SCONE K. Zarifis Internet-Draft S. Jaiswal Intended status: Informational I. Purushothaman Expires: 4 September 2025 Meta J. Varsanik Google A. Tiwari M. Joras Meta 3 March 2025 SCONEPRO Taxonomy of throttling policies used worldwide draft-zarifis-scone-taxonomy-00 Abstract This document provides a description of traffic throttling and a taxonomy of throttling policies used by CSPs worldwide. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 4 September 2025. Copyright Notice Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved. Zarifis, et al. Expires 4 September 2025 [Page 1] Internet-Draft SCONE Throttling Taxonomy March 2025 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Conventions and Definitions . . . . . . . . . . . . . . . . . 2 2. Throttling Background and Introduction . . . . . . . . . . . 2 2.1. Background . . . . . . . . . . . . . . . . . . . . . . . 3 2.2. Throttler Implementations . . . . . . . . . . . . . . . . 3 2.2.1. Token Bucket Filters . . . . . . . . . . . . . . . . 3 2.2.2. Policers . . . . . . . . . . . . . . . . . . . . . . 3 2.2.3. Shapers . . . . . . . . . . . . . . . . . . . . . . . 4 2.3. Impact of throttling . . . . . . . . . . . . . . . . . . 4 2.3.1. Impact of throttling on protocols . . . . . . . . . . 4 2.3.2. Impact of throttling on involved parties . . . . . . 4 3. Presence of throttling globally . . . . . . . . . . . . . . . 5 4. Taxonomy of throttling policies . . . . . . . . . . . . . . . 6 5. Design choices for throughput advice signaling . . . . . . . 7 6. Security Considerations . . . . . . . . . . . . . . . . . . . 8 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 8.1. Normative References . . . . . . . . . . . . . . . . . . 8 8.2. Informative References . . . . . . . . . . . . . . . . . 8 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 9 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 1. Conventions and Definitions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 2. Throttling Background and Introduction Zarifis, et al. Expires 4 September 2025 [Page 2] Internet-Draft SCONE Throttling Taxonomy March 2025 2.1. Background Video traffic constitutes 70-80% of all traffic on the internet. Communications Service Providers (CSPs) throttle video traffic for a variety of reasons. Reasons cited by CSPs include service differentiation for their subscribers, enforcement of data limited plans, accommodation of mobility of users from well provisioned cells to purely provisioned or congested cells, efficient operation of radio access networks etc. [draft-tomar-sconepro-ecn-01] provides additional background on the motivation and challenges around CSP traffic throttling. 2.2. Throttler Implementations 2.2.1. Token Bucket Filters Achieving a controlled flow rate, referred to as Committed Information Rate (CIR), is commonly done using a Token Bucket Filter (TBF). In the simplest abstraction, network devices maintain a token bucket per flow, and tokens are added to a bucket at specified intervals. If the bucket is full with tokens, no more tokens are added. Token buckets control the burst size and mean rate of a flow by only allowing through as many packets as the number of tokens available in the flow’s bucket at any given time. The burst size is thus equal to the bucket size, and arriving packets are forwarded immediately as long as there are enough tokens to serve them. There are two main types of traffic throttlers: policers and shapers. Both typically implement TBFs, and they mostly differ in how they handle non-conforming packets, i.e. packets that arrive in a token bucket with insufficient tokens to forward them. 2.2.2. Policers Policers drop (or deprioritize) non conforming packets. A burst is propagated as long as it fits within the TBF’s capacity, otherwise excess packets are discarded. While this converges to a consistent mean transmission rate in the long term, it generates high packet loss and triggers retransmissions by the content delivery network (CDN) endpoint, leading to transmission rates with fluctuations. Zarifis, et al. Expires 4 September 2025 [Page 3] Internet-Draft SCONE Throttling Taxonomy March 2025 2.2.3. Shapers Shapers, on the other hand, employ an additional outbound queue and add non-conforming packets to it instead of dropping them. The enqueued packets are then scheduled for transmission at the configured rate of the shaper. This results in a more stable output rate close to the CIR, but also adds to the round trip time (RTT) measured by the clients by introducing queueing delays. The additional delay is bounded by the size of the queue used by the shaper. 2.3. Impact of throttling 2.3.1. Impact of throttling on protocols In the transport layer, throttling complicates estimation mechanisms. For example, BBR can base its initial bandwidth estimation for a new connection on the initial burst that a full token bucket will allow. Once the tokens are depleted and throttling kicks in, the bandwidth estimates will drop considerably, triggering a reaction in the congestion control. As a result, in the application layer, ABR algorithms can be adversely affected due to fluctuating bandwidth estimation. This can lead to video players flapping between video bitrates, causing degraded QoE and even video stalls. 2.3.2. Impact of throttling on involved parties By influencing transport and application layer mechanisms, throttling has a direct impact on content providers, service providers, and end users. Throttling affects Content Application Providers (CAPs): * The high packet loss rate introduced by policers leads to aggressive and unnecessary retransmissions, generating CPU overhead on CDN servers. * Both shapers and policers can lead to degraded QoE caused respectively by RTT inflation and packet loss Throttling also affects Communications Service Providers (CSPs): Zarifis, et al. Expires 4 September 2025 [Page 4] Internet-Draft SCONE Throttling Taxonomy March 2025 * Both policers and shapers require the ability to identify candidate flows for throttling (Deep Packet Inspection (DPI), Server Name Identification (SNI) parsing), which can be CPU and memory intensive, especially for high rate flows where the packet inspection has to be done on-path at the rate of the flow. * Although packets are dropped on arrival by policers (TBFs are on inbound interfaces), carriers can still carry bytes to the edge of their network just to drop them there, which can waste bandwidth, especially due to unnecessarily retransmitted packets. With retransmission rates up to 20-30%, network overhead can add up. * Shapers require slightly more complex middleboxes that maintain outbound queues on egress interfaces. The queues create artificial and unnecessary congestion. On the Radio Access Network side, while smoothing bursts can maintain consistent throughput, removing bursts can actually decrease radio access network (RAN) scheduling efficiency. Lastly, throttling affects clients: * The most obvious impact is QoE degradation, since video playback mechanisms are limited to artificially imposed bandwidth bounds. * Additionally, the temporal characteristics of shaped traffic does not allow mobile device modems to schedule sleep cycles (Discontinuous Reception (DRX)) leading to higher device battery consumption. An overall impact of throttling, as well as the benefits obviating the need to throttle is summarized in [YouTube] 3. Presence of throttling globally Considering the breadth of implementations and policies used by CSPs to meet their specific needs, detecting throttling in the wild is not trivial. Some studies have quantified the prevalence of throttling using various methodologies which come with limitations or vantage point biases This section summarizes some key findings. An analysis of millions of video streams served by Google’s CDN over a period of 7 days in 2015 ([flach]) revealed that ~2% of video segments served in North America were impacted by policing, while the number increased to ~7% for Africa and APAC. 30% of the connections were throttled between 0.5 and 2Mbps, and for all the connections that were throttled, a 15% increase in rebuffering time was observed compared to non-throttled counterparts. Zarifis, et al. Expires 4 September 2025 [Page 5] Internet-Draft SCONE Throttling Taxonomy March 2025 In 2019 [li] identified 30 (out of 144 analyzed) CSPs across 7 countries that throttled at least one of several video streaming services, by conducting crowd-sourced experiments from mobile phones. Specifically in the US, where the examined content providers were popular, it was found that most CSPs throttle several of the streaming services, with video traffic typically being throttled at 1.5Mbps. However, notably, CSPs used different throttling rates for different content providers (mainly due to the inaccuracy in identifying candidate flows), and throttled constantly both during peak as well as low traffic hours when congestion was not an issue. Analyzing goodput data across connections served by Meta to countries outside of the US in 2022 identified ~200 ASNs that use throttling. Among them, 60% throttled at rates up to 1Mbps, 30% between 1-2Mbps, and ~10% between 2-5Mbps. A more recent analysis in 2024 identified ~274 globally that throttle content served by Meta. The detected throttling rates were mostly consistent, with a slight shift towards lower rates: 68% of the ASNs now throttled at rates up to 1Mbps, 30% between 1-2Mbps, and 7% between 2-5Mbps. In most cases, especially for ASNs in Latin America and Asia/Pacific, throttling was attributed to carrier-side Fair Usage Policies, with carriers implementing application-specific data caps for the various Meta apps. Within the US, most major CSPs throttled at specific rates (predominantly 2Mbps or 4Mbps), without imposing data caps for most of the users. Across the different studies, a few key take-aways are highlighted: Over the last ~10 years there has been an increasing trend in use of throttling by CSPs, particularly for video traffic. Most US carriers throttle video traffic constantly, regardless of time of day or network conditions or user usage patterns. User Data Caps are prevalent, especially in APAC/LATAM CSPs around the world employ different mechanisms and diverse throttling policies, depending on the market and business needs. 4. Taxonomy of throttling policies This section provides a taxonomy of the various throttling policies implemented by Communication Service Providers (CSPs) in the wild. These policies are designed to manage network traffic effectively and are influenced by a range of factors, including business objectives, network conditions, and regulatory requirements. Zarifis, et al. Expires 4 September 2025 [Page 6] Internet-Draft SCONE Throttling Taxonomy March 2025 * *Constant, Application-Based Throttling*: CSPs may implement constant throttling policies that specifically target video flows from Content Application Providers (CAPs). These policies enforce a fixed rate, often utilizing Server Name Indication (SNI) to identify and manage specific applications. This approach ensures consistent bandwidth allocation for certain types of traffic, regardless of network conditions. * *Time-of-Day (ToD) Based Throttling*: To manage peak traffic periods, CSPs may employ ToD-based throttling. For example, network traffic may be throttled during peak hours, such as between 6 PM and 10 PM, to alleviate congestion and maintain service quality for all users. This strategy allows CSPs to optimize network performance during times of high demand. * **Data Capped User Throttling: Throttling policies may also be applied based on data usage caps. Users may experience throttling once they exceed predefined data limits, which can be set on a daily or monthly basis. Some CSPs offer manual top-ups to allow users to purchase additional data. Additionally, app-specific data caps may be enforced, such as throttling Facebook or Instagram or YouTube video traffic after a user consumes 25GB or 30GB of app-specific data per month. * *User-Specific Policies*: CSPs may implement user-specific throttling policies based on individual user profiles or subscription tiers. This allows for personalized bandwidth management, where users on different plans may experience varying levels of throttling. Such policies enable CSPs to offer differentiated services and pricing models. * *Network topology specific policies*: CSP may implement different throttling policies based on the network topology. For example in the case of a cellular network as users move from a 5G network to a 4G network the CSP may change the throttling policies. Another example is users accessing the internet through a wifi access point using a cellular backbone (fixed wireless access) vs a satellite backbone, vs a fiber/cable backhaul are subject to very different throttling policies. 5. Design choices for throughput advice signaling Understanding the throttling ecosystem on the Internet today is crucial for designing a protocol to communicate throughput advice. In particular, to sufficiently communicate the kinds of policies in use today any throughput advice signalling must be able to achieve certain degrees of frequency and granularity. Zarifis, et al. Expires 4 September 2025 [Page 7] Internet-Draft SCONE Throttling Taxonomy March 2025 * *Frequency of signal*: As discussed above, policies vary from being constantly active to being applied only during certain hours of the day. They can also be reactive to user-specific changes such as exceeding a subscription’s data allotment. This variability implies a requirement on the advice signaling protocol that is able to alter the advice in step with these changes in policy. * *Granularity of signal*: Similarly to frequency, the actual rates used in these policies vary as wildly as the policies themselves. Some, such as in the time-of-day policies, are based on network usage and demand. Others, such as the application-based constant policies, are aimed at an application serving a certain video quality. These rates also change over time with no standardization. A solution which seeks to communicate these rates as throughput advice needs to have the ability to encode the wide range of policies used. 6. Security Considerations General SCONE security considerations are discussed in the other documents covering the specific network-to-host signaling methods. This document only addresses questions regarding use of ECN for SCONE. 7. IANA Considerations This document has no IANA actions. 8. References 8.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . 8.2. Informative References [draft-tomar-sconepro-ecn-01] "SCONEPRO Need for Defining A New On-Path Signaling Mechanism", n.d., . Zarifis, et al. Expires 4 September 2025 [Page 8] Internet-Draft SCONE Throttling Taxonomy March 2025 [flach] Flach, T., "An Internet-Wide Analysis of Traffic Policing", n.d., . [li] Li, F., "A Large-Scale Analysis of Deployed Traffic Differentiation Practices", n.d., . [YouTube] YouTube, "YouTube Plan Aware Streaming", 21 March 2024, . Acknowledgments This document represents collaboration, comments, and inputs from others, including: * Tom Saffell (Youtube) * Wesley Eddy (Meta) Authors' Addresses Kyriakos Zarifis Meta Email: kzarifis@meta.com Sharad Jaiswal Meta Email: sj77@meta.com Ilango Purushothaman Meta Email: ipurush@meta.com Jon Varsanik Google Email: jvarsanik@google.com Abhishek Tiwari Meta Email: atiwari@meta.com Zarifis, et al. Expires 4 September 2025 [Page 9] Internet-Draft SCONE Throttling Taxonomy March 2025 Matt Joras Meta Email: mjoras@meta.com Zarifis, et al. Expires 4 September 2025 [Page 10]