<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc compact="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-bonica-gendispatch-exp-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="IETF Experiments">IETF Experiments</title>
    <seriesInfo name="Internet-Draft" value="draft-bonica-gendispatch-exp-00"/>
    <author initials="R." surname="Bonica" fullname="Ron Bonica">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Herndon</city>
          <region>Virginia</region>
          <country>USA</country>
        </postal>
        <email>rbonica@juniper.net</email>
      </address>
    </author>
    <author initials="A." surname="Farrel" fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <postal>
          <country>UK</country>
        </postal>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <date year="2024" month="July" day="02"/>
    <area>General</area>
    <workgroup>GenDispatch Working Group</workgroup>
    <keyword>experiment</keyword>
    <abstract>
      <?line 40?>

<t>This document describes IETF experiments and provides guidelines for the publication of Experimental RFCs.</t>
    </abstract>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Experimental RFCs in the IETF Stream describe IETF experiments. IETF process experiments are described in <xref target="RFC3933"/>, but this document is concerned with protocol experiments.</t>
      <t>An IETF protocol experiment is a procedure that is executed on the Internet for a bounded period of time. The experiment can, but does not always, include the deployment of a new protocol or protocol extension. When two protocols are proposed to solve a single problem, the IETF can initiate an experiment in which each protocol is deployed. Operational experience obtained during the experiments can help to determine which, if either, of the protocols should be progressed to the standards track.</t>
      <t>An IETF experiment must not harm the Internet or interfere with established network operations. It must be conducted in a carefully controlled manner (for example, using a limited domain <xref target="RFC8799"/>). Furthermore, it must use protocol identifiers that do not conflict with other protocols or experiments.</t>
      <t>When an IETF protocol experiment concludes, experimental results should be reported in one or more informational RFCs.</t>
      <t>This document describes IETF protocol experiments and provides guidelines for the publication of Experimental RFCs. Experimental RFCs in the Independent Submissions Stream are out of scope of this document.</t>
    </section>
    <section anchor="requirements-on-experimental-rfcs">
      <name>Requirements on Experimental RFCs</name>
      <t>An Experimental RFC must:</t>
      <ul spacing="normal">
        <li>
          <t>Describe the experiment in details, so that it can be replicated by non-collaborating parties and recognised when it is seen in deployments.</t>
        </li>
        <li>
          <t>Describe an experiment that does not harm the Internet or interfere with its established operations.</t>
        </li>
        <li>
          <t>Include a date at which the experiment will be terminated.</t>
        </li>
        <li>
          <t>Include metrics and observations that will be collected during the experiment.</t>
        </li>
        <li>
          <t>Include criteria by which success of the experiment will be determined.</t>
        </li>
      </ul>
      <t>When two protocols are proposed to solve a single problem, the IETF can initiate an experiment in which each protocol is deployed. In this case, the same metrics should be collected in each experiment.</t>
      <section anchor="iana-assign">
        <name>Codepoints in Experimental RFCs</name>
        <t><xref target="RFC8126"/> describes guidelines for writing IANA Considerations sections in RFCs. It lists a number of assignment policies that apply to codepoint registries maintained by IANA.</t>
        <t>Experimental RFCs cannot obtain codepoints from registries or parts of registries that are managed under the following assignment policies:</t>
        <ul spacing="normal">
          <li>
            <t>Standards Action</t>
          </li>
          <li>
            <t>Hierarchical Allocation</t>
          </li>
        </ul>
        <t>An Experimental RFC may request and be granted codepoints from registries or parts of registries that are managed under the following assignment policies:</t>
        <ul spacing="normal">
          <li>
            <t>First Come First Served</t>
          </li>
          <li>
            <t>Expert Review</t>
          </li>
          <li>
            <t>Specification Required</t>
          </li>
          <li>
            <t>RFC Required</t>
          </li>
          <li>
            <t>IETF Review</t>
          </li>
          <li>
            <t>IESG Approval</t>
          </li>
        </ul>
        <t>Consideration must be given to the fact that the experiment may be temporary in nature and the protocol or protocol extensions may be abandoned. If there is a scarcity of available codepoints in a registry, even more caution should be applied to any codepoint assignments.</t>
        <t>Some registries or parts of registries are marked as "For Experimental Use: Not to be assigned." These ranges are specifically intended for use by protocol experiments. But assigments are not made from them and Experimental RFCs must not document and codepoints from such ranges. Instead, protocol implementations should allow the codepoints to be configured so that all implementations participating in an experiment can interoperate and so that multiple experiments may co-exist in the same network.</t>
        <t>Experiemts should not use Private Use registries.</t>
        <t>Additionally, IANA will not create any new registries or sub-registries as specified in Experimental RFCs. Experimental RFCs that would otherwise ask for the creation of protocol registries can simply enumerate the codepoints within the RFC.</t>
      </section>
      <section anchor="requirements-level-language-and-keywords">
        <name>Requirements Level Language and Keywords</name>
        <t>An Experimental RFC describing a protocol experiment may use BCP 14 requirements level language and keywords <xref target="RFC2119"/> <xref target="RFC8174"/> to help clarify the description of the protocol or prtocol extension and the expected behavior of implementations.</t>
      </section>
    </section>
    <section anchor="experimental-reports">
      <name>Experimental Reports</name>
      <t>Experimental Reports shoul include the following information:</t>
      <ul spacing="normal">
        <li>
          <t>Scale of deployment</t>
        </li>
        <li>
          <t>Effort required to deploy
          </t>
          <ul spacing="normal">
            <li>
              <t>Was deployment incremental or network-wide?</t>
            </li>
            <li>
              <t>Was there a need to synchronize configurations at each node or could nodes be configured independently</t>
            </li>
            <li>
              <t>Did the deployment require hardware upgrade?</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Effort required to secure</t>
        </li>
        <li>
          <t>Performance impact of risk mitigation</t>
        </li>
        <li>
          <t>Effectiveness of risk mitigation</t>
        </li>
        <li>
          <t>Cost of risk mitigation</t>
        </li>
        <li>
          <t>Interoperability</t>
        </li>
        <li>
          <t>Did you deploy two inter-operable implementations?</t>
        </li>
        <li>
          <t>Did you experience interoperability problems?</t>
        </li>
        <li>
          <t>Effectiveness and sufficiency of OAM mechanism</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not make any requests of IANA, but see <xref target="iana-assign"/> for details of the use of codepoints in Experimental RFCs.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document does not introduce any new protocols or operational procedures, it does not introduce any new security considerations</t>
      <t>Experimental RFCs must include security and privacy considerations as with any other RFC. As well as considering the security and privacy implications of the protocol or protocol extensions, Experimental RFCs should examine the implications for security and privacy of running an experiment on the Internet.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors wish to acknowledge TBD for their review and helpful comments.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3933">
          <front>
            <title>A Model for IETF Process Experiments</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="S. Dawkins" initials="S." surname="Dawkins"/>
            <date month="November" year="2004"/>
            <abstract>
              <t>The IETF has designed process changes over the last ten years in one of two ways: announcement by the IESG, sometimes based on informal agreements with limited community involvement and awareness, and formal use of the same mechanism used for protocol specification. The first mechanism has often proven to be too lightweight, the second too heavyweight.</t>
              <t>This document specifies a middle-ground approach to the system of making changes to IETF process, one that relies heavily on a "propose and carry out an experiment, evaluate the experiment, and then establish permanent procedures based on operational experience" model rather than those previously attempted. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="93"/>
          <seriesInfo name="RFC" value="3933"/>
          <seriesInfo name="DOI" value="10.17487/RFC3933"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8VZ74/buBH9bsD/A3v50gZrY5Mc7i7+knN2k9zejyTIJs2H
oigoirbZlUgdSa3XXez/3jdDSpZsJz2gQHsBLrJEzQxn3rx5VGaz2XSiXGns
eiHauJr9MPgZZjIoY6aT6SSaWOmFuHr18bV4dddob2ptY5hOZFF4fXvqSemU
lTVeKr1cxVnhrFFytta2NKGRUW1m+q6ZnZ/DoYx67fxuIQrVTCehLWoTgnE2
7prslGIIUdryH7JyFjd3Gi4asxB/i06dCfzP1Y1UkS+NLRHDmQjOR69XAVe7
Ol3kZX8ng6bxCxF9G+LT8/Pn50+xG6/lQrzRVntZTSfbNf+4zAGLz87fIDXi
jXctAr3ZLoTut0wWZRs3zi+mE2RV4D9jw0J8mIuXvPl0LyXlg7Oju8pE7P8n
7W3pbLrl9Ro5WIi/Gr821uSFziOon1tr4Fe81XGLmEK24VobKY2frpfpjq6l
qRbCp+T/+M/02tzqOA5xORevpfe6Goa4LL2RdvSAnb+rSnHp1uLC2dBWEQk5
dP/LyLtkOz+6qizdeq7cvL2hXE0n1vlaRnOrF1wNuxr9ns1mQhYhepSLfn/c
mCAAqpaSLUodlDeFDgl5+zIEAZSIxrtbgzVi3eKvylhcwryIGy2atqiQjYjk
CrcagFZW4sPrizDvvNemLCtNvx6JK2zNla2it+jO0VtIJFvncK4BO1n3QR7F
OE93EKXSIYyj97p/rySj9/cvYP/Z82fPHh7ORNFGuBlmAtfKWQXkYP3WxA2Z
pX6oRh4p6KXt/R4uIDMyBVS2CCFuJN/Td1q1EZZd3p6N5ClyNqUoUPMST8mM
KymdEebm4iOWDowraVPopUMhrItCVlu5Qz8aq6q21Gy71E3ldvwCDElh9XYf
KtwNwo7aEkHMxeeNRmBb1z9MGcSvxgUEFh1YoLrVMBeA1IofFZWuz/bVQnSI
w0QDHgJ6RlmxYrsxaH0t1SCxlH8OVpdz8Q6rGU2yS6hGOYQrojRUE+STSCOO
UhLY60ZXDYVYamS1xurkDWlZCY1San/GOd3owf7CxrVowYLvrT0AlPZJq5gj
pS+DoL65GVV9sK0anMdl2Ehfj+uKPBu6XmmkkeGkYRQdEzZwYxPhCNftmaCc
7SEgAJF6JAFXYosg3baqdvQA/VNVeFJLC3oVfyYA6TtZN5U+w6yhFElRmdrQ
66UDd3TY/+H7588fHv4Cjmo95aR2Hq+Y7LYNelAYIn6zMtqHBOHS8T7hf4Wm
j2lHjqwMMsqRjFuFcSW/0i/Uc4RcYFgPuQD1ACkOq+R1gzmUcoLZRd5oB6In
PEZOzzxf5blTrf3fE97xrZ7N0N2N5nEqrvu5HDqCo1ZzLbdrUMBEAusg/nli
zw/699Z4ncJFFEf+Mk4P73OFeRo8FpcdmY4biSJF+2DS0Jh3mbiYcnLyee9I
f7EDFOwM2atk4Qi+gFwjfTQ65dBr5dbWUDttqfyGGTBourQDdqI6DeIZM0ZG
Xaa5P9JfBjkZ9tigt8jPVWZIKUrmp5gZ6SANW1NVtOFEJLTh0du1jt6otE9X
BO1vk4sUb/cy5UZz/54krZFFbB6+jKS8pohCq3icZcY6EVzPc+W+yf6/5H1l
E2CVDDpZDRA/fbr2XbxPDcyywVFeppP7hXgEnSMhmoNZ2wfg/hE0Elw5Q7A3
X4D9/f2fiOOePP3u4WHQ7gd9vEW2qSBXy7dLVl54mlEChKp0ARepn0HJABNR
g7BtXYDsaKByXJyZxqEpCPZcfdk0oGgkW3XRsvaE9KIlRMR5kqHS5H9+WgCh
EgT5NPf2thC/d/XQIo1ytB0DZXA7xYL6Y0LINdyRtEgMtkLy3ZZHxPEmMj9c
96NvmVXaY/ETBoH0CiBAkEvYSCz4RbaROwT0e4tu5EZB2ddeWir6/3w7r41H
FBcOYEyX1+hZXdIjjjuCVG+N3vLWG60w9DLFZ7LlpbSr4W9umf2LV6+u34hl
Q8ODzjvTyQhZ/VhfQ5PbTmKsoMfT5g6anLLHBFRj3km/IziCiEhNUjKHIua0
mgudCVlIOgZxfzKX0LQkMAcoCjopMZxvwfkgTT2sDcuOXIQdJjPFzcNW4WhG
W9o3NKHeJJKRdjfA/r4maSBfUw3+c71Tqf0NTMogvnmNZSOAfQo4U71Fg8Ah
uWcv2OI3JJahYQC0dTYTunqSdKJpwRqbaIDEDrrwpMIXL9sc/P4kQQ1ZS7A1
gxaZrLkWx83bK8JeedC6Q9SD4Tc5UKLOELUszwbMSmKOrWZiSsmWhHau/8Be
ygLpMrMGRMp+dmP1kSGe0so0aWYbe0D0aQZgtKTRmfDW2avpjApzI8lEQFNu
pu9QvU7rMPFngTugOF3v1RwliErw3ptb8vMpDJGR1HZZmiTpKgCQ6ZqnH6tQ
iCaObsdnmzGmQlvMhnAKHQzSyPlDqi0Ncw6VNe4WYgaWbnopyBFkHdiXbeCV
Mhko+zuhMTlSNg8qR6IlpwxOk8I7kHi/ovEq8SuA0oL6uBy/6B0SW35R6eXJ
l44BpwQ3lYxy//LivXjyLfN0769if9XQ3032J9J8ffrkCc4Qohu233+LH4Ag
H8BUJb1Z7fIZlMJouhwdk9YBZ/XURpGyPCj0Rt4axyP3AMdZDY/3zqeDcDxS
0/2EvNExeT89BieIbgiCM1iF79UqT4wVFsYuZ2U6ctIC+lDzWHyWYXj4hrOU
WMl7zi0x22IwvNi/kGiZTulZqe2s2nhnzb/2bZ3bF6BkxWQBIrKocjPReWVM
AmZ/3qhycJemPPw6kPdB6rrcEs21DeY0R/dYnNosFBLMwx4ev4f2pqzRGd3w
x0AmcoMuwdnTrLNCEMkSSSsMkSxrT666cOG0CTy76lmpMBUGF79BO9q5Nu+I
BTCz1ywtrPQhbl6MXht8YzAH5jt9HPpMDOJnUmxXK1IZVvEMfbf8DVJXbSRO
PXX+0HUsME+cSrvzTS1vEp9l2cRZIhPpcw/OTmi5oSp+YCrKB7auw6itcam+
LpZz91xTLWmvx0Euw8G3sT5Okz/f7cl3dPrvj1xw1X8DC/yN4SsmQheJOork
CwO2a+P+zXR0xzBRh1ZoAPDxkLylDxbEtgJ73GrMExn6F7qD2kmrBKWsDMNp
RjuSYWcnJksegPTBhj5TkZWRZarqSf/UGK21zOujoX3wQTFXd6lurNtWulzr
/O8IhD3knL+sU0rChiXbfp34+PKyG3DGA4mkbjkGYvcV2FO5ei/n6M+/AYM2
Vpr3GAAA

-->

</rfc>
