< draft-conet-aeon-use-cases-00.txt   draft-conet-aeon-use-cases-01.txt >
Internet Engineering Task Force W. George Internet Engineering Task Force W. George
Internet-Draft Time Warner Cable Internet-Draft Time Warner Cable
Intended status: Informational P. Fan Intended status: Informational P. Fan
Expires: November 30, 2014 China Mobile Expires: January 5, 2015 China Mobile
S. Matsushima
SoftBank Telecom
T. Reddy T. Reddy
C. Eckel C. Eckel
Cisco Systems, Inc. Cisco Systems, Inc.
May 29, 2014 July 4, 2014
Application Enabled Collaborative Networking Use Cases Application Enabled Collaborative Networking Use Cases
draft-conet-aeon-use-cases-00 draft-conet-aeon-use-cases-01
Abstract Abstract
This document describes application enabled collaborative networking This document describes application enabled collaborative networking
use cases. Application enabled collaborative networking has use cases. Application enabled collaborative networking has
applications explicitly signal their flow characteristics to the applications explicitly signal their flow characteristics to the
network. This provides network nodes with visibility of the network. This provides network nodes with visibility of the
application flow characteristics, which enables them to apply the application flow characteristics, which enables them to apply the
correct flow treatment and provide feedback to applications. correct flow treatment and provide feedback to applications.
skipping to change at page 1, line 39 skipping to change at page 1, line 41
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 30, 2014. This Internet-Draft will expire on January 5, 2015.
Copyright Notice Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Firewall Traversal: Identification of new applications . 5 2.1. Firewall Traversal: Identification of new applications . 5
2.1.1. Description of Problem . . . . . . . . . . . . . . . 5 2.1.1. Description of Problem . . . . . . . . . . . . . . . 5
2.1.2. Proposed Solution . . . . . . . . . . . . . . . . . . 6 2.1.2. Proposed Solution . . . . . . . . . . . . . . . . . . 5
2.1.3. User Benefit . . . . . . . . . . . . . . . . . . . . 6 2.1.3. User/Application Benefit . . . . . . . . . . . . . . 6
2.1.4. Operator Benefit . . . . . . . . . . . . . . . . . . 6 2.1.4. Operator Benefit . . . . . . . . . . . . . . . . . . 6
2.1.5. Application Benefit . . . . . . . . . . . . . . . . . 6 2.1.5. Flow characteristics provided by application . . . . 6
2.1.6. Flow characteristics provided by application . . . . 6 2.1.6. Action taken by firewall as result of receiving flow
2.1.7. Action taken by firewall as result of receiving flow characteristics . . . . . . . . . . . . . . . . . . . 6
characteristics . . . . . . . . . . . . . . . . . . . 7 2.1.7. Feedback provided by firewall . . . . . . . . . . . . 6
2.1.8. Feedback provided by firewall . . . . . . . . . . . . 7 2.1.8. Security and Privacy Considerations . . . . . . . . . 6
2.1.9. Security and Privacy Considerations . . . . . . . . . 7 2.2. Efficient Capacity Usage . . . . . . . . . . . . . . . . 6
2.2. Efficient Capacity Usage . . . . . . . . . . . . . . . . 7 2.2.1. Description of Problem . . . . . . . . . . . . . . . 6
2.2.1. Description of Problem . . . . . . . . . . . . . . . 7
2.2.2. Proposed Solution . . . . . . . . . . . . . . . . . . 8 2.2.2. Proposed Solution . . . . . . . . . . . . . . . . . . 8
2.2.3. User Benefit . . . . . . . . . . . . . . . . . . . . 9 2.2.3. User/Application Benefit . . . . . . . . . . . . . . 9
2.2.4. Operator Benefit . . . . . . . . . . . . . . . . . . 9 2.2.4. Operator Benefit . . . . . . . . . . . . . . . . . . 9
2.2.5. Application Benefit . . . . . . . . . . . . . . . . . 9 2.2.5. Flow characteristics provided by application . . . . 9
2.2.6. Flow characteristics provided by application . . . . 9 2.2.6. Action taken by network as result of receiving flow
2.2.7. Action taken by network as result of receiving flow characteristics . . . . . . . . . . . . . . . . . . . 9
characteristics . . . . . . . . . . . . . . . . . . . 10 2.2.7. Feedback provided by network . . . . . . . . . . . . 9
2.2.8. Feedback provided by network . . . . . . . . . . . . 10 2.2.8. Security and Privacy Considerations . . . . . . . . . 10
2.2.9. Security and Privacy Considerations . . . . . . . . . 10 2.3. Video Adaptation . . . . . . . . . . . . . . . . . . . . 10
2.3. Video Adaptation: Use client metadata to help video bit 2.3.1. Description of Problem . . . . . . . . . . . . . . . 10
rate selection . . . . . . . . . . . . . . . . . . . . . 10
2.3.1. Description of Problem . . . . . . . . . . . . . . . 11
2.3.2. Proposed Solution . . . . . . . . . . . . . . . . . . 11 2.3.2. Proposed Solution . . . . . . . . . . . . . . . . . . 11
2.3.3. User Benefit . . . . . . . . . . . . . . . . . . . . 12 2.3.3. User/Application Benefit . . . . . . . . . . . . . . 11
2.3.4. Operator Benefit . . . . . . . . . . . . . . . . . . 12 2.3.4. Operator Benefit . . . . . . . . . . . . . . . . . . 11
2.3.5. Application Benefit . . . . . . . . . . . . . . . . . 12 2.3.5. Flow characteristics provided by application . . . . 11
2.3.6. Flow characteristics provided by application . . . . 12 2.3.6. Action taken by network as result of receiving flow
2.3.7. Action taken by network as result of receiving flow
characteristics . . . . . . . . . . . . . . . . . . . 12 characteristics . . . . . . . . . . . . . . . . . . . 12
2.3.8. Feedback provided by network . . . . . . . . . . . . 12 2.3.7. Feedback provided by network . . . . . . . . . . . . 12
2.3.9. Security and Privacy Considerations . . . . . . . . . 12 2.3.8. Security and Privacy Considerations . . . . . . . . . 12
2.4. Multi-interface selection: Use metadata to help interface 2.4. Multi-interface selection: Use metadata to help interface
selection or prioritization . . . . . . . . . . . . . . . 12 selection or prioritization . . . . . . . . . . . . . . . 12
2.4.1. Description of Problem . . . . . . . . . . . . . . . 12 2.4.1. Description of Problem . . . . . . . . . . . . . . . 12
2.4.2. Proposed Solution . . . . . . . . . . . . . . . . . . 13 2.4.2. Proposed Solution . . . . . . . . . . . . . . . . . . 12
2.4.3. User Benefit . . . . . . . . . . . . . . . . . . . . 13 2.4.3. User/Application Benefit . . . . . . . . . . . . . . 12
2.4.4. Operator Benefit . . . . . . . . . . . . . . . . . . 13 2.4.4. Operator Benefit . . . . . . . . . . . . . . . . . . 13
2.4.5. Application Benefit . . . . . . . . . . . . . . . . . 13 2.4.5. Flow characteristics provided by application . . . . 13
2.4.6. Flow characteristics provided by application . . . . 13 2.4.6. Action taken by network as result of receiving flow
2.4.7. Action taken by network as result of receiving flow
characteristics . . . . . . . . . . . . . . . . . . . 13 characteristics . . . . . . . . . . . . . . . . . . . 13
2.4.8. Feedback provided by network . . . . . . . . . . . . 13 2.4.7. Feedback provided by network . . . . . . . . . . . . 13
2.4.9. Security and Privacy Considerations . . . . . . . . . 13 2.4.8. Security and Privacy Considerations . . . . . . . . . 13
2.5. Session Identification: Identification of multiple media 2.5. Session Identification: Identification of multiple media
flows belonging to a common application session . . . . . 13 flows belonging to a common application session . . . . . 13
2.5.1. Description of Problem . . . . . . . . . . . . . . . 13 2.5.1. Description of Problem . . . . . . . . . . . . . . . 13
2.5.2. Proposed Solution . . . . . . . . . . . . . . . . . . 14 2.5.2. Proposed Solution . . . . . . . . . . . . . . . . . . 14
2.5.3. User Benefit . . . . . . . . . . . . . . . . . . . . 14 2.5.3. User/Application Benefit . . . . . . . . . . . . . . 14
2.5.4. Operator Benefit . . . . . . . . . . . . . . . . . . 14 2.5.4. Operator Benefit . . . . . . . . . . . . . . . . . . 14
2.5.5. Application Benefit . . . . . . . . . . . . . . . . . 14 2.5.5. Flow characteristics provided by application . . . . 14
2.5.6. Flow characteristics provided by application . . . . 14 2.5.6. Action taken by network as result of receiving flow
2.5.7. Action taken by network as result of receiving flow
characteristics . . . . . . . . . . . . . . . . . . . 15 characteristics . . . . . . . . . . . . . . . . . . . 15
2.5.8. Feedback provided by network . . . . . . . . . . . . 15 2.5.7. Feedback provided by network . . . . . . . . . . . . 15
2.5.9. Security and Privacy Considerations . . . . . . . . . 15 2.5.8. Security and Privacy Considerations . . . . . . . . . 15
2.6. Content Based Charging . . . . . . . . . . . . . . . . . 15 2.6. Content Based Charging . . . . . . . . . . . . . . . . . 15
2.6.1. Description of Problem . . . . . . . . . . . . . . . 15 2.6.1. Description of Problem . . . . . . . . . . . . . . . 15
2.6.2. Proposed Solution . . . . . . . . . . . . . . . . . . 15 2.6.2. Proposed Solution . . . . . . . . . . . . . . . . . . 15
2.6.3. User Benefit . . . . . . . . . . . . . . . . . . . . 16 2.6.3. User/Application Benefit . . . . . . . . . . . . . . 16
2.6.4. Operator Benefit . . . . . . . . . . . . . . . . . . 16 2.6.4. Operator Benefit . . . . . . . . . . . . . . . . . . 16
2.6.5. Application Benefit . . . . . . . . . . . . . . . . . 16 2.6.5. Flow characteristics provided by application . . . . 16
2.6.6. Flow characteristics provided by application . . . . 16 2.6.6. Action taken by network as result of receiving flow
2.6.7. Action taken by network as result of receiving flow
characteristics . . . . . . . . . . . . . . . . . . . 16 characteristics . . . . . . . . . . . . . . . . . . . 16
2.6.8. Feedback provided by network . . . . . . . . . . . . 17 2.6.7. Feedback provided by network . . . . . . . . . . . . 16
2.6.9. Security and Privacy Considerations . . . . . . . . . 17 2.6.8. Security and Privacy Considerations . . . . . . . . . 16
2.7. Open QoS and Experience Enhancement for Applications . . 17 3. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 17
2.7.1. Description of Problem . . . . . . . . . . . . . . . 17 4. Informative References . . . . . . . . . . . . . . . . . . . 17
2.7.2. Proposed Solution . . . . . . . . . . . . . . . . . . 17 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17
2.7.3. User Benefit . . . . . . . . . . . . . . . . . . . . 18
2.7.4. Operator Benefit . . . . . . . . . . . . . . . . . . 18
2.7.5. Application Benefit . . . . . . . . . . . . . . . . . 18
2.7.6. Flow characteristics provided by application . . . . 18
2.7.7. Action taken by network as result of receiving flow
characteristics . . . . . . . . . . . . . . . . . . . 18
2.7.8. Feedback provided by network . . . . . . . . . . . . 18
2.7.9. Security and Privacy Considerations . . . . . . . . . 19
3. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 19
1. Introduction 1. Introduction
Identification and treatment of application flows are important to Identification and treatment of application flows are important to
many application providers and network operators. They often rely on many application providers and network operators. They often rely on
these capabilities to deploy and/or support a wide range of these capabilities to deploy and/or support a wide range of
applications. These applications, and the packet flows they generate applications. These applications, and the packet flows they generate
and consume, may have specific connectivity requirements that can be and consume, may require specific bandwidth, latency, etc., that can
met if made known to the network. Historically, this functionality be better met if made known to the network. Historically, this
has been implemented to the extent possible using heuristics, which functionality has been implemented to the extent possible using
inspect and infer flow characteristics. Heuristics may be based on heuristics, which inspect and infer flow characteristics. Heuristics
port ranges, network separation (e.g. subnets or VLANs, Deep Flow may be based on port ranges, network separation (e.g. subnets or
Inspection (DFI), or Deep Packet Inspection (DPI). But many VLANs, Deep Flow Inspection (DFI), or Deep Packet Inspection (DPI).
application flows in current usages are dynamic, adaptive, time- But many application flows in current usages are dynamic, adaptive,
bound, encrypted, peer-to-peer, asymmetric, used on multipurpose time-bound, encrypted, peer-to-peer, asymmetric, used on multipurpose
devices, and have different priorities depending on direction of devices, and have different priorities depending on direction of
flow, user preferences, and other factors. Any combination of these flow, user preferences, and other factors. Any combination of these
properties renders heuristic based techniques less effective and may properties renders heuristic based techniques less effective and may
result in compromises to application security or user privacy, as result in compromises to application security or user privacy, as
described in detail in draft-conet-aeon-problem-statement-00. described in detail in [I-D.conet-aeon-problem-statement].
Application enabled collaborative networking allows applications to Application enabled collaborative networking allows applications to
explicitly signal their flow characteristics to the network. This explicitly signal their flow characteristics to the network. This
provides network nodes with visibility of the application flow provides network nodes with visibility of the application flow
characteristics. These network nodes may take action based on this characteristics. These network nodes may take action based on this
visibility and/or contribute to the flow description. The resulting visibility and/or contribute to the flow description. The resulting
flow description may be communicated as feedback from the network to flow description may be communicated as feedback from the network to
applications. This proposes a way of building collaborative applications. This proposes a way of building collaborative
connections for network operators and application providers, connections for network operators and application providers,
benefiting both of them as well as users. Network provider is able benefiting both of them as well as users. Network provider is able
skipping to change at page 4, line 49 skipping to change at page 4, line 31
enabled collaborative networking. enabled collaborative networking.
2. Use Cases 2. Use Cases
The following use cases have been identified. The following use cases have been identified.
1. Firewall Traversal: Identification of new applications 1. Firewall Traversal: Identification of new applications
2. Efficient Capacity Usage 2. Efficient Capacity Usage
3. Video Adaptation: Use client metadata to help video bit rate 3. Video Adaptation
selection.
4. Multi-interface selection: Use metadata to help interface 4. Multi-interface selection: Use metadata to help interface
selection or prioritization. selection or prioritization.
5. Session Identification: Identification of multiple media flows 5. Session Identification: Identification of multiple media flows
belonging to a common application session. belonging to a common application session.
6. Content Based Charging 6. Content Based Charging
7. Open QoS and Experience Enhancement for Applications
In describing each use case, the following information is provided. In describing each use case, the following information is provided.
o description of the problem o description of the problem
o proposed solution o proposed solution
o user benefit o user/application benefit
o operator benefit o operator benefit
o application benefit
o flow characteristics provided by application o flow characteristics provided by application
o action taken by network as result of receiving flow o action taken by network as result of receiving flow
characteristics characteristics
o feedback provided by network o feedback provided by network
o security and privacy considerations o security and privacy considerations
2.1. Firewall Traversal: Identification of new applications 2.1. Firewall Traversal: Identification of new applications
2.1.1. Description of Problem 2.1.1. Description of Problem
skipping to change at page 6, line 19 skipping to change at page 5, line 40
3. Session signaling and media traverse different firewalls (e.g., 3. Session signaling and media traverse different firewalls (e.g.,
signaling exits a network via one firewall whereas media exits a signaling exits a network via one firewall whereas media exits a
network via a different firewall). network via a different firewall).
Enterprise networks that use firewalls with restrictive policies Enterprise networks that use firewalls with restrictive policies
block new applications like WebRTC and delay deployment of killer block new applications like WebRTC and delay deployment of killer
applications. applications.
2.1.2. Proposed Solution 2.1.2. Proposed Solution
The above problems can be addressed by the host getting authorization These problems can be addressed by the host providing authorization
from the Application Server trusted by the network in order to it received from an application server that is trusted by the network
install flows and associated actions (e.g., policies). PCP third to authorize flows and associated actions (e.g., policies). PCP
party authorization (draft-wing-pcp-third-party-authz-01) solves this third party authorization ([I-D.wing-pcp-third-party-authz]) solves
problem by associating the media session with the signaling session. this problem by associating the media session with the signaling
This is done by sending a cryptographic token in the signaling which session. This is done by sending a cryptographic token in the
authorizes the firewall mapping for the media session. signaling which authorizes the firewall mapping for the media
session.
2.1.3. User Benefit 2.1.3. User/Application Benefit
Enterprise networks that use firewalls with restrictive policies can Enterprise networks that use firewalls with restrictive policies can
deploy new applications at a faster rate for user benefit. deploy new applications at a faster rate for user benefit.
2.1.4. Operator Benefit 2.1.4. Operator Benefit
Enterprise firewalls can enforce restrictive policies without the Enterprise firewalls can enforce restrictive policies without the
need to be enhanced to perform ALG on new applications. For example need to be enhanced to perform ALG on new applications. For example
Enterprise firewall could have granular policies to permit peer-to- Enterprise firewall could have granular policies to permit peer-to-
peer UDP media session only when the call is initiated using the peer UDP media session only when the call is initiated using the
selected WebRTC server (Dr. Good) it trusts and block others (Dr. selected WebRTC server (Dr. Good) it trusts and block others (Dr.
Evil). PCP-aware firewalls can enforce such granular security Evil). PCP-aware firewalls can enforce such granular security
policies without performing ALG on the session signaling protocols. policies without performing ALG on the session signaling protocols.
This mechanism can be used by any other Application Function trusted This mechanism can be used by any other Application Function trusted
by the network to permit time-bound, encrypted, peer-to-peer traffic. by the network to permit time-bound, encrypted, peer-to-peer traffic.
2.1.5. Application Benefit 2.1.5. Flow characteristics provided by application
2.1.6. Flow characteristics provided by application
The client requests dynamic mappings to permit flows required by the The client requests dynamic mappings to permit flows required by the
application. This request includes a cryptographic token and application. This request includes a cryptographic token and
characteristics of the flow, such as the anticipated bandwidth needs characteristics of the flow, such as the anticipated bandwidth needs
as well as the tolerance to delay, loss, and jitter. as well as the tolerance to delay, loss, and jitter.
2.1.7. Action taken by firewall as result of receiving flow 2.1.6. Action taken by firewall as result of receiving flow
characteristics characteristics
The firewall uses the client request to permit and prioritize the The firewall uses the client request to permit and prioritize the
traffic associated with those flows. The cryptographic token traffic associated with those flows. The cryptographic token
provides authorization for the flows and their prioritization. provides authorization for the flows and their prioritization.
2.1.8. Feedback provided by firewall 2.1.7. Feedback provided by firewall
Firewall matches the authorization data with what is requested in the Firewall matches the authorization data with what is requested in the
request sent by the client. If the authorization sets match, the request sent by the client. If the authorization sets match, the
firewall processes the request made by the client. If the token is firewall processes the request made by the client. If the token is
invalid or the request exceeds what is authorized by the token then invalid or the request exceeds what is authorized by the token then
firewall rejects the request. firewall rejects the request.
2.1.9. Security and Privacy Considerations 2.1.8. Security and Privacy Considerations
2.2. Efficient Capacity Usage 2.2. Efficient Capacity Usage
2.2.1. Description of Problem 2.2.1. Description of Problem
Network traffic is bursty and often follows diurnal usage patterns Network traffic is bursty and often follows diurnal usage patterns
such that there are times of day where traffic levels are at a peak, such that there are times of day where traffic levels are at a peak,
and other times of day where they are at a valley. Networks that are and other times of day where they are at a valley. Networks that are
properly capacity planned need to have enough capacity to service the properly capacity planned need to have enough capacity to service the
traffic demands at peak. In a network with consistent demand and traffic demands at peak. In a network with consistent demand and
skipping to change at page 9, line 23 skipping to change at page 9, line 5
This solution could also be used in conjunction with defined paths This solution could also be used in conjunction with defined paths
through the network (TE, Segment Routing, etc) to provide capacity through the network (TE, Segment Routing, etc) to provide capacity
for traffic that has specific performance requirements, or is not for traffic that has specific performance requirements, or is not
sensitive to using a sub-optimal path. i.e. capacity exists on this sensitive to using a sub-optimal path. i.e. capacity exists on this
backup path that is much longer, so since this traffic does not care backup path that is much longer, so since this traffic does not care
about a few 10s of milliseconds of additional latency, it should be about a few 10s of milliseconds of additional latency, it should be
marked to use the non-optimal path even if that path is not seen as marked to use the non-optimal path even if that path is not seen as
best by the routing protocol. best by the routing protocol.
2.2.3. User Benefit 2.2.3. User/Application Benefit
Key user benefits include: Key user benefits include:
o Best service for real-time and other interactive applications o Best service for real-time and other interactive applications
(less interference from non real-time or non-interactive traffic) (less interference from non real-time or non-interactive traffic)
o More control over application bandwidth usage, potential for o More control over application bandwidth usage, potential for
service guarantees for important applications service guarantees for important applications
2.2.4. Operator Benefit 2.2.4. Operator Benefit
Reduced cost via better/more efficient management of capacity/growth Reduced cost via better/more efficient management of capacity/growth
while still providing first-class service to customers. while still providing first-class service to customers.
2.2.5. Application Benefit 2.2.5. Flow characteristics provided by application
2.2.6. Flow characteristics provided by application
An application signals one or more of the following to the network: An application signals one or more of the following to the network:
o level of service required (e.g. guaranteed service, best-effort, o level of service required (e.g. guaranteed service, best-effort,
or below best effort) or below best effort)
o minimum requirement for transmission rate/throughput o minimum requirement for transmission rate/throughput
o that it is tolerant/intolerant of high latency, high jitter, high o that it is tolerant/intolerant of high latency, high jitter, high
packet loss packet loss
o a request in the form "I need to deliver this data by X, when o a request in the form "I need to deliver this data by X, when
should I send, and how should I identify the flow?" should I send, and how should I identify the flow?"
2.2.7. Action taken by network as result of receiving flow 2.2.6. Action taken by network as result of receiving flow
characteristics characteristics
Potential action taken by the network include: Potential action taken by the network include:
o Identify path through network that meets flow service requirements o Identify path through network that meets flow service requirements
o Treat marked traffic according to identified service type (e.g. o Treat marked traffic according to identified service type (e.g.
scavenger class carried in periods of low usage, and/or dropped scavenger class carried in periods of low usage, and/or dropped
during congestion) during congestion)
2.2.8. Feedback provided by network 2.2.7. Feedback provided by network
Feedback provided by the network includes: Feedback provided by the network includes:
o Peak demand times, either proactively (e.g. this network peaks o Peak demand times, either proactively (e.g. this network peaks
daily between the hours of X and Y) or reactively through daily between the hours of X and Y) or reactively through
something like Explicit Congestion Notification (this network is something like Explicit Congestion Notification (this network is
at peak or is experiencing congestion right now) at peak or is experiencing congestion right now)
o ACK/NACK for requested level of service, throughput, etc. o ACK/NACK for requested level of service, throughput, etc.
2.2.9. Security and Privacy Considerations 2.2.8. Security and Privacy Considerations
This requires a trust model between application and network so that This requires a trust model between application and network so that
the information communicated about performance envelope requirements the information communicated about performance envelope requirements
can be trusted. In the case where there are different costs, can be trusted. In the case where there are different costs,
charging rates, tonnage limits by type of traffic, there is charging rates, tonnage limits by type of traffic, there is
opportunity for abuse (maliciously marking all traffic such that it opportunity for abuse (maliciously marking all traffic such that it
incurs additional cost, or such that it is dropped when it should not incurs additional cost, or such that it is dropped when it should not
be, etc). Even simpler data such as IP Precedence is often remarked be, etc). Even simpler data such as IP Precedence is often remarked
at the boundaries between networks as untrusted, so carrying this at the boundaries between networks as untrusted, so carrying this
sort of metadata likely requires a method to ensure that it was set sort of metadata likely requires a method to ensure that it was set
by a trusted entity and not manipulated in transit. by a trusted entity and not manipulated in transit.
2.3. Video Adaptation: Use client metadata to help video bit rate 2.3. Video Adaptation
selection
HTTP Adaptive Streaming (HAS) is an umbrella term for various HTTP- HTTP Adaptive Streaming (HAS) is an umbrella term for various HTTP-
based streaming technologies that allow a client to adaptively switch based streaming technologies that allow a client to adaptively switch
between multiple bitrates, depending on current network conditions. between multiple bitrates, depending on current network conditions.
HAS client first requests and receives a Manifest File, and then, HAS client first requests and receives a Manifest File, and then,
after parsing the information in the Manifest File, proceeds with after parsing the information in the Manifest File, proceeds with
sequentially requesting the chunks listed in the Manifest File. sequentially requesting the chunks listed in the Manifest File.
2.3.1. Description of Problem 2.3.1. Description of Problem
The problems with HAS are: The problems with HAS are:
o HAS client selects the initial bitrate without knowing the current o HAS client selects the initial bitrate without knowing the current
network conditions which could cause start-up delay and frame network conditions which could cause start-up delay and frame
freezes while a lower bitrate chunk is being retrieved. HAS freezes while a lower bitrate chunk is being retrieved. HAS
client does not have a mechanism to signal the flow client does not have a mechanism to signal the flow
characteristics and flow priority to the network. characteristics and desired treatment to the network.
o HAS server can mark the packets appropriately but setting DSCP has o HAS server can mark the packets appropriately but setting DSCP has
limitations. DSCP value may not be preserved or honored over the limitations. DSCP value may not be preserved or honored over the
Internet and OS may not allow to set DSCP values. Internet and operating system may not allow to set DSCP values.
o Content Providers may have agreements with ISPs and need a o Content Providers may need a mechanism to convey the flow
mechanism to convey the flow characteristics and flow priority to characteristics and desired treatment to the ISP. Existing
the ISP. Existing mechanisms and the associated limitations are: mechanisms and the associated limitations are:
1. ISP can be configured with the IP addresses of content 1. ISP can be configured with the IP addresses of content
providers to prioritize the traffic originating from those providers to identify the traffic originating from those
servers. The limitations with this approach are ISP has to servers. The limitations with this approach are ISP has to
keep track of content providers IP addresses. With CDNI keep track of content providers IP addresses. With CDNI
(Content Delivery Network InterConnection) content could be (Content Delivery Network InterConnection) content could be
served either from uCDN (upstream CDN) or any of a number of served either from uCDN (upstream CDN) or any of a number of
dCDNs (downstream CDN) and it will not be possible to manually dCDNs (downstream CDN) and it will not be possible to manually
track the IP addresses of all the CDN surrogates. There is track the IP addresses of all the CDN surrogates. There is
also no way to differentiate content which could be available also no way to differentiate content which could be available
in different bitrates. in different bitrates.
2. If HAS client is behind NAT and content provider uses RESTful 2. If HAS client is behind NAT and content provider uses RESTful
API (OneAPI) to install differentiated QoS then ISP will API (OneAPI) to install differentiated QoS then ISP will
struggle to find the pre-NAT information. Content provider struggle to find the pre-NAT information. Content provider
also needs to be aware of the ISP to which the client is also needs to be aware of the ISP to which the client is
attached and the IP address of the Policy Decision Point (PDP) attached and the IP address of the Policy Decision Point (PDP)
in the ISP to which it needs to signal the flow in the ISP to which it needs to signal the flow
characteristics. characteristics.
o ISP can use DPI to prioritize one-way video streaming content but o ISP can use DPI to identify one-way video streaming content but is
is expensive and fails if the traffic is encrypted. expensive and fails if the traffic is encrypted.
2.3.2. Proposed Solution 2.3.2. Proposed Solution
If ISP has agreement with content provider then HAS client can use HAS client can use third party authorization to request network
third party authorization to request network resources. At a high resources. At a high level, this authorization works by the client
level, this authorization works by the client first obtaining a first obtaining a cryptographic token from the authorizing network
cryptographic token from the authorizing network element, then element, then including that token in the request along with relevant
including that token in the request along with relevant flow flow characteristics. ISP validates the token and grants the
characteristics. ISP validates the token and grants the request. request.
2.3.3. User Benefit 2.3.3. User/Application Benefit
AEON helps increase the average play quality, reduces the start-up This solution helps increase the average play quality, reduces the
delay and frame freezes by avoiding attempt to retrieve a too high- start-up delay and frame freezes by avoiding attempt to retrieve a
bit rate chunk etc thus improving the quality of experience for end too high-bit rate chunk etc thus improving the quality of experience
user. for end user.
2.3.4. Operator Benefit 2.3.4. Operator Benefit
Network Operators can recognize and prioritize one-way video Network operators can better recognize and treat one-way video
streaming content. streaming content.
2.3.5. Application Benefit 2.3.5. Flow characteristics provided by application
2.3.6. Flow characteristics provided by application
HAS client signals the flow characteristics such as the anticipated HAS client signals the flow characteristics such as the anticipated
bandwidth needs as well as the tolerance to delay, loss, and jitter. bandwidth needs as well as the tolerance to delay, loss, and jitter.
2.3.7. Action taken by network as result of receiving flow 2.3.6. Action taken by network as result of receiving flow
characteristics characteristics
Subject to local policies, a network node might perform bandwidth Subject to local policies, a network node might perform bandwidth
counting, or reconfigure the underlying network so that additional counting, or reconfigure the underlying network so that additional
bandwidth is made available for this particular flow, or might bandwidth is made available for this particular flow, or might
perform other actions. perform other actions.
2.3.8. Feedback provided by network 2.3.7. Feedback provided by network
The network responds that the client request can be fully or The network responds that the client request can be fully or
partially accommodated. It also notifies the client when conditions partially accommodated. It also notifies the client when conditions
change. change.
2.3.9. Security and Privacy Considerations 2.3.8. Security and Privacy Considerations
2.4. Multi-interface selection: Use metadata to help interface 2.4. Multi-interface selection: Use metadata to help interface
selection or prioritization selection or prioritization
2.4.1. Description of Problem 2.4.1. Description of Problem
An increasing number of hosts are operating in multiple-interface An increasing number of hosts are operating in multiple-interface
environments and a host with multiple interfaces needs to choose the environments and a host with multiple interfaces needs to choose the
best interface for communication. Oftentimes, this decision is based best interface for communication. Oftentimes, this decision is based
on a static configuration and does not consider the link on a static configuration and does not consider the link
characteristics of that interface, which may affect the user characteristics of that interface, which may affect the user
experience. The network interfaces may have different link experience. The network interfaces may have different link
characteristics, but that will not be known without the awareness of characteristics, but that will not be known without the awareness of
the upstream and downstream characteristics of the access link. the upstream and downstream characteristics of the access link.
2.4.2. Proposed Solution 2.4.2. Proposed Solution
TODO The problem can be solved if a mechanism is provided for the
applications to communicate required flow characteristics with the
available interfaces, and know about network condition of each
interface, or to what extent application requirement of flow
characteristics can be met by each interface. Application can then
prioritize the interfaces based on information gathered and select
one or more interfaces that best meet its requirement.
2.4.3. User Benefit 2.4.3. User/Application Benefit
Applications can choose the best interface for communication using Applications can choose the interface that best meets their
AEON. requirements for communication. User experience is improved because
of the consistency between flow characteristics requested by
application and network ability provided by the selected interface.
2.4.4. Operator Benefit 2.4.4. Operator Benefit
The network that can provide the requested flow characteristics will The network that can provide the requested flow characteristics will
be selected by the application thus increasing the subscriber base of be selected by the application thus increasing the subscriber base of
the operator. the operator.
2.4.5. Application Benefit 2.4.5. Flow characteristics provided by application
2.4.6. Flow characteristics provided by application
Application signals flow characteristics over multiple interfaces and Application signals flow characteristics over multiple interfaces and
based on the response from its various interfaces sorts the source based on the response from its various interfaces sorts the source
addresses according to the link capacity characteristics. Source addresses according to the link capacity characteristics. Source
addresses from the interface which best fulfills the desired flow addresses from the interface which best fulfills the desired flow
characteristics are assigned the highest priority and would be tried characteristics are assigned the highest priority and would be tried
first to communicate with the server or remote peer. For example first to communicate with the server or remote peer. For example
draft-reddy-mmusic-ice-best-interface-pcp-00 explains the mechanism [I-D.reddy-mmusic-ice-best-interface-pcp] explains the mechanism
where Interactive Connectivity Establishment (ICE) agent on a host where Interactive Connectivity Establishment (ICE) agent on a host
with multiple interfaces uses AEON to determine the link with multiple interfaces determines the link characteristics of the
characteristics of the host's interfaces, which influences the ICE host's interfaces, which influences the ICE candidate priority.
candidate priority. Similarly draft-wing-mptcp-pcp-00 explains how Similarly [I-D.wing-mptcp-pcp] explains how Multipath TCP (MPTCP) can
Multipath TCP (MPTCP) can select the best path when multiple paths select the best path when multiple paths are available.
are available.
2.4.7. Action taken by network as result of receiving flow 2.4.6. Action taken by network as result of receiving flow
characteristics characteristics
2.4.8. Feedback provided by network Network identifies flow characteristics requested by applications,
and decides whether the request can be met or not.
2.4.9. Security and Privacy Considerations 2.4.7. Feedback provided by network
Link characteristics and ACK/NACK for flow requirement can be
provided as feedback by network.
2.4.8. Security and Privacy Considerations
Users/applications are expected to consider security of interfaces,
e.g. an untrusted public wifi access point will have lower priority
than a trusted VPN tunnel, when prioritizing and selecting the
interfaces.
2.5. Session Identification: Identification of multiple media flows 2.5. Session Identification: Identification of multiple media flows
belonging to a common application session belonging to a common application session
2.5.1. Description of Problem 2.5.1. Description of Problem
Many end-to-end application sessions involve multiple application Many end-to-end application sessions involve multiple application
protocols, devices and administrative domains. These sessions protocols, devices and administrative domains. These sessions
involve multiple media flows (e.g. an audio flow and a video flow for involve multiple media flows (e.g. an audio flow and a video flow for
a video call, media flows between different entities in a a video call, media flows between different entities in a
supplementary service session consisting of multiple SIP dialogs or supplementary service session consisting of multiple SIP dialogs or
H.323 calls). Media flows may be added/removed from a application H.323 calls). Media flows may be added/removed from a application
session during the lifetime of the session. From within the network, session during the lifetime of the session. From within the network,
determining which media flows are associated with each application determining which media flows are associated with each application
session is often difficult, making it hard to provide application session is often difficult, making it hard to provide application
level troubleshooting, traffic analysis, and QoS. level troubleshooting, traffic analysis, and QoS.
2.5.2. Proposed Solution 2.5.2. Proposed Solution
Including a session identifier (e.g. as defined in RFC 7206) in the Including a session identifier (e.g. as defined in [RFC7206]) in the
flow characteristics communicated by the application to the network flow characteristics communicated by the application to the network
would allow the network to identify media flows belonging to a common would allow the network to identify media flows belonging to a common
application session. This visibility would enable the following: application session. This visibility would enable the following:
o network troubleshooting and traffic analysis tools to correctly o network troubleshooting and traffic analysis tools to correctly
associate media flows with application sessions associate media flows with application sessions
o media flows that are part of established application sessions to o media flows that are part of established application sessions to
be identified (e.g. the triggered call in the case of a transfer) be identified (e.g. the triggered call in the case of a transfer)
and given dedicated QoS. Preserving established sessions and given dedicated QoS. Preserving established sessions
generally is higher priority than setting up new sessions (except generally is higher priority than setting up new sessions (except
when there is some form of multi-level preemption). Giving more when there is some form of multi-level preemption). Giving more
bandwidth to additional flows on established sessions might cause bandwidth to additional flows on established sessions might cause
some newer sessions to fail due to resource unavailability while some newer sessions to fail due to resource unavailability while
established sessions continue without degradation, which is the established sessions continue without degradation, which is the
preferred outcome in most cases. preferred outcome in most cases.
2.5.3. User Benefit 2.5.3. User/Application Benefit
Users receive more predictable and reliable QoS for their application Users receive more predictable and reliable QoS for their application
sessions. sessions.
2.5.4. Operator Benefit 2.5.4. Operator Benefit
Operators are able to perform traffic analysis and troubleshooting at Operators are able to perform traffic analysis and troubleshooting at
the application level, and they are able to provide QoS at the the application level, and they are able to provide QoS at the
application level rather than only at the media flow level. application level rather than only at the media flow level.
2.5.5. Application Benefit 2.5.5. Flow characteristics provided by application
2.5.6. Flow characteristics provided by application
The application provides a common session id as metadata for all its The application provides a common session id as metadata for all its
media flows throughout the lifetime of the session. media flows throughout the lifetime of the session.
2.5.7. Action taken by network as result of receiving flow 2.5.6. Action taken by network as result of receiving flow
characteristics characteristics
The network identifies all media flows associated with a given The network identifies all media flows associated with a given
session. This information may be used to provide application level session. This information may be used to provide application level
QoS, preserving established sessions and/or giving more bandwidth to QoS, preserving established sessions and/or giving more bandwidth to
additional flows on established sessions. additional flows on established sessions.
2.5.8. Feedback provided by network 2.5.7. Feedback provided by network
The network may provide feedback to the application indicating the The network may provide feedback to the application indicating the
amount of bandwidth it expects to be able to provide for its session. amount of bandwidth it expects to be able to provide for its session.
It may also be provide indications of the expected amount of delay, It may also be provide indications of the expected amount of delay,
jitter, and loss the application should be prepared to tolerate. jitter, and loss the application should be prepared to tolerate.
2.5.9. Security and Privacy Considerations 2.5.8. Security and Privacy Considerations
2.6. Content Based Charging 2.6. Content Based Charging
2.6.1. Description of Problem 2.6.1. Description of Problem
Commonly used billing method for internet subscribers, e.g. volume Commonly used billing method for internet subscribers, e.g. volume
based charging, does not distinguish usage from the angle of based charging, does not distinguish usage from the angle of
applications. Under this billing model ISP cannot apply different applications. Under this billing model ISP cannot apply different
pricing strategies to the applications it carries, users may hesitate pricing strategies to the applications it carries, users may hesitate
to use certain types of applications, e.g. mobile apps consuming to use certain types of applications, e.g. mobile apps consuming
skipping to change at page 16, line 11 skipping to change at page 16, line 11
traffic flows needing a certain charging method. Network will then traffic flows needing a certain charging method. Network will then
have direct visibility into the traffic and identify targeted traffic have direct visibility into the traffic and identify targeted traffic
accordingly. This billing model usually involves collaboration accordingly. This billing model usually involves collaboration
between network and content providers. The notification needs to go between network and content providers. The notification needs to go
through an authentication function to guarantee the application is through an authentication function to guarantee the application is
reliable and probably an identifier for network to identify the reliable and probably an identifier for network to identify the
application that has service agreement with ISP. ISP will identify application that has service agreement with ISP. ISP will identify
traffic based on characteristics notified by application and apply traffic based on characteristics notified by application and apply
designated billing strategy. designated billing strategy.
2.6.3. User Benefit 2.6.3. User/Application Benefit
Users take advantage of the granular and customized charging model, Users take advantage of the granular and customized charging model,
and pay for different types of traffic at different rate. This and pay for different types of traffic at different rate. This
charging model will reduce volume expense for users and stimulate charging model will reduce volume expense for users and stimulate
internet usage. internet usage. Content provider can benefit from providing users
with exclusive payment function, e.g. pay for traffic volume or
provide cheap volume package, and increase user enthusiasm and time
to use its applications.
2.6.4. Operator Benefit 2.6.4. Operator Benefit
The solution will provide operators with a method to precisely The solution will provide operators with a method to precisely
identify and charge traffic based on content, and to agilely manage identify and charge traffic based on content, and to agilely manage
charging strategy of applications. Operators are able to cooperate charging strategy of applications. Operators are able to cooperate
with content providers to provide this new billing service to users with content providers to provide this new billing service to users
and encourage encourage traffic consumption. and encourage encourage traffic consumption.
2.6.5. Application Benefit 2.6.5. Flow characteristics provided by application
Content provider can benefit from providing users with exclusive
payment function, e.g. pay for traffic volume or provide cheap volume
package, and increase user enthusiasm and time to use its
applications.
2.6.6. Flow characteristics provided by application
Application notifies network of its identifier and traffic Application notifies network of its identifier and traffic
description to enable network to recognize its traffic accordingly. description to enable network to recognize its traffic accordingly.
Application may also signal its intended charging model as a request Application may also signal its intended charging model as a request
to the network. to the network.
2.6.7. Action taken by network as result of receiving flow 2.6.6. Action taken by network as result of receiving flow
characteristics characteristics
Network identifies traffic flows notified by the application and Network identifies traffic flows notified by the application and
applies the designated billing model based on application request and applies the designated billing model based on application request and
business agreement with the content provider providing the business agreement with the content provider providing the
application. application.
2.6.8. Feedback provided by network 2.6.7. Feedback provided by network
2.6.9. Security and Privacy Considerations 2.6.8. Security and Privacy Considerations
There needs to be an authentication mechanism so as to ensure that There needs to be an authentication mechanism so as to ensure that
traffic characteristics provider is right the authorized application traffic characteristics provider is right the authorized application
the ISP has the charging agreement with. the ISP has the charging agreement with.
2.7. Open QoS and Experience Enhancement for Applications 3. Acknowledgements
2.7.1. Description of Problem
Current QoS provided in an ISP's network is usually circuit or user
based, achieved by configuring policies on network nodes like edge
router or gateway, and is not dynamic, on-demand or application
specific. An example showing the current problem of achieving
application granularity is the internet based home products provided
by many content providers, e.g. an internet TV box using WiFi to
connect the internet and providing video programs to users. Content
providers often wish to cooperate with the ISP providing internet
access service to improve the experience of their services, as access
network is often congested due to extensive internet usage nowadays.
But currently there is no direct way of classifying certain traffic
when it is mixed with other background traffic in a single pipe, e.g.
WiFi. Implementing classification on specific traffic of an
individual application, e.g. text, audio, video traffic of an instant
messaging application, is even more difficult.
QoS provided by an ISP is usually predefined and not application
driven. QoS ability opening provides a mechanism to enable dynamic
access acceleration, priority guarantee and other service
differentiation for ICPs, and new application based QoS selling
business for network operators. By opening QoS ability to content
providers, this mechanism is expected to allow application to
subscribe QoS business to enhance its user experience, and manage
traffic treatment on its own.
2.7.2. Proposed Solution
The potential solution proposes a collaboration mechanism for content
provider operating the application and ISP operating the network.
Application notifies the network of its identifier and the
characteristics of its traffic flows needing experience enhancement.
The notification probably conveys service request to the network,
e.g. desired QoS, capacity guarantee, etc. The treatment traffic
will receive is expected to be based on agreements between content
provider and ISP, or service subscription templates provided by ISP,
and an authentication mechanism is used by ISP to validate the party
making the notification. Network will then know the exact
application information of traffic, and perform traffic
identification and differentiation on network nodes, e.g. broadband
access router. This solution provides a way for applications to lead
its experience enhancement.
2.7.3. User Benefit
Users will have enhanced experience when using the applications.
2.7.4. Operator Benefit
Operator is able to identify application traffic precisely and
perform differentiated service accordingly. QoS ability of operator
is further extended to a finer granularity and initiation and
management of traffic differentiation is more flexible and open,
providing operator with new business model while cooperating with
content provider.
2.7.5. Application Benefit
Content provider has the ability to influence the treatment network
give to its traffic, and decide when and how to apply QoS to its
traffic. By enhancing experience using this mechanism user
enthusiasm and usage time will be increased.
2.7.6. Flow characteristics provided by application
Application notifies network of its identifier and the
characteristics of its traffic flows needing experience enhancement.
Application may also notify the network of a request of desired
traffic treatment.
2.7.7. Action taken by network as result of receiving flow
characteristics
Network identifies traffic flows notified by the application and The authors thank the attendees of the Bar BoF for contributing
applies the designated QoS or other service guarantee based on towards this set of use cases.
application request and business agreement/subscription with the
content provider providing the application.
2.7.8. Feedback provided by network 4. Informative References
Network may provide feedback indicating whether service request can [I-D.conet-aeon-problem-statement]
be satisfied or the designated service, but it is not mandatory. Fan, P., Deng, H., Boucadair, M., Reddy, T., and C. Eckel,
"Application Enabled Collaborative Networking: Problem
Statement and Requirements", draft-conet-aeon-problem-
statement-00 (work in progress), May 2014.
2.7.9. Security and Privacy Considerations [I-D.reddy-mmusic-ice-best-interface-pcp]
Reddy, T., Wing, D., Steeg, B., Penno, R., and V. Varun,
"Improving ICE Interface Selection Using Port Control
Protocol (PCP) Flow Extension", draft-reddy-mmusic-ice-
best-interface-pcp-00 (work in progress), October 2013.
There needs to be an authentication mechanism so as to ensure that [I-D.wing-mptcp-pcp]
traffic characteristics provider is right the authorized application Wing, D., R, R., Reddy, T., Ford, A., and R. Penno,
cooperating with the ISP. "Multipath TCP (MPTCP) Path Selection using PCP", draft-
wing-mptcp-pcp-00 (work in progress), October 2013.
3. Acknowledgements [I-D.wing-pcp-third-party-authz]
Wing, D., Reddy, T., Patil, P., and R. Penno, "PCP
Extension for Third Party Authorization", draft-wing-pcp-
third-party-authz-03 (work in progress), April 2014.
The authors thank the attendees of the Bar BoF for contributing [RFC7206] Jones, P., Salgueiro, G., Polk, J., Liess, L., and H.
towards this set of use cases. Kaplan, "Requirements for an End-to-End Session
Identification in IP-Based Multimedia Communication
Networks", RFC 7206, May 2014.
Authors' Addresses Authors' Addresses
Wesley George Wesley George
Time Warner Cable Time Warner Cable
13820 Sunrise Valley Drive 13820 Sunrise Valley Drive
Herndon, VA 20171 Herndon, VA 20171
US US
Email: wesley.george@twcable.com Email: wesley.george@twcable.com
skipping to change at page 19, line 25 skipping to change at page 18, line 4
Authors' Addresses Authors' Addresses
Wesley George Wesley George
Time Warner Cable Time Warner Cable
13820 Sunrise Valley Drive 13820 Sunrise Valley Drive
Herndon, VA 20171 Herndon, VA 20171
US US
Email: wesley.george@twcable.com Email: wesley.george@twcable.com
Peng Fan Peng Fan
China Mobile China Mobile
32 Xuanwumen West Street 32 Xuanwumen West Street
Beijing 100053 Beijing 100053
China China
Email: fanpeng@chinamobile.com Email: fanpeng@chinamobile.com
Satoru Matsushima
SoftBank Telecom
1-9-1 Higashi-Shinbashi, Munato-ku
Tokyo
Japan
Email: satoru.matsushima@g.softbank.co.jp
Tirumaleswar Reddy Tirumaleswar Reddy
Cisco Systems, Inc. Cisco Systems, Inc.
Cessna Business Park, Varthur Hobli Cessna Business Park, Varthur Hobli
Sarjapur Marathalli Outer Ring Road Sarjapur Marathalli Outer Ring Road
Bangalore, Karnataka 560103 Bangalore, Karnataka 560103
India India
Email: tireddy@cisco.com Email: tireddy@cisco.com
Charles Eckel Charles Eckel
 End of changes. 83 change blocks. 
257 lines changed or deleted 184 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/