Re: [Dime] OVLI: comments to 4.6

Jouni <jouni.nospam@gmail.com> Fri, 06 December 2013 12:32 UTC

Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFC941ADF32 for <dime@ietfa.amsl.com>; Fri, 6 Dec 2013 04:32:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RnSmXYhp4tG9 for <dime@ietfa.amsl.com>; Fri, 6 Dec 2013 04:32:52 -0800 (PST)
Received: from mail-bk0-x236.google.com (mail-bk0-x236.google.com [IPv6:2a00:1450:4008:c01::236]) by ietfa.amsl.com (Postfix) with ESMTP id 232211ADF5E for <dime@ietf.org>; Fri, 6 Dec 2013 04:32:51 -0800 (PST)
Received: by mail-bk0-f54.google.com with SMTP id v16so273438bkz.13 for <dime@ietf.org>; Fri, 06 Dec 2013 04:32:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=Y7CzVXzr5d3tMR1HbQ0n+X9IIraIzBy1EaxdgYrUCu4=; b=LZ/G4UBHRZHYcCd+9e3KLAXR56P0zsryoTpiRrl6PE0cZKuwS7nlA0Sko0GlpH0+5l 2EuYCSt12VE9UPIVwZgW8PL0HbBtfYBK2pZ58Nq2CKmGc5J4ZxXYDRwzWnHb3RR82DSg R1IeQZxs4QMF8zSyraqoQPXFqww/baEweymNJ6EP8E4hgSEK583Gv+GubKuFnYldHRA7 tZ6c9dS7AcZ3YvDP4lbXtVoZQ3A2XFJy7HmhjNvU1inV9Sz7d6D/DF958mLnRfq2JJVi sxj7PDCZDO0N4vZba/3Fm9l2Z+cj+j3VFmz9VDALDyEpL9UA7q9j9osuwlEsnEPS+BgL YeOQ==
X-Received: by 10.204.102.72 with SMTP id f8mr1076552bko.44.1386333167762; Fri, 06 Dec 2013 04:32:47 -0800 (PST)
Received: from ?IPv6:2001:1bc8:101:f101:f93e:4c8d:dae9:6a68? ([2001:1bc8:101:f101:f93e:4c8d:dae9:6a68]) by mx.google.com with ESMTPSA id qe6sm87922273bkb.5.2013.12.06.04.32.43 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 06 Dec 2013 04:32:43 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1283)
Content-Type: text/plain; charset="iso-8859-1"
From: Jouni <jouni.nospam@gmail.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D90006681519DCBC@DEMUMBX014.nsn-intra.net>
Date: Fri, 06 Dec 2013 14:32:42 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <6950EE6B-689E-47A1-88AA-1A67C47BC82E@gmail.com>
References: <5BCBA1FC2B7F0B4C9D935572D90006681519DCBC@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1283)
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] OVLI: comments to 4.6
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Dec 2013 12:32:55 -0000

On Dec 6, 2013, at 2:10 PM, Wiehe, Ulrich (NSN - DE/Munich) wrote:

> Dear all,
>  
> here are comments to clause 4.6:
>  
> It has already been proposed to change the type of the OC-Report-Type AVP from Enumerated to Unsinged64 in order to avoid potential extensibility problems.  

I do not see how changing the type to unsigned would help with the extensibility on
an assumption we create an IANA maintained registry for it. Unsigned64 will have
exactly the same issues as enumerated unless we define report type semantics to
something like what we have on OC-Feature AVP. How the receiver of the report type
reacts when it sees a flag bit that is does not understand? If the content and
handling  of the OC-OLR somehow depends on the unknown flag bit, the receiver has
no other choice than drop the OLR, since it cannot be sure how to handle the report
as a whole.

The only ways around I see here are:
a) you can extend report types when defining new applications
b) or when both ends have a mutually supported & advertised feature that maps
   to a report type (that has been defined after the publication of this 
   spec)

Other than those, IMHO, are just repackaging the issue into different form.


- Jouni

> In addition to that, I think that the purpose of the Report-Type is to let the reacting node know to which (future) request commands the overload treatment should apply:
> 
> For a host report-type the overload treatment should apply to all request commands for which
> a) The request command's Application-ID matches the Application-Id of the OC-Report-Type AVP's encapsulating answer command and
> b) The request command's Destination-Host is present and 
> c) The request command's Destination-Host matches the Origin-Host of the OC-Report-Type AVP's encapsulating answer command
> 
> For a realm report-type the overload treatment should apply to all request commands for which
> a) <see a) above> and
> d) The request command's Destination-Host is absent and 
> e) The request command's Destination Realm matches the Origin-Realm of the OC-Report-Type AVP's encapsulating answer command.
> 
> The proposal now is to assign individual bits of the Unsinged64 type to a), b), c), d), and e):
> 
> Proposed text:
>   4.6 OC-Report-Type AVP
> 
>   The OC-Report-Type AVP (AVP code TBD5) is type of Unsigned64 and contains a 64 bit flags field of a request
>   command's characteristics.
> 
>   The following characteristics are defined in this document:
> 
>   APPLICATION_ID_MATCH (0x0000000000000001)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   to those request commands with an Application-ID that matches the Application-Id of the OC-Report-Type AVP's
>   encapsulating answer command.
> 
>   DESTINATION_HOST_PRESENT (0x0000000000000002)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   to those request commands containing a Destination-Host AVP.
> 
>   DESTINATION_HOST_MATCH (0x0000000000000004)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   To those request commands with an Destination-Host AVP that matches the Origin-Host of the OC-Report-Type AVP's
>   encapsulating answer command.
> 
>   DESTINATION_HOST_ABSENT (0x0000000000000008)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   to those request commands not containing a Destination-Host AVP.
> 
>   DESTINATION_REALM_MATCH (0x0000000000000010)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   to those request commands with an Destination-Host AVP that matches the Origin-Host of the OC-Report-Type AVP's
>   encapsulating answer command.
> 
>   Combinations other than 
>   1) APPLICATION_ID_MATCH and DESTINATION_HOST_PRESENT and DESTINATION_HOST_MATCH
>   and
>   2) APPLICATION_ID_MATCH and DESTINATION_HOST_ABSENT and DESTINATION_REALM_MATCH
>   require a mutually agreed extension.
> 
> 
> 
> 
> One extension required by 3GPP applications is the Overload Mitigation Differentiation per client (see 3GPP TR 29.809 clause 6.4.7. To address this, a new value would be needed e.g.
> 
>   ORIGIN_HOST_MATCH (0x0000000000000020)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   to those request commands with an Origin-Host AVP that matches the Destination-Host of the OC-Report-Type AVP's
>   encapsulating answer command.
> 
> With this extension the following additional combinations would be allowed:
> 3) APPLICATION_ID_MATCH and DESTINATION_HOST_PRESENT and DESTINATION_HOST_MATCH and ORIGIN_HOST_MATCH
> and
> 4) APPLICATION_ID_MATCH and DESTINATION_HOST_ABSENT and DESTINATION_REALM_MATCH and ORIGIN_HOST_MATCH
> 
> Another potential extension is Diameter Agent Overload. To address this, a new value would be needed e.g.
> 
>   NEXT_HOP_MATCH (0x0000000000000040)
> 
>   When this flag is set by the overload reporting endpoint it means that the overload treatment should apply only
>   to those request commands sent to the same next hop the OC-Report-Type AVP's encapsulating answer command was received from.
> 
> 
> Best regards
> Ulrich
> 
> 
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime