[Sipping] Fwd: Expert review of draft-vanelburg-sipping-private-network-indication-03

Hans Erik van Elburg <ietf.hanserik@gmail.com> Fri, 03 July 2009 14:22 UTC

Return-Path: <ietf.hanserik@gmail.com>
X-Original-To: sipping@core3.amsl.com
Delivered-To: sipping@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 18F013A6A6E for <sipping@core3.amsl.com>; Fri, 3 Jul 2009 07:22:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.45
X-Spam-Level:
X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[AWL=0.148, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lLVBW6sZT4D7 for <sipping@core3.amsl.com>; Fri, 3 Jul 2009 07:22:39 -0700 (PDT)
Received: from mail-ew0-f215.google.com (mail-ew0-f215.google.com [209.85.219.215]) by core3.amsl.com (Postfix) with ESMTP id 39B693A682D for <sipping@ietf.org>; Fri, 3 Jul 2009 07:22:39 -0700 (PDT)
Received: by ewy11 with SMTP id 11so1103885ewy.37 for <sipping@ietf.org>; Fri, 03 Jul 2009 07:23:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=5Amo/faxBX7YOCLiyvjvlLNVOquDA5sMVHo00l1DLnQ=; b=Alxw/hj9XC3Yg/JxY/gQfsANPDjjG9/Uqvjviq2cg9qP2L+/LMp/dfGN1oxrY4YcLd UYXIPzgCSFfRqHzx4y8STo27wKIHgYjH8ZYbGO5hF9x8m/WBtlOgtjNku9l+wfZzC051 qGwcPyUMQSMrNsYQkL5xdtu6q3nt6j0Xk9gHE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=cZKcGynF6nEccZMi85QcDNHaJ4+PRyraJTBaVhEU2+/RzM/0IZwUuBgDqtM9z6NDuQ 6YFTR0iboFHtHU4M3Wm0VBYpGdKWDFYdjZ9txULOx96tdF/xU44vvn4Ei7BaBE9HzkQT ByctE/3GQSMQFyTDP8s1tov8y5Etn9d6SeCH0=
MIME-Version: 1.0
Received: by 10.210.34.2 with SMTP id h2mr1726150ebh.57.1246630609744; Fri, 03 Jul 2009 07:16:49 -0700 (PDT)
In-Reply-To: <9ae56b1e0907030710i5e51de42icfbcc0d0064b5ddd@mail.gmail.com>
References: <AcnTzw5dx+joO13zQeugGcDGqqjeNg==@siemenscomms.co.uk> <0D5F89FAC29E2C41B98A6A762007F5D001E1A290@GBNTHT12009MSX.gb002.siemens.net> <9ae56b1e0907021519h5093aec3g5023cc7c6a38ba32@mail.gmail.com> <0D5F89FAC29E2C41B98A6A762007F5D00218C5B3@GBNTHT12009MSX.gb002.siemens.net> <9ae56b1e0907030710i5e51de42icfbcc0d0064b5ddd@mail.gmail.com>
Date: Fri, 03 Jul 2009 16:16:49 +0200
Message-ID: <9ae56b1e0907030716w738f1167n889e26694f71087c@mail.gmail.com>
From: Hans Erik van Elburg <ietf.hanserik@gmail.com>
To: "Elwell, John" <john.elwell@siemens-enterprise.com>, "DRAGE, Keith (Keith)" <drage@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary="0015174bee88a907c4046dcdcee2"
Cc: IETF Sipping List <sipping@ietf.org>
Subject: [Sipping] Fwd: Expert review of draft-vanelburg-sipping-private-network-indication-03
X-BeenThere: sipping@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "SIPPING Working Group \(applications of SIP\)" <sipping.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sipping>
List-Post: <mailto:sipping@ietf.org>
List-Help: <mailto:sipping-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jul 2009 14:22:41 -0000

Resent and history removed as otherwise rejected by mailing list.

Hi John,

1. Again the required applicability statement is in section 10 of the main
body. (Same pattern has been followed in RFC5502, 5002 and 4457) which I
took as examples. Together with the additional text in the abstract that
should be sufficient. If the text in section 10 needs to be improved then
please indicate so.

2. Took in your nits, the abstract now reads:
      "This document specifies the SIP P-Private-Network-Indication
P-header. The use of this private network indication extension
 is only applicable inside an administrative domain with
previously agreed-upon policies for generation, transport and
 usage of such information.  A private network indication
allows nodes in such a domain to treat private network traffic
 according to a different set of rules then than the set
applicable to public network traffic. The indication also
 distinguishes traffic from one private network from another
private network."

4a. Regarding 1.2 item b). Would the following rewrite help?:
OLD:
" b) business trunking application, where the NGN hosts transit capabilities
between NGCN's, break-in capabilities from NGN to NGCN and break-out
capabilities from NGCN to NGN; and" /OLD

NEW:
" b) business trunking application, where the NGN hosts transit capabilities
between NGCN's, break-in capabilities  where the NGN converts public network
traffic to private network traffic for delivery at a served NGCN and
break-out capabilities where the NGN converts private network traffic from a
served NGCN to public network traffic; and"
/NEW

If not please suggest an improved sentence that covers your concern. Please
note that in the example that you gave it is not the business trunking
application that does the conversion, but the hosted enterprise application.

4b. "normal rules"
Looking at the definition, would the following rewrite help:
OLD
" Traffic sent to or received from a public telecommunication network for
processing according to the normal rules."
/OLD

NEW
" Traffic sent to or received from a public telecommunication network for
processing according to the rules for ordinary subscribers of a public
telecommunication network."
/NEW

4c. NGN is a public telecommunication network
>       - "To summarize a few example reasons for a
public telecommunication network to make the distinction between the two
types of traffic" Isn't it an NGN that needs to make the distinction?
> [HE] NGN is a public telecommunication network. But we can rephrase
to: "To summarize a few example reasons for a public NGN to make the
distinction between the two types of traffic" [/HE]
[JRE] I think that is the problem I am having. I believe an NGN is a network
infrastructure that supports both public network traffic and private network
traffic, or in other words it supports both a public network and a number of
private networks.[/JRE]
[HE2]Yes, but its main purpose is to serve as a public network with all the
regulations that apply to such networks etc. This does not prohibit an NGN
to be used as a private network of course, but still it has been designed
from the perspective of having to serve the needs of public network
operators. That is why the "normal"/default  procedures are  for public
network traffic. As we want to introduce the capability for such a public
network (NGN) to also support private network traffic that has to be
processed to a different set of rules, the Private-Network-Indication is
needed.[/HE2]

5. Traffic --> SIP traffic
Calling traffic SIP traffic suggest that the media is not part of the
traffic, is that what we want??

6. Example private network traffic can also exist between
two different enterprises
Where would you like to see this? Obviously section 1.2 is not the right
place for such an example.
Isn't this too obvious, if you imagine that two companies have agreed to
form a cooperation and communicate under this agreement?
Would you like to see this as an additional example in section 4?


8. calling line identification
Yes we agree fully on that "calling line identification is not an adequate
distinction". I think that is what the current text tries to explain.
Actually what I dont like about this text is that it starts explaining what
the indication is not about. I propose that we completely remove the 1st
paragraph in section 1.3 and the 1st word "Rather" from the 2nd paragraph.

/Hans Erik van Elburg