Re: [Dime] [dime] #56: Bad Description of Overload Control State

Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com> Mon, 24 February 2014 16:23 UTC

Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CDB51A0180 for <dime@ietfa.amsl.com>; Mon, 24 Feb 2014 08:23:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 16LHQ3epvFg8 for <dime@ietfa.amsl.com>; Mon, 24 Feb 2014 08:22:56 -0800 (PST)
Received: from sesbmg20.ericsson.net (sesbmg20.ericsson.net [193.180.251.56]) by ietfa.amsl.com (Postfix) with ESMTP id E85DE1A0112 for <dime@ietf.org>; Mon, 24 Feb 2014 08:22:55 -0800 (PST)
X-AuditID: c1b4fb38-b7f418e000001099-c4-530b71de04be
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg20.ericsson.net (Symantec Mail Security) with SMTP id 02.A9.04249.ED17B035; Mon, 24 Feb 2014 17:22:54 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.28]) by ESESSHC005.ericsson.se ([153.88.183.33]) with mapi id 14.02.0387.000; Mon, 24 Feb 2014 17:22:53 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "dime@ietf.org" <dime@ietf.org>, "draft-docdt-dime-ovli@tools.ietf.org" <draft-docdt-dime-ovli@tools.ietf.org>
Thread-Topic: [dime] #56: Bad Description of Overload Control State
Thread-Index: AQHPLKXn/K5opEUqEkqiVdwfHsd6G5rEUNjAgABMwyA=
Date: Mon, 24 Feb 2014 16:22:53 +0000
Message-ID: <087A34937E64E74E848732CFF8354B9209784A7E@ESESSMB101.ericsson.se>
References: <062.3b2a6cd77559639b8e7a22c978bd41db@trac.tools.ietf.org> <5BCBA1FC2B7F0B4C9D935572D9000668151B43DE@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D9000668151B43DE@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.17]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrALMWRmVeSWpSXmKPExsUyM+Jvje69Qu5gg803NS3m9q5gs5iy4g+T A5PHkiU/mTy+XP7MFsAUxWWTkpqTWZZapG+XwJWxq62JqeCgYUXP7mVMDYxv1boYOTkkBEwk pq2ewwxhi0lcuLeeDcQWEjjCKHH3vk4XIxeQvZhRYu6PG4wgCTYBO4lLp18wdTFycIgIlEhM bdMFCQsLOEksvbyBHcQWEXCWmDZnGZRtJfH38h0wm0VAVWLuxNVMIDavgK/ExxeXmSDm9zBK vG+bA5bgFAiQeNX9CqyBEeig76fWgMWZBcQlbj2ZzwRxqIDEkj3noY4WlXj5+B8ryD0SAooS y/vlIMp1JBbs/sQGYWtLLFv4mhlir6DEyZlPWCYwis5CMnUWkpZZSFpmIWlZwMiyipGjOLU4 KTfdyGATIzAWDm75bbGD8fJfm0OM0hwsSuK8H986BwkJpCeWpGanphakFsUXleakFh9iZOLg lGpgPPfhTkbfQ0lmfZFnSak3zUX6PNQW/prsw8n29u/e+mOHZzwo3Hfi6/UKhQlfZm4Rvxr0 ha92QWfyQm6hWPWHKdVLf2mdW/jTVepVot7jpEfX6hZPqambpPhz7pbPe4zbN5yewhkrtNVI 4Xfemv95rdzXGdj7K+fMuJ+4vHxxymENS7ufm3ZE8CixFGckGmoxFxUnAgDFeKq/UwIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/vIBZOA5BOG847mEGtEhzMqLjy0c
Subject: Re: [Dime] [dime] #56: Bad Description of Overload Control State
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2014 16:23:01 -0000

Ulrich,

In your proposal you newly define overload control states per client/origin-host.
This is very related to the ongoing discussion in Issue#35. Then, at least I think we need to first conclude on that thread.

A part from that,  we need to take into account that 3GPP requirement on overload mitigation differentiation per client is a server option:
TR 29809 ch. 6.4.7.1 states "It may be up to the server/agent implementations to decide when and whether overload mitigation differentiation per client is used".

Therefore, it could be better to keep this differentiation per client/origin-host out of chapter 5.5.1.

Best regards
/MCruz



-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Wiehe, Ulrich (NSN - DE/Munich)
Sent: lunes, 24 de febrero de 2014 12:44
To: dime@ietf.org; draft-docdt-dime-ovli@tools.ietf.org
Subject: Re: [Dime] [dime] #56: Bad Description of Overload Control State

There has been no discussion of this ticket.

I propose to replace text in claues 5.5.1 as suggested in the ticket.

Regards
Ulrich


-----Original Message-----
From: ext dime issue tracker [mailto:trac+dime@grenache.tools.ietf.org]
Sent: Tuesday, February 18, 2014 1:35 PM
To: draft-docdt-dime-ovli@tools.ietf.org; Wiehe, Ulrich (NSN - DE/Munich)
Cc: dime@ietf.org
Subject: [dime] #56: Bad Description of Overload Control State

#56: Bad Description of Overload Control State

 The description of Overload Control State in clause 5.5.1 is inaccurate,  incomplete and could be misleading. It does not differentiate between  Overload Control State in a reacting node versus Overload Control State in  a reporting node. It also does not describe how Overload Control States  are maintained.

 It is proposed to replace current text with the following:


 5.5.1.  Overload Control State (OCS)

    5.5.1.1   Overload Control States for reacting nodes

    A reacting node (client) maintains per supported Diameter application
    a host-type Overload Control State for each Destination-Host towards
    which it sends host-type requests and a realm-type Overload Control  State
    for each Destination-Realm toward which it sends realm-type requests.
    A host-type Overload Control State may be identified by the pair of
    Application-Id and Destination-Host; a realm-type Overload Control  State
    may be identified by the pair of Application-Id and Destination-Realm.
    The host-type/realm-type Overload Control State for a given pair of
    Application and Destination-Host / Destination-Realm could include the
    information as shown in table 1/table 2.

    <see attachment>

    Agents that take the role of a reacting node on behalf of clients MUST
    maintain Overload Control States per client.

    5.5.1.2   Overload Control States for reporting nodes

    A reporting node (server) maintains per supported Diameter application
    an Overload Control State for each Origin-Host from which it receives
    requests that contain an (explicit or implicit) indication of
    OLR_DEFAULT_ALGO support.

    A reporting node (agent that is configured to take the role of a
    reporting node for a given realm) maintains per supported Diameter
    application an Overload Control State for each Origin-Host from which  it
    receives realm-type requests (of that given realm) that contain an
    (explicit or implicit) indication of OLR_DEFAULT_ALGO support.

    A Overload Control State may be identified by the pair of Application-  Id
    and Origin-Host.

    The Overload Control State for a given pair of Application and Origin-
    Host could include the information as shown in table 3.
    <see attachment>

    Note: For nodes that support other features than just OLR_DEFAULT_ALGO
    the Overload Control State definitions may need to be extended.

    5.5.1.3  Maintaining Overload Control States

    Reacting nodes create a host-type OCS with OCS-Id = (x,A) when  receiving
    an answer message of application x containing an Orig-Host of A and a
    host-type OC-OLR AVP unless such host-type OCS already exists.

    Reacting nodes create a realm-type OCS with OCS-Id = (x,A) when  receiving
    an answer message of application x containing an Orig-Realm of A and a
    realm-type OC-OLR AVP unless such realm type OCS already exists.

    Reacting nodes delete an OCS when it expires (i.e. when current time
    minus reception time is greater than validity duration).

    Reacting nodes update the host-type OCS with OCS-Id = (x,A) when
    receiving an answer message of application x containing an Orig-Host of
    A and a host-type OC-OLR AVP with a sequence number higher than the
    stored sequence number.

    Reacting nodes update the realm-type OCS with OCS-Id = (x,A) when
    receiving an answer message of application x containing an Orig-Realm  of
    A and a realm-type OC-OLR AVP with a sequence number higher than the
    stored sequence number.

    Reporting nodes create an OCS with OCS-Id = (x,A) when receiving a
    request (indicating support of OLR_DEFAULT_ALGO) of application x
    containing an Orig-Host of A unless such OCS already exists.

    Reporting nodes delete an OCS when it expires.

    Reporting nodes update the OCS with OCS-Id = (x,A) when they detect the
    need to modify the requested amount of application x traffic reduction
    generated by A.

-- 
-------------------------+----------------------------------------------
-------------------------+---
 Reporter:               |      Owner:  draft-docdt-dime-
  ulrich.wiehe@nsn.com   |  ovli@tools.ietf.org
     Type:  defect       |     Status:  new
 Priority:  major        |  Milestone:
Component:  draft-       |    Version:
  docdt-dime-ovli        |   Keywords:
 Severity:  Active WG    |
  Document               |
-------------------------+----------------------------------------------
-------------------------+---

Ticket URL: <http://trac.tools.ietf.org/wg/dime/trac/ticket/56>
dime <http://tools.ietf.org/wg/dime/>

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime