Re: [NSIS] AD Review comments on draft-ietf-nsis-req-07.txt
"Georgios Karagiannis" <karagian@cs.utwente.nl> Mon, 16 June 2003 16:19 UTC
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA19618 for <nsis-archive@odin.ietf.org>; Mon, 16 Jun 2003 12:19:13 -0400 (EDT)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h5GGIkS15675 for nsis-archive@odin.ietf.org; Mon, 16 Jun 2003 12:18:46 -0400
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h5GA92a21774; Mon, 16 Jun 2003 06:09:02 -0400
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h5GA8bm21754 for <nsis@optimus.ietf.org>; Mon, 16 Jun 2003 06:08:37 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA07032 for <nsis@ietf.org>; Mon, 16 Jun 2003 06:08:34 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19RqsX-00017I-00 for nsis@ietf.org; Mon, 16 Jun 2003 06:06:21 -0400
Received: from utrhcs.cs.utwente.nl ([130.89.10.247]) by ietf-mx with esmtp (Exim 4.12) id 19RqsW-00017F-00 for nsis@ietf.org; Mon, 16 Jun 2003 06:06:20 -0400
Received: from utip105 (utip105.cs.utwente.nl [130.89.13.76]) by utrhcs.cs.utwente.nl (8.12.9/8.12.9) with SMTP id h5GA8BCf001681; Mon, 16 Jun 2003 12:08:11 +0200 (MET DST)
Message-ID: <006001c333ef$328652d0$4c0d5982@dynamic.cs.utwente.nl>
From: Georgios Karagiannis <karagian@cs.utwente.nl>
To: mankin@psg.com, brunner@ccrle.nec.de
Cc: nsis@ietf.org
References: <E19PGAC-000Gd7-00@psg.com>
Subject: Re: [NSIS] AD Review comments on draft-ietf-nsis-req-07.txt
Date: Mon, 16 Jun 2003 12:08:13 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Content-Transfer-Encoding: 7bit
Sender: nsis-admin@ietf.org
Errors-To: nsis-admin@ietf.org
X-BeenThere: nsis@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=unsubscribe>
List-Id: Next Steps in Signaling <nsis.ietf.org>
List-Post: <mailto:nsis@ietf.org>
List-Help: <mailto:nsis-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/nsis>, <mailto:nsis-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Hi Allison Regarding your comment on Section 5.7.5 about MUST implement and not a MUST use. Do you mean that the channel security between signaling entities MUST be implemented, but this does not mean that it should be used? Best Regards, Georgios ----- Original Message ----- From: "Allison Mankin" <mankin@psg.com> To: <brunner@ccrle.nec.de> Cc: <john.loughney@nokia.com>; <nsis@ietf.org>; <mankin@psg.com> Sent: Monday, June 09, 2003 8:29 AM Subject: [NSIS] AD Review comments on draft-ietf-nsis-req-07.txt > Marcus, John and WG, > > Here are my AD Review comments on the NSIS requirements. Overall > it is a good document. I have a few problems on charter, technical > or clarity points. Discussion welcome. > > Allison > > -------- > However, QoS is not the only field where signaling > is used in the Internet. Others might be the use for middlebox > communication [RFC3234]. > > It would be helpful to clarify the manner in which signaling would be > used for middlebox communication (in one sentence) - this is so terse, that > only if a reader has been in the working group would they understand the > sentence. > > Suggestion: "Signaling might also be used as a communication protocol > to set up the state in middleboxes." > > -------- > > There are several areas related to networking aspects which are > incomplete, for example, interaction with host and site multi- > homing, use of anycast services, and so on. These issues should be > considered in any future analysis work. > > Incomplete in the sense of requirements analysis? This paragraph suggests > a different kind of analysis. Also anycast in particular seems very unlikely > to be a significant element in signaling requirements analysis - it seems > like it should not be mentioned in the same sentence with a common issue > like multihoming. > > Suggestion: "This document does not cover requirements in relation to some > networking areas, in particular, interaction with host and site multihoming. > We leave these for future analysis. " > > -------- > > NSIS Initiator - needs to say, in parallel with the NSIS Responder, > it interacts with applications (Definition does not say so). > > -------- > 3. Something that terminates the signaling path, the NSIS Responder. > > The NSIS responder might be in an end-system or within other > equipment. The distinguishing feature of the NSIS Initiator is that > ^^^^^^^^^ > it responds to requests at the end of a signaling path. > > Typo? s/Initiator/Responder/ > > -------- > The host to first > router part includes all the layer 2 technologies to access to the > Internet. > > Consider a home network with a wireless router and a DSL router accessing > the Internet. The topology definition is less crisp than host to *first* > router. I suggest you add a sentence after this one: "This part of the > division is especially informal and may incorporate several access segments." > -------- > > 5.2.2 NSIS MUST support path-coupled and SHOULD NOT exclude path- > decoupled signaling. > > SHOULD NOT is very strong, given that the WG is not chartered to work on > this technology. > > The language needs to be "MAY support path-decoupled signaling." > > -------- > > 5.3.2 Automatic release of state after failure SHOULD be possible > > When the NSIS Initiator goes down, the state it requested in the > network SHOULD be released, since it will no longer be necessary. > > An important feature of RSVP was its soft-state character, in part to > ensure that critical resources in the net were not fate-shared for too long. > Given this is about release after _failure_, these SHOULDs should be MUSTs, > if not going so far as to preserve the soft-state architecture. Comments? > > -------- > > > 5.4.3 State MUST be addressed independent of flow identification > > Addressing or identifying state MUST be independent of the flow > identifier (flow end-points, topological addresses). Various > scenarios in the mobility area require this independence because > flows resulting from handoff might have changed end-points etc. but > still have the same service requirement. Also several proxy-based > signaling methods profit from such independence. > > Add to the last sentence "though these are not chartered work items for > NSIS". > > This is a tough requirement since it has to be globally unique. It may > turn out to be best met by the NI's authentication token, requiring an > early integration of authentication design into the protocol. No request > to change this, but just noting how hard this is - WG is _sure_ > the mobility requirements are really so important? > > -------- > > > 5.4.1 Mutability information on parameters SHOULD be possible > > It SHOULD be possible for the NSIS initiator to control the > mutability of the signaled information. This prevents them from > being changed in a non-recoverable way. The NSIS initiator SHOULD be > able to control what is requested end to end, without the request > being gradually mutated as it passes through a sequence of domains. > This implies that in case of changes made on the parameters, the > original requested ones must still be available. > > Note that we do not require anything about particular parameters > being changed. > > Additionally, note that the provider of the particular requested > services can still influence the provisioning but in the signaling > message the request should stay the same. > > The requirement is not expressed well. Do you mean "It SHOULD be > possible to have nodes modify parameters to interact with the > signaling message, while still retaining an intact copy of the > original form of the signaling message"? > > This requirement seems like it would vary a great deal depending on what > the signaling application was, and as it is written here it is very close > to a protocol design rather than a requirement. Could you omit > it from this document? > > -------- > > One of the > reasons is that the protocol handling should have a minimal impact > on interior (core) nodes. > > Suggest adding that NSIS MAY also have a feature allowing core nodes > to ignore it (though I hope it will be more elegant than RSVP's as > document in RFC 3175 :) > > -------- > > 5.7.5 Hop-by-hop security > > Hop-by-Hop security SHOULD be supported. It is a well known and > proven concept in Quality-of-Service and other signaling protocols > that allows intermediate nodes that actively participate in the > protocol to modify the messages as it is required by processing > rules. Note that this requirement does not exclude end-to-end or > network-to-network security of a signaling message. End-to-end > security between the initiator and the responder may be used to > provide protection of non-mutable data fields. Network-to-network > security refers to the protection of messages over various hops but > not in an end-to-end manner i.e. protected over a particular network. > > Without minimum mandatory to implement channel security for the signaling, > you can't be sure the other security features will be untampered with - > this needs to be a MUST implement (it's not a MUST use). Suggest changing > the first sentence to "Channel security between signaling entities > MUST be implemented'? > > -------- > > > 5.9.5 SHOULD interwork with seamless handoff protocols > > 5.9.6 MAY interwork with non-traditional routing > > NSIS assumes L3 routing, but networks, which do non-traditional > routing, should not break it. > > NSIS should not be complex and interworked in ways that make it less modular. > Both of these requirements are complications. The first one, because it poses > a certain environment and particular protocols, would make NSIS less modular. > It is probably improved by changing SHOULD to MAY. The second one may sound > worse than it is - does it mean NATs? Suggest this might have meant: > > 5.9.6. MAY operate in varied routing environments > > NSIS assumes L3 routing, but it MAY be designed to operate in > varied routing environments, such as those with L4 switches and NATs. > > But if not, do explain... > -------- > > Scenarios - > > 's' as an abbreviation is not explained. > > -------- > 10.2 > > The 3G Scenario is somewhat too specific to 3GPP and 3GPP2 still - IMS is > mentioned without being expanded or explained. All the terms are specific. > Try to make it a bit more abstract - say it is an All-IP multimedia system. > > -------- > This part of the wireless network has different > characteristics when compared to traditional IP networks: > > 1. The network supports a high proportion of real-time > traffic. The majority of the traffic transported in the > wired part of the wireless network is speech, which is > very sensitive to delays and delay variation (jitter). > > Two things about IP networks - they carry whatever they carry, so > it's not out of tradition to be a voice IP network. Second, speech in > Internet phones is quite a lot less sensitive to delays and jitter than > often thought, due to the many good engineering designs in playout and > speech cover that are known. So this material places a context of more > difference on the environment than most general transport experts view > as necessary, seeing more continuum, while not disagreeing that signaling > and resource reservation are valuable. > > So drop sentence 1, but leave the rest alone (I just wanted to make my point :) > > -------- > > > 10.10 Application request end-to-end QoS path from the network > > This is actually the easiest case, nevertheless might be most often > used in terms of number of users. > > Few believe that ordinary applications signaling for QoS is an easy matter for > the network - RFCs 2961, 2996 and 3175 are all about mitigating the unscalability > of edge signaling. Probably this would go better if you substitute the term > "conceptually simplest" for "easiest" and note that there are these issues with > scaling. > > > Additionally, we assume no mobility and standard devices. > > Note: the end system application and NSIS do not know about the > distinction between 10.10 and the other scenarios :), unless NSIS is not > a modular Internet protocol. > > -------- > > QoS for Virtual Private Networks - section needs a number > > IP-Sec -> IPSec > > The discussion of NSIS in VPNs ignores the whole world of the PPVPN WG. > Cite draft-ietf-ppvpn-framework-08.txt early on in the section (it is in the > RFC-Editor Queue). > > > > Allison > > > _______________________________________________ > nsis mailing list > nsis@ietf.org > https://www1.ietf.org/mailman/listinfo/nsis > _______________________________________________ nsis mailing list nsis@ietf.org https://www1.ietf.org/mailman/listinfo/nsis
- [NSIS] AD Review comments on draft-ietf-nsis-req-… Allison Mankin
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Scott Bradner
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… Avella, Alejandro
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Henning Schulzrinne
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… Hancock, Robert
- [NSIS] RE: AD Review comments on draft-ietf-nsis-… john.loughney
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… john.loughney
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… john.loughney
- RE: [NSIS] RE: AD Review comments on draft-ietf-n… Tschofenig Hannes
- [NSIS] AD Review comments on draft-ietf-nsis-req-… Michael Thomas
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Marcus Brunner
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… john.loughney
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… Hancock, Robert
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… Geib, Ruediger
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Georgios Karagiannis
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… Attila Bader (ETH)
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Melinda Shore
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… john.loughney
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Georgios Karagiannis
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Georgios Karagiannis
- Re: [NSIS] AD Review comments on draft-ietf-nsis-… Melinda Shore
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… john.loughney
- RE: [NSIS] AD Review comments on draft-ietf-nsis-… john.loughney