Re: [Dime] [dime] #65 (draft-ietf-dime-ovli): Definition of messages impacted by host overload report

Steve Donovan <srdonovan@usdonovans.com> Mon, 28 April 2014 18:35 UTC

Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA4B81A6FAC for <dime@ietfa.amsl.com>; Mon, 28 Apr 2014 11:35:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.58
X-Spam-Level: *
X-Spam-Status: No, score=1.58 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pvAbAAUlCmqD for <dime@ietfa.amsl.com>; Mon, 28 Apr 2014 11:35:02 -0700 (PDT)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) by ietfa.amsl.com (Postfix) with ESMTP id CB34F1A04F1 for <dime@ietf.org>; Mon, 28 Apr 2014 11:35:02 -0700 (PDT)
Received: from [137.254.4.58] (port=1090 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:DHE-RSA-AES128-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1WeqMi-0007uJ-Bk for dime@ietf.org; Mon, 28 Apr 2014 11:33:21 -0700
Message-ID: <535E9F54.7010607@usdonovans.com>
Date: Mon, 28 Apr 2014 13:35:00 -0500
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.4.0
MIME-Version: 1.0
To: dime@ietf.org
References: <066.a99805710f0922547f49ff6eb5d6c0fa@trac.tools.ietf.org>
In-Reply-To: <066.a99805710f0922547f49ff6eb5d6c0fa@trac.tools.ietf.org>
Content-Type: multipart/alternative; boundary="------------010404080407080009000401"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/dqH8Q88J1a4UCKhSlKiAM43m2Cs
Subject: Re: [Dime] [dime] #65 (draft-ietf-dime-ovli): Definition of messages impacted by host overload report
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 18:35:04 -0000

All,

I am planning to update the wording per the following minor adjustment 
to Lionel's suggested wording for second paragraph of the following.

Let me know if there are any objections to closing this issue with the 
proposed wording.

       Either the Destination-Host AVP is present in the request and its value

       matches the value of the Origin-Host AVP of the received message

       that contained the OC-OLR AVP; or the Destination-Host is not present

       in the request but the value of peer identity associated with the connection

       used to send the request matches the value of the Origin-Host AVP of the

       received message that contained the OC-OLR AVP.

Regards,

Steve

On 4/23/14, 10:03 AM, dime issue tracker wrote:
> #65: Definition of messages impacted by host overload report
>
>   The current definition of a host overload needs to be enhanced.
>
>   The following is what is currently in the -02 draft:
>
>      0  A host report.  The overload treatment should apply to requests
>         for which all of the following conditions are true:
>
>         The Destination-Host AVP is present in the request and its value
>         matches the value of the Origin-Host AVP of the received message
>         that contained the OC-OLR AVP.
>
>         The value of the Destination-Realm AVP in the request matches the
>         value of the Origin-Realm AVP of the received message that
>         contained the OC-OLR AVP.
>
>         The value of the Application-ID in the Diameter Header of the
>         request matches the value of the Application-ID of the Diameter
>         Header of the received message that contained the OC-OLR AVP.
>
>
>   The second paragraph says that only requests that contain a Destination-
>   Host AVP can be used for overload treatment.
>
>   This does not address the case where there is no agent between the
>   reacting and reporting nodes.  In other words, the reacting node has a
>   direct connection to the reporting node.  In this case the reacting node
>   should include all messages that would be sent to the reporting node,
>   including those that do not contain a Destination-Host AVP and those that
>   the reacting node would sent to the reporting node through normal route
>   selection for requests that do not contain a Destination-Host AVP.
>
>   I propose that the second paragraph be changed to the following:
>
>   "The reacting node knows that the request will be routed to the overloaded
>   Diameter node identified by the Diameter ID in the OLR.  This is the value
>   of the Origin-Host AVP in the message that carried the OLR.  There are two
>   cases where the reacting node will know that the request will be routed to
>   the overloaded node.  The first is the request contains a Destination-Host
>   AVP that matches the Diameter ID contained in the OLR.  The second is when
>   the reacting node selects a route that is a direct connection to the
>   overloaded Diameter node."
>