I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last-call comments. This document describes an exemplary XR application and its network requirements. Using the example, the draft provides network operators with information about network characteristics such as response time and bandwidth that their networks must support to make such XR applications a reality. The security considerations of the use case described are similar to any other streaming application. Some nits * The draft uses a mix of capitalization: "Edge Computing", "edge computing", and "Edge computing". Similarly, it uses "Edge devices" and "Edge Devices". Some more uniformity would be beneficial. * The draft uses both milliseconds and milli-seconds. * The paragraph on long-range and self-similar traffic was slightly hard to comprehend. I am not sure I have still fully understood it.