Re: [sip-overload] draft-ietf-soc-overload-control-07 section 6.3 algorithm

"Vijay K. Gurbani" <vkg@bell-labs.com> Thu, 08 March 2012 19:25 UTC

Return-Path: <vkg@bell-labs.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2847B21E801B for <sip-overload@ietfa.amsl.com>; Thu, 8 Mar 2012 11:25:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.952
X-Spam-Level:
X-Spam-Status: No, score=-106.952 tagged_above=-999 required=5 tests=[AWL=-0.353, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rcj0Cves-pkV for <sip-overload@ietfa.amsl.com>; Thu, 8 Mar 2012 11:25:39 -0800 (PST)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by ietfa.amsl.com (Postfix) with ESMTP id 676C521E8018 for <sip-overload@ietf.org>; Thu, 8 Mar 2012 11:25:39 -0800 (PST)
Received: from usnavsmail3.ndc.alcatel-lucent.com (usnavsmail3.ndc.alcatel-lucent.com [135.3.39.11]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id q28JPYsg016942 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 8 Mar 2012 13:25:34 -0600 (CST)
Received: from umail.lucent.com (umail-ce2.ndc.lucent.com [135.3.40.63]) by usnavsmail3.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id q28JPYii016207 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 8 Mar 2012 13:25:34 -0600
Received: from shoonya.ih.lucent.com (shoonya-135185238235.ih.lucent.com [135.185.238.235]) by umail.lucent.com (8.13.8/TPES) with ESMTP id q28JPXSw003678; Thu, 8 Mar 2012 13:25:34 -0600 (CST)
Message-ID: <4F5908C1.8060709@bell-labs.com>
Date: Thu, 08 Mar 2012 13:30:09 -0600
From: "Vijay K. Gurbani" <vkg@bell-labs.com>
Organization: Bell Laboratories, Alcatel-Lucent
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:10.0.1) Gecko/20120209 Thunderbird/10.0.1
MIME-Version: 1.0
To: Adam Roach <adam@nostrum.com>
References: <D05CF57C-B7B8-4187-BF55-70426DB3762D@estacado.net> <4F57B393.3020702@nostrum.com> <4F58F595.9070107@bell-labs.com> <4F58FACB.2020602@nostrum.com> <4F5902D9.1080006@bell-labs.com> <4F5904A0.5090709@nostrum.com>
In-Reply-To: <4F5904A0.5090709@nostrum.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.11
Cc: sip-overload@ietf.org
Subject: Re: [sip-overload] draft-ietf-soc-overload-control-07 section 6.3 algorithm
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Mar 2012 19:25:40 -0000

On 03/08/2012 01:12 PM, Adam Roach wrote:
> Because responses that you're *sending* will *not* contain overload
> information that you need to extract. In fact, you'll need to take
> action to *put* overload information in them.

Well ... if you are *sending* a response, you're acting as a proxy
and in fact, will take out oc parameters from a response going upstream.

> Responses that you're *receiving* will potentially contain overload
> information that you need to extract and store.

Right.

> Similarly, requests that you're about to *send* are subject to the
> overload state of their next hop host, and might be dropped accordingly.

Right.

> Requests that you've just *received* aren't (although they might be
> subject to local rejection, per the behavior in 5.10.2).

Right.

> Critically, there are four different behaviors that need to be detailed:
> inbound request, outbound request, inbound response, and outbound
> response. The algorithm in the draft (and the revised one that you
> proposed) seem to mash these all together into two cases (request and
> response), which are then slightly or radically wrong, depending on
> whether they're applied to inbound or outbound messages.

So assume that you are a proxy (the most general of the entities doing
overload control).  And also assume that when you execute

while (true)  {
    sip_msg := get_sip_msg() ... }

that if this is a request, it has been picked up from the network and
put on your processing queue.  If it is a response, then it has been
picked up from the network and put on your processing queue.  From your
viewpoint, requests are now destined downstream subject to overload
control.  Similarly, responses are to be processed to extract overload
control information and proxied upstream.

With this context, see if things make more sense.

- vijay
-- 
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)
Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
Web:   http://ect.bell-labs.com/who/vkg/