Internet-Draft SCONE Applicability & Manageability October 2025
Mishra, et al. Expires 23 April 2026 [Page]
Workgroup:
SCONE
Internet-Draft:
draft-mishra-scone-applicability-manageablity-03
Published:
Intended Status:
Informational
Expires:
Authors:
S. Mishra
Verizon
Z. Sarker
Nokia
A. Tomar
Meta
K. Abbas
Verizon

Applicability & Manageability consideration for SCONE

Abstract

This document describes the applicability and manageability considerations for providing throughput guidance to application endpoints in telecommunications service provider networks supporting the Standard Communication with Network Elements (SCONE) protocol.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 23 April 2026.

Table of Contents

1. Introduction

The SCONE protocol [I-D.ietf-scone-protocol] provides a signaling mechanism that enables on-path SCONE-capable network elements to communicate the maximum allowable bit rate to application endpoints, which is particularly relevant for adaptive bit-rate applications. This document addresses the applicability and manageability considerations for deploying the SCONE protocol within telecommunications service provider networks.

SCONE operates based on a UDP 4-tuple. Network elements capable of rate limiting at this granularity can send notifications of the maximum allowable bit rate in each direction of the observed traffic. Such network elements may also drop or delay packets within the corresponding UDP 4-tuple flows. This implies that on-path SCONE-capable network elements (referred to as SCONE Network Elements in the rest of this document) are assumed to have the following capabilities: detect and maintain UDP 4-tuple flows, be aware of or configurable with rate-limiting policies, and identify flows that carry SCONE packets in order to insert throughput advice into those packets.

In this document, on-path SCONE Network Elements are generally considered within the access portion of the telecommunications provider’s network. However, multiple SCONE Network Elements may exist along a path between the communicating peers. Depending on their configuration and roles they are likely to generate different throughput advices for the SCONE enabled application traffic flows, specially when differnet access technologies are in use. SCONE protocol For example, a wireless access network element may operate differently from one in a fixed broadband network. Wi-Fi networks provide another example, where enforcement is often per user or per Service Set Identifier (SSID), but visibility into individual UDP 4-tuples may be limited. Among access networks, mobile networks offer the most fine-grained visibility into traffic flows and can act on individual flows. In mobile networks, the User Plane Function (UPF) in 5G and the Packet Data Network Gateway (P-GW) in 4G can generate throughput advice to guide adaptive applications on a per-flow basis. In contrast, wireline broadband networks typically apply rate limiting at a centralized Broadband Network Gateway (BNG) or at aggregation points serving multiple Customer Premises Equipment (CPE) devices.

Accordingly, applicability and manageability considerations must encompass a wide range of access-network scenarios, each of which handles per-flow rate limiting differently. This document first presents generic considerations for the SCONE protocol and then provides network-specific guidance where throughput advisory signaling can enhance both resource utilization and user experience.

2. Terms and Definitions

This document uses terms and definitions described in [I-D.ietf-scone-protocol], some more terms and definitions are described below in this section.

3. Generic Applicability and Manageability considerations

3.1. Flow session awareness

SCONE signaling operates only over established sessions. SCONE Network Elements ought to be able to unambiguously associate throughput advice with application flows. Each session is bound to an IP address and port, ensuring SCONE packets are routed precisely without affecting unrelated traffic.

3.2. Per-Flow Signaling

Throughput advice is applied on a per–4-tuple basis. SCONE Network Elements ought to maintain flow-specific context to ensure signaling correctness. This enables applications to receive targeted throughput advice while preventing unintended impact on unrelated flows.

3.3. QoS awareness

Networks can enforce Quality of Service (QoS) using various techniques. In some cases, operators may wish to apply separate QoS policies to SCONE-enabled flows. The SCONE Network Element that inserts SCONE advice does not need to interpret or enforce QoS policies directly; it only provides the advice. Operators should be able to identify SCONE-enabled flows and apply differentiated QoS treatment when desired.

3.4. SCONE Hint to the Network

SCONE-aware applications ought to provide hints to the SCONE Network Elements, enabling it to generate appropriate throughput advice for a given 4-tuple. Such hints prevent unnecessary default rate-limiting, allow the network to signal the maximum allowable bit rate, and reduce CPU overhead by eliminating additional classification steps.

3.5. Retransmission of Advised Bit-Rate

Packet loss or non-delivery of SCONE advice reduces its effectiveness. Both SCONE Network Elements and applications should support retransmission or periodic re-sending of SCONE packets to ensure reliable delivery. Conformance depends on the behavior of both network and endpoint.

3.6. Frequency of Updates

The rate at which SCONE updates are issued depends on flow characteristics and available computational resources. Excessively frequent updates may increase CPU load, while infrequent updates may reduce advisory effectiveness. Network providers can define adjustable update intervals based on application requirements, network capacity, and operational constraints. The SCONE protocol specifies a minimum interval of 67 seconds between updates [I-D.ietf-scone-protocol].

3.7. Dynamic Updates

Dynamic rate limits can be enforced by the network during active application sessions due to:

  • Changes in access network type (requiring updated throughput advice)

  • Subscriber policy updates (e.g., exceeding usage thresholds)

  • Adjustments to maximum allowable throughput

  • Periodic refreshes of throughput advice (e.g., timers for maximum update periodicity)

In such cases, the SCONE Network Elements need to be able to initiate SCONE packets to provide updated advice, or applications should generate SCONE packets frequently enough to trigger network responses.

3.8. Monitoring and Logging

SCONE signaling can be integrated into existing operational and management frameworks to enable monitoring, troubleshooting, and fault isolation. Metrics of interest include:

  • Rate of SCONE advisory messages issued per session

  • Correlation between SCONE advisories and user-plane throughput changes

  • Error conditions where SCONE signaling fails to reach the intended endpoints

3.9. Conformance Monitoring

Networks providing SCONE throughput advice ought to implement mechanisms to measure compliance, either per application flow or in aggregate. This allows operators to validate advisory effectiveness and adjust policies. Due flow awareness, such mechanism are typically implemented in a SCONE Network Element but may also be implemented elsewhere in the network.

3.10. Standards Compliance

SCONE signaling is expected to traverse the existing data path. For example, in 3GPP-compliant networks, SCONE packets are carried within Protocol Data Unit (PDU) sessions established between the User Equipment (UE) and Internet endpoints.

3.11. Interworking with Other Congestion Management Mechanisms

SCONE operates independently of transport-layer mechanisms such as Explicit Congestion Notification (ECN) or Low Latency, Low Loss, and Scalable throughput (L4S). Operators would benefit from harmonizing multiple congestion signaling methods by policy or scope deployments to avoid conflicting feedback.

4. SCONE Usage in a 5G Network

5G systems consist of a 5G Radio Access Network (RAN) and a 5G Packet Core. The 5G Packet Core is built on a cloud-native Service-Based Architecture (SBA) and introduces the concept of Network Functions (NFs), which provides flexibility for deploying SCONE in the network.

Appendix A describes the various network components of a 5G network.

In 5G, the User Plane Function (UPF) is the on-path network element with access to subscriber policy and user-plane connectivity between the User Equipment (UE, or client application endpoint) and the Internet. The UPF is capable of generating SCONE throughput advice on a per-application-flow basis, enabling endpoints to adjust sending rates proactively. SCONE signaling occurs over the existing data path.

For a 5G network, the UPF serves as the natural anchor point for SCONE signaling. However, due to the flexibility of 5G’s SBA, any network component capable of meeting the applicability and manageability considerations may act as a SCONE Network Element.

The following diagram illustrates how throughput advice can be conveyed within a 5G network, highlighting the role of user-plane SCONE Network Elements.

+---------+
|   PCF   |
+---------+
     |
     v Policy Rules
+---------+
|   SMF   |
+----+----+
     | Policy Rules
     v
+--------+                 +------------------------+
| Client |<===============>|                        |
|   App  |     SCONE       |                        |
+--------+     Advice      |            UPF         |
|   OS   |                 |                        |
+--------+                 |                        |
|  Modem |                 |                        |
+----+---+                 +------------------------+
     |                             |      |
     |   +-----+                   |      |
     +---+ gNB +-------------------+      |
         +-----+                          |
                                          v
                                  +--------------+
                                  |  Internet    |
                                  +--------------+
                                         |
                                         |
                                         v
                                 +-----------------+
                                 | Content Provider|
                                 +-----------------+

Figure 1: SCONE Integration within the 5G SA Network

4.1. 5G specific considerations

This section describes how the SCONE protocol can be deployed and managed within 3GPP [_5G-Arch] networks, including support for SCONE packets over established PDU sessions.

4.1.1. 3GPP Defined PDU Session Establishment Procedures

The following high-level functions, defined in 3GPP specifications, are relevant to SCONE manageability as SCONE packets traverse established PDU sessions:

  1. PDU Session (5G)
    A logical connection between the UE and UPF (5G), allowing the UE to exchange IP packets with external networks such as the Internet or a private network.

  2. IP Address Allocation
    During PDU Session establishment, the UE is allocated an IP address (IPv4, IPv6, or both) used for communication with external networks.

  3. Bearer Establishment
    Data traffic within a PDU session flows over radio bearers, each with defined QoS characteristics. IP packets are mapped to QoS flows based on packet filters at the UPF and UE.

4.1.2. PDU Session Awareness

SCONE signaling operates only over established PDU sessions. This allows SCONE Network Elements in 5G network to unambiguously associate throughput advice with specific UEs and application flows. Each session is bound to a DNN and an allocated IP address, ensuring SCONE packets are handled precisely without affecting unrelated traffic.

4.1.3. Per-Flow Signaling

Throughput advice is applied on a per–4-tuple basis. SCONE Network Elements in 5G network need to maintain flow-specific context to ensure signaling correctness. This enables applications to receive targeted throughput advice while preventing unintended impact on unrelated flows.

4.1.4. QoS Considerations

In 5G, QoS is enforced at the granularity of QoS Flows. A single PDU session can contain multiple QoS Flows. Operators may configure a distinct QoS Flow for SCONE packets to ensure predictable handling or allow SCONE packets to traverse the same QoS Flows as other user-plane traffic when differentiated treatment is not required.

5G network functions, such as the PCF and SMF, can assign appropriate QoS attributes to SCONE flows so that the advised throughput is not degraded under high-load conditions. They can also dynamically update SCONE rate advice in response to network load variations.

The UPF can be configured to enforce a Maximum Bitrate (MBR) of traffic calculated across over an averaging window (default 2seconds). The enforcement may be applied on different granularity, all traffic carried within a PDU session with default QoS, all traffic mapped to a specific QoS flow within a PDU session, or just the traffic of a specific application traffic flow mapped to a specific QoS flow. The restriction can be separated for upstream and downstream directions. By default, the throughput advice reflects the MBR value the UPF is configured for a particular SCONE-capable traffic flow.

4.1.5. Dynamic Updates

When preferred mobile networks can enforce dynamic rate limits during active sessions, for example on a QoS Flow basis. In such cases, a SCONE Network element in 5G network would like to sent dynamics updates to applications..

4.1.6. Operations Monitoring and Logging

When preferred mobile operators can integrate SCONE signaling into existing operational and management frameworks to enable monitoring, troubleshooting, and fault isolation. Metrics of interest include:

  • Rate of SCONE advisory messages issued per session

  • Correlation between SCONE advisories and user-plane throughput changes

  • Error conditions where SCONE signaling fails to reach the UE

Integration with analytics frameworks (e.g., NWDAF in 5G) can also be used to assess SCONE effectiveness.

5. SCONE Usage in a 4G/LTE Network

In LTE/Evolved Packet Core (EPC) systems as defined by 3GPP [_4G-Arch], SCONE can be integrated at the PDN Gateway (P-GW) or the Serving Gateway (S-GW). Unlike 5G, traffic granularity is bearer-based rather than per-flow.

The following diagram illustrates SCONE integration within the P-GW:

+---------+
|  PCRF   |
+----+----+
     | Flow
     v Policy Rules
+--------+          +--------------+
| Client |<========>|  P-GW        |
|  App   |   SCONE  |              |
+--------+   advice +-------+------+
|   OS   |                  |
+--------+                  |
|  Modem |                  |
+----+---+                  |
     |                      |
     v                      v
  +--+---+              +---+---+
  |  eNB |--------------|  S-GW |
  +--+---+              +---+---+
                            |
                            v
                    +-------------+
                    |  Internet   |
                    +-------------+
                           |
                           v
                  +-----------------+
                  | Content Provider|
                  +-----------------+

Figure 2: SCONE Integration within the 4G Network

5.1. Applicability of SCONE in a 4G/LTE Network

TBD

Editor's NOTE: SCONE signaling maps to EPS bearers, enabling secure and targeted throughput advice between endpoints and EPC gateways.

6. SCONE usage in a Wireline Network

TBD

Editor's Note: SCONE can be deployed in wireline broadband networks at key access aggregation points such as Broadband Network Gateways (BNGs) or equivalent subscriber access nodes. These SCONE network elements originate throughput advice, signaling maximum sustainable data rates to application endpoints for each subscriber session, typically identified by DHCP, PPP, or IPoE session contexts.Session granularity is typically based on subscriber sessions using PPP, DHCP, or IPoE protocols. We need to consider if aggregation points have flow level visibility or not, or whether there is a point to provide throughput advice at the aggregate level.

7. SCONE usage in a Wifi Networks

TBD

Editor's Note: Home, enterprise, and campus networks commonly use Wi-Fi access. The SCONE client may remain within the Wi-Fi network for the duration of a session, or it may be subject to handover or offloading, moving between a cellular network and a Wi-Fi network, and vice versa. In such scenarios, rate limiting is typically applied per user, device, or Service Set Identifier (SSID). These cases should be considered when defining applicability and manageability guidelines for SCONE deployments.

8. Security Considerations

Security considerations are included separately in the SCONE protocol documents.

9. IANA Considerations

This document has no IANA actions.

10. References

11. References

11.1. Normative References

[I-D.ietf-scone-protocol]
Thomson, M., Huitema, C., Oku, K., Joras, M., and M. Ihlar, "Standard Communication with Network Elements (SCONE) Protocol", Internet-Draft, draft-ietf-scone-protocol, Work in Progress , , <https://datatracker.ietf.org/doc/draft-ietf-scone-protocol/>.

11.2. Informative References

[_4G-Arch]
3GPP, "System Architecture for the Evolved Packet Core (EPC)", , <https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=24300>.
[_5G-Arch]
3GPP, "System Architecture for the 5G System (5GS)", , <https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144>.

Appendix A. Appendix A. Additional Background details on role of UPF in 5G Mobile Packet Core

This section describes 5G mobile packet core in mobile packet core and reasons why the 5G User Plane Function (UPF) as SCONE network elements can be considered candidates for signaling the "throughput advice" to client-application-endpoint.

The user plane SCONE network element in the 5G packet core, termed as the UPF, as shown in Figure 1.

               +-----+  Nudm/Nudr  +---------+
               | PCF +-------------+ UDM/UDR |
               +--+--+             +----+----+
                   |                    |
              Npcf |      +-----+       |Nudm
                   +------+ SMF +-------+
                          +--+--+      ___  __
                             | N4     (   )(  )
   +----+   +--------+    +--+--+    (         )    +------------------+
   | UE |---| gNodeB |----| UPF |----( Internet )---| Content Provider |
   +----+   +--------+ N3 +- ---+ N6  (        )    +------------------+
                              | N9     (__(___)
                            +-+---+
                            | UPF |
                            +-----+
Figure 3: 5G Mobile Network Architecture

A.1. 5G Mobile Network Architecture

The UPF is a fundamental component of the 3GPP's 5G packet core network architecture. UPF is on the data path between the end-user and the Internet, has access to subscriber policy via standard 3GPP N4 interface and is responsible for routing and forwarding user data packets. UPF is the anchor point between the mobile infrastructure and the Packet Data Network. The UPF is responsible for functions such as:

  • Packet routing, forwarding, and interconnection to the Data Network (Internet)

  • Allocation of User Equipment (UE) IP Address/prefix, in conjunction with Session Management Function (SMF)

  • Quality of Service policy enforcement

  • Handling of traffic filtering, steering and application detection

  • Traffic usage reporting

Note: This is not an exhaustive list of UPF functions. For details refer to [_5G-Arch].

To accomplish above mentioned functions, the UPF has four distinct reference points (interfaces) as defined by the 3GPP and as shown in the figure 1 above:

  1. The N3 interface is between the UPF and the 5G Base station.

  2. The N4 interface is a connection between the UPF and the Session Management Function (SMF).

  3. The N6 interface is between the UPF and the public data network or the Internet.

  4. The N9 interface is between instances of UPFs.

A.2. N3 Interface

The N3 interfaces transfers user plane traffic, that is, user data packets between the gNodeB and the UPF. It uses GPRS Tunneling Protocol - User Plane or GTP-U. It replaces the S1-U interfaces from the 4G mobile packet core.

A.3. N4 Interface

The N4 interface connects the UPF and the 5G Session Management Function (SMF). Through N4, the SMF informs the UPF about the subscriber policy and data plans. Additionally, this interface is used to manage session setup, modification, deletion, and for configuring QoS and forwarding rules for user data. The QoS rules contain parameters such as MBR. The N4 interface among others uses Packet Forwarding Control Protocol (PFCP).

Note: SMF also interacts with Policy Control Function (PCF) for functions such as QoS and Charging policy rules, Unified Data Management (UDM) and Unified Data Repository (UDR) for functions such as subscription data and policy plans.

A.4. N6 Interface

The N6 interface connects the UPF to external Data Networks, similar to the SGi interface between the P-GW and the external Data Network for access to services and applications. The interface supports various transport protocols over IP.

A.5. N9 Interface

This interface interconnects two or more UPFs when used in a data path. The interface uses GTP-U protocol for user traffic tunneling including roaming.

Note: In the scenario of 2 or more UPFs in the data path, only one UPF that has access to subscriber policy would send "throughput advice" to the client-application-endpoint.

A.6. User Plane Interface Between UPF and UE

This section describes the N3 interface (between the UPF and gNodeB or gNB) and the air interface between the gNB and UE. For purposes of nomenclature, a Protocol Data Unit (PDU) session is a logical path between a UE and UPF to carry packets belonging to one or more IP flows between UE and DN. A PDU session within a 5G mobile network consists of an air-interface between UE and gNB and GTP-U tunnel between gNB and UPF (N3 interface). Application traffic flows with different QoS requirements get mapped to different QoS treatments based on packet filters and QoS rules configured on the UPF and UE. Below is an example of data flow to/from a UE to the UPF.

  1. Uplink Data Flow

    • Apps that are hosted on UE that generate application packets for communication (e.g. web browsing, video streaming).

    • These packets are transmitted to the gNB over the air interface and get mapped to different QoS treatments based on packet filters and QoS rules provided to the UE

    • N3 Encapsulation and Forwarding

      1. The gNB then encapsulates this user-plane data using GTP-U.

      2. It then forwards the encapsulated packets over the N3 interface to the UPF in the 5G mobile packet core.

    • UPF Routes Data to External Networks.

      1. Within the UPF, UPF then removes the GTP-U header, processes the packet, and routes it over the N6 interface toward the destination (Internet, enterprise network, cloud services, etc.).

  2. Downlink Data Flow

    • UPF receives incoming data in downlink direction at N6 interface (e.g. from the Internet).

    • The UPF encapsulates incoming data using GTP-U and forwards it over the N3 interface to the gNB. It maps traffic flows with different QoS requirements to different QoS treatments based on packet filters and QoS rules configured by SMF.

    • The gNB forwards the packets to the UE over the air-interface. UE-side modem stack then transparently passes the application packets to the app hosted on the UE.

In summary, the UPF is responsible for packet routing and forwarding, packet inspection and filtering, participating in subscriber and flow policy enforcement, inline services (NAT, firewall, DNS etc) and QoS handling.

Appendix B. Appendix B. Non-ASCII Characters

This document uses the following kramdown-rfc character escapes for common non-ASCII symbols:

Acknowledgments

The authors would like to acknowledge and thank the SCONE working grouup and also the following individuals for their valuable feedback, discussions, and contributions that helped improve this document:

Authors' Addresses

Sanjay Mishra
Verizon
Zaheduzzaman Sarker
Nokia
Anoop Tomar
Meta
Khurram Abbas
Verizon