fundamental new network 
			    	capability that applications can choose to utilize as their needs dictate. It reflects a new ground truth 
			    	about two fundamentally different types of application traffic and demonstrates that networks 
			    	continue to evolve in exciting ways.</t>
				
				<t>In addition, this new network capability can be implemented in a variety of network technologies. For example in access network 
technologies this could be implemented in DOCSIS <xref target="LLD"/>, 5G <xref target="Ericsson"/>, PON <xref target="CTI"/>, and many other types of networks. Anywhere 
that a network bottleneck could occur may benefit from this technology.</t>
	    	</section>
	    
	    
	    </section>
	    
	    <section title="Recommended Deployment Design Decisions">
		    
		    <t>Like any network or system, a good deployment design and configuration matters and 
		    can be the difference between a well-functioning and accepted design and one that experiences 
		    problems and faces opposition. In the context of deploying low latency networking in an ISP network, 
		    this document describes some recommended deployment design decisions that should help 
		    to ensure a deployment is resilient, well-accepted, and creates the environment for generating 
		    strong network effects. In contrast, creating barriers to adoption in the early stages through design and 
		    policy decisions will presumably reduce the predicted potential network effect, thus choking off further 
		    investment across the Internet ecosystem, leading to a vicious circle of decline - and then the potential 
		    value is never realized.</t>
		    
	   
	    
	    <section title="Only Applications Mark Traffic">
		    
		    <t>Only applications should mark traffic to indicate their preference for the low latency queue, 
			not the network. This is for several reasons:</t>
		    <ul>
		    <li>According to the end-to-end principle, this function is best delegated to the edge of 
		    the network as an architectural best practice (the edge being the application in this case).</li>
		    <li>Application marking maintains the loose coupling between the application and network layers, 
		    eliminating the need for close coordination between networks and application developers.</li>
		    <li>Application developers know best whether their application is compatible with low 
			    latency networking and which aspects of their traffic flows will or will not benefit.</li>
		    <li>Application traffic is almost entirely encrypted, which makes it very difficult for networks 
		    to accurately determine application protocols and to further infer which flows will benefit from low latency 
		    and which flows may be harmed because they need to build a queue.</li>
		    <li>To correctly utilize L4S, the application and the server needs to use a scalable congestion control algorithm in order to 
			use the packet marking for L4S and respond to Congestion Experienced (CE) marking. This is done by using the ECN field of the packet header, with an ECT(1) marking, 
			according to Section 4.1 of <xref target="RFC9331"/> and being responsibe to CE marks. 
			But only the application (not the network) knows what congestion control it is using. So, with L4S, the network cannot properly 
			mark on behalf of the application.</li>
			<li>To correctly utilize NQB for non-L4S traffic, then the DSCP field of the packet header is used, with a DSCP 45 marking, according to Section 
			4.1 of <xref target="I-D.ietf-tsvwg-nqb"/>. But the majority of traffic is now encrypted, 
			so it seems implausible for a network to try to infer the type of traffic and whether an application could benefit from NQB treatment; this 
			is best left to application developers to determine as they are the experts in the particular needs of their application. </li>
		    <li>Network operators and equipment vendors attempting to infer application type and application need 
		    will sometimes make mistakes, incorrectly classifying traffic <xref target="Lotus"/>, and potentially negatively 
		    affecting certain flows.</li>  
		    <li>The pace of innovation and iteration is necessarily faster-moving in the application edge at layer 7, 
		    rather than in the network at layer 3 (and below) - where there is greater standards stability and a lower rate of 
		    major changes. As a result, the application layer is best suited to rapid experimentation and iteration. Network 
		    operators and equipment vendors trying to infer application needs will in comparison always be in a reactive 
		    mode, one step behind changes made in applications.</li>
			<li>Note, however, that this does not preclude an ISP from changing packet marking within their internal network due to an existing use of a 
			particular code point.</li>
		    </ul>
		    
	    </section>
	    
	    
	    <section title="All Application Providers Welcome"> 
		    
		    <t>Any application provider should be able to mark their traffic for the low latency queue, with no restrictions 
		    other than standards compliance or other reasonable and openly documented technical guidelines. This 
		    maintains the loose cross-layer coupling that is a key tenet of the Internet's architecture by eliminating 
		    or greatly reducing any need for application providers and networks to coordinate on deployment (though 
		    such coordination is normal in the early experimental phase of any deployment).</t>
		    
		    <t>As noted above, this is another example that low latency networking will have strong network 
		    effects, any barriers to adoption such as this should be avoided in order to maximize the value to users 
		    and the network of a new low latency queue.</t> 
		    
	    </section>
	    
	    <section title="End User CPE Choice"> 
		    
		   <t>Both customer-owned and ISP-administered Customer Premises Equipment (CPE) should be supported, when 
		   applicable (not all networks support this nor is it necessary in some networks). This avoids the risk that an ISP can be 
		   perceived as giving preference to their own network demarcation devices, which may carry some monthly recurring fee or other 
		   cost. This also means that retail CPE manufacturers need to make the necessary development investment to 
		   correctly implement low latency networking, though this may not interest or may be outside the capabilities of some organizations.
		   In any case, the more devices that implement low latency networking, the broader adoption would be, positively 
           driving network effects.</t>
		   
	    </section>
			

			
	    <section title="Opt Out Capability During Technical Trial Experiments">
		    <t>During technical trial experiments of low latency networking, ISPs should consider making available some 
			    mechanism for users to opt out of (deactivate) it. If low latency networking is functioning correctly, it seems extremely 
			    unlikely that a user should ever want or need to turn it off. On the other hand, it is also possible that it may be 
                desirable in some troubleshooting situations to turn it off.</t> 
			    
				<t>As this technology enters normal production operation, there will not be a long term need or 
			    practical benefit to having an opt out mechanism. Thus, that mechanism will no longer be necessary or practical; 
                any problems should be handled 
				like typical production network problems.</t>
	    </section>
			
			<section title="Consider Traffic Protection">
				<t>The specifications in <xref target="I-D.ietf-tsvwg-nqb"/> describe a concept of Traffic Protection, also known as a 
                Queue Protection Function <xref target="I-D.briscoe-docsis-q-protection"/>. The document says that Traffic Protection 
                is optional and may not be needed in certain networks. In the case of an ISP deploying low latency networking with 
                two queues, an ISP should consider deploying such a network function to at least detect mismarking (if not necessarily 
                to correct mismarking). This may be implemented, for example, in end user CPE, last mile network equipment, 
                and/or elsewhere in the ISP network - or closely monitors network statistics and user feedback for any indication of 
                widespread NQB packet mismarking by applications.</t>
			</section>	
			
			<section title="Avoid Internal Remarking of DSCP Values if Possible">
				<t>If possible, based on a network's existing use of DSCP values, a network should try to maintain the use of DSCP 45 on an end-to-end basis 
				without remarking. While this may not be possible in all networks, it can reduce complexity, enable simpler network operations, and ease troubleshooting of NQB traffic flows. In some cases a network may need to migrate an existing, private internal use of DSCP 45 to some other mark to achieve this. In the long term that may be best, even if it takes a bit more initial effort when deploying low latency networking. In addition, if a network does have their own 
private internal use of DSCP 45, then they alone should be responsible for any necessary remarking for traffic passing through their network (it would be 
unfair and unreasonable for a given network's private use of a DSCP mark to pose a burden on other networks).</t>
			</section>	


			<section title="In Home Wi-Fi LAN Considerations">
				<t>As noted above with respect to prioritization of packets in the ISP network, all packets should be handled with the same 
				best effort priority. However, in a user's home Wi-Fi (wireless) local area network (WLAN), this is more complicated, 
                because there is not a precise mapping between IETF packet marking and IEEE 802.11 marking, explored in 
				<xref target="RFC8325"/>.</t>

				<t>In short, today's 802.11 specifications enable a Wi-Fi network to have multiple queues, using different "User Priority" and "Access 
				Category" values. At the current time, these queues are:</t>
				<ul>
					<li>User Priority 1 or 2, AC_BK = Background</li>
					<li>User Priority 0 or 3, AC_BE = Best Effort</li>
					<li>User Priority 4 or 5, AC_VI = Video</li>
					<li>User Priority 6 or 7, AC_VO = Voice</li>
				</ul>

				<t>Thus, as recommended in <xref target="I-D.ietf-tsvwg-nqb"/>, the low latency queue should be different from 
                the best effort queue. That means default best effort traffic will be in User Priority 0 or 3 (AC_BE), and it is 
                recommended that the low latency queue 
				will be in User Priority 4 or 5 (AC_VI). For additional context, please refer to 
                Section 8.1 of  <xref target="I-D.ietf-tsvwg-nqb"/>.</t>

				<t>It is also worth noting that, in the short-term, Microsoft has taken a slightly different approach to packet 
				marking on their Xbox platform <xref target="Microsoft"/>. They are using DSCP-46 rather than DSCP-45, though presumably 
				once the IANA port assignment 
				for DSCP-45 is made this will change. As a result, a more permissive WLAN marking policy is initially recommended until RFCs for 
				NQB are published and developers coalesce around DSCP-45. This means that the network will put packets 
				marked with DSCP-46 (and potentially other values, such as 40 and 56) into the low latency queue. They are also using the AC_VO queue rather than the AC_VI queue, but it 
				is not known if that may change when the DSCP marking changes.</t>

			</section>	
	  
	 </section>
	  
	 <section title="Summary of Recommended Deployment Design Decisions">
		 
		 <ol type="%d">
			 
		 	<li>Only Applications Mark Traffic: Not the network</li>
		 	<li>All Application Providers Welcome: Any application provider can mark with no restrictions other than standards compliance 
			 	or other reasonable and openly documented technical guidelines</li>
			<li>End User CPE Choice: When applicable, both customer-owned and ISP-administered devices supported</li>
			<li>Opt Out Capability During Technical Trial Experiments: Users can opt out during technical trial expriments</li>
			<li>Consider Traffic Protection: Consider potentially deploying a network function to detect mismarking of NQB traffic</li>
			<li>Avoid Internal Remarking of DSCP Values if Possible: Try to maintain DSCP 45 on an end-to-end basis with remarking</li>
	
		 </ol>
		 
		 
	 </section>
	 
	    <section title="Acknowledgements">
			<t>Thanks to Bob Briscoe, Mat Ford, Vidhi Goel, Sebastian Moeller, Sebnem Ozer, Jim Rampley, Dan Rice, Greg Skinner, 
            Greg White, and Yiannis Yiakoumis for their review and feedback on this document.</t>
		</section>
	
	    <section title="IANA Considerations">
		  <t>RFC Editor: Please remove this section before
			 publication.</t>
	      <t>This memo includes no requests to or actions for IANA.</t>
	    </section>
	
	    <section title="Security Considerations">
		  <t>RFC Editor: Please remove this section before
			 publication.</t>
	      <t>This memo includes no security considerations.</t>
	    </section>
	    
	    <section title="Privacy Considerations">
		  <t>RFC Editor: Please remove this section before
			 publication.</t>
	      <t>This memo includes no security considerations.</t>
	    </section>
	    
	    <section title="Revision History">
		  <t>RFC Editor: Please remove this section before
			 publication.</t>
	      <t>v00: First draft</t>
	      <t>v01: Incorporate comments from 1st version after IETF-115</t>
		  <t>v02: Incorporate feedback from the TSVWG mailing list</t>
		  <t>v03: Final feedback from TSVWG and prep for sending to ISE</t>
		  <t>v04: Refresh expiration before major revision</t>
          <t>v05: Changes from Greg Skinner</t>
	    </section>
	    
	    <section title="Open Issues">
		  <t>RFC Editor: Please remove this section before
			 publication.</t>
	      <t>- Open issues are being tracked in a GitHub repository for this document 
		      at https://github.com/jlivingood/IETF-L4S-Deployment/issues</t>
	    </section>
	    
	    
	  </middle>
	
	  <!--  *****BACK MATTER ***** -->
	
	  <back>
	    <!-- References split to informative and normative -->
	
	   <references title="Informative References">
			<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8325.xml"/>
			<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9330.xml"/>
			<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9331.xml"/>
			<xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9332.xml"/>
		   <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tsvwg-l4sops.xml"/>
		   <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tsvwg-nqb.xml"/>
		   <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tsvwg-dscp-considerations.xml"/>
		   <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.briscoe-docsis-q-protection.xml"/>
		   
		   <reference anchor="BITAG" target="https://bitag.org/documents/BITAG_latency_explained.pdf">
			   <front>
	            <title>Latency Explained</title>
	            <author>
	              <organization>Broadband Internet Technical Advisory Group</organization>
	            </author>
	            <date year="2022" month="January" day="10"/>
			   </front>
		   </reference>
		   
		   <reference anchor="Lotus" target="https://www.eff.org/wp/packet-forgery-isps-report-comcast-affair">
			   <front>
	            <title>Packet Forgery By ISPs: A Report on the Comcast Affair</title>
	            <author fullname="Peter Eckersley" initials="P" surname="Eckerseley">
	              <organization>Electronic Frontier Foundation</organization>
	            </author>
                <author fullname="Fred von Lohmann" initials="F" surname="von Lohmann">
	              <organization>Electronic Frontier Foundation</organization>
	            </author>
                <author fullname="Seth Schoen" initials="S" surname="Schoen">
	              <organization>Electronic Frontier Foundation</organization>
	            </author>
	            <date year="2007" month="November" day="28"/>
			   </front>
		   </reference>
		   
		   <reference anchor="IETF-114-Slides" target="https://datatracker.ietf.org/meeting/114/materials/slides-114-tsvwg-update-on-l4s-work-in-ietf-114-hackathon-00.pdf">
			   <front>
	            <title>First L4S Interop Event @ IETF Hackathon</title>
	            <author fullname="Greg White" initials="G" surname="White">
	              <organization>CableLabs</organization>
	            </author>
	            <date year="2022" month="July" day="25"/>
			   </front>
			   
			</reference>
			
			<reference anchor="LLD" target="https://cablela.bs/low-latency-docsis-technology-overview-february-2019">
				<front>
					<title>Low Latency DOCSIS: Technology Overview</title>
					<author fullname="Greg White" initials="G" surname="White">
						<organization>CableLabs</organization>
						</author>
					<author fullname="Karthik Sundaresan" initials="K" surname="Sundaresan">
						<organization>CableLabs</organization>
						</author>
							<author fullname="Bob Briscoe" initials="B" surname="Briscoe">
					</author>
					<date year="2019" month="February"/>
				</front>
				
				</reference>

				<reference anchor="Ericsson" target="https://www.ericsson.com/49bc82/assets/local/reports-papers/white-papers/26052021-enabling-time-critical-applications-over-5g-with-rate-adaptation-whitepaper.pdf">
							<front>
							<title>Enabling time-critical applications over 5G with rate adaptation</title>
					<author fullname="Per Willars" initials="P" surname="Willars"><organization>Ericsson</organization></author>
					<author fullname="Emma Wittenmark" initials="E" surname="Wittenmark"><organization>Ericsson</organization></author>
					<author fullname="Henrik Ronkainen" initials="H" surname="Ronkainen"><organization>Business Area Networks</organization></author>
					<author fullname="Ingemar Johansson" initials="I" surname="Johansson"><organization>Ericsson</organization></author>
					<author fullname="Johan Strand" initials="J" surname="Strand"><organization>Business Area Networks</organization></author>
					<author fullname="Petr Ledl" initials="D" surname="Ledl"><organization>Deutsche Telekom</organization></author>
					<author fullname="Dominik Schnieders" initials="D" surname="Schnieders"><organization>Deutsche Telekom</organization></author>
	
	
							<date year="2021" month="May"/>
						</front>
							
						</reference>

			<reference anchor="CTI" target="https://www.itu.int/rec/T-REC-G.Sup71-202104-I">
							<front>
							<title>Optical line termination capabilities for supporting cooperative dynamic bandwidth assignment</title>
							<author><organization>International Telecommunications Union - Telecommunication Standardization Sector (ITU-T)</organization></author>
			
			        <date year="2021" month="April"/>
		           </front>
			           <seriesInfo name="Series G: Transmission Systems and Media, Digital Systems and Networks" value="Supplement 71" />
						</reference>

			<reference anchor="IEEE" target="https://ieeexplore.ieee.org/document/9363693">
							<front>
							<title>Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
							<author><organization>IEEE Computer Society (IEEE)</organization></author>
			        <date year="2021" month="February" day="26"/>
		           </front>
				   		<seriesInfo name="DOI" value="10.1109/IEEESTD.2021.9363693"/>
			           <seriesInfo name="IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks--Specific Requirements" value="802.11-2020" />
						</reference>

			<reference anchor="Microsoft" target="https://learn.microsoft.com/en-us/gaming/gdk/_content/gc/networking/overviews/qos-packet-tagging">
			   <front>
	            <title>Quality of service (QoS) packet tagging on Xbox consoles</title>
	            <author>
	              <organization>Microsoft</organization>
	            </author>
	            <date year="2022" month="August" day="19"/>
			   </front>
			   
			</reference>
			
		   
	   </references>
	
	  </back>
	</rfc>
