Re: [dispatch] draft-shen-soc-avalanche-restart-overload

Charles Shen <charles@cs.columbia.edu> Tue, 11 February 2014 02:36 UTC

Return-Path: <charles.newyork@gmail.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E32E1A074A for <dispatch@ietfa.amsl.com>; Mon, 10 Feb 2014 18:36:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level:
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1HPts2wCqYUW for <dispatch@ietfa.amsl.com>; Mon, 10 Feb 2014 18:36:15 -0800 (PST)
Received: from mail-ob0-x233.google.com (mail-ob0-x233.google.com [IPv6:2607:f8b0:4003:c01::233]) by ietfa.amsl.com (Postfix) with ESMTP id 960821A073E for <dispatch@ietf.org>; Mon, 10 Feb 2014 18:36:15 -0800 (PST)
Received: by mail-ob0-f179.google.com with SMTP id wo20so8215082obc.38 for <dispatch@ietf.org>; Mon, 10 Feb 2014 18:36:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:from:date:message-id:subject:to:cc:content-type; bh=ZmtHwq4TPdc5TqAWWshwXIbsTjZHaZ9cWPpWZRCJcxY=; b=gjn6DiOXQDY0s+qOI9D8ldskFGAs8OEfe+brGEC7X/IP14FzA9GjCvetNgg7BSgYxc twGr58f0esRpaAfYiNa8EMD18NO17fTqnQTYJW8wG6rhsmU5rbsz/DPfysUc3cAjX/mB /41ZhDvkYxmDTP5MP7A2x0nZo6zQSjvI0h6ePmCaHJP8oxXCRS4ydw6xvOzWibq2V6A2 zBwiq6elT7HPz5lMu6wbXju593Me1cHljaLEZEJtX2O90e+FieVK3coMX7maCDyDZIdJ dB0fecYOKnOK8ojmPQkIp2/q/6oNRQm/4fDJbwVMKqQnH0c5BQxoM54DYg/nJ8V4yPYw Cp5Q==
X-Received: by 10.60.45.206 with SMTP id p14mr29949729oem.21.1392086175030; Mon, 10 Feb 2014 18:36:15 -0800 (PST)
MIME-Version: 1.0
Sender: charles.newyork@gmail.com
Received: by 10.182.55.106 with HTTP; Mon, 10 Feb 2014 18:35:54 -0800 (PST)
From: Charles Shen <charles@cs.columbia.edu>
Date: Mon, 10 Feb 2014 21:35:54 -0500
X-Google-Sender-Auth: _y-TysXcTJFWxx6RP-uWMSykvXA
Message-ID: <CAPSQ9ZWxwomvKJBKbSTpO8B83wis=7+oqkfZYE7cg3RQ7wcf3g@mail.gmail.com>
To: dispatch@ietf.org
Content-Type: multipart/alternative; boundary="001a11c2019af5a24804f218510c"
Subject: Re: [dispatch] draft-shen-soc-avalanche-restart-overload
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2014 02:36:17 -0000

Dear all:

As advised by Richard Barnes, I am writing to seek opinion from you about
this draft:

http://datatracker.ietf.org/doc/draft-shen-soc-avalanche-restart-overload/
A Mechanism for Session Initiation Protocol (SIP) Avalanche Restart
Overload Control

Abstract:
   When a large number of clients register with a SIP registrar server
   at approximately the same time, the server may become overloaded.
   Near-simultaneous floods of SIP SUBSCRIBE and PUBLISH requests may
   have similar effects.  Such request avalanches can occur, for
   example, after a power failure and recovery in a metropolitan area.
   This document describes how to avoid such overload situations.  Under
   this mechanism, a server estimates an avalanche restart backoff
   interval during its normal operation and conveys this interval to its
   clients through a new Restart-Timer header in normal response
   messages.  Once an avalanche restart actually occurs, the clients
   perform backoff based on the previously received Restart-Timer header
   value before sending out the first request attempt.  Thus, the
   mechanism spreads all the initial client requests and prevents them
   from overloading the server.

The draft has been presented and discussed in IETF meetings since 2010, and
generated interest among the community:

https://encrypted.google.com/search?as_q=draft-shen-soc-avalanche-restart-overload&as_sitesearch=www.ietf.org%2Fmail-archive%2Fweb%2F

I am looking for your kind opinion on what should be the appropriate next
step for this document:

-- Should this draft be dispatched to SOC (and their charter amended)?
-- Should this draft be processed as AD-sponsored?
-- Should this draft be killed (if it is harmful)?

Thank you very much.

Charles