Re: [sip-overload] The frequency of re-negotiating overload control schemes

Shida Schubert <shida@ntt-at.com> Wed, 07 September 2011 00:22 UTC

Return-Path: <shida@ntt-at.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7B4C21F8D2F for <sip-overload@ietfa.amsl.com>; Tue, 6 Sep 2011 17:22:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.265
X-Spam-Level:
X-Spam-Status: No, score=-102.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SDBxuCDhrjCo for <sip-overload@ietfa.amsl.com>; Tue, 6 Sep 2011 17:21:59 -0700 (PDT)
Received: from gator465.hostgator.com (gator465.hostgator.com [69.56.174.130]) by ietfa.amsl.com (Postfix) with ESMTP id 6F69821F8DDF for <sip-overload@ietf.org>; Tue, 6 Sep 2011 17:21:58 -0700 (PDT)
Received: from [122.135.156.233] (port=57841 helo=[192.168.1.139]) by gator465.hostgator.com with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.69) (envelope-from <shida@ntt-at.com>) id 1R15va-0005Hu-0k; Tue, 06 Sep 2011 19:23:42 -0500
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: text/plain; charset=iso-8859-1
From: Shida Schubert <shida@ntt-at.com>
In-Reply-To: <4E661C01.3010803@bell-labs.com>
Date: Wed, 7 Sep 2011 09:23:40 +0900
Content-Transfer-Encoding: 7bit
Message-Id: <BECE4232-9F57-4FDF-9D3F-2D8D29484C75@ntt-at.com>
References: <4E613160.5010701@bell-labs.com> <A7854CEA-AC39-434E-82E6-C9E608B7741B@ntt-at.com> <4E661C01.3010803@bell-labs.com>
To: Vijay K. Gurbani <vkg@bell-labs.com>
X-Mailer: Apple Mail (2.1244.3)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - gator465.hostgator.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - ntt-at.com
X-BWhitelist: no
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: fl1-122-135-156-233.tky.mesh.ad.jp ([192.168.1.139]) [122.135.156.233]:57841
X-Source-Auth: shida@agnada.com
X-Email-Count: 1
X-Source-Cap: c3NoaWRhO3NzaGlkYTtnYXRvcjQ2NS5ob3N0Z2F0b3IuY29t
Cc: "sip-overload@ietf.org" <sip-overload@ietf.org>
Subject: Re: [sip-overload] The frequency of re-negotiating overload control schemes
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Sep 2011 00:22:00 -0000

Hi Vijay;

 My comments inline..

On Sep 6, 2011, at 10:11 PM, Vijay K. Gurbani wrote:

> On 09/06/2011 06:32 AM, Shida Schubert wrote:
>> 
>>  I think the general approach is fine.
> 
> Shida: Thank you for your comments.  More inline.
> 
>>  Client sends the list and server picks one is the current
>> approach, so client has no way to present preference,
>> and as far as I can tell the server has no way to change
>> the algorithm unless client initiates the re-negotiation. I
>> don't have any problem with that as we want to keep it
>> as simple as possible  but I thought I would share my
>> observation.
>> *As far as I can read from the text, there was no text
>>  saying that server can include "oc-algo" with list of
>>  algorithm it supports in a response to negotiate the
>>  algorithm with the client.
> 
> Right; the server simply gets to choose one from the list
> provided by the client.
> 
>>  - If we want to allow client to show preference, we can
>>    say that the list is composed in a order that it prefers.
>>    Whether server honor that or not is a different story.
> 
> That is fine with me, and more preferable than adding additional
> parameters showing preference (a q-value).
> 
>>  It's also not clear to me the expected normative behavior
>> surrounding "oc-algo", I am assuming that  "oc-algo" only
>> shows up when negotiating but it is currently not clear. So
>> we should probably be clear with when "oc-algo" shows
>> up so client/server both know when to set it and what it means.
>> 
>>  Below are my interpretation.
>> 
>>     Client sets "oc-algo" in request only when it wants to
>>     negotiate the algorithm to be used.
> 
> I agree this part is unclear.  Here is my view, and if you
> and the list agrees, I can update the draft.
> 
> For the normal sake of fault-tolerance, robustness, and
> carrying as much state in the message itself, the
> oc-algo appears in every request, with one important difference.
> When the client first contacts the server, and thereupon every
> time the timer fires, the oc-algo list will contain all
> schemes supported by the client.  Once an algorithm has been agreed
> to, it becomes the sole value that goes into the oc-algo parameter
> until re-negotiation.  Sending it as the sole value allows for
> an backup server to continue using the same algorithm agreed
> to by its predecessor.

 Okay, fair enough. 

 I guess we should probably mandate the inclusion of "oc-algo" 
in that case. It is currently stated on 4.1 as "MAY" add an "oc-algo"..

 One can assume that not having "oc-algo" indicates that the client 
only supports or wants to use the default "loss" based algorithm but 
if that is the case we should probably have a statement saying that 
too. 

 I prefer mandating the inclusion of "oc-algo" so it is always clear 
what the client/server means/wants. 

> 
>>     Server knows that the negotiation is requested
>>     due to the fact that "oc-algo" is present in the via.
>>     It selects the algorithm and sends that in the response.
> 
> Yes, the above works in both cases.  That is, when there is a list
> of algorithms and when one has been chosen and the client/server
> pair is in between the timer for the next negotiation going off.
> In the latter case, the server does not have too much latitude at
> choosing, but the former case (list of algorithms), the server
> can choose afresh.
> 
>>     No "oc-algo" shows up until the next negotiation phase.
>> 
>>  Should we say anything about when timer runs out?
> 
> I believe this is present in Section 5.7:
> 
>   Once the client and server agree on an overload control
>   algorithm, it MUST remain in effect for at least 3600 seconds
>   (1 hour) before renegotiation occurs.
> 
>>  Should we have a text mandating that if the timer runs out,
>> client negotiates the algorithm on the next request it sends
>> to the server??
> 
> I believe it is already there in Section 5.7:
> 
>   Renegotiation, when desired, is simply accomplished by the
>   SIP client sending a complete list of overload control
>   algorithms it supports in a "oc-algo" parameter in a
>   request going downstream.  The downstream server, as before, MUST
>   choose one algorithm from the list and MUST pare the list down to
>   include the one chosen algorithm.  The pared down list consisting of
>   the chosen algorithm MUST be returned to the upstream SIP client in
>   the response and stays in effect until the next renegotiation.

 I must have misread it, it looks good. 

 Regards
  Shida

> 
> If the last two points you make are not clear in Section 5.7, please
> let me know and I can see if I can highlight these in some fashion.
> 
> Thanks,
> 
> - vijay
> -- 
> Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
> 1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60566 (USA)
> Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
> Web:   http://ect.bell-labs.com/who/vkg/