[sip-overload] I-D Action: draft-ietf-soc-overload-control-12.txt
internet-drafts@ietf.org Fri, 01 February 2013 17:56 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 3047321E80DA; Fri, 1 Feb 2013 09:56:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.527
X-Spam-Level:
X-Spam-Status: No, score=-102.527 tagged_above=-999 required=5 tests=[AWL=0.072,
BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e9RUkIv7j987;
Fri, 1 Feb 2013 09:56:30 -0800 (PST)
Received: from ietfa.amsl.com (localhost [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id A410021E8084; Fri, 1 Feb 2013 09:56:30 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.37
Message-ID: <20130201175630.27023.2656.idtracker@ietfa.amsl.com>
Date: Fri, 01 Feb 2013 09:56:30 -0800
Cc: sip-overload@ietf.org
Subject: [sip-overload] I-D Action: draft-ietf-soc-overload-control-12.txt
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>,
<mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>,
<mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Feb 2013 17:56:31 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the SIP Overload Control Working Group of the IETF.
Title : Session Initiation Protocol (SIP) Overload Control
Author(s) : Vijay K. Gurbani
Volker Hilt
Henning Schulzrinne
Filename : draft-ietf-soc-overload-control-12.txt
Pages : 35
Date : 2013-02-01
Abstract:
Overload occurs in Session Initiation Protocol (SIP) networks when
SIP servers have insufficient resources to handle all SIP messages
they receive. Even though the SIP protocol provides a limited
overload control mechanism through its 503 (Service Unavailable)
response code, SIP servers are still vulnerable to overload. This
document defines the behaviour of SIP servers involved in overload
control, and in addition, it specifies a loss-based overload scheme
for SIP.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-soc-overload-control
There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-soc-overload-control-12
A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-soc-overload-control-12
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
- [sip-overload] I-D Action: draft-ietf-soc-overloa… internet-drafts