[multipathtcp] [tcpm] FW: New Version Notification for draft-kang-tcpm-fault-management-in-mptcp-session-00.txt

Kangjiao <kangjiao@huawei.com> Mon, 10 August 2020 09:37 UTC

Return-Path: <kangjiao@huawei.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D48CC3A149B; Mon, 10 Aug 2020 02:37:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tP830_Qlzss8; Mon, 10 Aug 2020 02:37:24 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 901973A147B; Mon, 10 Aug 2020 02:37:19 -0700 (PDT)
Received: from lhreml718-chm.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id A7D68CE4F510C173C1ED; Mon, 10 Aug 2020 10:37:17 +0100 (IST)
Received: from lhreml718-chm.china.huawei.com (10.201.108.69) by lhreml718-chm.china.huawei.com (10.201.108.69) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 10 Aug 2020 10:37:17 +0100
Received: from DGGEMM402-HUB.china.huawei.com (10.3.20.210) by lhreml718-chm.china.huawei.com (10.201.108.69) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1913.5 via Frontend Transport; Mon, 10 Aug 2020 10:37:17 +0100
Received: from DGGEMM514-MBX.china.huawei.com ([169.254.2.74]) by DGGEMM402-HUB.china.huawei.com ([10.3.20.210]) with mapi id 14.03.0487.000; Mon, 10 Aug 2020 17:37:06 +0800
From: Kangjiao <kangjiao@huawei.com>
To: "tcpm@ietf.org Extensions" <tcpm@ietf.org>
CC: "multipathtcp@ietf.org" <multipathtcp@ietf.org>, Liangqiandeng <liangqiandeng@huawei.com>
Thread-Topic: [tcpm] FW: New Version Notification for draft-kang-tcpm-fault-management-in-mptcp-session-00.txt
Thread-Index: AdZu+SKFoFRKtFs3Qja+TbLin4ztww==
Date: Mon, 10 Aug 2020 09:37:06 +0000
Message-ID: <719A2C1D4AC73847B6E1BF21DF1545EAE5CC0FD4@dggemm514-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.67.102.89]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/hMAJaUc3awK0vnd8JsXeMCrCRV0>
Subject: [multipathtcp] [tcpm] FW: New Version Notification for draft-kang-tcpm-fault-management-in-mptcp-session-00.txt
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Aug 2020 09:37:33 -0000

Dear all,

We uploaded a draft to propose a solution to convey subflow failure information between client and server during a MPTCP session . It is different from MP_TCPRST because it is applied in the case of abnormal termination of one ongoing subflow. 

Your suggestion and comments are welcome. 

Thanks
Jiao

-----Original Message-----
From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org] 
Sent: Monday, August 10, 2020 2:13 PM
To: Kangjiao <kangjiao@huawei.com>; Liangqiandeng <liangqiandeng@huawei.com>; Liangqiandeng <liangqiandeng@huawei.com>
Subject: New Version Notification for draft-kang-tcpm-fault-management-in-mptcp-session-00.txt


A new version of I-D, draft-kang-tcpm-fault-management-in-mptcp-session-00.txt
has been successfully submitted by Jiao Kang and posted to the IETF repository.

Name:		draft-kang-tcpm-fault-management-in-mptcp-session
Revision:	00
Title:		Fault Management Mechanism in MPTCP Session
Document date:	2020-08-09
Group:		Individual Submission
Pages:		6
URL:            https://www.ietf.org/internet-drafts/draft-kang-tcpm-fault-management-in-mptcp-session-00.txt
Status:         https://datatracker.ietf.org/doc/draft-kang-tcpm-fault-management-in-mptcp-session/
Htmlized:       https://tools.ietf.org/html/draft-kang-tcpm-fault-management-in-mptcp-session-00
Htmlized:       https://datatracker.ietf.org/doc/html/draft-kang-tcpm-fault-management-in-mptcp-session


Abstract:
   This document presents a mechanism for fault management during a
   MPTCP session.  It is used to convey subflow failure information from
   client to server by other subflow running normally.  It includes: 1)
   a new Fault Announce Option for describing subflow failure, 2)
   implementation and interoperability of this option during a MPTCP
   session when one subflow suffers a failure.  In fact, the server is
   able to determine network problems accurately based on these fault
   information reported from multiple clients for their connections.

                                                                                  


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat