Re: [p2pi] Incentives and Deployment Considerations for P2PI Solutions

<toby.moncaster@bt.com> Wed, 28 May 2008 10:15 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91DEC28C114; Wed, 28 May 2008 03:15:28 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 43C0D3A6CB2 for <p2pi@core3.amsl.com>; Wed, 28 May 2008 03:15:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.492
X-Spam-Level:
X-Spam-Status: No, score=-1.492 tagged_above=-999 required=5 tests=[AWL=1.507, BAYES_00=-2.599, J_CHICKENPOX_53=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dw7yjJy2JscI for <p2pi@core3.amsl.com>; Wed, 28 May 2008 03:15:24 -0700 (PDT)
Received: from smtp2.smtp.bt.com (smtp2.smtp.bt.com [217.32.164.150]) by core3.amsl.com (Postfix) with ESMTP id 3772828C114 for <p2pi@ietf.org>; Wed, 28 May 2008 03:15:23 -0700 (PDT)
Received: from E03MVZ4-UKDY.domain1.systemhost.net ([193.113.30.64]) by smtp2.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 28 May 2008 11:15:26 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 28 May 2008 11:15:09 +0100
Message-ID: <BAB4DC0CD5148948A86BD047A85CE2A705A811E5@E03MVZ4-UKDY.domain1.systemhost.net>
In-Reply-To: <81F82335-60FE-4B4A-91A6-A51A800E093E@cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [p2pi] Incentives and Deployment Considerations for P2PI Solutions
Thread-Index: AcjARwtVNSv9EpzdSeeqFn5Z68tUBwAZFqfA
From: toby.moncaster@bt.com
To: fluffy@cisco.com, p2pi@ietf.org
X-OriginalArrivalTime: 28 May 2008 10:15:26.0182 (UTC) FILETIME=[BF51F860:01C8C0AB]
Subject: Re: [p2pi] Incentives and Deployment Considerations for P2PI Solutions
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

Just for everyones info, Bob's re-ECN draft is currently at version 05
(not 04 as quoted here):

<http://www.ietf.org/internet-drafts/draft-briscoe-tsvwg-re-ecn-tcp-05.t
xt>

Toby

____________________________________________________________________
Toby Moncaster, <toby.moncaster@bt.com> Networks Research Centre, BT
B54/70 Adastral Park, Ipswich, IP53RE, UK.  +44 1473 648734 


> -----Original Message-----
> From: p2pi-bounces@ietf.org [mailto:p2pi-bounces@ietf.org] On 
> Behalf Of Cullen Jennings
> Sent: 27 May 2008 23:16
> To: p2pi@ietf.org
> Subject: [p2pi] Incentives and Deployment Considerations for 
> P2PI Solutions
> 
> 
> One more paper ...
> 
> Begin forwarded message:
> 
> > From: Jari Arkko <jari.arkko@piuha.net>
> > Date: May 27, 2008 5:16:37 AM EDT
> > To: p2pi-com@ietf.org, Cullen Jennings <fluffy@cisco.com>
> > Subject: later position paper submission
> >
> >
> > I wrote this as a part of my preparations for the workshop.
> >
> > Jari
> >
> >
> >
> >
> > Network Working Group                                           J.  
> > Arkko
> > Internet-Draft                                                   
> > Ericsson
> > Intended status: Informational                              
> May 27,  
> > 2008
> > Expires: November 28, 2008
> >
> >
> >      Incentives and Deployment Considerations for P2PI Solutions
> >                     draft-arkko-p2pi-incentives-00
> >
> > Status of this Memo
> >
> >   By submitting this Internet-Draft, each author represents that any
> >   applicable patent or other IPR claims of which he or she is aware
> >   have been or will be disclosed, and any of which he or she becomes
> >   aware will be disclosed, in accordance with Section 6 of BCP 79.
> >
> >   Internet-Drafts are working documents of the Internet Engineering
> >   Task Force (IETF), its areas, and its working groups.  Note that
> >   other groups may also distribute working documents as Internet-
> >   Drafts.
> >
> >   Internet-Drafts are draft documents valid for a maximum of six  
> > months
> >   and may be updated, replaced, or obsoleted by other 
> documents at any
> >   time.  It is inappropriate to use Internet-Drafts as reference
> >   material or to cite them other than as "work in progress."
> >
> >   The list of current Internet-Drafts can be accessed at
> >   http://www.ietf.org/ietf/1id-abstracts.txt.
> >
> >   The list of Internet-Draft Shadow Directories can be accessed at
> >   http://www.ietf.org/shadow.html.
> >
> >   This Internet-Draft will expire on November 28, 2008.
> >
> > Abstract
> >
> >   Several papers in this workshop have argued that there is 
> a need to
> >   build new protocol mechanisms to accommodate peer-to-peer 
> traffic in
> >   networks in the most efficient way and with minimal 
> impact to other
> >   traffic.  This paper presents an analysis of such 
> solutions from the
> >   point of view of the incentives of the different parties 
> involved in
> >   peer-to-peer traffic.  The paper concludes that it is essential to
> >   understand the incentives in order to have a deployable solution.
> >
> >
> > 1.  Introduction
> >
> >   Peer-to-peer (P2P) networking has been cited as the 
> leading consumer
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 1]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >   of network bandwidth in networks serving private 
> subscribers.  This
> >   is by itself not a problem, as the network providers are in the
> >   business of providing a service to their customers, including the
> >   ones that employ P2P tools.  However, the issue is whether P2P
> >   traffic causes undue congestion and reduced level of service for
> >   other customers in the network [I-D.briscoe-tsvwg-relax-fairness].
> >
> >   Historically, the Internet service provider market has 
> developed for
> >   interactive services where the bandwidth requirements for 
> each user
> >   vary significantly from over time.  This allowed the service
> >   providers to employ statistical multiplexing.  At the 
> same time, the
> >   nominal link speeds have been a major factor in marketing Internet
> >   service.  But during the last few years, the nature of the traffic
> >   has changed from interactive to more always-on type traffic, for
> >   instance from P2P applications.  As a result, statistical
> >   multiplexing is no longer effective, and service providers are
> >   finding that a large sets of users are actually trying to utilize
> >   their full link speed at all times.  This is making the service
> >   providers either increase the capacity of their networks 
> to match  
> > the
> >   changing traffic mix and increasingly high broadband 
> service speeds,
> >   or find other ways to deal with the problems.
> >
> >   It is important to see that these problems are not limited to P2P
> >   tools [P2PI.daigle].  Indeed, not even all P2P applications have
> >   these problems.  Some forms of video communication 
> exhibit the same
> >   problems that large file sharing P2P applications do 
> [P2PI.hardie].
> >   And as the Internet applications evolve, we expect to see 
> new forms
> >   of traffic with these issues.  In the remainder of this paper, we
> >   assume any bandwidth-intensive, semi-permanently running 
> application
> >   that may or may not attempt to be friendly with other 
> network usage.
> >
> >   The fairness problem can present itself in various ways.  For
> >   instance, users opening multiple transport sessions may get a
> >   disproportionate share of a congested link.  Permanent, high
> >   bandwidth sessions may slow down the ramp-up of short-term,
> >   interactive sessions.  Or some users may utilize a 
> transit link far
> >   more than others, resulting in these users gaining a 
> larger share of
> >   the transit costs that the provider has to pay.
> >
> >   These problems are not just abstract issues.  There has 
> been highly
> >   publicized debates about what forms of traffic management are
> >   acceptable for network providers.  In reality, network providers
> >   already employ a number of techniques [P2PI.tschofenig].  
> Solutions
> >   addressing issues in this space have been worked on by network
> >   providers, vendors, and researchers.  This paper looks at the
> >   different classes of solutions in Section 2 and analyzes 
> them based
> >   on the incentives of the involved parties in Section 3.  The key
> >   issue is finding a solution that provides immediate benefits to
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 2]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >   everyone who needs to add new mechanisms or equipment.  
> Another key
> >   issue is the information available to different parties.  
> This leads
> >   us to make conclusions in Section 4.
> >
> >
> > 2.  Solution Classes
> >
> >   A number of solutions have already been deployed to 
> mitigate issues
> >   caused by the changed traffic pattern.  Other solutions 
> are actively
> >   being worked on.  We divide the solutions in three rough classes,
> >   based partially on similar classifications in [P2PI.tschofenig]
> >   [P2PI.moncaster]:
> >
> >   Contractual
> >
> >      These solutions are based on choosing pricing models and
> >      contractual conditions that persuade users to avoid always-on
> >      traffic.  For instance, volume-based accounting can be 
> employed,
> >      or the contracts of the heaviest users can be discontinued.
> >
> >   Voluntary changes in applications
> >
> >      These solutions are based on some change of behaviour in the
> >      applications, leading to taking other users better 
> into account,
> >      reducing congestion or the use of expensive links, and so on.
> >
> >      Some of the solutions in this category include:
> >
> >      *  Indicating the desired quality of service, so that 
> interactive
> >         and always-on applications can be distinguished in 
> the network
> >         [P2PI.moncaster].  This assumes that there is a 
> basic level of
> >         quality of service filtering capabilities in the network.
> >
> >      *  Making decisions with better information about the network
> >         topology and cost.  For instance, algorithms that P2P
> >         applications use to determine which peers to talk to can
> >         probably be improved.  One particular class of improvements
> >         involves "oracles" in the service provider network to help
> >         applications determine the most likely peers with good
> >         connectivity.  For instance, peers that are in the local
> >         service provider network vs. behind an expensive and/or
> >         congested transit service provider.
> >
> >      *  New congestion control mechanisms.  For instance, BitTorrent
> >         has gotten positive results from their new algorithm
> >         [P2PI.shalunov].  Another example is Bob Briscoe's re-ECN
> >         mechanism [I-D.briscoe-tsvwg-re-ecn-tcp], which allows hosts
> >         and networks to co-operate in the treatment of 
> congestion, and
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 3]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >         allows networks to treat different users in a fair manner.
> >
> >   Network-based mechanisms
> >
> >      These mechanisms are implemented solely in the 
> network.  Examples
> >      include:
> >
> >      *  Prioritization, slowdown, or even blocking of 
> traffic based on
> >         packet header information.  Relatively complicated designs  
> > that
> >         peek further into the packet, Deep Packet Inspection (DPI)  
> > have
> >         also been deployed.  Priorities can also be set 
> based on user
> >         accounting information, e.g., traffic shaping heavy users
> >         during a rush hour.
> >
> >      *  Changing the "scheduling algorithm", by attempting 
> to complete
> >         the short jobs first everyone's performance will improve.
> >         Similar techniques as discussed above are needed to 
> determine
> >         which jobs are "short" and "long", however.
> >
> >      *  Building caches and peer-to-peer network components in the
> >         service provider network.
> >
> >
> > 3.  Incentives
> >
> >   This section discusses motives, deployment considerations, and how
> >   information available to the different parties affects the
> >   incentives.
> >
> > 3.1.  Motives
> >
> >   For any solution to be adopted the involved parties have to have
> >   compatible motives.  This is not always trivial, because 
> the parties
> >   may either optimize for different goals, or because there 
> is room  
> > for
> >   malicious behaviour.
> >
> >   For instance, one type of a quality-of-service solution involves
> >   voluntary marking of packets by applications and subsequent
> >   differentiated treatment of these packets by the network.  In this
> >   case the motives of well-behaving users and service providers are
> >   similar: both want interactive applications to be given more
> >   priority, while allowing always-on batch applications to 
> run in the
> >   background, and take as much bandwidth as is available.  
> However, if
> >   the prioritization happens across multiple users, this 
> also implies
> >   that a lower priority marking has the potential to reduce 
> the user's
> >   share of the overall throughput.  Clever users can distort the  
> > system
> >   by claiming to run only interactive applications.  A 
> tragedy of the
> >   commons follows: The optimal strategy from the point of 
> view of the
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 4]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >   entire group of users would be to correctly classify traffic.  But
> >   from the point of an individual user a better strategy would be to
> >   lie.
> >
> >   Note that no misbehaviour is needed from a human user for this to
> >   happen.  It is enough that the user runs applications 
> that do this.
> >   And if such applications appear to produce better results 
> than other
> >   applications, the user has an incentive to use them.  Having said
> >   this, past experience tells us that a vast majority of networking
> >   software plays by the rules.  Attempts to improve or bypass TCP
> >   congestion control are relatively rare, for instance.
> >
> >   An example where the motives themselves may be conflict is the co-
> >   operation between P2P applications and service providers to  
> > determine
> >   the "best" peers to connect to.  The definition of "best" from the
> >   P2P client perspective is a peer that has the highest possible  
> > actual
> >   transfer rate.  But the service provider is more interested in
> >   minimization of their costs and overall network 
> congestion.  This  
> > may
> >   or may not coincide with the client's desires.  For instance, a
> >   service provider may prefer a local peer with a slow access link  
> > over
> >   a remote peer that is connected via an expensive transit 
> connection.
> >
> >   While not part of the incentives, the available information to the
> >   different parties plays an interesting role as well.  It can be
> >   expected that P2P nodes are capable of measuring actual transfer
> >   rates across the end-to-end path, including the behaviour 
> of the end
> >   systems.  P2P applications might even be able to accumulate this
> >   information from multiple clients and over time.  In contrast, the
> >   service provider network at its basic form would be limited to
> >   understanding the topology and link speeds.  More advanced service
> >   provider networks may be capable of traffic-engineering 
> and tracking
> >   congestion in different parts of their network.  However, they are
> >   fundamentally incapable of measuring end systems or end-to-end
> >   behaviour in paths that cross multiple networks.
> >
> >   As a result of the motive conflict and lack of information, any
> >   "oracle" style design [RIPE.feldmann] needs to play a 
> fairly limited
> >   role in supplying additional information to the P2P applications.
> >   Information from the service provider network can help make an
> >   initial guess or to narrow the search for the best peer.  But it
> >   cannot replace or govern the overall decision that the P2P
> >   application needs to make on its own.
> >
> >   Having basic support for peer selection in the P2P 
> applications also
> >   allows the service providers to focus on improvements in their own
> >   network, as opposed to attempting to build tools that try to guide
> >   selection of peers across multiple networks.  As long as 
> the oracle
> >   focuses on increasing the number of peers within the service
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 5]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >   provider's network, the algorithms in P2P applications 
> can take care
> >   of optimizing the connectivity to peers in other networks.
> >
> > 3.2.  Deployment Considerations
> >
> >   Another important consideration is what needs to change 
> in order for
> >   a particular solution to be deployed.  Some solutions can be  
> > deployed
> >   unilaterally, some require coordinated action.  The 
> coordination may
> >   act as a disincentive to build support for a particular solution.
> >   For instance, P2P application developers do not invest time in
> >   building support for contacting an oracle in the service provider
> >   network until it becomes likely that such oracles can 
> actually used
> >   in some fraction of networks; the limited development 
> resources are
> >   better invested in actions that the developers are in 
> full control  
> > of
> >   -- for instance in improved peer selection algorithms that do not
> >   depend on new infrastructure nodes.  Similarly, service 
> providers do
> >   not invest in an oracle until there is software that actually uses
> >   it.
> >
> >   This problem affects the following types of solutions:
> >
> >   o  Quality of service marking in the host and priority 
> treatment in
> >      the network.
> >
> >   o  Network-assisted P2P peer selection.
> >
> >   o  Network-assisted congestion control mechanisms.
> >
> > 3.3.  Availability of Information
> >
> >   Section 3.1 discussed how available information affects 
> the way best
> >   peer selection can be made to work.  But there are other 
> aspects of
> >   information availability as well.  Specifically, when 
> networks have
> >   unilaterally implemented mechanisms that do not align with the
> >   motives of P2P applications, the applications have employed
> >   information hiding in order to prevent the network from 
> making non-
> >   desireable prioritization decisions for them.  Eric Rescorla makes
> >   the argument that ultimately P2P traffic can be secured 
> and made to
> >   resemble other types of traffic, such as VPN traffic.  
> This makes it
> >   very hard for the network to de-prioritize or modify P2P traffic
> >   [P2PI.rescorla].  It is interesting that many of the solutions in
> >   this workshop attempt to increase the amount of information  
> > available
> >   to the parties, while in reality the converse seems to happen.
> >
> >   We would like to suggest that this trend can only be 
> reversed if the
> >   motives becomes more aligned between the players.  That is, no P2P
> >   application will participate in a system designed to restrict P2P
> >   traffic.  But they may participate in systems that attempt to
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 6]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >   optimize P2P traffic.
> >
> >
> > 4.  Conclusions
> >
> >   The right incentives are a key to the successful 
> standardization and
> >   deployment of any solution in this space.  Based on our 
> analysis, we
> >   would like to suggest that the following avenues for IETF
> >   documentation and standards be looked at:
> >
> >   o  Improved and/or standardized peer selection 
> algorithms.  These  
> > can
> >      be deployed unilaterally by application developers.
> >
> >   o  Co-operative designs where service provider networks supply
> >      additional information that helps the P2P applications 
> to make a
> >      better initial selection of peers.  This should only 
> be done as a
> >      sub-item to the above one; service provider networks 
> do not have
> >      sufficient information or incentives to make the full decision,
> >      and attempting to do so would dissuade the P2P 
> applications from
> >      using such a system.
> >
> >   o  Improved and/or standardized congestion control mechanisms
> >      suitable for P2P and other "always-on" applications.  Again,  
> > these
> >      can be deployed unilaterally, and IETF can help ensure they
> >      algorithms are safe for other traffic in the Internet. 
>  Note the
> >      difference to quality of service mechanisms that typically  
> > require
> >      deployment at both ends; the quality of service 
> mechanisms would
> >      in many ways be the right solution for this problem, but it is
> >      hard to get them deployed and used due to the issues mentioned
> >      earlier in this paper.
> >
> >      Still, both the co-operative designs and congestion control
> >      mechanisms depend on the interest of the P2P application
> >      developers and users.  The primary incentive from their
> >      perspective is the desire to be nice for the user's other  
> > traffic.
> >
> >   In any case, these items are tactical, short-term 
> efforts.  There is
> >   an associated longer-term issue where the market place 
> has to learn
> >   to provide services without relying on statistical multiplexing.
> >   Ultimately, if there is demand for communication services
> >   (interactive or not) it should be met with an offering that allows
> >   providers to build the infrastructure needed to support it, and  
> > still
> >   be profitable.  Pricing models and service packaging has perhaps  
> > even
> >   more to do with this than technical solutions.
> >
> >
> >
> >
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 7]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> > Appendix A.  Acknowledgments
> >
> >   The author would like to thank Magnus Westerlund and Gonzalo
> >   Camarillo for interesting discussions in this problem space.
> >
> >
> > 5.  Informative References
> >
> >   [I-D.briscoe-tsvwg-relax-fairness]
> >              Briscoe, B., Moncaster, T., and A. Burness, "Problem
> >              Statement: We Don't Have To Do Fairness Ourselves",
> >              draft-briscoe-tsvwg-relax-fairness-00 (work in 
> progress),
> >              November 2007.
> >
> >   [P2PI.daigle]
> >              Daigle, L., "Defining Success: Questions for 
> the Future  
> > of
> >              the Internet and Bandwidth-Intensive Activities", P2PI
> >              position paper LLD-P2P-Position-May15.pdf, May 2008.
> >
> >   [P2PI.tschofenig]
> >              Tschofenig, H. and M. Matuszewski, "Dealing with P2P
> >              Traffic in an Operator Network: State of the Art", P2PI
> >              position paper p2p-state-of-the-art.pdf, May 2008.
> >
> >   [P2PI.hardie]
> >              Hardie, T., "Peer-to-peer Traffic and "Unattended
> >              Consequences", P2PI position paper hardie - 
> p2pi position
> >              paper.rtf, May 2008.
> >
> >   [P2PI.rescorla]
> >              Rescorla, E., "Notes on P2P Blocking and Evasion", P2PI
> >              position paper rescorla-p2pi.pdf, May 2008.
> >
> >   [P2PI.shalunov]
> >              Shalunov, S., "Users want P2P, we make it work", P2PI
> >              position paper BitTorrent-Position-IETF-P2P.pdf, May  
> > 2008.
> >
> >   [P2PI.moncaster]
> >              Moncaster, T., Briscoe, B., and L. Burness, "Is There a
> >              Problem with Peer-to-peer Traffic", P2PI 
> position paper  
> > Is
> >              There a Problem with Peer-to-Peer Traffic.pdf, 
> May 2008.
> >
> >   [RIPE.feldmann]
> >              Feldmann, A., "ISP-Aided Neighbor Selection in P2P
> >              Systems", RIPE presentation at RIPE-56, 
> Berlin, May 2008.
> >
> >   [I-D.briscoe-tsvwg-re-ecn-tcp]
> >              Briscoe, B., "Re-ECN: Adding Accountability for Causing
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 8]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> >              Congestion to TCP/IP", 
> draft-briscoe-tsvwg-re-ecn-tcp-04
> >              (work in progress), July 2007.
> >
> >
> > Author's Address
> >
> >   Jari Arkko
> >   Ericsson
> >   Jorvas  02420
> >   Finland
> >
> >   Email: jari.arkko@piuha.net
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > Arkko                   Expires November 28, 2008                
> > [Page 9]
> >
> > Internet-Draft             P2P and Incentives               
>     May  
> > 2008
> >
> >
> > Full Copyright Statement
> >
> >   Copyright (C) The IETF Trust (2008).
> >
> >   This document is subject to the rights, licenses and restrictions
> >   contained in BCP 78, and except as set forth therein, the authors
> >   retain all their rights.
> >
> >   This document and the information contained herein are 
> provided on  
> > an
> >   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE  
> > REPRESENTS
> >   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE 
> IETF TRUST  
> > AND
> >   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL 
> WARRANTIES, EXPRESS
> >   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY 
> THAT THE USE  
> > OF
> >   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
> >   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
> >
> >
> > Intellectual Property
> >
> >   The IETF takes no position regarding the validity or scope of any
> >   Intellectual Property Rights or other rights that might 
> be claimed  
> > to
> >   pertain to the implementation or use of the technology 
> described in
> >   this document or the extent to which any license under such rights
> >   might or might not be available; nor does it represent that it has
> >   made any independent effort to identify any such rights.   
> > Information
> >   on the procedures with respect to rights in RFC documents can be
> >   found in BCP 78 and BCP 79.
> >
> >   Copies of IPR disclosures made to the IETF Secretariat and any
> >   assurances of licenses to be made available, or the result of an
> >   attempt made to obtain a general license or permission 
> for the use  
> > of
> >   such proprietary rights by implementers or users of this
> >   specification can be obtained from the IETF on-line IPR 
> repository  
> > at
> >   http://www.ietf.org/ipr.
> >
> >   The IETF invites any interested party to bring to its 
> attention any
> >   copyrights, patents or patent applications, or other proprietary
> >   rights that may cover technology that may be required to implement
> >   this standard.  Please address the information to the IETF at
> >   ietf-ipr@ietf.org.
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > Arkko                   Expires November 28, 2008           
>    [Page  
> > 10]
> >
> 
> _______________________________________________
> p2pi mailing list
> p2pi@ietf.org
> https://www.ietf.org/mailman/listinfo/p2pi
> 
_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi