Re: [sip-overload] WG Last Call for draft-ietf-soc-overload-control-12

"Vijay K. Gurbani" <vkg@bell-labs.com> Mon, 25 March 2013 15:58 UTC

Return-Path: <vkg@bell-labs.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D01721F8FFB for <sip-overload@ietfa.amsl.com>; Mon, 25 Mar 2013 08:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level:
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qS8NShiNcfBG for <sip-overload@ietfa.amsl.com>; Mon, 25 Mar 2013 08:58:49 -0700 (PDT)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by ietfa.amsl.com (Postfix) with ESMTP id 79BEE21F9000 for <sip-overload@ietf.org>; Mon, 25 Mar 2013 08:58:46 -0700 (PDT)
Received: from usnavsmail1.ndc.alcatel-lucent.com (usnavsmail1.ndc.alcatel-lucent.com [135.3.39.9]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id r2PFwjnA017865 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <sip-overload@ietf.org>; Mon, 25 Mar 2013 10:58:45 -0500 (CDT)
Received: from umail.lucent.com (umail-ce2.ndc.lucent.com [135.3.40.63]) by usnavsmail1.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id r2PFwjhb002851 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for <sip-overload@ietf.org>; Mon, 25 Mar 2013 10:58:45 -0500
Received: from shoonya.ih.lucent.com (shoonya.ih.lucent.com [135.185.237.229]) by umail.lucent.com (8.13.8/TPES) with ESMTP id r2PFwjnb006292 for <sip-overload@ietf.org>; Mon, 25 Mar 2013 10:58:45 -0500 (CDT)
Message-ID: <515074E1.4020909@bell-labs.com>
Date: Mon, 25 Mar 2013 11:01:37 -0500
From: "Vijay K. Gurbani" <vkg@bell-labs.com>
Organization: Bell Laboratories, Alcatel-Lucent
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130311 Thunderbird/17.0.4
MIME-Version: 1.0
To: sip-overload@ietf.org
References: <51110A56.7030402@ericsson.com>, <51189F14.6050405@ericsson.com> <5EBD159DE88147488A3B1590E09001840353173DCBC2@njfpsrvexg2.research.att.com>
In-Reply-To: <5EBD159DE88147488A3B1590E09001840353173DCBC2@njfpsrvexg2.research.att.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.9
Subject: Re: [sip-overload] WG Last Call for draft-ietf-soc-overload-control-12
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Mar 2013 15:58:50 -0000

On 02/17/2013 04:49 PM, NOEL, ERIC (ERIC C) wrote:
> Salvatore,
>
> I read the document and have a few comments:

Eric: Sorry for the delay; finishing up WGLC comments related to the
draft.  Please see inline.

> - Typos:
> + Section 5.4 page 12, second paragraph "... is larger than the value
>  stored value, ...." --> "... is larger than the stored value, ..."
> + Section 6.2 page 18, 7th paragraph, "20% for 1s." --> "20% for
>  0.5s" or "oc-validity=500"  --> "oc-validity=1000"

Fixed.  Thanks for a close read.

> - Questions:
> + Section 4.1 page 6, 4th paragraph, why using SHOULD and not MUST to
>  describe the client behavior upon receiving a response with the oc
>  parameters filled in. This is in contrast with section 5.5 page 12,
>  first paragraph, where a SIP client MUST honor overload control
>  values it receives from downstream neighbors.

Changed SHOULD to MUST.

> + Section 4.4 page 8, 4th paragraph, following a sequence number
>  overflow, the server must reset the oc-seq parameter. Do we incur the
>  risk of having the client ignore all server requests with the new
>  oc-seq until oc-validity expires? Or does the client need to be able
>  to identify when oc-seq was reset?

That is a good question.  I think that this an exceptional case and
probably best handled by alerting the implementer of this instead of
trying to be prescriptive using rfc-2119 language.

To that extent, I can add some explanatory text as the last paragraph
of S4.4 as follows:

    Due to an overflow, client implementations should be prepared to
    receive an "oc-seq" parameter whose value is less than the previous
    value.  Client implementations can handle this by continuing to
    perform overload control until the "oc-validity" related to the
    previous value of "oc-seq" parameter expires.

If someone has a better way to handle this case, please let me know.

> + Section 7, should there be any mention of draft-soc-overload-rate-control?

draft-soc-overload-rate-control is mentioned already as a companion
overload control scheme throughout the document.  Thus I see no specific
reason to mention it in S7.

Thanks,

- vijay
-- 
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)
Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
Web:   http://ect.bell-labs.com/who/vkg/