Internet DRAFT - draft-mihaly-enablers-for-tlp-evolution
draft-mihaly-enablers-for-tlp-evolution
Internet Engineering Task Force Attila Mihaly
Internet-Draft Szilveszter Nadas
Intended status: Informational Ericsson
Expires: September 2015 March 9, 2015
Enablers for Transport Layer Protocol Evolution
draft-mihaly-enablers-for-tlp-evolution-00.txt
Abstract
In this document we collected requirements for TLP evolution. These
requirements are the consequence of removing obstacles of TLP
evolution. This results in a higher variety of expected TLP
implementations and lower trust level in these. Confidentiality of
communication and security is more and more important. Middleboxes
which today are one of the obstacles of the evolution shall be taken
into account and incentivized to cooperate in the future landscape.
Resulting from the requirements we propose areas for further
investigation.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on September 9, 2015.
Mihaly Expires September 9, 2015 [Page 1]
Internet-Draft Enablers for TLP evolution March 2015
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document.
Table of Contents
1. Introduction...................................................3
1.1. Main obstacles to TLP evolution...........................3
1.1.1. Kernel-based TLP implementations.....................3
1.1.2. Middleboxes..........................................4
2. Requirements on the TLP framework..............................4
2.1. Enforce expected TLP behavior.............................4
2.2. Enable application access to TLPs.........................5
2.3. Allow for consistent TLP selection........................5
2.4. Allow the path influencing TLP selection..................5
2.5. Ensure expected TLP performance characteristics...........5
2.6. Ensure that the access providers can be part of the value
chain..........................................................6
2.7. Ensure confidentiality of end-to-end communication........6
2.8. Ensure security of end-to-end communication...............6
2.9. Ensure user control.......................................7
3. Ideas for framework evolution..................................7
3.1. API definitions for TLP selection within the host.........7
3.2. Generic TLP related functions and APIs....................9
3.3. Mechanisms for consistent TLP selection...................9
3.4. Security solutions for multiple trust domains............10
3.5. In-band protocol for Middlebox communication.............10
4. On open source TLP implementations............................12
5. Related work..................................................12
6. Conventions used in this document.............................13
7. Security Considerations.......................................13
8. IANA Considerations...........................................13
9. Conclusions...................................................13
10. References...................................................14
10.1. Normative References....................................14
10.2. Informative References..................................14
Mihaly Expires September 9, 2015 [Page 2]
Internet-Draft Enablers for TLP evolution March 2015
11. Acknowledgments..............................................15
1. Introduction
In this document we collect requirements for TLP evolution. These
requirements are the consequence of removing obstacles of evolution.
Note that we are not after the requirements on the TLP development
as such, but rather the requirements on the eco-system that allow
fast evolution and deployment of new TLPs. When deriving the
requirements we consider the interest of all actors: users,
application developers, network operators, equipment vendors as well
as operating system vendors to result in an infrastructure where
cooperation between the parties becomes possible.
The premise of all the discussion is that TLPs need to evolve, and
potentially at a faster pace than it is allowed today. A few use
cases are collected to demonstrate the potential need for many
application and access network related TLP features that should be
available in a flexible way[FLEX].
Based on the requirements, in the second part we discuss the new
features that are needed and provide ideas to meet these
requirements.
1.1. Main obstacles to TLP evolution
The following obstacles were discussed at a related IAB workshop
[SEMI].
1.1.1. Kernel-based TLP implementations
One problem with the innovation in the TLP area is that the
transport protocols are currently implemented in the kernel. Kernel
updates are generally slow. The proprietary TLP implementations that
would require modifications of the existing transport protocols in
the clients are therefore not usable. Each new modification needs to
undergo a long standardization process, followed by a period until
it is deployed in the operating systems. This process may take
years.
The solution to this problem, which is also observed today in some
of the new TLP designs (QUIC, WebRTC), is that, instead of the
kernel, they are implemented in the application space on the top of
UDP. This is a way to speed up the innovation on the transport
protocol layer in the current eco-system.
Mihaly Expires September 9, 2015 [Page 3]
Internet-Draft Enablers for TLP evolution March 2015
1.1.2. Middleboxes
The ubiquitous deployment of middleboxes is another main reason of
what is called the 'ossification' of the transport layer. Firewalls
and NATs often inspect packets beyond the IP header and often drop
packets based on port numbers or other identified protocol and
application characteristics or, more commonly, because of non-
identified protocol characteristics. The only 100 percent 'safe'
protocol to be transmitted through middleboxes is HTTP and HTTPs
over TCP. Even the UDP-based traffic is often dropped or policed.
Note that there may be means to implement improved TLPs with framing
format embedded over the TCP layer to avoid potential problems with
middleboxes. However, this introduces additional complexity and
overhead.
Another, often neglected reason why the above approach is not
advisable is that middleboxes and the policies they enforce have an
important role in the eco-system. The internet is a critical
infrastructure a number of services are using from emergency
services to banking systems, which should therefore be protected
against misbehaving protocols. Middleboxes that filter out unknown
TLP implementations together with miss-behaving kernel-based TLP
implementations are the means to keep the Internet stable.
In conclusion, a solution is needed that lets the middleboxes not
block user space TLP implementations but in a way that protects
against miss-behaving TLPs.
2. Requirements on the TLP framework
Overcoming the abovementioned obstacles need changes in the TLP
framework. Also, when the above obstacles are overcome new
requirements result from the changed ecosystem.
2.1. Enforce expected TLP behavior
One conclusion that relates to both user space TLP implementations
and new TLP behavior is that protection is needed against buggy
and/or malicious TLP implementations. This serves the interest of
all parties and has two aspects:
. Protecting the other flows of the same user.
. Protecting the other customers using the network domain from
the potential negative effect of other traffic. One can always
gain a lot of capacity in a shared network just by being
Mihaly Expires September 9, 2015 [Page 4]
Internet-Draft Enablers for TLP evolution March 2015
aggressive. If there are no regulating network mechanisms then
both the overall network utility and fairness of assessing
network resources are compromised.
The behavior that needs to be verified in proprietary TLP
implementations is e.g., congestion control aggressiveness, packet
size, packet shaping.
2.2. Enable application access to TLPs
Introducing a proprietary TLP causes a 'walled-garden' effect, i.e.,
the new protocol with the new features is only available for the
services provided by the developer of the transport protocol.
Commercialization of the new TLPs and re-usage of open-source
implementations both support fast TLP innovation, but require that
the new TLPs SHOULD be selectable by different applications.
2.3. Allow for consistent TLP selection
While the previous requirement 2.2. relates to TLP selection within
the host, this requirement states that the framework SHOULD allow
for a consistent TLP selection for a given connection towards a
certain remote host through certain legacy paths. That is, the
finally selected TLP should be supported by the other endpoint as
well as the network domains on the path. This is to guarantee
interoperability during gradual deployment of new TLPs and their
support in the network.
2.4. Allow the path influencing TLP selection
Note that middleboxes on path may explicitly be part of the TLP
selection process. They may favor the usage of certain TLPs because
of some enhancement functions that they could offer (see discussion
in 2.6. )
2.5. Ensure expected TLP performance characteristics
By TLP performance characteristics we mean the non-functional, i.e.,
performance-related TLP features. Interactions needed for the
selection and usage of proper TLPs (including within-the-host
interactions as well as interactions with the other party and the
network domain) SHOULD not result in significant degradation of
expected TLP performance characteristics. For example, if a
transport protocol has been designed for low setup latency then this
should be preserved by introducing a framework that achieves the
above goals.
Mihaly Expires September 9, 2015 [Page 5]
Internet-Draft Enablers for TLP evolution March 2015
Note that the above requirement is strictly valid for the case when
communicating to a known party through a known network domain. In
other cases a more complex setup procedure (including e.g., the
exchange of security credentials with the other party or the
middlebox) may be needed. In some cases it MAY be also allowed that
the very first session is delayed until a proper TLP is downloaded
if one of the parties does not possess the required TLP. But such
cases should be as rare as possible, e.g., a browser downloading the
unsupported TLP once when first demand is encountered and then
storing it for future usage.
2.6. Ensure that the access providers can be part of the value chain
The framework SHALL allow access providers (ISPs and Mobile
operators) provide a cooperative middlebox environment for user
space TLP implementations. Middleboxes can generate value for the
hosts in a number of different scenarios; we direct the reader to
our recent position paper where we gave a summary of potential
middlebox roles for Mobile Broadband [MBC].
Naturally, content providers and users who are not willing to
participate in this cooperation and want to avoid any unwanted
traffic manipulation by middleboxes MUST be able to do that. Also,
the cooperation with middleboxes SHOULD be possible on different
trust levels. When there is a high trust level in a middlebox, the
middlebox should be able to access and manipulate higher layers,
i.e., TLP or application layers.
2.7. Ensure confidentiality of end-to-end communication
A valid demand from the end-users and content providers is that the
eco-system SHALL allow for confidentiality of end-to-end
communication. A trend in data communication is to encrypt
everything including the transport layer and above. However, if
middlebox communication requires access and manipulation of the TLP
fields, then object security solutions are needed to guarantee
confidentiality.
2.8. Ensure security of end-to-end communication
The framework SHOULD also make all possible actions to avoid that a
hostile entity along the path cannot cause any harm to the hosts by
exploiting the flaws in the user space TLP implementations (at least
not by using reasonable amount of processing resources).
Unfortunately it is very hard to prepare TLP implementations to be
robust against any harmful change in the protocol fields. Middlebox
interaction may however require that some of the TLP fields can be
accessed or modified by trusted middleboxes.
Mihaly Expires September 9, 2015 [Page 6]
Internet-Draft Enablers for TLP evolution March 2015
2.9. Ensure user control
It SHOULD be possible allow the users to control TLP behavior.
On the host side this means that the user may keep control on what
TLP should be selected for a certain application. Moreover, it
SHOULD be possible to control the transmission resource sharing
between the different applications or streams. Otherwise, specific
TLP behavior can override user expectations on the transmission
resource sharing and this may cause unwanted effect on the user
experience. Note that such resource sharing problems are also
apparent today e.g., file sharing using a broadband access may cause
bad Skype or video streaming experience.
The above requirement also has relevance for Middlebox
communication, i.e., the user SHOULD have the possibility to decide
what information is sent out related to a certain application or
TLP.
3. Ideas for framework evolution
3.1. API definitions for TLP selection within the host
New APIs are needed to support a consistent TLP selection as
specified in 2.3. Figure 1 depicts the new interfaces (shown by
question marks) that a user space TLP suite brings in, in addition
to the existing selection alternatives.
Mihaly Expires September 9, 2015 [Page 7]
Internet-Draft Enablers for TLP evolution March 2015
+---+ +---+ +---+ +---+ +----+
|APP| |APP| |APP| |APP| |APP |
+-^-+ +-^-+ +-^-+ +-^-+ +----+
| | | | +----+
| | | | |TLP3|
| +--v-------+ | | +-^--+
| |Middleware| | | |
| +^------^--+ | | |
| | | | | |
| | | | | |
| | +----v------------v----+ | |
| | |Protocol Selection API| | |
| | +^---------^-----------+ | |
| | | | | ? |
| | | | ? | |
| | | +-------v--------------v-+ |
| | | |(User Space TLPs) | |
| | | | | |
| | | | +----+ +----+ | |
| | | | |TLP1| |TLP2| ... | |
| | | | +----+ +----+ | |
| | | +-+----+^--+----+--------+ |
| | | | |
| | | | ? |
+-v-----v--v---------v----------------------v-+
| (Operating System) |
| +---+ +---+ |
| |TCP| |UDP| ... |
| +---+ +---+ |
+----------------------+---+---+---+----------+
Figure 1 : Transport protocol selection alternatives with User Space
transport protocol implementations
It is apparent that using middleware and high-level TLP selection
APIs (like that proposed in [TAPS]) is advantageous for a framework
involving user space TLPs since they separate application
development from TLP development and make new, innovative TLP
solutions possible also for legacy applications. However, direct
selection of TPLs by the applications should also be possible. Low-
level APIs to the new functions residing in the operating system are
also needed (see discussion in 3.2. )
Mihaly Expires September 9, 2015 [Page 8]
Internet-Draft Enablers for TLP evolution March 2015
3.2. Generic TLP related functions and APIs
It is apparent that there is some generic functionality needed
(i.e., transport layer functionality that applies on the top of the
different user space TLP flavors) in order to fulfill the
requirements in section 2. :
. Resource control component for the total transmission resources
in the host, to fulfill requirement 2.9.
. Trust API that enforces a certain trust level, i.e., controls
what different features and APIs a certain TLP has access to in
the operating system. For example, some TLPs may control the
resource control parameters, others not. This is needed because
TLPs may be designed by different parties and not every TLP
should be allowed to use all kernel functions.
. API in the operating system for time-critical processing, e.g.,
packet shaping. Time-critical processing is one functionality
that may only be done efficiently in the operating system
. A common policing function (needed to fulfill the requirements
in 2.1. and 2.9. on host side)
. Congestion control communication component with standard
framing on congestion control 'classes' (needed to fulfill the
requirements in 2.1. and 2.9. on the network side)
. Other middlebox communication component for exchanging
information about the 'service' required (to support
requirement 2.6. )
. A security function that verifies the different TLP
implementations requested and downloaded from remote sources
Note that there may be other common features and APIs required
besides those listed above. It is FFS to identify all necessary
functions.
3.3. Mechanisms for consistent TLP selection
There is a need for fast TLP identification and negotiation
mechanisms, which is derived from the requirements in 2.2. and 2.5.
, respectively. The selection mechanisms may potentially involve
middleboxes in the path. There can be many alternatives for this
which is outside the scope of this document.
The selection may include communication with a trusted part of code
at the other end, which provides some proof about the TLP
implementation.
Mihaly Expires September 9, 2015 [Page 9]
Internet-Draft Enablers for TLP evolution March 2015
3.4. Security solutions for multiple trust domains
As stipulated in 2.8. , it is important that the TLP fields should
not be easily changeable by nodes along the path because this can
help exploiting bugs in a TLP implementation. A potential solution
is to also authenticate the transport layer. However, network side
enhancements on different layers could lead to improved end-to-end
quality, as we discuss in 2.6. In some cases, this implies that the
middleboxes should be able to modify information on the transport
layer or above: transcoder proxies, parental control, TLP proxies
translating between an 'old' and a 'new' TLP, etc.
The conclusion from the above is that security solutions are needed
that enable that different entities have access to the information
at the different layers. If there is a hint on the expected
capabilities of the other end on a certain layer, the setup messages
for the different layers can be grouped together in order to speed
up the connection establishment, in the spirit of requirement 2.5.
3.5. In-band protocol for Middlebox communication
The smooth and fair networking so far has been highly aided by the
TCP/IP "narrow-waist", i.e., the assumption that all sources use
TCP-like congestion avoidance mechanisms. Misbehaving sources have
been possible to identify because of the fact that TCP wire format
(ACKs and sequence numbers) allows to identify both the congestion
signal and the congestion avoidance action, i.e., how many data is
sent upon the detection of packet losses. The proliferation of UDP-
based traffic in the network with many new features with unknown and
untested behavior could make even the simple traffic management that
guarantees that all users get their share quite troublesome.
Middleboxes may need to enforce expected behavior in the network
domain because of conflicting interests, as specified in the
requirement 2.1. A potential help in that is the identification of
the expected congestion behavior of TLPs (e.g., congestion control
used, constant bitrate flow, or chatty flow not adapting etc.) on
the network side. We recognize that any information from hosts that
would represent negative discrimination is useless, since all hosts
would evidently use the indication that implies the best treatment.
However this 'best treatment' is not obvious and the preferred
congestion treatment depends on application needs. For example, an
application using CBR-type of traffic would 'sacrifice' additional
bandwidth (e.g., by a rate-limiter in the network) for zero packet
loss provided by the network up to a certain congestion level. To
fully avoid misuse of certain congestion indicators, the network
should be able to ensure some kind of fairness for the different
Mihaly Expires September 9, 2015 [Page 10]
Internet-Draft Enablers for TLP evolution March 2015
congestion control mechanisms, to avoid scenarios where a certain
congestion behavior indicated would take more resources than others
over arbitrary period of time.
By default, when there is no indication on the congestion control
behavior used, the network could enforce a TCP-friendly behavior for
the flow, without requiring any specific knowledge about TLP
specifics (or apply a traffic treatment that result in comparable
congestion 'volumes'. However, we foresee that new TLPs providing
features tailored for specific application needs will have different
congestion control behavior. For these flows the network may enforce
a different congestion control behavior than default, given it
receives the needed information.
Middlebox communication shall be made in a way that does not impede
TLP evolution, which is likely faster than middlebox evolution. This
requires that the framework should not require that all middleboxes
should know all details (e.g., frame structure) of the TLPs. This
hints towards an in-band signaling solution as proposed in [SPUD],
where a new independent layer is introduced for middlebox
communication and where the parameters conveyed are independent from
the specific TLP used, but rather standardized information pointing
to a well-defined congestion behavior.
Communication from the middlebox towards the hosts is motivated by
the consistent TLP selection requirement 2.3. The end hosts may be
informed about middlebox capability on coping with a certain TLP to
be able to select a TLP that is supported by the network middleboxes
too.
In addition to communication about TLP congestion behavior, other
TLP capabilities could be exchanged and negotiated with a middlebox
in order to make use of some TLP enhancement functions. Such a
middlebox signaling layer also allows the endpoint convey additional
IP-layer (delay, loss targets, etc.) or application-layer (proxy,
transcoding feature negotiation etc.) information about their
traffic (if they want to) in order to enable additional services in
the spirit of the requirement 2.6. However, to support these
features, the framework should allow middleboxes to setup a
signaling connection in-band using the already setup user plane
connection in the end-to-end communication in an authenticated way
to advertise their services and communicate to the endpoints in a
secure way.
Requirement 2.5. implies that the performance overhead of the above
in-band signaling protocol should be minimal in the generic case,
and the communication setup should be fast. Certain scenarios may be
Mihaly Expires September 9, 2015 [Page 11]
Internet-Draft Enablers for TLP evolution March 2015
exception to the rule, e.g., setting up communication to a new
middlebox along a path, exchanging context to another middlebox due
to handovers, etc.
4. On open source TLP implementations
Open source implementation may facilitate TLP evolution. The user
space TLP (feature) implementations become faster, allowing smaller
players leverage on the existing features that are designed and
validated by bigger players. This may be further facilitated by pre-
agreed software design rules for TLPs.
However, the eco-system should allow also for non-open source.
Firstly, because nothing would prevent big players come out with
their own user space implementations. Further, it creates a
competitive eco-system allowing e.g., start-ups to design and
commercialize new proprietary TLP implementations. This helps
innovation.
In conclusion, open source does not bring in any specific
requirements to the eco-system compared to other user space
implementations. However, there could be TLP designs that facilitate
re-use of open source and thus contribute to faster TLP evolution.
5. Related work
There is an on-going activity and WG in IETF targeting the
definition of a transport-layer interface exposed to the
applications, on which, instead of specifying a protocol, a
'transport service' is specified [TAPS]. The primary scope for the
activity is to make it possible to select the best transport
protocol implementation for the applications, i.e., to use the
existing transport protocol implementations in the clients, which
are currently never of seldom used.
There is also an EU horizon 2020 activity proposal with similar
scope proposing to solve issues for NAT traversal, Path MTU
discovery and falling back to a semantically-equivalent service in
the selection layer, i.e., completely hidden from the application
[NEAT] . As mentioned above, TLP selection layers are advantageous
since they separate application development from TLP development.
However, they should consider the framework extensions identified in
this document.
The recently formed IAB program [SEMI] and resulting BoF discussions
[SPUD] started from the very same understanding that middleboxes in
the network have expectations on the packet and flow structures,
Mihaly Expires September 9, 2015 [Page 12]
Internet-Draft Enablers for TLP evolution March 2015
which block TLP evolution. The workshop held in January 2015
identified that a mechanism is needed for applications at the end as well
as boxes along the path to explicitly declare their assumptions and
intentions. The design goals identified in this document for such a
communication are intended to serve as input to the protocol discussion.
6. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [RFC2119].
In this document, these words will appear with that interpretation
only when in ALL CAPS. Lower case uses of these words are not to be
interpreted as carrying RFC-2119 significance.
7. Security Considerations
We argue in 2.7. 2.8. and 3.4. that other means that end-to-end
encryption mechanisms involving the transport layer are necessary to
address middlebox communication and also ensure the confidentiality
and integrity of end-to-end communication.
Exposing additional information to kernel functions and also to the
network middleboxes raises a number of security questions about what
should be exposed, how should be exposed etc. The present document
does not address these issues, but they should be talked in future
framework discussions.
8. IANA Considerations
This draft presently does not pose any requirements to IANA.
9. Conclusions
In this document we collected requirements for TLP evolution. These
requirements are the consequence of removing obstacles of evolution.
This results in a higher variety of expected TLP implementations and
lower trust level in these. With the evolved TLPs even better
performance is expected. Confidentiality of communication and
security is more and more important. Middleboxes which today are one
of the obstacles of the evolution shall be taken into account and
incentivized to cooperate in the future landscape.
Mihaly Expires September 9, 2015 [Page 13]
Internet-Draft Enablers for TLP evolution March 2015
Resulting from the requirements we have identified the following
ideas for further investigation.
. API definitions for TLP selection within the host
. Generic TLP related functions and APIs
. Mechanisms for consistent TLP selection
. Security solutions for multiple trust domains
. In-band protocol for Middlebox communication
We would like to invite the community to complete this analysis
based on potential missing pieces of the problem space to address,
further requirements, or further design goals that are useful for
fast TLP evolution.
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
10.2. Informative References
[FLEX] Flexibility of Transport Layer Protocols: Problem Statement
draft-mihaly-TP-flexibility-00.txt
[TAPS] Transport Services Charter,
https://datatracker.ietf.org/doc/charter-ietf-taps/
[NEAT] A New, Evolutive API and Transport Architecture for the
Internet (NEAT), project proposal to Call ICT 5-2014
'Smart Networks and Novel Internet Architectures", on the
Horizon 2020 Work programme
[SEMI] IAB Workshop on Stack Evolution in a Middlebox Internet
(SEMI), http://www.iab.org/activities/workshops/semi/
[SPUD] A new BoF called 'Session Protocol for User Datagrams'
(SPUD) is proposed for IETF92, see
http://trac.tools.ietf.org/bof/trac/#Transport Stack. The
background of it has been discussed in a recent IAB
workshop 'Evolution in a Middlebox Internet' (SEMI), see
https://www.iab.org/activities/workshops/semi/
Mihaly Expires September 9, 2015 [Page 14]
Internet-Draft Enablers for TLP evolution March 2015
[MBC] Nadas, S. and Loreto, S: Middleboxes in Cellular Networks,
position paper to SEMI WorkShop, https://www.iab.org/wp-
content/IAB-uploads/2014/12/semi2015_nadas.pdf
11. Acknowledgments
This document was prepared using 2-Word-v2.0.template.dot.
Copyright (c) 2015 IETF Trust and the persons identified as authors
of the code. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, is permitted pursuant to, and subject to the license
terms contained in, the Simplified BSD License set forth in Section
4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info).
Mihaly Expires September 9, 2015 [Page 15]
Internet-Draft Enablers for TLP evolution March 2015
Authors' Addresses
Attila Mihaly
Ericsson
H-1117 Budapest, Irinyi Jozsef u 4-20, Hungary
Email: Attila.Mihaly@ericsson.com
Szilveszter Nadas
Ericsson
H-1117 Budapest, Irinyi Jozsef u 4-20, Hungary
Email: Szilveszter.Nadas@ericsson.com
Mihaly Expires September 9, 2015 [Page 16]