Re: [sip-overload] The frequency of re-negotiating overload control schemes

"Vijay K. Gurbani" <vkg@bell-labs.com> Tue, 06 September 2011 13:07 UTC

Return-Path: <vkg@bell-labs.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CABA21F86A0 for <sip-overload@ietfa.amsl.com>; Tue, 6 Sep 2011 06:07:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.587
X-Spam-Level:
X-Spam-Status: No, score=-106.587 tagged_above=-999 required=5 tests=[AWL=0.012, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QiAMQrwJsH7A for <sip-overload@ietfa.amsl.com>; Tue, 6 Sep 2011 06:07:34 -0700 (PDT)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by ietfa.amsl.com (Postfix) with ESMTP id EC8C421F867E for <sip-overload@ietf.org>; Tue, 6 Sep 2011 06:07:33 -0700 (PDT)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id p86D9JHv019788 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 6 Sep 2011 08:09:19 -0500 (CDT)
Received: from umail.lucent.com (umail-ce2.ndc.lucent.com [135.3.40.63]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p86D9I29006752 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 6 Sep 2011 08:09:19 -0500
Received: from shoonya.ih.lucent.com (shoonya.ih.lucent.com [135.185.238.235]) by umail.lucent.com (8.13.8/TPES) with ESMTP id p86D9I8u026968; Tue, 6 Sep 2011 08:09:18 -0500 (CDT)
Message-ID: <4E661C01.3010803@bell-labs.com>
Date: Tue, 06 Sep 2011 08:11:29 -0500
From: "Vijay K. Gurbani" <vkg@bell-labs.com>
Organization: Bell Laboratories, Alcatel-Lucent
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.20) Gecko/20110817 Fedora/3.1.12-1.fc14 Lightning/1.0b2 Thunderbird/3.1.12
MIME-Version: 1.0
To: Shida Schubert <shida@ntt-at.com>
References: <4E613160.5010701@bell-labs.com> <A7854CEA-AC39-434E-82E6-C9E608B7741B@ntt-at.com>
In-Reply-To: <A7854CEA-AC39-434E-82E6-C9E608B7741B@ntt-at.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Cc: "sip-overload@ietf.org" <sip-overload@ietf.org>
Subject: Re: [sip-overload] The frequency of re-negotiating overload control schemes
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Sep 2011 13:07:38 -0000

On 09/06/2011 06:32 AM, Shida Schubert wrote:
>
>   I think the general approach is fine.

Shida: Thank you for your comments.  More inline.

>   Client sends the list and server picks one is the current
> approach, so client has no way to present preference,
> and as far as I can tell the server has no way to change
> the algorithm unless client initiates the re-negotiation. I
> don't have any problem with that as we want to keep it
> as simple as possible  but I thought I would share my
> observation.
> *As far as I can read from the text, there was no text
>   saying that server can include "oc-algo" with list of
>   algorithm it supports in a response to negotiate the
>   algorithm with the client.

Right; the server simply gets to choose one from the list
provided by the client.

>   - If we want to allow client to show preference, we can
>     say that the list is composed in a order that it prefers.
>     Whether server honor that or not is a different story.

That is fine with me, and more preferable than adding additional
parameters showing preference (a q-value).

>   It's also not clear to me the expected normative behavior
> surrounding "oc-algo", I am assuming that  "oc-algo" only
> shows up when negotiating but it is currently not clear. So
> we should probably be clear with when "oc-algo" shows
> up so client/server both know when to set it and what it means.
>
>   Below are my interpretation.
>
>      Client sets "oc-algo" in request only when it wants to
>      negotiate the algorithm to be used.

I agree this part is unclear.  Here is my view, and if you
and the list agrees, I can update the draft.

For the normal sake of fault-tolerance, robustness, and
carrying as much state in the message itself, the
oc-algo appears in every request, with one important difference.
When the client first contacts the server, and thereupon every
time the timer fires, the oc-algo list will contain all
schemes supported by the client.  Once an algorithm has been agreed
to, it becomes the sole value that goes into the oc-algo parameter
until re-negotiation.  Sending it as the sole value allows for
an backup server to continue using the same algorithm agreed
to by its predecessor.

>      Server knows that the negotiation is requested
>      due to the fact that "oc-algo" is present in the via.
>      It selects the algorithm and sends that in the response.

Yes, the above works in both cases.  That is, when there is a list
of algorithms and when one has been chosen and the client/server
pair is in between the timer for the next negotiation going off.
In the latter case, the server does not have too much latitude at
choosing, but the former case (list of algorithms), the server
can choose afresh.

>      No "oc-algo" shows up until the next negotiation phase.
>
>   Should we say anything about when timer runs out?

I believe this is present in Section 5.7:

    Once the client and server agree on an overload control
    algorithm, it MUST remain in effect for at least 3600 seconds
    (1 hour) before renegotiation occurs.

>   Should we have a text mandating that if the timer runs out,
> client negotiates the algorithm on the next request it sends
> to the server??

I believe it is already there in Section 5.7:

    Renegotiation, when desired, is simply accomplished by the
    SIP client sending a complete list of overload control
    algorithms it supports in a "oc-algo" parameter in a
    request going downstream.  The downstream server, as before, MUST
    choose one algorithm from the list and MUST pare the list down to
    include the one chosen algorithm.  The pared down list consisting of
    the chosen algorithm MUST be returned to the upstream SIP client in
    the response and stays in effect until the next renegotiation.

If the last two points you make are not clear in Section 5.7, please
let me know and I can see if I can highlight these in some fashion.

Thanks,

- vijay
-- 
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60566 (USA)
Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
Web:   http://ect.bell-labs.com/who/vkg/