<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bonica-gendispatch-exp-01" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="IETF Experiments">IETF Experiments</title>
    <seriesInfo name="Internet-Draft" value="draft-bonica-gendispatch-exp-01"/>
    <author initials="R." surname="Bonica" fullname="Ron Bonica">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Herndon</city>
          <region>Virginia</region>
          <country>USA</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <author initials="A." surname="Farrel" fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <date year="2024" month="August" day="08"/>
    <area>General</area>
    <workgroup>GenDispatch Working Group</workgroup>
    <keyword>experiment</keyword>
    <abstract>
      <?line 40?>

<t>This document describes IETF protocol experiments and provides guidelines for the publication of Experimental RFCs.</t>
    </abstract>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>According to <xref target="RFC2026"/>, the "Experimental" designation for an RFC typically denotes a specification that is part of a research or development effort. An Experimental RFC may be published for information and as an archival record of the work. An Experimental RFC may be the output of an IRTF Research Group, an IETF Working Group, or it may be an individual contribution that is sponsored by an Area Director or published on the Independent Submission Stream.</t>
      <t>Experimental RFCs in the IETF Stream describe IETF experiments. IETF process experiments are described in <xref target="RFC3933"/>, but this document is concerned with protocol experiments.</t>
      <t>An IETF protocol experiment is a procedure that is executed on the Internet for a bounded period of time. The experiment can, but does not always, include the deployment of a new protocol or protocol extension. For example, when two protocols are proposed to solve a single problem, the IETF can initiate an experiment in which each protocol is deployed. Operational experience obtained during the experiments can help to determine which, if either, of the protocols should be progressed to the standards track.</t>
      <t>An IETF protocol experiment must not harm the Internet or interfere with established network operations. It must be conducted in a carefully controlled manner (for example, using a limited domain <xref target="RFC8799"/>). Furthermore, it must use protocol identifiers and code points that do not conflict with deployments of standardized protocols or other experiments.</t>
      <t>When an IETF protocol experiment concludes, experimental results should be reported to the relevant working group usually via an Internet-Draft, and may be published in an Informational RFCs.</t>
      <t>This document describes IETF protocol experiments and provides guidelines for the publication of Experimental RFCs. Experimental RFCs in the Independent Submissions Stream or published by the IRTF are out of scope of this document.</t>
    </section>
    <section anchor="requirements-on-experimental-rfcs">
      <name>Requirements on Experimental RFCs</name>
      <t>An Experimental RFC must describe the experimental nature of the specification or deployment that it documents.</t>
      <t>An Experimental RFC should:</t>
      <ul spacing="normal">
        <li>
          <t>Describe the experiment in detail, so that it can be replicated by non-collaborating parties and recognized when it is seen in deployments.</t>
        </li>
        <li>
          <t>Describe how the experiment is safegarded so that it does not harm the Internet or interfere with its established operations.
          </t>
          <ul spacing="normal">
            <li>
              <t>It should indicate how messages or protocol data units are identified and associated with the experiment.</t>
            </li>
            <li>
              <t>It should describe how backward compatability is ensured by non-participating deployments using pre-existing standardized mechanisms to discard or ignore the experiment.</t>
            </li>
            <li>
              <t>It should explain how the experiment is controlled so that it does not "leak out" into the wider Internet.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>List what configuration knobs should be provided on experimental implementations</t>
        </li>
        <li>
          <t>Include a date at which the experiment will be terminated.</t>
        </li>
        <li>
          <t>Include metrics and observations that will be collected during the experiment.</t>
        </li>
        <li>
          <t>Include criteria by which success of the experiment will be determined.</t>
        </li>
        <li>
          <t>Explain how reports of the success or failure of the experiment will be brought to the IETF.</t>
        </li>
        <li>
          <t>Suggest planned next steps if the experiment is fully or partially successful.</t>
        </li>
      </ul>
      <t>When two protocol mechanisms are proposed to solve a single problem, the IETF can initiate an experiment in which each protocol is deployed. In this case, the same metrics should be collected in each experiment.</t>
      <section anchor="iana-assign">
        <name>Codepoints in Experimental RFCs</name>
        <t><xref target="RFC8126"/> describes guidelines for writing IANA Considerations sections in RFCs. It lists a number of assignment policies that apply to codepoint registries maintained by IANA.</t>
        <t>Experimental RFCs cannot obtain codepoints from registries or parts of registries that are managed under the following assignment policies:</t>
        <ul spacing="normal">
          <li>
            <t>Standards Action</t>
          </li>
          <li>
            <t>Hierarchical Allocation</t>
          </li>
        </ul>
        <t>An Experimental RFC may request and be granted codepoints from registries or parts of registries that are managed under the following assignment policies:</t>
        <ul spacing="normal">
          <li>
            <t>First Come First Served</t>
          </li>
          <li>
            <t>Expert Review</t>
          </li>
          <li>
            <t>Specification Required</t>
          </li>
          <li>
            <t>RFC Required</t>
          </li>
          <li>
            <t>IETF Review</t>
          </li>
          <li>
            <t>IESG Approval</t>
          </li>
        </ul>
        <t>Consideration must be given to the fact that the experiment may be temporary in nature and the protocol or protocol extensions may be abandoned. If there is a scarcity of available codepoints in a registry, even more caution should be applied to any codepoint assignments.</t>
        <t>Some registries or parts of registries are marked as "For Experimental Use: Not to be assigned." These ranges are specifically intended for use by protocol experiments, and this may be particularly valuable as described in <xref target="RFC3692"/>. But assigments are not made from these codepoint ranges and Experimental RFCs must not document any codepoints from such ranges. Instead, protocol implementations should allow the codepoints to be configured so that all implementations participating in an experiment can interoperate and so that multiple experiments may co-exist in the same network.</t>
        <t>Experiments may additionally use codepoints from Private Use ranges, but these codepoints are also not recorded</t>
        <t>Additionally, IANA will not create any new registries or sub-registries as specified in Experimental RFCs. Experimental RFCs that would otherwise ask for the creation of protocol registries can simply enumerate the codepoints within the RFC.</t>
        <t>[Editors' note: The first sentence in the previous paragraph is to be verified by IANA.]</t>
      </section>
      <section anchor="requirements-level-language-and-keywords">
        <name>Requirements Level Language and Keywords</name>
        <t>An Experimental RFC describing a protocol experiment may use BCP 14 requirements level language and keywords <xref target="RFC2119"/> <xref target="RFC8174"/> to help clarify the description of the protocol or prtocol extension and the expected behavior of implementations.</t>
      </section>
    </section>
    <section anchor="experimental-reports">
      <name>Experimental Reports</name>
      <t>Experimental Reports should include the following information:</t>
      <ul spacing="normal">
        <li>
          <t>Scale of deployment</t>
        </li>
        <li>
          <t>Effort required to deploy
          </t>
          <ul spacing="normal">
            <li>
              <t>Was deployment incremental or network-wide?</t>
            </li>
            <li>
              <t>Was there a need to synchronize configurations at each node or could nodes be configured independently</t>
            </li>
            <li>
              <t>Did the deployment require hardware upgrade?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effort required to secure</t>
        </li>
        <li>
          <t>Performance impact of risk mitigation</t>
        </li>
        <li>
          <t>Effectiveness of risk mitigation</t>
        </li>
        <li>
          <t>Cost of risk mitigation</t>
        </li>
        <li>
          <t>Interoperability</t>
        </li>
        <li>
          <t>Did you deploy two inter-operable implementations?</t>
        </li>
        <li>
          <t>Did you experience interoperability problems?</t>
        </li>
        <li>
          <t>Effectiveness and sufficiency of OAM mechanism</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any requests of IANA, but see <xref target="iana-assign"/> for details of the use of codepoints in Experimental RFCs.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document does not introduce any new protocols or operational procedures, it does not introduce any new security considerations.</t>
      <t>Experimental RFCs must include security and privacy considerations as with any other RFC. As well as considering the security and privacy implications of the protocol or protocol extensions, Experimental RFCs should examine the implications for security and privacy of running an experiment on the Internet.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to acknowledge Dhruv Dhody for helpful discussions of experimenal code points.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC3933">
          <front>
            <title>A Model for IETF Process Experiments</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="S. Dawkins" initials="S." surname="Dawkins"/>
            <date month="November" year="2004"/>
            <abstract>
              <t>The IETF has designed process changes over the last ten years in one of two ways: announcement by the IESG, sometimes based on informal agreements with limited community involvement and awareness, and formal use of the same mechanism used for protocol specification. The first mechanism has often proven to be too lightweight, the second too heavyweight.</t>
              <t>This document specifies a middle-ground approach to the system of making changes to IETF process, one that relies heavily on a "propose and carry out an experiment, evaluate the experiment, and then establish permanent procedures based on operational experience" model rather than those previously attempted. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="93"/>
          <seriesInfo name="RFC" value="3933"/>
          <seriesInfo name="DOI" value="10.17487/RFC3933"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC3692">
          <front>
            <title>Assigning Experimental and Testing Numbers Considered Useful</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>When experimenting with or extending protocols, it is often necessary to use some sort of protocol number or constant in order to actually test or experiment with the new function, even when testing in a closed environment. For example, to test a new DHCP option, one needs an option number to identify the new function. This document recommends that when writing IANA Considerations sections, authors should consider assigning a small range of numbers for experimentation purposes that implementers can use when testing protocol extensions or other new features. This document reserves some ranges of numbers for experimentation purposes in specific protocols where the need to support experimentation has been identified.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="82"/>
          <seriesInfo name="RFC" value="3692"/>
          <seriesInfo name="DOI" value="10.17487/RFC3692"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
