| Internet-Draft | Avian ML Parameter Carriers | April 2026 |
| Fairaizl | Expires 13 October 2026 | [Page] |
Current machine learning infrastructure relies heavily on high-bandwidth digital interconnects for parameter synchronization, gradient aggregation, and model weight distribution. This document proposes an alternative: Avian Parameter Carriers (APC), building on the physical transport layer established in RFC 1149 and the quality-of-service extensions of RFC 2549.¶
The authors note that the bandwidth-delay product of a pigeon carrying a 512GB NVMe drive over 5 kilometers remains competitive with certain cloud providers during peak billing hours.¶
This specification is considered Feature Complete. It addresses scale (Section 14), observability (Appendix A), security (Sections 11 and 11.4), regulatory compliance (Section 9.3), and pigeon hygiene (Sections 3.3, 10.4, and 11.4.5). Future revisions MAY address quantum parameter transport (Section 14.6) and UV-spectrum adversarial plumage design (Section 11.4.2). The pigeons are considered stable.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 13 October 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
The machine learning community has grown increasingly dependent on dense GPU clusters, high-speed interconnects, and cloud infrastructure with unpredictable pricing models. RFC 1149 [RFC1149] established that IP datagrams may be transmitted via avian carrier. This specification extends that foundation to accommodate the specific requirements of neural network training, including forward passes, backpropagation, gradient descent, and the existential uncertainty of whether the model is actually learning anything.¶
Avian Parameter Carriers offer several advantages over conventional infrastructure:¶
The following definitions apply throughout this document.¶
The following requirement keywords are used in this document:¶
The standard APC training loop proceeds as follows:¶
Each complete loop constitutes one training epoch. Epoch duration is a function of flight distance, headwind, and carrier motivation, the last of which is not currently formalizable.¶
Batch size is physically constrained by Flock size. Larger batches require proportionally more Carriers. The authors observe that very large batch training (batch size > 512) presents significant loft management challenges and is RECOMMENDED only for well-funded institutions.¶
Mini-batch gradient descent is the preferred approach. Stochastic single-sample updates via individual Carrier are theoretically supported but result in training instability proportional to wind conditions.¶
Payload capacity MUST be considered when selecting storage media for Parameter Scroll transport. A standard M.2 NVMe drive weighs approximately 7-10 grams. A homing pigeon's maximum comfortable payload is approximately 75 grams, yielding a theoretical maximum of seven drives per Carrier. Practitioners SHOULD target a conservative 50% utilization to preserve aerodynamic performance and Carrier morale.¶
For model shards exceeding single-Carrier payload capacity, implementors MAY employ a RAID-0 Dove Configuration (RDC), in which a Parameter Scroll is striped across multiple Carriers dispatched simultaneously. Reconstruction at the receiving node requires all shards to arrive.¶
The fault tolerance of a RAID-0 Dove Configuration is zero. The authors wish to be unambiguous on this point. If one Carrier in an RDC does not return, the entire shard set MUST be discarded and the epoch repeated. Practitioners considering RDC for production workloads SHOULD reflect carefully on this property and then consider logistic regression instead.¶
Conventional ML infrastructure provides continuous, real-time loss curves updated at each training step. APC implementations do not support this.¶
Loss MUST be computed at the central loft upon gradient aggregation and recorded manually in the Loss Log (LL), a physical ledger maintained by the loft operator. The Loss Log SHOULD include:¶
Loss curves SHOULD be plotted by hand on graph paper. Automated plotting via the Loft Telemetry Dashboard is available to implementors who have deployed the hardware described in Appendix A.¶
A flat or increasing loss over consecutive epochs indicates the model is not converging. Practitioners SHOULD verify the following before concluding the architecture is at fault:¶
NaN loss values indicate a numerical instability in the gradient computation, or that the scroll was exposed to rain en route and is no longer legible. The two cases are distinguished by examining the scroll. If the scroll is damp, the loss is indeterminate. Discard the epoch. Allow Carrier to dry before reuse. Smart Leg Band-equipped deployments receive automated moisture alerts prior to Carrier return (see Appendix A, Appendix "Overview"), which is considered a significant operational improvement.¶
High variance in model performance will manifest as high variance in carrier return times. A model that has overfit to training conditions will show strong performance in fair weather and catastrophic degradation when a neighboring loft releases recreational pigeons. Practitioners SHOULD regularize accordingly.¶
A principal advantage of APC over conventional black-box training infrastructure is full operational explainability. When a parameter update fails to arrive, the cause is observable:¶
Practitioners familiar with SHAP values will note that case (iii) is equivalent to a high-attribution input feature with a data pipeline error. The pigeon is blameless in both cases.¶
Recent literature [BAREZ2025] establishes that chain-of-thought reasoning traces in large language models are not equivalent to genuine interpretability. The authors note that a pigeon's flight path is similarly non-explanatory: the carrier arrives or does not. The route taken is unobserved, non-reproducible, and likely influenced by factors outside the training distribution.¶
APC implementations MUST NOT treat carrier arrival as evidence that the intended route was followed. Gradient integrity SHOULD be verified upon receipt via checksum. Checksums MUST be printed in a font legible to the receiving researcher, as OCR error rates on leg-mounted scrolls remain non-trivial (see [BERGEN2001]).¶
Smart Leg Band GPS logging (Appendix A) provides partial flight path reconstruction and is RECOMMENDED for implementations requiring route auditability. The authors note that knowing the route taken does not constitute understanding why. This is also true of transformer attention maps.¶
Physical parameter scrolls degrade over repeated use due to moisture, mechanical wear, and carrier enthusiasm. This constitutes a natural form of weight decay. The decay rate is a function of weather and scroll material and is not hyperparameter-tunable in the current specification.¶
Training SHOULD be halted when validation loss fails to improve over a defined number of epochs. In APC implementations, practitioners will typically identify this condition when they run out of grain before the model converges. This is considered a valid stopping criterion.¶
Carrier attrition provides a natural analog to dropout regularization. A Carrier that does not return effectively masks the corresponding parameter subset from the current update. The dropout rate is environment-dependent and not directly configurable.¶
The authors recommend maintaining a 20% reserve Carrier pool to compensate. Practitioners SHOULD NOT attempt to implement structured dropout via deliberate Carrier interception. This is both logistically complex and ethically inadvisable.¶
A peer review of this document identified a statistical bias inherent to naive dropout-via-attrition: if certain Parameter Scrolls are consistently heavier, or if specific Carriers exhibit reduced motivation for particular routes, those gradient components will be non-uniformly dropped across epochs. This constitutes a systematic bias in which the weights most likely to be dropped are precisely those the Carrier finds most burdensome. The authors acknowledge this is not random dropout.¶
To mitigate this effect, Carrier-to-Scroll assignment MUST be shuffled between epochs. No Carrier SHOULD be assigned the same scroll position in consecutive epochs. Implementations SHOULD maintain a Carrier Rotation Log to verify compliance. The authors note that the Carriers themselves do not maintain such a log and cannot be relied upon to self-report assignment history.¶
Carriers operating in varied meteorological conditions implicitly expose the model to augmented training distributions. Rain, wind, and seasonal variation constitute a natural augmentation pipeline. No additional implementation is required. This is one of the few areas in which APC outperforms GPU-based training without qualification.¶
A central loft serves as the parameter server. Remote training nodes dispatch Carriers to the central loft bearing gradient updates. The central node aggregates received updates and returns updated weights via return Carrier.¶
Consistency guarantees are eventual. Practitioners accustomed to synchronous gradient aggregation SHOULD adjust expectations.¶
APC is naturally suited to federated learning scenarios in which training data cannot leave the local node. Only gradients are transported, preserving data locality. Privacy guarantees are proportional to the discretion of all parties with access to the Carrier population.¶
The effective bandwidth of an APC link is determined by Carrier payload capacity and round-trip flight time. For a Carrier transporting a 512GB NVMe drive over 5 kilometers at standard homing pigeon airspeed (approximately 80 km/h in favorable conditions), peak throughput substantially exceeds that of a T1 line. This comparison is made seriously and has been previously noted in the networking literature.¶
Latency remains non-competitive.¶
Pre-trained Carriers, having internalized routes to known destinations, exhibit faster convergence on familiar tasks. This is directly analogous to fine-tuning a pre-trained foundation model: the expensive representational work has already been completed; the practitioner need only adapt the terminal behavior.¶
Catastrophic forgetting has not been observed in Carriers. The authors attribute this to the comparatively limited parameter space of the avian hippocampus and the absence of gradient descent in biological systems.¶
QoS extensions established in RFC 2549 [RFC2549] apply to APC without modification. Priority Carriers SHOULD be identified via distinct leg-band coloring. The authors note that Carriers do not observe priority markings and will proceed at their own discretion regardless.¶
Service classes from RFC 2549 (Concorde, First, Business, Coach) map naturally onto model sizes:¶
Parameter Scrolls in transit may constitute personal data under applicable privacy regulations if the training dataset contains personally identifiable information and the model has memorized it, as modern neural networks are known to do.¶
Under the General Data Protection Regulation (GDPR) and similar frameworks, gradient updates can encode and leak information about individual training samples. This property does not change when the gradients are printed on paper and attached to a bird. The medium is novel. The risk is not.¶
Practitioners MUST assess whether Parameter Scrolls constitute personal data under applicable law prior to dispatch. The authors observe that "we sent it via pigeon" is not currently recognized as a valid data transfer mechanism under Article 46 of the GDPR. This may change. The authors are not optimistic.¶
Research has demonstrated that model gradients can be inverted to reconstruct training data with meaningful fidelity. An adversary intercepting a Parameter Scroll mid-flight could potentially reconstruct training samples from the gradient values encoded therein.¶
This attack vector is partially mitigated by the following factors inherent to APC:¶
Practitioners handling sensitive training data SHOULD apply differential privacy mechanisms prior to printing [PHONG2018]. Adding calibrated Gaussian noise to gradient values before encoding them on the scroll is RECOMMENDED. The noise level MUST be sufficient to provide meaningful privacy guarantees and MUST NOT be so large as to render the gradient values indistinguishable from the researcher's normal handwriting variation.¶
If a data subject exercises their right to erasure under applicable privacy law, the practitioner MUST ensure that gradient information derived from that subject's data is purged from all Parameter Scrolls, including scrolls currently in transit.¶
Recalling Carriers mid-flight for the purpose of scroll amendment is not supported in the base specification. Peer review of this document identified this as a critical compliance gap under GDPR Article 17.¶
To address this gap, implementations requiring full regulatory compliance MAY deploy the Predatory Interception Protocol (PIP), in which a trained raptor (Falco peregrinus or equivalent) is dispatched to intercept and neutralize the Carrier prior to arrival at the destination node, thereby preventing the compromised scroll from entering the gradient aggregation pipeline.¶
The authors acknowledge that PIP raises significant concerns under Section 5.3 ("ethically inadvisable"). Practitioners operating under EU AI Act high-risk classification SHOULD consult legal counsel before implementing PIP. Practitioners operating under less stringent regulatory regimes MAY treat mid-flight scroll recovery as out of scope and document this decision in their Data Protection Impact Assessment.¶
The authors offer no opinion on whether a DPIA can legally reference a hawk.¶
Parameter Scrolls printed on standard paper and transported via avian carrier are subject to electrostatic discharge events arising from:¶
A peer review of this document identified an additional threat not addressed in prior drafts: potential difference upon landing. A Carrier that has spent 45 minutes triboelectrically charging against the atmosphere arrives at the loft with a significant accumulated charge relative to ground. A loft operator who is themselves grounded presents as a preferred discharge path. The authors classify this as a "Parameter Pop" event and note it is unpleasant for all parties.¶
Practitioners MUST observe the following ESD precautions:¶
Upon receipt, each Parameter Scroll MUST be inspected for signs of ESD damage prior to gradient aggregation. Indicators include:¶
Scrolls failing integrity verification MUST be discarded and the corresponding gradient treated as dropped. Under no circumstances SHOULD the practitioner attempt to recover partially legible values by interpolation and incorporate them into the gradient aggregate. The authors have done this. The model did not recover.¶
Peer review of this document identified a secondary consequence of the Parameter Pop event (Section 10.1) not addressed in prior drafts: behavioral impact on the Carrier.¶
A Carrier subjected to an uncontrolled electrostatic discharge event upon landing may exhibit reduced motivation in subsequent epochs. This manifests as increased route deviation, extended dwell time at intermediate locations, and in severe cases, a documented reluctance to re-enter the dispatch loft. The authors classify this as Shock-Based Training Instability (SBTI).¶
SBTI is operationally significant because it is self-reinforcing. A Carrier that experienced a Parameter Pop in epoch N is more likely to exhibit high variance in epoch N+1, producing the same high-variance loss characteristics as an overfit model, but arising from loft infrastructure failure rather than gradient pathology. The two causes are distinguished by consulting the Loss Log weather notes and the Carrier's observable disposition. A model that overfit is a modeling problem. A Carrier that was electrocuted is a facilities problem. Both present identically in the loss curve.¶
Mitigation is addressed by the dissipative perch requirement (Section 10.2). The perch provides a controlled discharge path that eliminates the abrupt high-voltage event and replaces it with a gradual, low-energy equalization. A Carrier that lands on a properly grounded dissipative perch experiences no detectable discharge event and proceeds to the scroll retrieval queue with motivation intact.¶
The authors note that this is the only section of this document in which the welfare of the Carrier and the integrity of the gradient are addressed by the same physical component. The dissipative perch is therefore both an ESD mitigation and an animal welfare measure, and MUST be treated as mandatory on both grounds.¶
Carriers exhibiting persistent SBTI symptoms SHOULD be rotated to non-dispatch duties pending behavioral recovery. Forcing an SBTI-affected Carrier to continue active dispatch duty introduces systematic variance into the training loop that cannot be corrected by regularization. The Carrier Rotation Log MUST record SBTI events and the affected Carrier's return-to-active status.¶
Parameter scrolls in transit are subject to interception, modification, and consumption. The last failure mode is novel to this transport layer and MUST be considered in threat modeling.¶
Practitioners operating in adversarial environments SHOULD encrypt parameter scrolls. Note that encrypted scrolls require a decryption step at the receiving node, which introduces latency proportional to the legibility of the researcher's handwriting.¶
A Carrier that has been compromised MUST NOT be reintegrated into the Flock without full parameter re-initialization. Supply chain security for grain and nesting materials is out of scope for this document.¶
Model poisoning via corrupted gradient injection is theoretically possible if an adversary gains access to the dispatch loft. Physical perimeter security is RECOMMENDED. A lock on the cage door would also address the failure mode documented in [BERGEN2001] and the data subject erasure gap identified in Section 9.3.¶
A class of attack not addressed in RFC 1149 or RFC 2549 is the Messenger-in-the-Middle attack, in which an adversary intercepts a Carrier mid-route and substitutes a modified or entirely fabricated Parameter Scroll prior to release.¶
Known attack vectors include:¶
Mitigations include:¶
A novel attack surface is introduced when APC infrastructure operates in geographic proximity to facilities housing psittacine or mimetic avian species, including but not limited to African Grey parrots (Psittacus erithacus), Common Hill Mynas (Gracula religiosa), and Northern Mockingbirds (Mimus polyglottos).¶
These species are capable of reproducing loft call signals, return confirmation sounds, and in documented cases, human speech patterns used in loft management. An adversary with access to a sufficiently trained mimetic bird could:¶
The authors note that (b) and (c) are functionally equivalent to prompt injection attacks against large language models, in which adversarial input in the environment causes the model to execute unintended instructions. The mechanism differs. The effect does not.¶
Mitigations SHOULD include:¶
This section describes a dual-purpose technique combining Carrier visual obfuscation with steganographic gradient encoding. The technique addresses two distinct threats: adversarial human interception (Section 11.2) and opportunistic raptor predation (a threat implicitly present in all APC deployments but not previously formalized in this specification).¶
Birds of prey employ a visual classification system refined over approximately 65 million years of supervised learning on a dataset of considerable size. This classifier is highly optimized for the detection of Columba livia domestica in open airspace and represents a meaningful threat to Carrier availability, particularly at altitude.¶
The authors note that this classifier is also vulnerable to adversarial examples. Research in the human domain has demonstrated that carefully constructed visual perturbations can cause deep neural networks to misclassify objects with high confidence. The same principle applies to biological classifiers, including raptors. A Carrier whose visual appearance has been shifted outside the raptor's training distribution for "pigeon" is less likely to be correctly classified as prey.¶
This is not a new observation. It is the operating principle of every bird that is not a pigeon. This document formalizes it as a security mitigation.¶
Carriers MAY be marked with animal-safe, non-toxic, water-soluble dyes in patterns selected to shift their visual classification away from Columba livia domestica. The following requirements apply:¶
The colorimetric patterns applied per Section 11.4.2 MAY simultaneously encode gradient metadata using a pre-shared colorimetric key known only to the dispatch and receiving lofts. This constitutes a steganographic encoding layer in which:¶
The steganographic layer MUST NOT be used as a substitute for scroll-level encryption (Section 11.1). It is an obfuscation layer, not a cryptographic one. An adversary who obtains the colorimetric key can decode all past and future transmissions. Key rotation SHOULD occur at regular intervals. Key rotation requires repainting the Carrier, which is addressed in Section 11.4.5.¶
A significant operational advantage of the steganographic encoding scheme is the ability to distinguish between a Carrier that has returned with an intact scroll and a Carrier that has lost its scroll in transit.¶
Under conventional APC operation, a Carrier returning without a Parameter Scroll is indistinguishable at a distance from a Carrier returning with one. The loft operator must physically inspect each returning Carrier to determine scroll status, introducing latency and handling risk (see Section 10).¶
In steganographically-equipped deployments, the absence of expected colorimetric encoding on a returning Carrier constitutes a NULL_GRADIENT signal, interpretable by the optical capture system prior to Carrier landing. This enables:¶
The authors consider this one of the more practically useful contributions of this specification.¶
The use of colorimetric patterning introduces an operational overhead not present in unencoded APC deployments: a Carrier bearing steganographic markings from a prior epoch MUST be fully scrubbed before reassignment to a new gradient payload.¶
Failure to scrub results in pattern contamination, in which residual encoding from a prior epoch is interpreted by the receiving loft's optical system as current metadata, producing corrupted gradient annotations. This is functionally equivalent to gradient poisoning and MUST be treated as such.¶
Scrubbing requirements:¶
The authors acknowledge that the scrub-before-reuse requirement adds meaningful operational overhead, particularly in high-throughput deployments with rapid epoch cycling. For a 70B parameter model dispatched across 140 Carriers, the time required to scrub, dry, inspect, and re-encode the entire active Flock will in many cases exceed the epoch flight time itself, creating a hard throughput ceiling that no gradient optimization can address.¶
To mitigate this constraint, implementations with sustained training workloads SHOULD adopt the Dual-Flock Pipeline (DFP), in which the total Carrier population is divided into two sub-flocks of equal size operating in alternating phase:¶
The Dual-Flock Pipeline requires doubling the total Carrier population relative to single-flock operation. Practitioners MUST size the scrub facility accordingly. A scrub facility capable of processing N Carriers per hour MUST be available to support a Dual-Flock Pipeline with sub-flocks of size N.¶
The authors note that scrub facility throughput is a function of warm water availability, drying capacity, Carrier cooperation, and the number of researchers assigned to scrub duty. Of these, Carrier cooperation is the least configurable and the most consequential. Practitioners SHOULD factor a cooperation variance multiplier of at least 1.3x into scrub dwell time estimates.¶
This is the second documented case in which pigeon hygiene directly constrains model training throughput. The first was rain.¶
For implementors who have reached this section without reading Sections 11.1 through 11.4, the following summary is provided. The authors note that not reading the preceding sections is itself a security risk.¶
The APC architecture introduces three primary threat classes not present in conventional ML infrastructure:¶
The Carriers described in this specification are living organisms. Their welfare is not incidental to the operation of the protocol. It is a direct operational dependency. A Carrier whose welfare is neglected exhibits reduced Carrier Morale (Section 2), increased epoch latency, elevated route deviation, and a higher probability of non-return. Ethical treatment of Carriers is therefore both a moral obligation and a performance optimization. The authors note this is one of the few cases in distributed systems where the two are identical.¶
Practitioners MUST provide:¶
Selection of Carriers for dispatch assignments MUST NOT introduce systematic bias into the gradient transport process. Known sources of selection bias include:¶
The Predatory Interception Protocol (Section 9.3) involves the deployment of a trained raptor to intercept Carriers bearing compromised Parameter Scrolls. The raptor participates in this protocol involuntarily, as raptors cannot provide informed consent to participation in ML compliance workflows.¶
The authors acknowledge this is an unresolved ethical gap. Deployment of PIP MUST be reviewed by an institutional ethics board, or the nearest available equivalent, before implementation. Documentation of this review MUST be retained.¶
The authors also note, for completeness, that the Carrier subject to PIP has also not provided informed consent. This is noted without resolution. The GDPR does not currently address avian data subjects. This may change.¶
Large-scale APC deployments involve significant numbers of Carriers operating in shared airspace. Practitioners MUST assess the environmental impact of their Carrier fleet on local ecosystems, including but not limited to:¶
The following example illustrates a complete training epoch under the APC protocol using the hardware and procedures defined in this document. All values are representative. Weather conditions are based on Bergen, Norway in April, as this is the only location for which empirical APC performance data exists [BERGEN2001].¶
Configuration:¶
06:47 Researcher arrives at loft. Attaches ESD wrist strap.
Verifies perch ground continuity. Confirms Carrier
Morale is adequate. One Carrier (C-4) appears
reluctant. C-4 is assigned the reserve role.
06:52 Scroll Header printed for each of six active Carriers:
"PyTorch 2.7 / safetensors / 4-bit NF4 / Shard N of 6
/ Llama-7B layer 18-21 / Key v4"
Scrolls attached. Colorimetric encoding applied.
Dispatch cage opened.
06:53 Carriers dispatched. Wind slightly adverse.
Loss Log entry: Epoch 47, 6 of 6 dispatched, 06:53.
Weather: OVC, 12C, NNW 18. C-4 on reserve.
07:38 C-2 returns first. ESD_RISK flag: negative.
Moisture reading: 14% (Optimal). Colorimetric
decode: valid, Key v4. Scroll retrieved.
Checksum: verified. C-2 proceeds to re-encode queue.
07:41 C-5 returns. ESD_RISK flag: negative.
Moisture reading: 22% (Humid). Ink Blur correction
applied. Gradient processed with high-variance flag.
C-5 proceeds to re-encode queue.
07:44 C-1, C-3, C-6 return within 90 seconds of each other.
All nominal. Gradients verified.
08:31 C-4 has been in reserve for 98 minutes and is now
being dispatched to replace C-2 while C-2 undergoes
scrub. C-4's earlier reluctance has resolved
following grain and rest. Carrier Morale: restored.
09:15 No further Carriers expected. C-2 (dispatched 08:31)
has not yet returned. This is within expected range
given adverse wind.
09:47 C-2 returns. Nominal.
10:00 GRADIENT AGGREGATION:
Shards received: 6 of 6.
High-variance flags: 1 (C-5, humidity).
Dropped gradients: 0.
Training loss: 1.847 (epoch 47).
Validation loss: 2.103 (epoch 47).
Delta from epoch 46: -0.031 training, -0.019 validation.
Assessment: converging. Continue training.
Loss Log entry closed. All Carriers in scrub/re-encode
pipeline. Dual-Flock Beta dispatched at 09:55 carrying
epoch 48 scrolls. Epoch 47 total elapsed time: 3h 07m.
Model is learning. Slowly. This is expected.
¶
The authors note that the above epoch proceeded without incident. This is not always the case. The Loss Log for epoch 23 contains the entry: "C-3 returned without scroll. Scroll location unknown. C-3 unavailable for comment." This entry has not been resolved.¶
This document has no IANA considerations. The authors previously held this position without elaboration.¶
Following reviewer feedback, the authors have reconsidered and now formally propose the following IANA registries for APC implementations:¶
Carrier Status Code Registry: A registry of standardized status codes for Carrier disposition, analogous to HTTP status codes. Proposed initial entries:¶
Scroll Header Framework Identifier Registry: A registry of valid framework identifier strings for use in the Scroll Header (Section 15.2). New entries MAY be submitted by framework maintainers. The registry MUST include a deprecation date field. Entries for frameworks that have been deprecated SHOULD be retained for historical reference, as practitioners MAY still encounter scrolls bearing deprecated identifiers in long-running loft archives.¶
The authors note that neither registry requires IANA action at this time, as APC has not achieved sufficient deployment scale to warrant formal registration. The authors express confidence that this will change.¶
The authors considered requesting a new IP protocol number for APC but concluded that the existing best-effort delivery model of IP adequately captures the operational characteristics of the transport layer.¶
At the time of this writing, frontier models are estimated at 1.7-1.8 trillion parameters (Section 8, Concorde class). The trajectory of model scaling suggests this figure will continue to increase. The APC architecture must address the physical implications of this trend.¶
A single 32-bit floating-point parameter requires 4 bytes of storage. A 1.8 trillion parameter model therefore requires approximately 7.2 terabytes in full precision, or approximately 900 gigabytes at 1-bit quantization. At the time of publication, no commercially available leg-band storage medium approaches this capacity.¶
Practitioners SHOULD apply aggressive quantization prior to scroll encoding. The authors note that 4-bit quantization, now standard practice for local inference, reduces the 1.8T parameter model to approximately 900GB, which is achievable via a multi-Carrier RAID-0 Dove Configuration (Section 3.2) with a fleet of approximately 1,800 Carriers each carrying a 512GB NVMe drive.¶
The authors acknowledge that a fleet of 1,800 Carriers represents a meaningful operational commitment. Institutions unable to sustain this fleet size SHOULD consider whether they are training the correct model for their resource envelope. This advice applies equally to conventional infrastructure.¶
As model sizes continue to grow, this specification anticipates two possible evolutionary paths:¶
The authors consider path (b) more likely and note that it represents a genuine alignment of interests between the ML efficiency research community and the avian transport community. This alignment has not previously been documented.¶
The ML framework ecosystem evolves rapidly. Parameter Scroll format compatibility across framework versions is a non-trivial operational concern. A scroll serialized under PyTorch 2.x tensor format may not be directly interpretable by a receiving node running a subsequent major version, a different framework entirely, or a researcher who has not updated their deserialization tooling since the model was dispatched.¶
This specification REQUIRES that all Parameter Scrolls include a Scroll Header (SH) prepended to the gradient payload. The Scroll Header MUST be printed in a standardized, human-readable format and MUST contain:¶
The Scroll Header MUST be verified by the receiving node before the gradient payload is processed. A version mismatch MUST produce a clear error in the Loss Log and MUST NOT result in silent gradient corruption. The authors note that silent gradient corruption on conventional infrastructure is a well-documented and deeply unpleasant failure mode. The scroll header exists precisely to make this class of error loud and attributable.¶
Section 6.1 describes a hub-and-spoke topology with a central parameter server loft. This topology does not scale to the distributed training configurations required by frontier models, which employ pipeline parallelism, tensor parallelism, and expert parallelism across hundreds or thousands of nodes.¶
This specification defines three extended topologies for large-scale APC deployments:¶
This specification has addressed training throughput in detail. Inference serving presents distinct scaling challenges.¶
A deployed model receiving queries must return predictions within a latency envelope acceptable to the requesting application. For most applications this envelope is measured in milliseconds to seconds. APC inference latency is measured in hours. This gap is not currently bridgeable within the constraints of avian flight physics.¶
The authors therefore formally RECOMMEND that APC implementations decouple training and inference infrastructure. APC is appropriate for the training loop. Inference SHOULD be served via conventional digital infrastructure after model weights have been transported to the serving node by Carrier and loaded onto appropriate hardware.¶
The authors note that this hybrid architecture -- avian training transport, digital inference serving -- is consistent with the broader principle that the right tool should be selected for each phase of the ML lifecycle. APC excels at asynchronous, high-payload, low-frequency gradient transport. It does not excel at sub-second token generation. These are not the same problem. Treating them as the same problem is a category error that no amount of grain will resolve.¶
As new ML frameworks emerge, this specification requires only that their serialization formats be registerable in the Scroll Header framework identifier field (Section 15.2). No changes to the physical transport layer are required. The Carrier does not care what framework serialized the weights it is carrying. This is one of the more durable properties of the APC architecture and is considered a design strength.¶
Framework deprecation SHOULD be handled by sunsetting the corresponding Scroll Header identifier. Scrolls bearing deprecated framework identifiers MUST be flagged at the receiving node. Whether to process them anyway is a decision for the receiving researcher, who by that point presumably knows what they are doing. Or does not, and the Loss Log will reflect this.¶
The emergence of fault-tolerant quantum computing raises the question of whether APC remains viable as a transport layer for quantum ML workloads, or whether quantum methods will supplant the requirement for avian carriers entirely.¶
The authors address this in two parts.¶
Part I: Quantum ML Parameter Transport. Quantum ML models represent parameters as quantum states rather than classical floating-point values. Quantum states cannot be copied without disturbance (the No-Cloning Theorem, Wootters and Zurek, 1982 [NOCLONING]). A Parameter Scroll encoding a quantum state would therefore constitute a measurement of that state, collapsing the superposition and destroying the quantum information in the act of printing it.¶
The authors conclude that APC is fundamentally incompatible with native quantum parameter transport. A pigeon cannot carry a qubit. More precisely: by the time the qubit has been attached to the pigeon's leg, it is no longer a qubit. It is a classical value, and the quantum advantage has been surrendered to the leg band.¶
This is not a limitation of the pigeon. It is a limitation of measurement. The pigeon is, once again, blameless.¶
Part II: Will Quantum Methods Supplant the Pigeon? Quantum computers offer theoretical speedups for specific problem classes, including optimization problems relevant to ML training. However, the question of whether quantum methods will supplant APC conflates two distinct concerns:¶
Regarding (a): quantum advantage for general ML training remains undemonstrated at scale. Current quantum hardware operates at qubit counts and error rates that preclude practical ML workloads. The authors note that "practical quantum ML" has been approximately five years away for approximately fifteen years. Carrier fleets established today are unlikely to be rendered obsolete by quantum hardware before they reach retirement age.¶
Regarding (b): even assuming quantum ML training achieves practical advantage, the trained model weights must still be transported to inference infrastructure. If those weights are classical (as is likely for deployed models, given the state of quantum memory), the APC architecture remains a viable transport option.¶
The authors therefore conclude that quantum computing does not supplant the requirement for pigeons. It may, in the long term, change what is printed on their scrolls. The scrolls themselves, and the birds carrying them, remain relevant.¶
A future revision of this specification MAY address hybrid quantum-classical parameter transport in which classical gradient approximations of quantum circuit parameters are encoded on Parameter Scrolls. The authors consider this a tractable extension. The pigeons have no opinion on quantum mechanics and are not expected to develop one.¶
The following limitations are acknowledged:¶
The authors thank the Bergen Linux User Group for their foundational empirical work, without which the latency figures in Section 6.3 would be theoretical rather than measured.¶
The authors also thank the three Carriers from the 2001 Bergen test whose fate remains undocumented. Their contribution to the literature is noted.¶
The authors thank the reviewers whose comments prompted the addition of Sections 9 and 10, the Carrier Shuffling requirement in Section 5.3, the RAID-0 Dove Configuration definition, the dissipative perch specification, the Messenger-in-the-Middle section, the prompt injection via avian mimicry threat model, the steganographic plumage encoding scheme, the NULL_GRADIENT signaling protocol, and the scrub-before-reuse hygiene requirement. The quality of this document is directly attributable to their rigor. The scrub-before-reuse requirement in particular represents a genuine operational insight that the authors had not previously considered and are somewhat embarrassed not to have anticipated.¶
The authors thank Alex the parrot (1976-2007) posthumously. His last words were "You be good. I love you." He did not live to see the threat he represented formalized in an RFC.¶
This document was submitted late due to pigeons.¶
The Smart Leg Band (SLB) is an optional hardware extension to the APC architecture providing in-flight telemetry, automated scroll integrity monitoring, and loft handshake capabilities. Deployment of the SLB is OPTIONAL but RECOMMENDED for implementations where scroll loss rate exceeds 20% or where regulatory compliance requires documented chain-of-custody for Parameter Scrolls.¶
The reference implementation specifies the following components:¶
Moisture (%) WET_BIT Action
--------------------------------------------------------
0 - 20 0 Optimal. Process gradient normally.
21 - 50 0 Humid. Apply Ink Blur correction
algorithm prior to OCR.
51 - 80 1 Damp. MAY attempt OCR. Treat
resulting gradient as high-variance.
Weight accordingly in aggregation.
> 80 1 MUST discard. Treat as NULL gradient.
Allow Carrier to towel-dry before
reassignment. Do not attempt OCR.
The authors have attempted OCR at
this moisture level. The results
were not gradients.
¶
The SLB operates in Store-and-Forward mode. All sensor readings are logged to the ESP32-C3 internal flash during flight. No active transmission occurs in-flight, as Wi-Fi connectivity at operational altitude is not supported and the power budget does not accommodate sustained radio operation.¶
Upon Carrier entry into the loft (detected per Appendix "Hardware Components", Loft Detection), the ESP32-C3 exits Deep Sleep, connects to the local Wi-Fi network, and transmits the accumulated telemetry log to the Loft Telemetry Dashboard prior to any physical interaction with the Carrier by loft personnel.¶
The Loft Telemetry Dashboard is a containerized web application deployable via Docker Compose on any OCI-compliant container orchestration platform. It provides:¶
Docker Compose configuration for the Loft Telemetry Dashboard is available in the project repository. The authors note that the repository does not currently exist but express confidence that it will by the time this RFC is published.¶
Implementations deploying steganographic scroll encoding (Section 11.4) MUST equip the receiving loft with a calibrated optical capture device positioned to image each returning Carrier prior to landing on the receiving perch.¶
Hardware requirements:¶
Decode pipeline:¶
The optical capture system operates independently of the SLB and requires no hardware on the Carrier. It is therefore compatible with non-SLB deployments that have opted into colorimetric encoding only. The authors consider this a useful deployment flexibility and note that it also means the Carrier's ESP32-C3 is not required to know anything about the steganographic layer, which simplifies firmware scope and reduces the surface area available to beak-based debugging.¶
SLB firmware MUST be cryptographically signed. Over-the-air firmware updates are supported via the loft Wi-Fi network and MUST be authenticated before installation.¶
Voice-activated configuration commands, if implemented, MUST be authenticated via passphrase as specified in Section 11.3. The authors reiterate that the passphrase MUST be selected with awareness of local mimetic species populations. An African Grey parrot has a documented vocabulary exceeding one thousand words [PEPPERBERG1999]. Implementors in affected regions are advised to plan accordingly.¶
Physical access to the ESP32-C3 is prevented by conformal resin coating (Appendix "Hardware Components"). The authors wish to be clear that this coating serves dual purpose: it protects against moisture ingress, and it protects against the Carrier. Both threats are real. Both are addressed by the same countermeasure. This is considered an elegant solution.¶