
From nobody Tue Dec  2 10:43:04 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B75E01A6FC9 for <dime@ietfa.amsl.com>; Tue,  2 Dec 2014 10:42:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.779
X-Spam-Level: 
X-Spam-Status: No, score=0.779 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sWO8wetlOPaf for <dime@ietfa.amsl.com>; Tue,  2 Dec 2014 10:42:50 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10BD01A6FC8 for <dime@ietf.org>; Tue,  2 Dec 2014 10:41:46 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63043 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XvsOJ-0009cf-LO for dime@ietf.org; Tue, 02 Dec 2014 10:41:44 -0800
Message-ID: <547E07E3.7090200@usdonovans.com>
Date: Tue, 02 Dec 2014 12:41:39 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com> <16959_1416942163_5474D253_16959_819_1_6B7134B31289DC4FAF731D844122B36E941941@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <16959_1416942163_5474D253_16959_819_1_6B7134B31289DC4FAF731D844122B36E941941@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Content-Type: multipart/alternative; boundary="------------040308090400040805030209"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/2H3NBO47JgXJRqw3B931cIzm7HM
Subject: Re: [Dime] Updated DOIC Requirements Analysis
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Dec 2014 18:42:59 -0000

This is a multi-part message in MIME format.
--------------040308090400040805030209
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit

Lionel,

I currently have the following for the Introduction based on other 
suggestions from, I believe, Ben:

    This specification defines a base solution for Diameter overload
    control, referred to as Diameter Overload Indication Conveyance
    (DOIC).  The requirements for the solution are described and
    discussed in the corresponding requirements document [RFC7068].

    This specification addresses Diameter overload control between
    Diameter nodes that support the DOIC solution.  The solution, which
    is designed to apply to existing and future Diameter applications,
    requires no changes to the Diameter base protocol [RFC6733] and is
    deployable in environments where some Diameter nodes do not implement
    the Diameter overload control solution defined in this specification.

    Note that the overload control solution defined in this specification
    does not address all the requirements listed in [RFC7068].  A number
    of overload control related features are left for future
    specifications.  See Appendix A for a list of extensions that are
    currently being considered.  See Appendix C for an analysis of
    conformance to the requirements specified in [RFC7068].

Let me know if this works for you.

I have included your other suggestion below.

Regards,

Steve


On 11/25/14, 1:02 PM, lionel.morand@orange.com wrote:
> Hi Ben, Steve,
>
> the text in section 1 needs also to be updated. I would propose something like:
>
> 1.  Introduction
>
>     This specification defines a base solution for Diameter Overload
>     Control (DOC), referred to as Diameter Overload Indication Conveyance
>     (DOIC).  The requirements for the solution are described and
>     discussed in the corresponding design requirements document
>     [RFC7068].  Note that the overload control solution defined in this
>     specification does not address all the requirements listed in
>     [RFC7068].  See Appendix C for further details on the
>     conformance to the requirements specified in [RFC7068].
>
> In C.1:
>
> C.1.  Deferred Requirements
>
>     The DIME working group chose to defer certain requirements in order
>     to meet an an external deadline.  The 3GPP "Core Network and
>     Terminal" working group 4 (CT4) working group wished to reference
>     DOIC as part of Release 12.  This required the DOIC base protocol to
>     be substantially complete by the end of 2014.  The deferred work
>     includes the following:
>
> it is not necessary to quote CT4, as there are other groups impacts. I would propose to rephrase as below:
>
>     3GPP have adopted an early version of this document as normative
>     reference in various Diameter related specifications to support the
>     overload control mechanism in their release 12 framework.  The DIME
>     working group has therefore decided to defer certain requirements in order
>     to complete the design of an extensible generic solution before the
>     deadline scheduled by 3GPP for the completion of the protocol work
>     in release 12 by the end of 2014.  The deferred work includes the following:
>
> regards,
>
> Lionel
>
> De : DiME [mailto:dime-bounces@ietf.org] De la part de Ben Campbell
> Envoyé : mardi 25 novembre 2014 03:19
> À : dime@ietf.org list
> Objet : [Dime] Updated DOIC Requirements Analysis
>
> Here's the text from the updated requirements analysis. I updated the summary to be more general, and updated the detail based on mail discussion. The detail section is marked for deletion before publication as an RFC.
>
> BTW, It's appendix C now because I used the section Steve had already reserved for it :-)
>
> Thanks!
>
> Ben.
> -------------------
> Appendix C.  Requirements Conformance Analysis
>
>     This section contains the result of an analysis of the DOIC solutions
>     conformance to the requirements defined in [RFC7068].
>
> C.1.  Deferred Requirements
>
>     The DIME working group chose to defer certain requirements in order
>     to meet an an external deadline.  The 3GPP "Core Network and
>     Terminal" working group 4 (CT4) working group wished to reference
>     DOIC as part of Release 12.  This required the DOIC base protocol to
>     be substantially complete by the end of 2014.  The deferred work
>     includes the following:
>
>     o  Agent Overload - The ability for an agent to report an overload
>        condition of the agent itself.
>
>     o  Load Information - The ability for a node to report its load level
>        when not overloaded.
>
>     At the time of this writing, DIME has begun separate work efforts for
>     these requirements.
>
> C.2.  Detection of non-supporting Intermediaries
>
>     The DOIC mechanism as currently defined does not allow supporting
>     nodes to automatically determine whether OC-Supported-Features or OC-
>     OLR AVPs are originated by a peer node, or by a non-peer node and
>     sent across a non-supporting peer.  This makes it impossible to
>     detect the presence of non-supporting nodes between supporting nodes,
>     except by configuration.  The working group determined that such a
>     configuration requirement is acceptable.
>
>     This limits full compliance with certain requirements related to the
>     limitation of new configuration, deployment in environments with
>     mixed support, operating across non-supporting agents, and
>     authorization.
>
> C.3.  Implicit Application Indication
>
>     The working group elected to determine the application for an
>     overload report from that of the enclosing message.  This prevents
>     sending an OLR for an application when there are no transactions for
>     that application.
>
>     As a consequence, DOIC does not comply with the requirement to be
>     able to report overload information across quiescent connections.
>     DOIC does not fully comply with requirements to operate on up-to-date
>     information, since if an OLR causes all transactions to stop for an
>     application, the only way traffic will resume is for the OLR to
>     expire.
>
> C.4.  Stateless Operation
>
>     RFC7068 explicitly discourages the sending of OLRs in every answer
>     message, as part of the requirement to avoid additional work for
>     overloaded nodes.  DOIC recommends exactly that behavior during
>     active overload conditions.  The working group determined that doing
>     otherwise would reduce reliability and increase statefulness.  (Note
>     that DOIC does allow nodes to avoid sending OLRs in every answer if
>     they have some other method of ensuring that OLRs get to all relevant
>     reacting nodes.)
>
> C.5.  No New Vulnerabilities
>
>     The working group believes that DOIC is compliant with the
>     requirement to avoid introducing new vulnerabilities.  However, this
>     requirement may warrant an early security expert review.
>
> C.6.  Detailed Requirements
>
>     [RFC Editor: Please remove this section and subsections prior to
>     publication as an RFC.]
>
> C.6.1.  General
>
>     REQ 1:  The solution MUST provide a communication method for Diameter
>             nodes to exchange load and overload information.
>
>             *Partially Compliant*. The mechanism uses new AVPs
>             piggybacked on existing Diameter messages to exchange
>             overload information.  It does not currently support "load"
>             information or the ability to report overload of an agent.
>             These have been left for future extensions.
>
>
>
>     REQ 2:  The solution MUST allow Diameter nodes to support overload
>             control regardless of which Diameter applications they
>             support.  Diameter clients and agents must be able to use the
>             received load and overload information to support graceful
>             behavior during an overload condition.  Graceful behavior
>             under overload conditions is best described by REQ 3.
>
>             *Partially Compliant*. The DOIC AVPs can be used in any
>             application that allows the extension of AVPs.  However,
>             "load" information is not currently supported.
>
>
>
>     REQ 3:  The solution MUST limit the impact of overload on the overall
>             useful throughput of a Diameter server, even when the
>             incoming load on the network is far in excess of its
>             capacity.  The overall useful throughput under load is the
>             ultimate measure of the value of a solution.
>
>             *Compliant*. DOIC provides information that nodes can use to
>             reduce the impact of overload.
>
>
>
>     REQ 4:  Diameter allows requests to be sent from either side of a
>             connection, and either side of a connection may have need to
>             provide its overload status.  The solution MUST allow each
>             side of a connection to independently inform the other of its
>             overload status.
>
>             *Compliant*. DOIC AVPs can be included regardless of
>             transaction "direction"
>
>
>
>     REQ 5:  Diameter allows nodes to determine their peers via dynamic
>             discovery or manual configuration.  The solution MUST work
>             consistently without regard to how peers are determined.
>
>             *Compliant*. DOIC contains no assumptions about how peers are
>             discovered.
>
>
>
>     REQ 6:  The solution designers SHOULD seek to minimize the amount of
>             new configuration required in order to work.  For example, it
>             is better to allow peers to advertise or negotiate support
>             for the solution, rather than to require that this knowledge
>             to be configured at each node.
>
>             *Partially Compliant*. Most DOIC parameters are advertised
>             using the DOIC capability announcement mechanism.  However,
>             there are some situations where configuration is required.
>             For example, a DOIC node detect the fact that a peer may not
>             support DOIC when nodes on the other side of the non-
>             supporting node do support DOIC without configuration.
>
>
>
> C.6.2.  Performance
>
>     REQ 7:  The solution and any associated default algorithm(s) MUST
>             ensure that the system remains stable.  At some point after
>             an overload condition has ended, the solution MUST enable
>             capacity to stabilize and become equal to what it would be in
>             the absence of an overload condition.  Note that this also
>             requires that the solution MUST allow nodes to shed load
>             without introducing non-converging oscillations during or
>             after an overload condition.
>
>             *Compliant*. The specification offers guidance that
>             implementations should apply hysteresis when recovering from
>             overload, and avoid sudden ramp ups in offered load when
>             recovering.
>
>
>
>     REQ 8:  Supporting nodes MUST be able to distinguish current overload
>             information from stale information.
>
>             *Partially Compliant*. DOIC overload reports are "soft
>             state", that is they expire after an indicated period.  DOIC
>             nodes may also send reports that end existing overload
>             conditions.  DOIC requires reporting nodes to ensure that all
>             relevant reacting nodes receive overload reports.
>
>             However, since DOIC does not allow reporting nodes to send
>             OLRs in watchdog messages, if an overload condition results
>             in zero offered load, the reporting node cannot update the
>             condition until the expiration of the original OLR.
>
>
>
>     REQ 9:  The solution MUST function across fully loaded as well as
>             quiescent transport connections.  This is partially derived
>             from the requirement for stability in REQ 7.
>
>             *Not Compliant*. DOIC does not allow OLRs to be sent over
>             quiescent transport connections.  This is due to the fact
>             that OLRs cannot be sent outside of the application to which
>             they apply.
>
>
>
>     REQ 10: Consumers of overload information MUST be able to determine
>             when the overload condition improves or ends.
>
>             *Partially Compliant*. (See response to previous two
>             requirements.)
>
>
>
>     REQ 11: The solution MUST be able to operate in networks of different
>             sizes.
>
>             *Compliant*. DOIC makes no assumptions about the size of the
>             network.  DOIC can operate purely between clients and
>             servers, or across agents.
>
>
>
>     REQ 12: When a single network node fails, goes into overload, or
>             suffers from reduced processing capacity, the solution MUST
>             make it possible to limit the impact of the affected node on
>             other nodes in the network.  This helps to prevent a small-
>             scale failure from becoming a widespread outage.
>
>             *Partially Compliant*. DOIC allows overload reports for an
>             entire realm, where abated traffic will not be redirected
>             towards another server.  But in situations where nodes choose
>             to divert traffic to other nodes, DOIC offers no way of
>             knowing whether the new recipients can handle the traffic if
>             they have not already indicated overload.  This may be
>             mitigated with the use of a future "load" extension, or with
>             the use of proprietary dynamic load-balancing mechanisms.
>
>
>
>     REQ 13: The solution MUST NOT introduce substantial additional work
>             for a node in an overloaded state.  For example, a
>             requirement for an overloaded node to send overload
>             information every time it received a new request would
>             introduce substantial work.
>
>             *Not Compliant*. DOIC does in fact encourage an overloaded
>             node to send an OLR in every response.  The working group
>             that other mechanisms to ensure that every relevant node
>             receives an OLR would create even more work.  [Note: This
>             needs discussion.]
>
>
>
>     REQ 14: Some scenarios that result in overload involve a rapid
>             increase of traffic with little time between normal levels
>             and levels that induce overload.  The solution SHOULD provide
>             for rapid feedback when traffic levels increase.
>
>             *Compliant*. The piggyback mechanism allows OLRs to be sent
>             at the same rate as application traffic.
>
>
>
>     REQ 15: The solution MUST NOT interfere with the congestion control
>             mechanisms of underlying transport protocols.  For example, a
>             solution that opened additional TCP connections when the
>             network is congested would reduce the effectiveness of the
>             underlying congestion control mechanisms.
>
>             *Compliant*. DOIC does not require or recommend changes in
>             the handling of transport protocols or connections.
>
>
>
> C.6.3.  Heterogeneous Support for Solution
>
>     REQ 16: The solution is likely to be deployed incrementally.  The
>             solution MUST support a mixed environment where some, but not
>             all, nodes implement it.
>
>             *Partially Compliant*. DOIC works with most mixed-deployment
>             scenarios.  However, it cannot work across a non-supporting
>             proxy that modifies Origin-Host AVPs in answer messages.
>             DOIC will have limited impact in networks where the nodes
>             that perform server selections do not support the mechanism.
>
>
>
>     REQ 17: In a mixed environment with nodes that support the solution
>             and nodes that do not, the solution MUST NOT result in
>             materially less useful throughput during overload as would
>             have resulted if the solution were not present.  It SHOULD
>             result in less severe overload in this environment.
>
>             *Compliant*. In most mixed-support deployment, DOIC will
>             offer at least some value, and will not make things worse.
>
>
>
>     REQ 18: In a mixed environment of nodes that support the solution and
>             nodes that do not, the solution MUST NOT preclude elements
>             that support overload control from treating elements that do
>             not support overload control in an equitable fashion relative
>             to those that do.  Users and operators of nodes that do not
>             support the solution MUST NOT unfairly benefit from the
>             solution.  The solution specification SHOULD provide guidance
>             to implementors for dealing with elements not supporting
>             overload control.
>
>             *Compliant*. DOIC provides mechanisms to abate load from non-
>             supporting sources.  Furthermore, it recommends that
>             reporting nodes will still need to be able to apply whatever
>             protections they would ordinarily apply if DOIC were not in
>             use.
>
>
>
>     REQ 19: It MUST be possible to use the solution between nodes in
>             different realms and in different administrative domains.
>
>             *Partially Compliant*. DOIC allows sending OLRs across
>             administrative domains, and potentially to nodes in other
>             realms.  However, an OLR cannot indicate overload for realms
>             other than the one in the Origin-Realm AVP of the containing
>             answer.
>
>
>
>     REQ 20: Any explicit overload indication MUST be clearly
>             distinguishable from other errors reported via Diameter.
>
>             *Compliant*. DOIC sends explicit overload indication in
>             overload reports.  It does not depend on error result codes.
>
>
>
>     REQ 21: In cases where a network node fails, is so overloaded that it
>             cannot process messages, or cannot communicate due to a
>             network failure, it may not be able to provide explicit
>             indications of the nature of the failure or its levels of
>             overload.  The solution MUST result in at least as much
>             useful throughput as would have resulted if the solution were
>             not in place.
>
>             *Compliant*. DOIC overload reports have the primary effect of
>             suppressing message retries in overload conditions.  DOIC
>             recommends that messages never be silently dropped if at all
>             possible.
>
>
>
> C.6.4.  Granular Control
>
>     REQ 22: The solution MUST provide a way for a node to throttle the
>             amount of traffic it receives from a peer node.  This
>             throttling SHOULD be graded so that it can be applied
>             gradually as offered load increases.  Overload is not a
>             binary state; there may be degrees of overload.
>
>             *Compliant*. The "loss" algorithm expresses a percentage
>             reduction.
>
>
>
>     REQ 23: The solution MUST provide sufficient information to enable a
>             load-balancing node to divert messages that are rejected or
>             otherwise throttled by an overloaded upstream node to other
>             upstream nodes that are the most likely to have sufficient
>             capacity to process them.
>
>             *Not Compliant*. DOIC provides no built in mechanism to
>             determine the best place to divert messages that would
>             otherwise be throttled.  This can be accomplished with a
>             future "load" extension, or with proprietary load balancing
>             mechanisms.
>
>
>
>     REQ 24: The solution MUST provide a mechanism for indicating load
>             levels, even when not in an overload condition, to assist
>             nodes in making decisions to prevent overload conditions from
>             occurring.
>
>             *Not Compliant*. "Load" information has been left for a
>             future extension.
>
>
>
> C.6.5.  Priority and Policy
>
>     REQ 25: The base specification for the solution SHOULD offer general
>             guidance on which message types might be desirable to send or
>             process over others during times of overload, based on
>             application-specific considerations.  For example, it may be
>             more beneficial to process messages for existing sessions
>             ahead of new sessions.  Some networks may have a requirement
>             to give priority to requests associated with emergency
>             sessions.  Any normative or otherwise detailed definition of
>             the relative priorities of message types during an overload
>             condition will be the responsibility of the application
>             specification.
>
>             *Compliant*. The specification offers guidance on how
>             requests might be prioritized for different types of
>             applications.
>
>
>
>     REQ 26: The solution MUST NOT prevent a node from prioritizing
>             requests based on any local policy, so that certain requests
>             are given preferential treatment, given additional
>             retransmission, not throttled, or processed ahead of others.
>
>             *Compliant*. Nothing in the specification prevents
>             application-specific, implementation-specific, or local
>             policies.
>
>
>
> C.6.6.  Security
>
>     REQ 27: The solution MUST NOT provide new vulnerabilities to
>             malicious attack or increase the severity of any existing
>             vulnerabilities.  This includes vulnerabilities to DoS and
>             DDoS attacks as well as replay and man-in-the-middle attacks.
>             Note that the Diameter base specification [RFC6733] lacks
>             end-to-end security and this must be considered (see the
>             Security Considerations in [RFC7068]).  Note that this
>             requirement was expressed at a high level so as to not
>             preclude any particular solution.  Is is expected that the
>             solution will address this in more detail.
>
>             *Compliant*. The working group is not aware of any such
>             vulnerabilities.  [This may need further analysis.]
>
>
>
>     REQ 28: The solution MUST NOT depend on being deployed in
>             environments where all Diameter nodes are completely trusted.
>             It SHOULD operate as effectively as possible in environments
>             where other nodes are malicious; this includes preventing
>             malicious nodes from obtaining more than a fair share of
>             service.  Note that this does not imply any responsibility on
>             the solution to detect, or take countermeasures against,
>             malicious nodes.
>
>             *Partially Compliant*. Since all Diameter security is
>             currently at the transport layer, nodes must trust immediate
>             peers to enforce trust policies.  However, there are
>             situations where a DOIC node cannot determine if an immediate
>             peer supports DOIC.  The authors recommend an expert security
>             review.
>
>
>
>     REQ 29: It MUST be possible for a supporting node to make
>             authorization decisions about what information will be sent
>             to peer nodes based on the identity of those nodes.  This
>             allows a domain administrator who considers the load of their
>             nodes to be sensitive information to restrict access to that
>             information.  Of course, in such cases, there is no
>             expectation that the solution itself will help prevent
>             overload from that peer node.
>
>             *Partially Compliant*. (See response to previous
>             requirement.)
>
>
>
>     REQ 30: The solution MUST NOT interfere with any Diameter-compliant
>             method that a node may use to protect itself from overload
>             from non-supporting nodes or from denial-of-service attacks.
>
>             *Compliant*. The specification recommends that any such
>             protection mechanism needed without DOIC should continue to
>             be employed with DOIC.
>
>
>
> C.6.7.  Flexibility and Extensibility
>
>     REQ 31: There are multiple situations where a Diameter node may be
>             overloaded for some purposes but not others.  For example,
>             this can happen to an agent or server that supports multiple
>             applications, or when a server depends on multiple external
>             resources, some of which may become overloaded while others
>             are fully available.  The solution MUST allow Diameter nodes
>             to indicate overload with sufficient granularity to allow
>             clients to take action based on the overloaded resources
>             without unreasonably forcing available capacity to go unused.
>             The solution MUST support specification of overload
>             information with granularities of at least "Diameter node",
>             "realm", and "Diameter application" and MUST allow
>             extensibility for others to be added in the future.
>
>             *Partially Compliant*. All DOIC overload reports are scoped
>             to the specific application and realm.  Inside that scope,
>             overload can be reported at the specific server or whole
>             realm scope.  As currently specified, DOIC cannot indicate
>             local overload for an agent.  At the time of this writing,
>             the DIME working group has plans to work on an agent-overload
>             extension.
>
>             DOIC allows new "scopes" through the use of extended report
>             types.
>
>
>
>     REQ 32: The solution MUST provide a method for extending the
>             information communicated and the algorithms used for overload
>             control.
>
>             *Compliant*. DOIC allows new report types and abatement
>             algorithms to be created.  These may be indicated using the
>             OC-Supported-Features AVP.
>
>
>
>     REQ 33: The solution MUST provide a default algorithm that is
>             mandatory to implement.
>
>             *Compliant*. The "loss" algorithm is mandatory to implement.
>
>
>
>     REQ 34: The solution SHOULD provide a method for exchanging overload
>             and load information between elements that are connected by
>             intermediaries that do not support the solution.
>
>             *Partially Compliant*. DOIC information can traverse non-
>             supporting agents, as long as those agents do not modify
>             certain AVPs. (e.g., Origin-Host).  DOIC does not provide a
>             way for supporting nodes to detect such modification.
>
>
> _________________________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


--------------040308090400040805030209
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Lionel,<br>
    <br>
    I currently have the following for the Introduction based on other
    suggestions from, I believe, Ben:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>   This specification defines a base solution for Diameter overload
   control, referred to as Diameter Overload Indication Conveyance
   (DOIC).  The requirements for the solution are described and
   discussed in the corresponding requirements document [RFC7068].

   This specification addresses Diameter overload control between
   Diameter nodes that support the DOIC solution.  The solution, which
   is designed to apply to existing and future Diameter applications,
   requires no changes to the Diameter base protocol [RFC6733] and is
   deployable in environments where some Diameter nodes do not implement
   the Diameter overload control solution defined in this specification.

   Note that the overload control solution defined in this specification
   does not address all the requirements listed in [RFC7068].  A number
   of overload control related features are left for future
   specifications.  See Appendix A for a list of extensions that are
   currently being considered.  See Appendix C for an analysis of
   conformance to the requirements specified in [RFC7068].</pre>
    Let me know if this works for you.<br>
    <br>
    I have included your other suggestion below.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 11/25/14, 1:02 PM,
      <a class="moz-txt-link-abbreviated" href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a> wrote:<br>
    </div>
    <blockquote
cite="mid:16959_1416942163_5474D253_16959_819_1_6B7134B31289DC4FAF731D844122B36E941941@PEXCVZYM13.corporate.adroot.infra.ftgroup"
      type="cite">
      <pre wrap="">Hi Ben, Steve,

the text in section 1 needs also to be updated. I would propose something like:

1.  Introduction

   This specification defines a base solution for Diameter Overload
   Control (DOC), referred to as Diameter Overload Indication Conveyance
   (DOIC).  The requirements for the solution are described and
   discussed in the corresponding design requirements document
   [RFC7068].  Note that the overload control solution defined in this
   specification does not address all the requirements listed in
   [RFC7068].  See Appendix C for further details on the 
   conformance to the requirements specified in [RFC7068].

In C.1:

C.1.  Deferred Requirements

   The DIME working group chose to defer certain requirements in order
   to meet an an external deadline.  The 3GPP "Core Network and
   Terminal" working group 4 (CT4) working group wished to reference
   DOIC as part of Release 12.  This required the DOIC base protocol to
   be substantially complete by the end of 2014.  The deferred work
   includes the following:

it is not necessary to quote CT4, as there are other groups impacts. I would propose to rephrase as below:

   3GPP have adopted an early version of this document as normative
   reference in various Diameter related specifications to support the 
   overload control mechanism in their release 12 framework.  The DIME
   working group has therefore decided to defer certain requirements in order
   to complete the design of an extensible generic solution before the 
   deadline scheduled by 3GPP for the completion of the protocol work
   in release 12 by the end of 2014.  The deferred work includes the following:

regards,

Lionel

De&nbsp;: DiME [<a class="moz-txt-link-freetext" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>] De la part de Ben Campbell
Envoy&eacute;&nbsp;: mardi 25 novembre 2014 03:19
&Agrave;&nbsp;: <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a> list
Objet&nbsp;: [Dime] Updated DOIC Requirements Analysis

Here's the text from the updated requirements analysis. I updated the summary to be more general, and updated the detail based on mail discussion. The detail section is marked for deletion before publication as an RFC.&nbsp;

BTW, It's appendix C now because I used the section Steve had already reserved for it :-)

Thanks!

Ben.
-------------------
Appendix C.  Requirements Conformance Analysis

   This section contains the result of an analysis of the DOIC solutions
   conformance to the requirements defined in [RFC7068].

C.1.  Deferred Requirements

   The DIME working group chose to defer certain requirements in order
   to meet an an external deadline.  The 3GPP "Core Network and
   Terminal" working group 4 (CT4) working group wished to reference
   DOIC as part of Release 12.  This required the DOIC base protocol to
   be substantially complete by the end of 2014.  The deferred work
   includes the following:

   o  Agent Overload - The ability for an agent to report an overload
      condition of the agent itself.

   o  Load Information - The ability for a node to report its load level
      when not overloaded.

   At the time of this writing, DIME has begun separate work efforts for
   these requirements.

C.2.  Detection of non-supporting Intermediaries

   The DOIC mechanism as currently defined does not allow supporting
   nodes to automatically determine whether OC-Supported-Features or OC-
   OLR AVPs are originated by a peer node, or by a non-peer node and
   sent across a non-supporting peer.  This makes it impossible to
   detect the presence of non-supporting nodes between supporting nodes,
   except by configuration.  The working group determined that such a
   configuration requirement is acceptable.

   This limits full compliance with certain requirements related to the
   limitation of new configuration, deployment in environments with
   mixed support, operating across non-supporting agents, and
   authorization.

C.3.  Implicit Application Indication

   The working group elected to determine the application for an
   overload report from that of the enclosing message.  This prevents
   sending an OLR for an application when there are no transactions for
   that application.

   As a consequence, DOIC does not comply with the requirement to be
   able to report overload information across quiescent connections.
   DOIC does not fully comply with requirements to operate on up-to-date
   information, since if an OLR causes all transactions to stop for an
   application, the only way traffic will resume is for the OLR to
   expire.

C.4.  Stateless Operation

   RFC7068 explicitly discourages the sending of OLRs in every answer
   message, as part of the requirement to avoid additional work for
   overloaded nodes.  DOIC recommends exactly that behavior during
   active overload conditions.  The working group determined that doing
   otherwise would reduce reliability and increase statefulness.  (Note
   that DOIC does allow nodes to avoid sending OLRs in every answer if
   they have some other method of ensuring that OLRs get to all relevant
   reacting nodes.)

C.5.  No New Vulnerabilities

   The working group believes that DOIC is compliant with the
   requirement to avoid introducing new vulnerabilities.  However, this
   requirement may warrant an early security expert review.

C.6.  Detailed Requirements

   [RFC Editor: Please remove this section and subsections prior to
   publication as an RFC.]

C.6.1.  General

   REQ 1:  The solution MUST provide a communication method for Diameter
           nodes to exchange load and overload information.

           *Partially Compliant*. The mechanism uses new AVPs
           piggybacked on existing Diameter messages to exchange
           overload information.  It does not currently support "load"
           information or the ability to report overload of an agent.
           These have been left for future extensions.



   REQ 2:  The solution MUST allow Diameter nodes to support overload
           control regardless of which Diameter applications they
           support.  Diameter clients and agents must be able to use the
           received load and overload information to support graceful
           behavior during an overload condition.  Graceful behavior
           under overload conditions is best described by REQ 3.

           *Partially Compliant*. The DOIC AVPs can be used in any
           application that allows the extension of AVPs.  However,
           "load" information is not currently supported.



   REQ 3:  The solution MUST limit the impact of overload on the overall
           useful throughput of a Diameter server, even when the
           incoming load on the network is far in excess of its
           capacity.  The overall useful throughput under load is the
           ultimate measure of the value of a solution.

           *Compliant*. DOIC provides information that nodes can use to
           reduce the impact of overload.



   REQ 4:  Diameter allows requests to be sent from either side of a
           connection, and either side of a connection may have need to
           provide its overload status.  The solution MUST allow each
           side of a connection to independently inform the other of its
           overload status.

           *Compliant*. DOIC AVPs can be included regardless of
           transaction "direction"



   REQ 5:  Diameter allows nodes to determine their peers via dynamic
           discovery or manual configuration.  The solution MUST work
           consistently without regard to how peers are determined.

           *Compliant*. DOIC contains no assumptions about how peers are
           discovered.



   REQ 6:  The solution designers SHOULD seek to minimize the amount of
           new configuration required in order to work.  For example, it
           is better to allow peers to advertise or negotiate support
           for the solution, rather than to require that this knowledge
           to be configured at each node.

           *Partially Compliant*. Most DOIC parameters are advertised
           using the DOIC capability announcement mechanism.  However,
           there are some situations where configuration is required.
           For example, a DOIC node detect the fact that a peer may not
           support DOIC when nodes on the other side of the non-
           supporting node do support DOIC without configuration.



C.6.2.  Performance

   REQ 7:  The solution and any associated default algorithm(s) MUST
           ensure that the system remains stable.  At some point after
           an overload condition has ended, the solution MUST enable
           capacity to stabilize and become equal to what it would be in
           the absence of an overload condition.  Note that this also
           requires that the solution MUST allow nodes to shed load
           without introducing non-converging oscillations during or
           after an overload condition.

           *Compliant*. The specification offers guidance that
           implementations should apply hysteresis when recovering from
           overload, and avoid sudden ramp ups in offered load when
           recovering.



   REQ 8:  Supporting nodes MUST be able to distinguish current overload
           information from stale information.

           *Partially Compliant*. DOIC overload reports are "soft
           state", that is they expire after an indicated period.  DOIC
           nodes may also send reports that end existing overload
           conditions.  DOIC requires reporting nodes to ensure that all
           relevant reacting nodes receive overload reports.

           However, since DOIC does not allow reporting nodes to send
           OLRs in watchdog messages, if an overload condition results
           in zero offered load, the reporting node cannot update the
           condition until the expiration of the original OLR.



   REQ 9:  The solution MUST function across fully loaded as well as
           quiescent transport connections.  This is partially derived
           from the requirement for stability in REQ 7.

           *Not Compliant*. DOIC does not allow OLRs to be sent over
           quiescent transport connections.  This is due to the fact
           that OLRs cannot be sent outside of the application to which
           they apply.



   REQ 10: Consumers of overload information MUST be able to determine
           when the overload condition improves or ends.

           *Partially Compliant*. (See response to previous two
           requirements.)



   REQ 11: The solution MUST be able to operate in networks of different
           sizes.

           *Compliant*. DOIC makes no assumptions about the size of the
           network.  DOIC can operate purely between clients and
           servers, or across agents.



   REQ 12: When a single network node fails, goes into overload, or
           suffers from reduced processing capacity, the solution MUST
           make it possible to limit the impact of the affected node on
           other nodes in the network.  This helps to prevent a small-
           scale failure from becoming a widespread outage.

           *Partially Compliant*. DOIC allows overload reports for an
           entire realm, where abated traffic will not be redirected
           towards another server.  But in situations where nodes choose
           to divert traffic to other nodes, DOIC offers no way of
           knowing whether the new recipients can handle the traffic if
           they have not already indicated overload.  This may be
           mitigated with the use of a future "load" extension, or with
           the use of proprietary dynamic load-balancing mechanisms.



   REQ 13: The solution MUST NOT introduce substantial additional work
           for a node in an overloaded state.  For example, a
           requirement for an overloaded node to send overload
           information every time it received a new request would
           introduce substantial work.

           *Not Compliant*. DOIC does in fact encourage an overloaded
           node to send an OLR in every response.  The working group
           that other mechanisms to ensure that every relevant node
           receives an OLR would create even more work.  [Note: This
           needs discussion.]



   REQ 14: Some scenarios that result in overload involve a rapid
           increase of traffic with little time between normal levels
           and levels that induce overload.  The solution SHOULD provide
           for rapid feedback when traffic levels increase.

           *Compliant*. The piggyback mechanism allows OLRs to be sent
           at the same rate as application traffic.



   REQ 15: The solution MUST NOT interfere with the congestion control
           mechanisms of underlying transport protocols.  For example, a
           solution that opened additional TCP connections when the
           network is congested would reduce the effectiveness of the
           underlying congestion control mechanisms.

           *Compliant*. DOIC does not require or recommend changes in
           the handling of transport protocols or connections.



C.6.3.  Heterogeneous Support for Solution

   REQ 16: The solution is likely to be deployed incrementally.  The
           solution MUST support a mixed environment where some, but not
           all, nodes implement it.

           *Partially Compliant*. DOIC works with most mixed-deployment
           scenarios.  However, it cannot work across a non-supporting
           proxy that modifies Origin-Host AVPs in answer messages.
           DOIC will have limited impact in networks where the nodes
           that perform server selections do not support the mechanism.



   REQ 17: In a mixed environment with nodes that support the solution
           and nodes that do not, the solution MUST NOT result in
           materially less useful throughput during overload as would
           have resulted if the solution were not present.  It SHOULD
           result in less severe overload in this environment.

           *Compliant*. In most mixed-support deployment, DOIC will
           offer at least some value, and will not make things worse.



   REQ 18: In a mixed environment of nodes that support the solution and
           nodes that do not, the solution MUST NOT preclude elements
           that support overload control from treating elements that do
           not support overload control in an equitable fashion relative
           to those that do.  Users and operators of nodes that do not
           support the solution MUST NOT unfairly benefit from the
           solution.  The solution specification SHOULD provide guidance
           to implementors for dealing with elements not supporting
           overload control.

           *Compliant*. DOIC provides mechanisms to abate load from non-
           supporting sources.  Furthermore, it recommends that
           reporting nodes will still need to be able to apply whatever
           protections they would ordinarily apply if DOIC were not in
           use.



   REQ 19: It MUST be possible to use the solution between nodes in
           different realms and in different administrative domains.

           *Partially Compliant*. DOIC allows sending OLRs across
           administrative domains, and potentially to nodes in other
           realms.  However, an OLR cannot indicate overload for realms
           other than the one in the Origin-Realm AVP of the containing
           answer.



   REQ 20: Any explicit overload indication MUST be clearly
           distinguishable from other errors reported via Diameter.

           *Compliant*. DOIC sends explicit overload indication in
           overload reports.  It does not depend on error result codes.



   REQ 21: In cases where a network node fails, is so overloaded that it
           cannot process messages, or cannot communicate due to a
           network failure, it may not be able to provide explicit
           indications of the nature of the failure or its levels of
           overload.  The solution MUST result in at least as much
           useful throughput as would have resulted if the solution were
           not in place.

           *Compliant*. DOIC overload reports have the primary effect of
           suppressing message retries in overload conditions.  DOIC
           recommends that messages never be silently dropped if at all
           possible.



C.6.4.  Granular Control

   REQ 22: The solution MUST provide a way for a node to throttle the
           amount of traffic it receives from a peer node.  This
           throttling SHOULD be graded so that it can be applied
           gradually as offered load increases.  Overload is not a
           binary state; there may be degrees of overload.

           *Compliant*. The "loss" algorithm expresses a percentage
           reduction.



   REQ 23: The solution MUST provide sufficient information to enable a
           load-balancing node to divert messages that are rejected or
           otherwise throttled by an overloaded upstream node to other
           upstream nodes that are the most likely to have sufficient
           capacity to process them.

           *Not Compliant*. DOIC provides no built in mechanism to
           determine the best place to divert messages that would
           otherwise be throttled.  This can be accomplished with a
           future "load" extension, or with proprietary load balancing
           mechanisms.



   REQ 24: The solution MUST provide a mechanism for indicating load
           levels, even when not in an overload condition, to assist
           nodes in making decisions to prevent overload conditions from
           occurring.

           *Not Compliant*. "Load" information has been left for a
           future extension.



C.6.5.  Priority and Policy

   REQ 25: The base specification for the solution SHOULD offer general
           guidance on which message types might be desirable to send or
           process over others during times of overload, based on
           application-specific considerations.  For example, it may be
           more beneficial to process messages for existing sessions
           ahead of new sessions.  Some networks may have a requirement
           to give priority to requests associated with emergency
           sessions.  Any normative or otherwise detailed definition of
           the relative priorities of message types during an overload
           condition will be the responsibility of the application
           specification.

           *Compliant*. The specification offers guidance on how
           requests might be prioritized for different types of
           applications.



   REQ 26: The solution MUST NOT prevent a node from prioritizing
           requests based on any local policy, so that certain requests
           are given preferential treatment, given additional
           retransmission, not throttled, or processed ahead of others.

           *Compliant*. Nothing in the specification prevents
           application-specific, implementation-specific, or local
           policies.



C.6.6.  Security

   REQ 27: The solution MUST NOT provide new vulnerabilities to
           malicious attack or increase the severity of any existing
           vulnerabilities.  This includes vulnerabilities to DoS and
           DDoS attacks as well as replay and man-in-the-middle attacks.
           Note that the Diameter base specification [RFC6733] lacks
           end-to-end security and this must be considered (see the
           Security Considerations in [RFC7068]).  Note that this
           requirement was expressed at a high level so as to not
           preclude any particular solution.  Is is expected that the
           solution will address this in more detail.

           *Compliant*. The working group is not aware of any such
           vulnerabilities.  [This may need further analysis.]



   REQ 28: The solution MUST NOT depend on being deployed in
           environments where all Diameter nodes are completely trusted.
           It SHOULD operate as effectively as possible in environments
           where other nodes are malicious; this includes preventing
           malicious nodes from obtaining more than a fair share of
           service.  Note that this does not imply any responsibility on
           the solution to detect, or take countermeasures against,
           malicious nodes.

           *Partially Compliant*. Since all Diameter security is
           currently at the transport layer, nodes must trust immediate
           peers to enforce trust policies.  However, there are
           situations where a DOIC node cannot determine if an immediate
           peer supports DOIC.  The authors recommend an expert security
           review.



   REQ 29: It MUST be possible for a supporting node to make
           authorization decisions about what information will be sent
           to peer nodes based on the identity of those nodes.  This
           allows a domain administrator who considers the load of their
           nodes to be sensitive information to restrict access to that
           information.  Of course, in such cases, there is no
           expectation that the solution itself will help prevent
           overload from that peer node.

           *Partially Compliant*. (See response to previous
           requirement.)



   REQ 30: The solution MUST NOT interfere with any Diameter-compliant
           method that a node may use to protect itself from overload
           from non-supporting nodes or from denial-of-service attacks.

           *Compliant*. The specification recommends that any such
           protection mechanism needed without DOIC should continue to
           be employed with DOIC.



C.6.7.  Flexibility and Extensibility

   REQ 31: There are multiple situations where a Diameter node may be
           overloaded for some purposes but not others.  For example,
           this can happen to an agent or server that supports multiple
           applications, or when a server depends on multiple external
           resources, some of which may become overloaded while others
           are fully available.  The solution MUST allow Diameter nodes
           to indicate overload with sufficient granularity to allow
           clients to take action based on the overloaded resources
           without unreasonably forcing available capacity to go unused.
           The solution MUST support specification of overload
           information with granularities of at least "Diameter node",
           "realm", and "Diameter application" and MUST allow
           extensibility for others to be added in the future.

           *Partially Compliant*. All DOIC overload reports are scoped
           to the specific application and realm.  Inside that scope,
           overload can be reported at the specific server or whole
           realm scope.  As currently specified, DOIC cannot indicate
           local overload for an agent.  At the time of this writing,
           the DIME working group has plans to work on an agent-overload
           extension.

           DOIC allows new "scopes" through the use of extended report
           types.



   REQ 32: The solution MUST provide a method for extending the
           information communicated and the algorithms used for overload
           control.

           *Compliant*. DOIC allows new report types and abatement
           algorithms to be created.  These may be indicated using the
           OC-Supported-Features AVP.



   REQ 33: The solution MUST provide a default algorithm that is
           mandatory to implement.

           *Compliant*. The "loss" algorithm is mandatory to implement.



   REQ 34: The solution SHOULD provide a method for exchanging overload
           and load information between elements that are connected by
           intermediaries that do not support the solution.

           *Partially Compliant*. DOIC information can traverse non-
           supporting agents, as long as those agents do not modify
           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a
           way for supporting nodes to detect such modification.


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.

_______________________________________________
DiME mailing list
<a class="moz-txt-link-abbreviated" href="mailto:DiME@ietf.org">DiME@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a>

</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------040308090400040805030209--


From nobody Tue Dec  2 10:49:47 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA5D91A6FC9 for <dime@ietfa.amsl.com>; Tue,  2 Dec 2014 10:49:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.58
X-Spam-Level: *
X-Spam-Status: No, score=1.58 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1BZa9g69k_fZ for <dime@ietfa.amsl.com>; Tue,  2 Dec 2014 10:49:41 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DB051A1EF6 for <dime@ietf.org>; Tue,  2 Dec 2014 10:49:41 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63073 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XvsW0-00083A-6D; Tue, 02 Dec 2014 10:49:40 -0800
Message-ID: <547E09C0.5080305@usdonovans.com>
Date: Tue, 02 Dec 2014 12:49:36 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: lionel.morand@orange.com, Ben Campbell <ben@nostrum.com>
References: <545792B6.8030502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815228ADC@DEMUMBX014.nsn-intra.net> <22181_1415728795_54624E9B_22181_12987_1_6B7134B31289DC4FAF731D844122B36E8C86C9@PEXCVZYM13.corporate.adroot.infra.ftgroup> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Content-Type: multipart/alternative; boundary="------------070508030007080406070803"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/2F-AiHQJ6lWobF7BeQ9cnD2FZvg
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Dec 2014 18:49:44 -0000

This is a multi-part message in MIME format.
--------------070508030007080406070803
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit

Lionel,

The two paragraphs together now say the following:

    When a reporting node sends an OLR, it effectively delegates any
    necessary throttling to downstream nodes.  If the reporting node also
    locally throttles the same set of messages, the overall number of
    throttled request may be higher than intended.  Therefore, if a
    reporting node needs to apply local throttling on a set of messages
    that match or overlap with existing OCS entries, it needs to consider
    the impact of throttling by downstream nodes.

    However, when the reporting node sends an OLR downstream, it might
    still need to apply other abatement methods such as diversion.  The
    reporting node might also need to throttle requests for reasons other
    than overload.  For example, an agent or server might have a
    configured rate limit for each client, and throttle requests that
    exceed that limit, even if such requests had already been candidates
    for throttling by downstream nodes.

Do you see the need for further clarification?

Steve


On 11/25/14, 12:26 PM, lionel.morand@orange.com wrote:
> I'm OK with the idea of the text proposed by Ben.
> I would just make clear that throttling is applicable to the fact of sending/forwarding requests (cf. definition). A reporting node may apply local throttling if it is an agent. But if it is a server, it can either drop the exceeded number of requests (no response sent to the downstream) or send a specific DIAMETER-TOO-BUSY response. I think that this clarification is somehow missing in the document.
>
> Regards,
>
> Lionel
>
> -----Message d'origine-----
> De : Steve Donovan [mailto:srdonovan@usdonovans.com]
> Envoyé : mardi 25 novembre 2014 15:07
> À : Ben Campbell; MORAND Lionel IMT/OLN
> Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org; Maria Cruz Bartolome
> Objet : Re: [Dime] Updates to DOIC -05
>
> I'm ok with Ben's wording and will make the change unless I hear objections on the list.
>
> Steve
>
> On 11/21/14, 5:01 PM, Ben Campbell wrote:
>> On reflection, I think there might be a subtlety here. The resulting offered-load may still exceed the reporting node's current capacity. This can be true even if it's sent an OLR (and thus has related OCS). As mentioned in the surrounding node needs to still be able to protect itself, possibly by throttling. Therefore, I propose the sentence take the form of non-normative guidance. For example:
>>
>> "When a reporting node sends an OLR, it effectively delegates any necessary throttling to downstream nodes.  If the reporting node also locally throttles the same set of messages, the overall number of throttled request may be higher than intended. Therefore, if a reporting node needs to apply local throttling on a set of messages that match or overlap with existing OCS entries, it needs to consider the impact of throttling by downstream nodes."
>>
>>    
>>> On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com wrote:
>>>
>>> I can live with the text proposed by Ulrich. But what is wrong with:
>>>
>>> " Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which an active OCS applies." ?
>>>
>>> Envoyé depuis mon Sony Xperia SP d'Orange
>>>
>>> ---- Maria Cruz Bartolome a écrit ----
>>>
>>>
>>>> Section 4.2.3, 13th paragraph, 2nd sentence:
>>>> Existing text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the OLR applies.
>>>> Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the sent OLR applies.
>>>>
>>>> [LM] I would say that the reporting node will not remember the previously sent OLR, but will take care that there is an active OCS.
>>> SRD> I'm ok with Ulrich's change.
>>>
>>> [LM] and this is incorrect but not fundamental. The reporting node does not have to "remember" a previously sent OLR. What it will do is to refer to existing OCS to know that throttling should not be applied. An OCS is a consequence of an sent OLR but it is not an OLR itself. But not fundamental here.
>>>
>>> [MCruz] I am ok with Ulrich's change. It does not mean that the reporting node needs to "remember" a previously sent OLR, though. The change only proposes to "identify" which OLR we refer to.
>>>
>>> Best regards
>>> /MCruz
>>>
>>>
>>> _____________________________________________________________________
>>> ____________________________________________________
>>>
>>> Ce message et ses pieces jointes peuvent contenir des informations
>>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>>> exploites ou copies sans autorisation. Si vous avez recu ce message
>>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>>
>>> This message and its attachments may contain confidential or
>>> privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
>>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>>> Thank you.
>>>
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>
> _________________________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>
>


--------------070508030007080406070803
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Lionel,<br>
    <br>
    The two paragraphs together now say the following:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>   When a reporting node sends an OLR, it effectively delegates any
   necessary throttling to downstream nodes.  If the reporting node also
   locally throttles the same set of messages, the overall number of
   throttled request may be higher than intended.  Therefore, if a
   reporting node needs to apply local throttling on a set of messages
   that match or overlap with existing OCS entries, it needs to consider
   the impact of throttling by downstream nodes.

   However, when the reporting node sends an OLR downstream, it might
   still need to apply other abatement methods such as diversion.  The
   reporting node might also need to throttle requests for reasons other
   than overload.  For example, an agent or server might have a
   configured rate limit for each client, and throttle requests that
   exceed that limit, even if such requests had already been candidates
   for throttling by downstream nodes.</pre>
    Do you see the need for further clarification?<br>
    <br>
    Steve<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 11/25/14, 12:26 PM,
      <a class="moz-txt-link-abbreviated" href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a> wrote:<br>
    </div>
    <blockquote
cite="mid:19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup"
      type="cite">
      <pre wrap="">I'm OK with the idea of the text proposed by Ben.
I would just make clear that throttling is applicable to the fact of sending/forwarding requests (cf. definition). A reporting node may apply local throttling if it is an agent. But if it is a server, it can either drop the exceeded number of requests (no response sent to the downstream) or send a specific DIAMETER-TOO-BUSY response. I think that this clarification is somehow missing in the document.

Regards,

Lionel

-----Message d'origine-----
De&nbsp;: Steve Donovan [<a class="moz-txt-link-freetext" href="mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>] 
Envoy&eacute;&nbsp;: mardi 25 novembre 2014 15:07
&Agrave;&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN
Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a>; Maria Cruz Bartolome
Objet&nbsp;: Re: [Dime] Updates to DOIC -05

I'm ok with Ben's wording and will make the change unless I hear objections on the list.

Steve

On 11/21/14, 5:01 PM, Ben Campbell wrote:
</pre>
      <blockquote type="cite">
        <pre wrap="">On reflection, I think there might be a subtlety here. The resulting offered-load may still exceed the reporting node's current capacity. This can be true even if it's sent an OLR (and thus has related OCS). As mentioned in the surrounding node needs to still be able to protect itself, possibly by throttling. Therefore, I propose the sentence take the form of non-normative guidance. For example:

"When a reporting node sends an OLR, it effectively delegates any necessary throttling to downstream nodes.  If the reporting node also locally throttles the same set of messages, the overall number of throttled request may be higher than intended. Therefore, if a reporting node needs to apply local throttling on a set of messages that match or overlap with existing OCS entries, it needs to consider the impact of throttling by downstream nodes."

  
</pre>
        <blockquote type="cite">
          <pre wrap="">On Nov 17, 2014, at 2:38 AM, <a class="moz-txt-link-abbreviated" href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a> wrote:

I can live with the text proposed by Ulrich. But what is wrong with:

" Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which an active OCS applies." ?

Envoy&eacute; depuis mon Sony Xperia SP d'Orange

---- Maria Cruz Bartolome a &eacute;crit ----


</pre>
          <blockquote type="cite">
            <pre wrap="">Section 4.2.3, 13th paragraph, 2nd sentence:
Existing text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the OLR applies.
Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the sent OLR applies.

[LM] I would say that the reporting node will not remember the previously sent OLR, but will take care that there is an active OCS.
</pre>
          </blockquote>
          <pre wrap="">SRD&gt; I'm ok with Ulrich's change.

[LM] and this is incorrect but not fundamental. The reporting node does not have to "remember" a previously sent OLR. What it will do is to refer to existing OCS to know that throttling should not be applied. An OCS is a consequence of an sent OLR but it is not an OLR itself. But not fundamental here.

[MCruz] I am ok with Ulrich's change. It does not mean that the reporting node needs to "remember" a previously sent OLR, though. The change only proposes to "identify" which OLR we refer to.

Best regards
/MCruz


_____________________________________________________________________
____________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc pas etre diffuses, 
exploites ou copies sans autorisation. Si vous avez recu ce message 
par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or 
privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.

_______________________________________________
DiME mailing list
<a class="moz-txt-link-abbreviated" href="mailto:DiME@ietf.org">DiME@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a>
</pre>
        </blockquote>
        <pre wrap="">
</pre>
      </blockquote>
      <pre wrap="">

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.


</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------070508030007080406070803--


From nobody Wed Dec  3 01:47:59 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAE231A037E for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 01:47:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1
X-Spam-Level: 
X-Spam-Status: No, score=-1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kg3X7ndA_GYU for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 01:47:55 -0800 (PST)
Received: from mail-lb0-x22e.google.com (mail-lb0-x22e.google.com [IPv6:2a00:1450:4010:c04::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61A161A033A for <dime@ietf.org>; Wed,  3 Dec 2014 01:47:54 -0800 (PST)
Received: by mail-lb0-f174.google.com with SMTP id w7so12174605lbi.33 for <dime@ietf.org>; Wed, 03 Dec 2014 01:47:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=5Rb7aPrkvbBptdhztcE7gol7UKD5TEp1v2FQ6NKHCvM=; b=DuugYtFixbj7i3uzl4DCLOKNWc2IeXZdOCW+rjCDVZWJlGbX9iL5JkKxlndCr/8xjT XK5myIl8agfbty2WEt9zEVnVpb4eypZSHrPRGuaRJ1BtGPFwhsuoZT9y/AGb2UMII132 IaecWU/2bAc533HQVQhVqHdb2IWFeNwBZ+k6lZ4ww9wH7IER8Sd7znBG9BMArHsZtsSL dTu+cpJbI4SkrRW1xLbDOsM3VPvB7Rs2zEeYCO2HLtgY3cwvuCWNjeBFOmRSGybvt+tc brpAkvtteeqifUqyRFaRGeKQVLF6Z33X1fPXJBP4Kkwnzre5xAM8O8SfODcFkZWh0spO bzrQ==
X-Received: by 10.112.129.228 with SMTP id nz4mr1251890lbb.8.1417600072666; Wed, 03 Dec 2014 01:47:52 -0800 (PST)
Received: from [188.117.15.109] ([188.117.15.109]) by mx.google.com with ESMTPSA id vr7sm6309174lbb.21.2014.12.03.01.47.50 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 03 Dec 2014 01:47:51 -0800 (PST)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Jouni <jouni.nospam@gmail.com>
In-Reply-To: <547E09C0.5080305@usdonovans.com>
Date: Wed, 3 Dec 2014 11:47:49 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <010C55AB-73CF-4462-A157-87107644C230@gmail.com>
References: <545792B6.8030502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815228ADC@DEMUMBX014.nsn-intra.net> <22181_1415728795_54624E9B_22181_12987_1_6B7134B31289DC4FAF731D844122B36E8C86C9@PEXCVZYM13.corporate.adroot.infra.ftgroup> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/qREnfkTUmxXz86UNTql7fvuIA_k
Cc: Ben Campbell <ben@nostrum.com>, "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 09:47:57 -0000

I would be OK with this text.

- Jouni


> On 02 Dec 2014, at 20:49, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Lionel,
>=20
> The two paragraphs together now say the following:
>=20
>    When a reporting node sends an OLR, it effectively delegates any
>    necessary throttling to downstream nodes.  If the reporting node =
also
>    locally throttles the same set of messages, the overall number of
>    throttled request may be higher than intended.  Therefore, if a
>    reporting node needs to apply local throttling on a set of messages
>    that match or overlap with existing OCS entries, it needs to =
consider
>    the impact of throttling by downstream nodes.
>=20
>    However, when the reporting node sends an OLR downstream, it might
>    still need to apply other abatement methods such as diversion.  The
>    reporting node might also need to throttle requests for reasons =
other
>    than overload.  For example, an agent or server might have a
>    configured rate limit for each client, and throttle requests that
>    exceed that limit, even if such requests had already been =
candidates
>    for throttling by downstream nodes.
>=20
> Do you see the need for further clarification?
>=20
> Steve
>=20
>=20
> On 11/25/14, 12:26 PM, lionel.morand@orange.com wrote:
>> I'm OK with the idea of the text proposed by Ben.
>> I would just make clear that throttling is applicable to the fact of =
sending/forwarding requests (cf. definition). A reporting node may apply =
local throttling if it is an agent. But if it is a server, it can either =
drop the exceeded number of requests (no response sent to the =
downstream) or send a specific DIAMETER-TOO-BUSY response. I think that =
this clarification is somehow missing in the document.
>>=20
>> Regards,
>>=20
>> Lionel
>>=20
>> -----Message d'origine-----
>> De : Steve Donovan [
>> mailto:srdonovan@usdonovans.com
>> ]=20
>> Envoy=E9 : mardi 25 novembre 2014 15:07
>> =C0 : Ben Campbell; MORAND Lionel IMT/OLN
>> Cc : Wiehe, Ulrich (NSN - DE/Munich);=20
>> dime@ietf.org
>> ; Maria Cruz Bartolome
>> Objet : Re: [Dime] Updates to DOIC -05
>>=20
>> I'm ok with Ben's wording and will make the change unless I hear =
objections on the list.
>>=20
>> Steve
>>=20
>> On 11/21/14, 5:01 PM, Ben Campbell wrote:
>>=20
>>> On reflection, I think there might be a subtlety here. The resulting =
offered-load may still exceed the reporting node's current capacity. =
This can be true even if it's sent an OLR (and thus has related OCS). As =
mentioned in the surrounding node needs to still be able to protect =
itself, possibly by throttling. Therefore, I propose the sentence take =
the form of non-normative guidance. For example:
>>>=20
>>> "When a reporting node sends an OLR, it effectively delegates any =
necessary throttling to downstream nodes.  If the reporting node also =
locally throttles the same set of messages, the overall number of =
throttled request may be higher than intended. Therefore, if a reporting =
node needs to apply local throttling on a set of messages that match or =
overlap with existing OCS entries, it needs to consider the impact of =
throttling by downstream nodes."
>>>=20
>>>  =20
>>>=20
>>>> On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com
>>>>  wrote:
>>>>=20
>>>> I can live with the text proposed by Ulrich. But what is wrong =
with:
>>>>=20
>>>> " Therefore, the reporting node SHOULD NOT apply throttling to the =
set of messages to which an active OCS applies." ?
>>>>=20
>>>> Envoy=E9 depuis mon Sony Xperia SP d'Orange
>>>>=20
>>>> ---- Maria Cruz Bartolome a =E9crit ----
>>>>=20
>>>>=20
>>>>=20
>>>>> Section 4.2.3, 13th paragraph, 2nd sentence:
>>>>> Existing text: Therefore, the reporting node SHOULD NOT apply =
throttling to the set of messages to which the OLR applies.
>>>>> Proposed text: Therefore, the reporting node SHOULD NOT apply =
throttling to the set of messages to which the sent OLR applies.
>>>>>=20
>>>>> [LM] I would say that the reporting node will not remember the =
previously sent OLR, but will take care that there is an active OCS.
>>>>>=20
>>>> SRD> I'm ok with Ulrich's change.
>>>>=20
>>>> [LM] and this is incorrect but not fundamental. The reporting node =
does not have to "remember" a previously sent OLR. What it will do is to =
refer to existing OCS to know that throttling should not be applied. An =
OCS is a consequence of an sent OLR but it is not an OLR itself. But not =
fundamental here.
>>>>=20
>>>> [MCruz] I am ok with Ulrich's change. It does not mean that the =
reporting node needs to "remember" a previously sent OLR, though. The =
change only proposes to "identify" which OLR we refer to.
>>>>=20
>>>> Best regards
>>>> /MCruz
>>>>=20
>>>>=20
>>>> =
_____________________________________________________________________
>>>> ____________________________________________________
>>>>=20
>>>> Ce message et ses pieces jointes peuvent contenir des informations=20=

>>>> confidentielles ou privilegiees et ne doivent donc pas etre =
diffuses,=20
>>>> exploites ou copies sans autorisation. Si vous avez recu ce message=20=

>>>> par erreur, veuillez le signaler a l'expediteur et le detruire =
ainsi que les pieces jointes. Les messages electroniques etant =
susceptibles d'alteration, Orange decline toute responsabilite si ce =
message a ete altere, deforme ou falsifie. Merci.
>>>>=20
>>>> This message and its attachments may contain confidential or=20
>>>> privileged information that may be protected by law; they should =
not be distributed, used or copied without authorisation.
>>>> If you have received this email in error, please notify the sender =
and delete this message and its attachments.
>>>> As emails may be altered, Orange is not liable for messages that =
have been modified, changed or falsified.
>>>> Thank you.
>>>>=20
>>>> _______________________________________________
>>>> DiME mailing list
>>>>=20
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>> =
__________________________________________________________________________=
_______________________________________________
>>=20
>> Ce message et ses pieces jointes peuvent contenir des informations =
confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous =
avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les =
messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, =
deforme ou falsifie. Merci.
>>=20
>> This message and its attachments may contain confidential or =
privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender =
and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.
>> Thank you.
>>=20
>>=20
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec  3 02:04:42 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55BF01A1AB6 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:04:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oz9ajzEGsXbf for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:04:38 -0800 (PST)
Received: from mail-la0-x22c.google.com (mail-la0-x22c.google.com [IPv6:2a00:1450:4010:c03::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE1951A0389 for <dime@ietf.org>; Wed,  3 Dec 2014 02:04:19 -0800 (PST)
Received: by mail-la0-f44.google.com with SMTP id ge10so12190919lab.31 for <dime@ietf.org>; Wed, 03 Dec 2014 02:04:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:content-transfer-encoding:subject:date:message-id :cc:to:mime-version; bh=aoV3dHNy980AuE1O05IJttLoNFmwh9kKoWdT9EcvSK0=; b=K71jp0Sdlc8mBhjgOQum3MKFdC1EUsAujALI8FDJ/i0wgtNxPrM1fCf3dX5Q6uvqxz IASHD4nleOoml/tXdb2AJF/4xK9XcBis01DLT3If1Evy4lnec2/6ibgWixhLqSVRvByu S+nx4a1uWp/fmvescj96pFkY2fllnlGlkNi3Cdem2AWiLmIlZnJs4CpPfCC7RZGHlSr6 ewYC8Sxo3pGMyPgH3heJyM7FaQ00L3NKj4PplSNdOh7gJC3SrvkgJGaGgSWshqNCjHkG 9lf85nO81NZXPmHkRZGxZNO9Out+jiYvh/bK299D/nZcSz9MvCzTHWchmw/fqdfGzrUT sSBA==
X-Received: by 10.152.28.131 with SMTP id b3mr3684746lah.12.1417601058387; Wed, 03 Dec 2014 02:04:18 -0800 (PST)
Received: from ?IPv6:2001:1bc8:101:f101:38c3:cb41:84a2:f0d0? ([2001:1bc8:101:f101:38c3:cb41:84a2:f0d0]) by mx.google.com with ESMTPSA id v7sm4006580lbb.2.2014.12.03.02.04.16 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 03 Dec 2014 02:04:17 -0800 (PST)
From: Jouni <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 3 Dec 2014 12:04:15 +0200
Message-Id: <4A9D369D-E22C-4E21-A887-C9123C23D017@gmail.com>
To: "dime@ietf.org list" <dime@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/cRVGhnKxfryaQ0ZVmbDPNlow4VY
Subject: [Dime] DIME and adding "load information" to the charter milestones
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:04:40 -0000

Folks,

As we discussed in Honolulu there is interest to add a new milestone for =
the load information. Recap from the meeting minutes:

  Ben - we have a path forward for now. Not working group adoption. We =
don't
        have a milestone for load. Although it's implied with solving =
RFC7068
         =20
  Jouni - Who supports adding load to milestones? (7 hands) Against? (0
          hands).
         =20
  ACTION: Ask the mailing list about adding load to the milestones.

So, we are going to add the following milestones (subject to editing) =
unless
enough people express their disagreement by 11th Dec EOB (CET+1):

Mar 2015 - Submit a document on 'Diameter Load Information' as a working =
group item
Mar 2016 - Submit I-D 'Diameter Load Information' to the IESG for =
consideration as a Proposed Standard


- Jouni & Lionel=


From nobody Wed Dec  3 02:12:13 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 342281A01FA for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:12:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jkbxj3R16O76 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:12:09 -0800 (PST)
Received: from mail-la0-x22e.google.com (mail-la0-x22e.google.com [IPv6:2a00:1450:4010:c03::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 776471A0461 for <dime@ietf.org>; Wed,  3 Dec 2014 02:12:09 -0800 (PST)
Received: by mail-la0-f46.google.com with SMTP id q1so7431079lam.33 for <dime@ietf.org>; Wed, 03 Dec 2014 02:12:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:content-transfer-encoding:subject:date:message-id :cc:to:mime-version; bh=+sqbpNX1xnVwhga18JCrtX8zUwjL/TVm7PBet8sP/Z8=; b=qtS0u9dSDEKzinntG7PtyAKn6k/71Lh+9MxPVQf0ZrtpNeTIalraYoHzL7xgvxBZPr ysV6Xari6W8M/L30eOE+UxWcgHZu9j7zthwL0PdQBzl11SST9Ci72JHrhzpxij8Z7sww UajTxWzvqut5em5XRywieTpM/8mMRv1y+cyBrRwpeyfd7/vwpmR+IBA3weQG+aX+1Mcl fcEBstgT58pJhXVfKMDIlKPO6dXzgfVO3WUGihl5rxjklZ2S2Wsdkd8UK0+6U414pPgP JRzgFz354MFTcCu+nJaOeiAUZBqX6f5OwEPMhCKmIVkyvN3vm7+2S3WLQmPwPOWKg6tS ItrA==
X-Received: by 10.152.8.82 with SMTP id p18mr3543123laa.25.1417601527998; Wed, 03 Dec 2014 02:12:07 -0800 (PST)
Received: from [188.117.15.109] ([188.117.15.109]) by mx.google.com with ESMTPSA id b4sm6326927lbp.17.2014.12.03.02.12.06 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 03 Dec 2014 02:12:07 -0800 (PST)
From: Jouni <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 3 Dec 2014 12:12:05 +0200
Message-Id: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com>
To: "dime@ietf.org list" <dime@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/_6_9LDolrrxpDpjFcivU01RJh8g
Subject: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-control
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:12:11 -0000

Folks,

As we discussed and agreed during the Honolulu meeting we ask for the WG =
adoption for draft-donovan-dime-doc-rate-control unless counter =
proposals show up. The "wait period" for counter proposals has been more =
than enough.

This mail starts a two week adoption call for =
draft-donovan-dime-doc-rate-control as a WG Item.

Express your support or disagreements in the mailing list. The call ends=20=

17th Dec EOB (CET+1).

- Jouni & Lionel


From nobody Wed Dec  3 02:12:20 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E0F31A0461 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:12:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V8rbEve6plsL for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:12:18 -0800 (PST)
Received: from mail-lb0-x22c.google.com (mail-lb0-x22c.google.com [IPv6:2a00:1450:4010:c04::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18BFD1A01FA for <dime@ietf.org>; Wed,  3 Dec 2014 02:12:16 -0800 (PST)
Received: by mail-lb0-f172.google.com with SMTP id u10so12064002lbd.3 for <dime@ietf.org>; Wed, 03 Dec 2014 02:12:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:content-transfer-encoding:subject:date:message-id :cc:to:mime-version; bh=9Rh24RICEERPp04UAkMkdwdyQ9frJTcs4lO7cSMvQKI=; b=XoR51mWuh3Eu1eVQuXWsUXtos9lUB0FBa5VujRvhjG1B/Dgz6SgkpD16ihmJ8ljI+V sVbrk3ca7un7Jdjh/UXDT8uqDU7RTrLxkwvkZdeQLgFsEnaOqLgxuDUmZHUFdF79ETHi etZx6ZJASf1IGIFKoDbxSJ2cpVichnvt1GBxNunpCsdSwBZg7cRGXV/I9yfLT01hjzkF id6kthEFnnrr18rcpfSlsfWbpei0a6+ZfPliiouG9PCIFeqHil9nd67gTZ6j+Vz+xAGG V7qBJFKcD1CG1u/pHGnEqXJHvd5s0G8imt6PPATCs6pr3HI/1FOObT8zeCK4LOYkaxHr QsPw==
X-Received: by 10.152.207.37 with SMTP id lt5mr3499847lac.66.1417601534622; Wed, 03 Dec 2014 02:12:14 -0800 (PST)
Received: from [188.117.15.109] ([188.117.15.109]) by mx.google.com with ESMTPSA id b4sm6326927lbp.17.2014.12.03.02.12.12 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 03 Dec 2014 02:12:13 -0800 (PST)
From: Jouni <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 3 Dec 2014 12:12:07 +0200
Message-Id: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com>
To: "dime@ietf.org list" <dime@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-c0QZYuetAWaOZNTfEWJuaJX29w
Subject: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:12:19 -0000

Folks,

As we discussed and agreed during the Honolulu meeting we ask for the WG =
adoption for draft-donovan-dime-agent-overload unless counter proposals =
show up. The "wait period" for counter proposals has been more than =
enough.

This mail starts a two week adoption call for =
draft-donovan-dime-agent-overload as a WG Item.

Express your support or disagreements in the mailing list. The call ends
17th Dec EOB (CET+1).

- Jouni & Lionel


From nobody Wed Dec  3 02:25:25 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1044D1A0AF7 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:25:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.599
X-Spam-Level: 
X-Spam-Status: No, score=-1.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xBSR6dgkhe-N for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:25:18 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 384F31A1A30 for <dime@ietf.org>; Wed,  3 Dec 2014 02:25:06 -0800 (PST)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm09.si.francetelecom.fr (ESMTP service) with ESMTP id 7ECF02DC194; Wed,  3 Dec 2014 11:25:04 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.183]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 6016327C079; Wed,  3 Dec 2014 11:25:04 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH02.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Wed, 3 Dec 2014 11:25:04 +0100
From: <lionel.morand@orange.com>
To: Jouni <jouni.nospam@gmail.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHQDmC9B2lc+qnTi0KtXgvGw5tH5Jx9juCAgAAVEvA=
Date: Wed, 3 Dec 2014 10:25:03 +0000
Message-ID: <12859_1417602304_547EE500_12859_6241_1_6B7134B31289DC4FAF731D844122B36E99A14C@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <545792B6.8030502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815228ADC@DEMUMBX014.nsn-intra.net> <22181_1415728795_54624E9B_22181_12987_1_6B7134B31289DC4FAF731D844122B36E8C86C9@PEXCVZYM13.corporate.adroot.infra.ftgroup> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <010C55AB-73CF-4462-A157-87107644C230@gmail.com>
In-Reply-To: <010C55AB-73CF-4462-A157-87107644C230@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.2]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.12.3.40922
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-a3CCFUmhes9QMOTE_zZ0e611oU
Cc: Ben Campbell <ben@nostrum.com>, "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:25:21 -0000

Hi Steve,

   When a reporting node sends an OLR, it effectively delegates any
   necessary throttling to downstream nodes.  If the reporting node also
   locally throttles the same set of messages, the overall number of
   throttled request may be higher than intended.  Therefore, if a
s/throttled request/throttled requests
   reporting node needs to apply local throttling on a set of messages
   that match or overlap with existing OCS entries, it needs to consider
   the impact of throttling by downstream nodes.
s/throttling by/throttling performed by

question: what is the meaning of overlap here? Can we just kept "match"

   However, when the reporting node sends an OLR downstream, it might
   still need to apply other abatement methods such as diversion.  The
   reporting node might also need to throttle requests for reasons other
   than overload.  For example, an agent or server might have a
   configured rate limit for each client, and throttle requests that
   exceed that limit, even if such requests had already been candidates
   for throttling by downstream nodes.

I can live the text above.
But I would suggest to change the third sentence of the first paragraph as =
follow:

   Therefore, before applying local message throttling, a  reporting node
   needs to check if these messages match existing OCS entries, indicating
   that these messages have survived to the throttling applied by=20
   downstream nodes that have received the related OLR.

And to make the link the first paragraph and the second one, I would propos=
e:

   However, even if the set of messages match existing OCS entries, the=20
   reporting node can still apply other abatement methods such as diversion=
.=20=20
  [etc.]

Regards,

Lionel

-----Message d'origine-----
De=A0: Jouni [mailto:jouni.nospam@gmail.com]=20
Envoy=E9=A0: mercredi 3 d=E9cembre 2014 10:48
=C0=A0: Steve Donovan
Cc=A0: MORAND Lionel IMT/OLN; Ben Campbell; dime@ietf.org
Objet=A0: Re: [Dime] Updates to DOIC -05

I would be OK with this text.

- Jouni


> On 02 Dec 2014, at 20:49, Steve Donovan <srdonovan@usdonovans.com> wrote:
>=20
> Lionel,
>=20
> The two paragraphs together now say the following:
>=20
>    When a reporting node sends an OLR, it effectively delegates any
>    necessary throttling to downstream nodes.  If the reporting node also
>    locally throttles the same set of messages, the overall number of
>    throttled request may be higher than intended.  Therefore, if a
>    reporting node needs to apply local throttling on a set of messages
>    that match or overlap with existing OCS entries, it needs to consider
>    the impact of throttling by downstream nodes.
>=20
>    However, when the reporting node sends an OLR downstream, it might
>    still need to apply other abatement methods such as diversion.  The
>    reporting node might also need to throttle requests for reasons other
>    than overload.  For example, an agent or server might have a
>    configured rate limit for each client, and throttle requests that
>    exceed that limit, even if such requests had already been candidates
>    for throttling by downstream nodes.
>=20
> Do you see the need for further clarification?
>=20
> Steve
>=20
>=20
> On 11/25/14, 12:26 PM, lionel.morand@orange.com wrote:
>> I'm OK with the idea of the text proposed by Ben.
>> I would just make clear that throttling is applicable to the fact of sen=
ding/forwarding requests (cf. definition). A reporting node may apply local=
 throttling if it is an agent. But if it is a server, it can either drop th=
e exceeded number of requests (no response sent to the downstream) or send =
a specific DIAMETER-TOO-BUSY response. I think that this clarification is s=
omehow missing in the document.
>>=20
>> Regards,
>>=20
>> Lionel
>>=20
>> -----Message d'origine-----
>> De : Steve Donovan [
>> mailto:srdonovan@usdonovans.com
>> ]
>> Envoy=E9 : mardi 25 novembre 2014 15:07 =C0 : Ben Campbell; MORAND Lione=
l=20
>> IMT/OLN Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org ; Maria=20
>> Cruz Bartolome Objet : Re: [Dime] Updates to DOIC -05
>>=20
>> I'm ok with Ben's wording and will make the change unless I hear objecti=
ons on the list.
>>=20
>> Steve
>>=20
>> On 11/21/14, 5:01 PM, Ben Campbell wrote:
>>=20
>>> On reflection, I think there might be a subtlety here. The resulting of=
fered-load may still exceed the reporting node's current capacity. This can=
 be true even if it's sent an OLR (and thus has related OCS). As mentioned =
in the surrounding node needs to still be able to protect itself, possibly =
by throttling. Therefore, I propose the sentence take the form of non-norma=
tive guidance. For example:
>>>=20
>>> "When a reporting node sends an OLR, it effectively delegates any neces=
sary throttling to downstream nodes.  If the reporting node also locally th=
rottles the same set of messages, the overall number of throttled request m=
ay be higher than intended. Therefore, if a reporting node needs to apply l=
ocal throttling on a set of messages that match or overlap with existing OC=
S entries, it needs to consider the impact of throttling by downstream node=
s."
>>>=20
>>>=20=20=20
>>>=20
>>>> On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com
>>>>  wrote:
>>>>=20
>>>> I can live with the text proposed by Ulrich. But what is wrong with:
>>>>=20
>>>> " Therefore, the reporting node SHOULD NOT apply throttling to the set=
 of messages to which an active OCS applies." ?
>>>>=20
>>>> Envoy=E9 depuis mon Sony Xperia SP d'Orange
>>>>=20
>>>> ---- Maria Cruz Bartolome a =E9crit ----
>>>>=20
>>>>=20
>>>>=20
>>>>> Section 4.2.3, 13th paragraph, 2nd sentence:
>>>>> Existing text: Therefore, the reporting node SHOULD NOT apply throttl=
ing to the set of messages to which the OLR applies.
>>>>> Proposed text: Therefore, the reporting node SHOULD NOT apply throttl=
ing to the set of messages to which the sent OLR applies.
>>>>>=20
>>>>> [LM] I would say that the reporting node will not remember the previo=
usly sent OLR, but will take care that there is an active OCS.
>>>>>=20
>>>> SRD> I'm ok with Ulrich's change.
>>>>=20
>>>> [LM] and this is incorrect but not fundamental. The reporting node doe=
s not have to "remember" a previously sent OLR. What it will do is to refer=
 to existing OCS to know that throttling should not be applied. An OCS is a=
 consequence of an sent OLR but it is not an OLR itself. But not fundamenta=
l here.
>>>>=20
>>>> [MCruz] I am ok with Ulrich's change. It does not mean that the report=
ing node needs to "remember" a previously sent OLR, though. The change only=
 proposes to "identify" which OLR we refer to.
>>>>=20
>>>> Best regards
>>>> /MCruz
>>>>=20
>>>>=20
>>>> ___________________________________________________________________
>>>> __ ____________________________________________________
>>>>=20
>>>> Ce message et ses pieces jointes peuvent contenir des informations=20
>>>> confidentielles ou privilegiees et ne doivent donc pas etre=20
>>>> diffuses, exploites ou copies sans autorisation. Si vous avez recu=20
>>>> ce message par erreur, veuillez le signaler a l'expediteur et le detru=
ire ainsi que les pieces jointes. Les messages electroniques etant suscepti=
bles d'alteration, Orange decline toute responsabilite si ce message a ete =
altere, deforme ou falsifie. Merci.
>>>>=20
>>>> This message and its attachments may contain confidential or=20
>>>> privileged information that may be protected by law; they should not b=
e distributed, used or copied without authorisation.
>>>> If you have received this email in error, please notify the sender and=
 delete this message and its attachments.
>>>> As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.
>>>> Thank you.
>>>>=20
>>>> _______________________________________________
>>>> DiME mailing list
>>>>=20
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>> _____________________________________________________________________
>> ____________________________________________________
>>=20
>> Ce message et ses pieces jointes peuvent contenir des informations=20
>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,=20
>> exploites ou copies sans autorisation. Si vous avez recu ce message=20
>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que=
 les pieces jointes. Les messages electroniques etant susceptibles d'altera=
tion, Orange decline toute responsabilite si ce message a ete altere, defor=
me ou falsifie. Merci.
>>=20
>> This message and its attachments may contain confidential or=20
>> privileged information that may be protected by law; they should not be =
distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and d=
elete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have be=
en modified, changed or falsified.
>> Thank you.
>>=20
>>=20
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


From nobody Wed Dec  3 02:29:09 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 393F21A1A06 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:29:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level: 
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TRfMngzlkJBh for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:29:02 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpgre-esg-01.alcatel-lucent.com [135.245.210.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 547BD1A0461 for <dime@ietf.org>; Wed,  3 Dec 2014 02:29:02 -0800 (PST)
Received: from fr711usmtp1.zeu.alcatel-lucent.com (unknown [135.239.2.122]) by Websense Email Security Gateway with ESMTPS id CDAFEA636CCF1; Wed,  3 Dec 2014 10:28:56 +0000 (GMT)
Received: from FR712WXCHHUB03.zeu.alcatel-lucent.com (fr712wxchhub03.zeu.alcatel-lucent.com [135.239.2.74]) by fr711usmtp1.zeu.alcatel-lucent.com (GMO) with ESMTP id sB3AT0PQ025173 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 3 Dec 2014 11:29:00 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR712WXCHHUB03.zeu.alcatel-lucent.com ([135.239.2.74]) with mapi id 14.03.0195.001; Wed, 3 Dec 2014 11:29:00 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "lionel.morand@orange.com" <lionel.morand@orange.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHP96zWh2IhAI9MNUyrs2P7h3In05xXdZWAgAKB9QCAABTjgIABToGAgABXjYCAAImqAIAAtOqAgAHz+gCAAFg3AIAFNTcAgAARHgCABzpwAIAFs+cAgABIhYCACwbhAIABEZ9g
Date: Wed, 3 Dec 2014 10:29:00 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <545792B6.8030502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815228ADC@DEMUMBX014.nsn-intra.net> <22181_1415728795_54624E9B_22181_12987_1_6B7134B31289DC4FAF731D844122B36E8C86C9@PEXCVZYM13.corporate.adroot.infra.ftgroup> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com>
In-Reply-To: <547E09C0.5080305@usdonovans.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.41]
Content-Type: multipart/alternative; boundary="_000_E194C2E18676714DACA9C3A2516265D2026F0FAFFR712WXCHMBA12z_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/8OC75bZd98N5Oq93qskFOx73GWw
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:29:06 -0000

--_000_E194C2E18676714DACA9C3A2516265D2026F0FAFFR712WXCHMBA12z_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear all

I am not against the new proposed texts from Steve or Ben to clarify this t=
opic.

My point is that, when  the reporting node has sent an OLR requiring  a tra=
ffic reduction , there is first a reaction time before receiving reduced tr=
affic, and second even if the traffic has been reduced, it can still exceed=
 the capacity of the reporting node  that has no other choice than to throt=
tle the received reduced traffic (if no diversion). This can happen when th=
e traffic at the source (reacting node) before throttling is increasing qui=
ckly, so the traffic reduced  according to the received OLR may  remain too=
 high .  Then, if the reporting node has nevertheless to do some throttle, =
it will certainly react by new OLRs requiring a higher traffic reduction fr=
om the reacting nodes. This is a dynamic process, where the reporting node =
adjust the  traffic  reduction it requires according to what it receives .

As Ben  I also think this is a guidance , and I think it is good to bring s=
ome guidance.

Best regards

JJacques

De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9 : mardi 2 d=E9cembre 2014 19:50
=C0 : lionel.morand@orange.com; Ben Campbell
Cc : dime@ietf.org
Objet : Re: [Dime] Updates to DOIC -05

Lionel,

The two paragraphs together now say the following:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled request may be higher than intended.  Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match or overlap with existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes.



   However, when the reporting node sends an OLR downstream, it might

   still need to apply other abatement methods such as diversion.  The

   reporting node might also need to throttle requests for reasons other

   than overload.  For example, an agent or server might have a

   configured rate limit for each client, and throttle requests that

   exceed that limit, even if such requests had already been candidates

   for throttling by downstream nodes.
Do you see the need for further clarification?

Steve

On 11/25/14, 12:26 PM, lionel.morand@orange.com<mailto:lionel.morand@orange=
.com> wrote:

I'm OK with the idea of the text proposed by Ben.

I would just make clear that throttling is applicable to the fact of sendin=
g/forwarding requests (cf. definition). A reporting node may apply local th=
rottling if it is an agent. But if it is a server, it can either drop the e=
xceeded number of requests (no response sent to the downstream) or send a s=
pecific DIAMETER-TOO-BUSY response. I think that this clarification is some=
how missing in the document.



Regards,



Lionel



-----Message d'origine-----

De : Steve Donovan [mailto:srdonovan@usdonovans.com]

Envoy=E9 : mardi 25 novembre 2014 15:07

=C0 : Ben Campbell; MORAND Lionel IMT/OLN

Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<mailto:dime@ietf.org>; =
Maria Cruz Bartolome

Objet : Re: [Dime] Updates to DOIC -05



I'm ok with Ben's wording and will make the change unless I hear objections=
 on the list.



Steve



On 11/21/14, 5:01 PM, Ben Campbell wrote:

On reflection, I think there might be a subtlety here. The resulting offere=
d-load may still exceed the reporting node's current capacity. This can be =
true even if it's sent an OLR (and thus has related OCS). As mentioned in t=
he surrounding node needs to still be able to protect itself, possibly by t=
hrottling. Therefore, I propose the sentence take the form of non-normative=
 guidance. For example:



"When a reporting node sends an OLR, it effectively delegates any necessary=
 throttling to downstream nodes.  If the reporting node also locally thrott=
les the same set of messages, the overall number of throttled request may b=
e higher than intended. Therefore, if a reporting node needs to apply local=
 throttling on a set of messages that match or overlap with existing OCS en=
tries, it needs to consider the impact of throttling by downstream nodes."





On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com<mailto:lionel.morand@=
orange.com> wrote:



I can live with the text proposed by Ulrich. But what is wrong with:



" Therefore, the reporting node SHOULD NOT apply throttling to the set of m=
essages to which an active OCS applies." ?



Envoy=E9 depuis mon Sony Xperia SP d'Orange



---- Maria Cruz Bartolome a =E9crit ----





Section 4.2.3, 13th paragraph, 2nd sentence:

Existing text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the OLR applies.

Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the sent OLR applies.



[LM] I would say that the reporting node will not remember the previously s=
ent OLR, but will take care that there is an active OCS.

SRD> I'm ok with Ulrich's change.



[LM] and this is incorrect but not fundamental. The reporting node does not=
 have to "remember" a previously sent OLR. What it will do is to refer to e=
xisting OCS to know that throttling should not be applied. An OCS is a cons=
equence of an sent OLR but it is not an OLR itself. But not fundamental her=
e.



[MCruz] I am ok with Ulrich's change. It does not mean that the reporting n=
ode needs to "remember" a previously sent OLR, though. The change only prop=
oses to "identify" which OLR we refer to.



Best regards

/MCruz





_____________________________________________________________________

____________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations

confidentielles ou privilegiees et ne doivent donc pas etre diffuses,

exploites ou copies sans autorisation. Si vous avez recu ce message

par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que le=
s pieces jointes. Les messages electroniques etant susceptibles d'alteratio=
n, Orange decline toute responsabilite si ce message a ete altere, deforme =
ou falsifie. Merci.



This message and its attachments may contain confidential or

privileged information that may be protected by law; they should not be dis=
tributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime







___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.






--_000_E194C2E18676714DACA9C3A2516265D2026F0FAFFR712WXCHMBA12z_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am not against the new =
proposed texts from Steve or Ben to clarify this topic.<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My point is that, when &n=
bsp;the reporting node has sent an OLR requiring &nbsp;a traffic reduction =
, there is first a reaction time before receiving reduced traffic,
 and second even if the traffic has been reduced, it can still exceed the c=
apacity of the reporting node &nbsp;that has no other choice than to thrott=
le the received reduced traffic (if no diversion). This can happen when the=
 traffic at the source (reacting node)
 before throttling is increasing quickly, so the traffic reduced&nbsp; acco=
rding to the received OLR may &nbsp;remain too high . &nbsp;Then, if the re=
porting node has nevertheless to do some throttle, it will certainly react =
by new OLRs requiring a higher traffic reduction
 from the reacting nodes. This is a dynamic process, where the reporting no=
de adjust the &nbsp;traffic &nbsp;reduction it requires according to what i=
t receives .<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As Ben&nbsp; I also think=
 this is a guidance , and I think it is good to bring some guidance.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-bou=
nces@ietf.org]
<b>De la part de</b> Steve Donovan<br>
<b>Envoy=E9&nbsp;:</b> mardi 2 d=E9cembre 2014 19:50<br>
<b>=C0&nbsp;:</b> lionel.morand@orange.com; Ben Campbell<br>
<b>Cc&nbsp;:</b> dime@ietf.org<br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Lionel,<br>
<br>
The two paragraphs together now say the following:<o:p></o:p></p>
<pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delega=
tes any<o:p></o:p></pre>
<pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the re=
porting node also<o:p></o:p></pre>
<pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall n=
umber of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttled request may be higher than intended.&nbsp; Ther=
efore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match or overlap with existing OCS entries, it needs=
 to consider<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes.<o:p></o:p><=
/pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; However, when the reporting node sends an OLR downstream,=
 it might<o:p></o:p></pre>
<pre>&nbsp;&nbsp; still need to apply other abatement methods such as diver=
sion.&nbsp; The<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node might also need to throttle requests for r=
easons other<o:p></o:p></pre>
<pre>&nbsp;&nbsp; than overload.&nbsp; For example, an agent or server migh=
t have a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; configured rate limit for each client, and throttle reque=
sts that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; exceed that limit, even if such requests had already been=
 candidates<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for throttling by downstream nodes.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Do you see the need f=
or further clarification?<br>
<br>
Steve<br>
<br>
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 11/25/14, 12:26 PM, <a href=3D"mailto:lionel.mora=
nd@orange.com">
lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>I'm OK with the idea of the text proposed by Ben.<o:p></o:p></pre>
<pre>I would just make clear that throttling is applicable to the fact of s=
ending/forwarding requests (cf. definition). A reporting node may apply loc=
al throttling if it is an agent. But if it is a server, it can either drop =
the exceeded number of requests (no response sent to the downstream) or sen=
d a specific DIAMETER-TOO-BUSY response. I think that this clarification is=
 somehow missing in the document.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Lionel<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-----Message d'origine-----<o:p></o:p></pre>
<pre>De&nbsp;: Steve Donovan [<a href=3D"mailto:srdonovan@usdonovans.com">m=
ailto:srdonovan@usdonovans.com</a>] <o:p></o:p></pre>
<pre>Envoy=E9&nbsp;: mardi 25 novembre 2014 15:07<o:p></o:p></pre>
<pre>=C0&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN<o:p></o:p></pre>
<pre>Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a href=3D"mailto:dime@ietf=
.org">dime@ietf.org</a>; Maria Cruz Bartolome<o:p></o:p></pre>
<pre>Objet&nbsp;: Re: [Dime] Updates to DOIC -05<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I'm ok with Ben's wording and will make the change unless I hear objec=
tions on the list.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 11/21/14, 5:01 PM, Ben Campbell wrote:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On reflection, I think there might be a subtlety here. The resulting o=
ffered-load may still exceed the reporting node's current capacity. This ca=
n be true even if it's sent an OLR (and thus has related OCS). As mentioned=
 in the surrounding node needs to still be able to protect itself, possibly=
 by throttling. Therefore, I propose the sentence take the form of non-norm=
ative guidance. For example:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&quot;When a reporting node sends an OLR, it effectively delegates any=
 necessary throttling to downstream nodes.&nbsp; If the reporting node also=
 locally throttles the same set of messages, the overall number of throttle=
d request may be higher than intended. Therefore, if a reporting node needs=
 to apply local throttling on a set of messages that match or overlap with =
existing OCS entries, it needs to consider the impact of throttling by down=
stream nodes.&quot;<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp; <o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On Nov 17, 2014, at 2:38 AM, <a href=3D"mailto:lionel.morand@orange.co=
m">lionel.morand@orange.com</a> wrote:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I can live with the text proposed by Ulrich. But what is wrong with:<o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&quot; Therefore, the reporting node SHOULD NOT apply throttling to th=
e set of messages to which an active OCS applies.&quot; ?<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Envoy=E9 depuis mon Sony Xperia SP d'Orange<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>---- Maria Cruz Bartolome a =E9crit ----<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Section 4.2.3, 13th paragraph, 2nd sentence:<o:p></o:p></pre>
<pre>Existing text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the OLR applies.<o:p></o:p></pre>
<pre>Proposed text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the sent OLR applies.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>[LM] I would say that the reporting node will not remember the previou=
sly sent OLR, but will take care that there is an active OCS.<o:p></o:p></p=
re>
</blockquote>
<pre>SRD&gt; I'm ok with Ulrich's change.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>[LM] and this is incorrect but not fundamental. The reporting node doe=
s not have to &quot;remember&quot; a previously sent OLR. What it will do i=
s to refer to existing OCS to know that throttling should not be applied. A=
n OCS is a consequence of an sent OLR but it is not an OLR itself. But not =
fundamental here.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>[MCruz] I am ok with Ulrich's change. It does not mean that the report=
ing node needs to &quot;remember&quot; a previously sent OLR, though. The c=
hange only proposes to &quot;identify&quot; which OLR we refer to.<o:p></o:=
p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Best regards<o:p></o:p></pre>
<pre>/MCruz<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_____________________________________________________________________<=
o:p></o:p></pre>
<pre>____________________________________________________<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations <o:=
p></o:p></pre>
<pre>confidentielles ou privilegiees et ne doivent donc pas etre diffuses, =
<o:p></o:p></pre>
<pre>exploites ou copies sans autorisation. Si vous avez recu ce message <o=
:p></o:p></pre>
<pre>par erreur, veuillez le signaler a l'expediteur et le detruire ainsi q=
ue les pieces jointes. Les messages electroniques etant susceptibles d'alte=
ration, Orange decline toute responsabilite si ce message a ete altere, def=
orme ou falsifie. Merci.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This message and its attachments may contain confidential or <o:p></o:=
p></pre>
<pre>privileged information that may be protected by law; they should not b=
e distributed, used or copied without authorisation.<o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>DiME mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/dime">https://www.iet=
f.org/mailman/listinfo/dime</a><o:p></o:p></pre>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>______________________________________________________________________=
___________________________________________________<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations con=
fidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
<pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez=
 recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
<pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messag=
es electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
<pre>Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This message and its attachments may contain confidential or privilege=
d information that may be protected by law;<o:p></o:p></pre>
<pre>they should not be distributed, used or copied without authorisation.<=
o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_E194C2E18676714DACA9C3A2516265D2026F0FAFFR712WXCHMBA12z_--


From nobody Wed Dec  3 02:54:21 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CF671A1A47 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:54:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AqSD_4193kQo for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:53:57 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias244.francetelecom.com [80.12.204.244]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4ECBD1A00B7 for <dime@ietf.org>; Wed,  3 Dec 2014 02:53:56 -0800 (PST)
Received: from omfeda08.si.francetelecom.fr (unknown [xx.xx.xx.201]) by omfeda09.si.francetelecom.fr (ESMTP service) with ESMTP id 6332AC027F; Wed,  3 Dec 2014 11:53:54 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfeda08.si.francetelecom.fr (ESMTP service) with ESMTP id 3949A384061; Wed,  3 Dec 2014 11:53:54 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Wed, 3 Dec 2014 11:53:53 +0100
From: <lionel.morand@orange.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Updated DOIC Requirements Analysis
Thread-Index: AQHQDl/RF5U9N06cVk+p/aHmphdv2px9rd8g
Date: Wed, 3 Dec 2014 10:53:52 +0000
Message-ID: <17153_1417604034_547EEBC2_17153_877_1_6B7134B31289DC4FAF731D844122B36E99A6E1@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com> <16959_1416942163_5474D253_16959_819_1_6B7134B31289DC4FAF731D844122B36E941941@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E07E3.7090200@usdonovans.com>
In-Reply-To: <547E07E3.7090200@usdonovans.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.2]
Content-Type: multipart/alternative; boundary="_000_6B7134B31289DC4FAF731D844122B36E99A6E1PEXCVZYM13corpora_"
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.11.21.125720
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5nPX-F8gTNRLYYzqlPJ9P8DlpNI
Subject: Re: [Dime] Updated DOIC Requirements Analysis
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:54:12 -0000

--_000_6B7134B31289DC4FAF731D844122B36E99A6E1PEXCVZYM13corpora_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Steve,

For the first paragraph, I would simply say:


   This specification defines a base solution for Diameter overload

   control, referred to as Diameter Overload Indication Conveyance

   (DOIC), based on the requirements identified in RFC 7068 [RFC7068].


OK for the rest.

Regards,

Lionel

De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9 : mardi 2 d=E9cembre 2014 19:42
=C0 : dime@ietf.org
Objet : Re: [Dime] Updated DOIC Requirements Analysis

Lionel,

I currently have the following for the Introduction based on other suggesti=
ons from, I believe, Ben:

   This specification defines a base solution for Diameter overload

   control, referred to as Diameter Overload Indication Conveyance

   (DOIC).  The requirements for the solution are described and

   discussed in the corresponding requirements document [RFC7068].



   This specification addresses Diameter overload control between

   Diameter nodes that support the DOIC solution.  The solution, which

   is designed to apply to existing and future Diameter applications,

   requires no changes to the Diameter base protocol [RFC6733] and is

   deployable in environments where some Diameter nodes do not implement

   the Diameter overload control solution defined in this specification.



   Note that the overload control solution defined in this specification

   does not address all the requirements listed in [RFC7068].  A number

   of overload control related features are left for future

   specifications.  See Appendix A for a list of extensions that are

   currently being considered.  See Appendix C for an analysis of

   conformance to the requirements specified in [RFC7068].
Let me know if this works for you.

I have included your other suggestion below.

Regards,

Steve

On 11/25/14, 1:02 PM, lionel.morand@orange.com<mailto:lionel.morand@orange.=
com> wrote:

Hi Ben, Steve,



the text in section 1 needs also to be updated. I would propose something l=
ike:



1.  Introduction



   This specification defines a base solution for Diameter Overload

   Control (DOC), referred to as Diameter Overload Indication Conveyance

   (DOIC).  The requirements for the solution are described and

   discussed in the corresponding design requirements document

   [RFC7068].  Note that the overload control solution defined in this

   specification does not address all the requirements listed in

   [RFC7068].  See Appendix C for further details on the

   conformance to the requirements specified in [RFC7068].



In C.1:



C.1.  Deferred Requirements



   The DIME working group chose to defer certain requirements in order

   to meet an an external deadline.  The 3GPP "Core Network and

   Terminal" working group 4 (CT4) working group wished to reference

   DOIC as part of Release 12.  This required the DOIC base protocol to

   be substantially complete by the end of 2014.  The deferred work

   includes the following:



it is not necessary to quote CT4, as there are other groups impacts. I woul=
d propose to rephrase as below:



   3GPP have adopted an early version of this document as normative

   reference in various Diameter related specifications to support the

   overload control mechanism in their release 12 framework.  The DIME

   working group has therefore decided to defer certain requirements in ord=
er

   to complete the design of an extensible generic solution before the

   deadline scheduled by 3GPP for the completion of the protocol work

   in release 12 by the end of 2014.  The deferred work includes the follow=
ing:



regards,



Lionel



De : DiME [mailto:dime-bounces@ietf.org] De la part de Ben Campbell

Envoy=E9 : mardi 25 novembre 2014 03:19

=C0 : dime@ietf.org<mailto:dime@ietf.org> list

Objet : [Dime] Updated DOIC Requirements Analysis



Here's the text from the updated requirements analysis. I updated the summa=
ry to be more general, and updated the detail based on mail discussion. The=
 detail section is marked for deletion before publication as an RFC.



BTW, It's appendix C now because I used the section Steve had already reser=
ved for it :-)



Thanks!



Ben.

-------------------

Appendix C.  Requirements Conformance Analysis



   This section contains the result of an analysis of the DOIC solutions

   conformance to the requirements defined in [RFC7068].



C.1.  Deferred Requirements



   The DIME working group chose to defer certain requirements in order

   to meet an an external deadline.  The 3GPP "Core Network and

   Terminal" working group 4 (CT4) working group wished to reference

   DOIC as part of Release 12.  This required the DOIC base protocol to

   be substantially complete by the end of 2014.  The deferred work

   includes the following:



   o  Agent Overload - The ability for an agent to report an overload

      condition of the agent itself.



   o  Load Information - The ability for a node to report its load level

      when not overloaded.



   At the time of this writing, DIME has begun separate work efforts for

   these requirements.



C.2.  Detection of non-supporting Intermediaries



   The DOIC mechanism as currently defined does not allow supporting

   nodes to automatically determine whether OC-Supported-Features or OC-

   OLR AVPs are originated by a peer node, or by a non-peer node and

   sent across a non-supporting peer.  This makes it impossible to

   detect the presence of non-supporting nodes between supporting nodes,

   except by configuration.  The working group determined that such a

   configuration requirement is acceptable.



   This limits full compliance with certain requirements related to the

   limitation of new configuration, deployment in environments with

   mixed support, operating across non-supporting agents, and

   authorization.



C.3.  Implicit Application Indication



   The working group elected to determine the application for an

   overload report from that of the enclosing message.  This prevents

   sending an OLR for an application when there are no transactions for

   that application.



   As a consequence, DOIC does not comply with the requirement to be

   able to report overload information across quiescent connections.

   DOIC does not fully comply with requirements to operate on up-to-date

   information, since if an OLR causes all transactions to stop for an

   application, the only way traffic will resume is for the OLR to

   expire.



C.4.  Stateless Operation



   RFC7068 explicitly discourages the sending of OLRs in every answer

   message, as part of the requirement to avoid additional work for

   overloaded nodes.  DOIC recommends exactly that behavior during

   active overload conditions.  The working group determined that doing

   otherwise would reduce reliability and increase statefulness.  (Note

   that DOIC does allow nodes to avoid sending OLRs in every answer if

   they have some other method of ensuring that OLRs get to all relevant

   reacting nodes.)



C.5.  No New Vulnerabilities



   The working group believes that DOIC is compliant with the

   requirement to avoid introducing new vulnerabilities.  However, this

   requirement may warrant an early security expert review.



C.6.  Detailed Requirements



   [RFC Editor: Please remove this section and subsections prior to

   publication as an RFC.]



C.6.1.  General



   REQ 1:  The solution MUST provide a communication method for Diameter

           nodes to exchange load and overload information.



           *Partially Compliant*. The mechanism uses new AVPs

           piggybacked on existing Diameter messages to exchange

           overload information.  It does not currently support "load"

           information or the ability to report overload of an agent.

           These have been left for future extensions.







   REQ 2:  The solution MUST allow Diameter nodes to support overload

           control regardless of which Diameter applications they

           support.  Diameter clients and agents must be able to use the

           received load and overload information to support graceful

           behavior during an overload condition.  Graceful behavior

           under overload conditions is best described by REQ 3.



           *Partially Compliant*. The DOIC AVPs can be used in any

           application that allows the extension of AVPs.  However,

           "load" information is not currently supported.







   REQ 3:  The solution MUST limit the impact of overload on the overall

           useful throughput of a Diameter server, even when the

           incoming load on the network is far in excess of its

           capacity.  The overall useful throughput under load is the

           ultimate measure of the value of a solution.



           *Compliant*. DOIC provides information that nodes can use to

           reduce the impact of overload.







   REQ 4:  Diameter allows requests to be sent from either side of a

           connection, and either side of a connection may have need to

           provide its overload status.  The solution MUST allow each

           side of a connection to independently inform the other of its

           overload status.



           *Compliant*. DOIC AVPs can be included regardless of

           transaction "direction"







   REQ 5:  Diameter allows nodes to determine their peers via dynamic

           discovery or manual configuration.  The solution MUST work

           consistently without regard to how peers are determined.



           *Compliant*. DOIC contains no assumptions about how peers are

           discovered.







   REQ 6:  The solution designers SHOULD seek to minimize the amount of

           new configuration required in order to work.  For example, it

           is better to allow peers to advertise or negotiate support

           for the solution, rather than to require that this knowledge

           to be configured at each node.



           *Partially Compliant*. Most DOIC parameters are advertised

           using the DOIC capability announcement mechanism.  However,

           there are some situations where configuration is required.

           For example, a DOIC node detect the fact that a peer may not

           support DOIC when nodes on the other side of the non-

           supporting node do support DOIC without configuration.







C.6.2.  Performance



   REQ 7:  The solution and any associated default algorithm(s) MUST

           ensure that the system remains stable.  At some point after

           an overload condition has ended, the solution MUST enable

           capacity to stabilize and become equal to what it would be in

           the absence of an overload condition.  Note that this also

           requires that the solution MUST allow nodes to shed load

           without introducing non-converging oscillations during or

           after an overload condition.



           *Compliant*. The specification offers guidance that

           implementations should apply hysteresis when recovering from

           overload, and avoid sudden ramp ups in offered load when

           recovering.







   REQ 8:  Supporting nodes MUST be able to distinguish current overload

           information from stale information.



           *Partially Compliant*. DOIC overload reports are "soft

           state", that is they expire after an indicated period.  DOIC

           nodes may also send reports that end existing overload

           conditions.  DOIC requires reporting nodes to ensure that all

           relevant reacting nodes receive overload reports.



           However, since DOIC does not allow reporting nodes to send

           OLRs in watchdog messages, if an overload condition results

           in zero offered load, the reporting node cannot update the

           condition until the expiration of the original OLR.







   REQ 9:  The solution MUST function across fully loaded as well as

           quiescent transport connections.  This is partially derived

           from the requirement for stability in REQ 7.



           *Not Compliant*. DOIC does not allow OLRs to be sent over

           quiescent transport connections.  This is due to the fact

           that OLRs cannot be sent outside of the application to which

           they apply.







   REQ 10: Consumers of overload information MUST be able to determine

           when the overload condition improves or ends.



           *Partially Compliant*. (See response to previous two

           requirements.)







   REQ 11: The solution MUST be able to operate in networks of different

           sizes.



           *Compliant*. DOIC makes no assumptions about the size of the

           network.  DOIC can operate purely between clients and

           servers, or across agents.







   REQ 12: When a single network node fails, goes into overload, or

           suffers from reduced processing capacity, the solution MUST

           make it possible to limit the impact of the affected node on

           other nodes in the network.  This helps to prevent a small-

           scale failure from becoming a widespread outage.



           *Partially Compliant*. DOIC allows overload reports for an

           entire realm, where abated traffic will not be redirected

           towards another server.  But in situations where nodes choose

           to divert traffic to other nodes, DOIC offers no way of

           knowing whether the new recipients can handle the traffic if

           they have not already indicated overload.  This may be

           mitigated with the use of a future "load" extension, or with

           the use of proprietary dynamic load-balancing mechanisms.







   REQ 13: The solution MUST NOT introduce substantial additional work

           for a node in an overloaded state.  For example, a

           requirement for an overloaded node to send overload

           information every time it received a new request would

           introduce substantial work.



           *Not Compliant*. DOIC does in fact encourage an overloaded

           node to send an OLR in every response.  The working group

           that other mechanisms to ensure that every relevant node

           receives an OLR would create even more work.  [Note: This

           needs discussion.]







   REQ 14: Some scenarios that result in overload involve a rapid

           increase of traffic with little time between normal levels

           and levels that induce overload.  The solution SHOULD provide

           for rapid feedback when traffic levels increase.



           *Compliant*. The piggyback mechanism allows OLRs to be sent

           at the same rate as application traffic.







   REQ 15: The solution MUST NOT interfere with the congestion control

           mechanisms of underlying transport protocols.  For example, a

           solution that opened additional TCP connections when the

           network is congested would reduce the effectiveness of the

           underlying congestion control mechanisms.



           *Compliant*. DOIC does not require or recommend changes in

           the handling of transport protocols or connections.







C.6.3.  Heterogeneous Support for Solution



   REQ 16: The solution is likely to be deployed incrementally.  The

           solution MUST support a mixed environment where some, but not

           all, nodes implement it.



           *Partially Compliant*. DOIC works with most mixed-deployment

           scenarios.  However, it cannot work across a non-supporting

           proxy that modifies Origin-Host AVPs in answer messages.

           DOIC will have limited impact in networks where the nodes

           that perform server selections do not support the mechanism.







   REQ 17: In a mixed environment with nodes that support the solution

           and nodes that do not, the solution MUST NOT result in

           materially less useful throughput during overload as would

           have resulted if the solution were not present.  It SHOULD

           result in less severe overload in this environment.



           *Compliant*. In most mixed-support deployment, DOIC will

           offer at least some value, and will not make things worse.







   REQ 18: In a mixed environment of nodes that support the solution and

           nodes that do not, the solution MUST NOT preclude elements

           that support overload control from treating elements that do

           not support overload control in an equitable fashion relative

           to those that do.  Users and operators of nodes that do not

           support the solution MUST NOT unfairly benefit from the

           solution.  The solution specification SHOULD provide guidance

           to implementors for dealing with elements not supporting

           overload control.



           *Compliant*. DOIC provides mechanisms to abate load from non-

           supporting sources.  Furthermore, it recommends that

           reporting nodes will still need to be able to apply whatever

           protections they would ordinarily apply if DOIC were not in

           use.







   REQ 19: It MUST be possible to use the solution between nodes in

           different realms and in different administrative domains.



           *Partially Compliant*. DOIC allows sending OLRs across

           administrative domains, and potentially to nodes in other

           realms.  However, an OLR cannot indicate overload for realms

           other than the one in the Origin-Realm AVP of the containing

           answer.







   REQ 20: Any explicit overload indication MUST be clearly

           distinguishable from other errors reported via Diameter.



           *Compliant*. DOIC sends explicit overload indication in

           overload reports.  It does not depend on error result codes.







   REQ 21: In cases where a network node fails, is so overloaded that it

           cannot process messages, or cannot communicate due to a

           network failure, it may not be able to provide explicit

           indications of the nature of the failure or its levels of

           overload.  The solution MUST result in at least as much

           useful throughput as would have resulted if the solution were

           not in place.



           *Compliant*. DOIC overload reports have the primary effect of

           suppressing message retries in overload conditions.  DOIC

           recommends that messages never be silently dropped if at all

           possible.







C.6.4.  Granular Control



   REQ 22: The solution MUST provide a way for a node to throttle the

           amount of traffic it receives from a peer node.  This

           throttling SHOULD be graded so that it can be applied

           gradually as offered load increases.  Overload is not a

           binary state; there may be degrees of overload.



           *Compliant*. The "loss" algorithm expresses a percentage

           reduction.







   REQ 23: The solution MUST provide sufficient information to enable a

           load-balancing node to divert messages that are rejected or

           otherwise throttled by an overloaded upstream node to other

           upstream nodes that are the most likely to have sufficient

           capacity to process them.



           *Not Compliant*. DOIC provides no built in mechanism to

           determine the best place to divert messages that would

           otherwise be throttled.  This can be accomplished with a

           future "load" extension, or with proprietary load balancing

           mechanisms.







   REQ 24: The solution MUST provide a mechanism for indicating load

           levels, even when not in an overload condition, to assist

           nodes in making decisions to prevent overload conditions from

           occurring.



           *Not Compliant*. "Load" information has been left for a

           future extension.







C.6.5.  Priority and Policy



   REQ 25: The base specification for the solution SHOULD offer general

           guidance on which message types might be desirable to send or

           process over others during times of overload, based on

           application-specific considerations.  For example, it may be

           more beneficial to process messages for existing sessions

           ahead of new sessions.  Some networks may have a requirement

           to give priority to requests associated with emergency

           sessions.  Any normative or otherwise detailed definition of

           the relative priorities of message types during an overload

           condition will be the responsibility of the application

           specification.



           *Compliant*. The specification offers guidance on how

           requests might be prioritized for different types of

           applications.







   REQ 26: The solution MUST NOT prevent a node from prioritizing

           requests based on any local policy, so that certain requests

           are given preferential treatment, given additional

           retransmission, not throttled, or processed ahead of others.



           *Compliant*. Nothing in the specification prevents

           application-specific, implementation-specific, or local

           policies.







C.6.6.  Security



   REQ 27: The solution MUST NOT provide new vulnerabilities to

           malicious attack or increase the severity of any existing

           vulnerabilities.  This includes vulnerabilities to DoS and

           DDoS attacks as well as replay and man-in-the-middle attacks.

           Note that the Diameter base specification [RFC6733] lacks

           end-to-end security and this must be considered (see the

           Security Considerations in [RFC7068]).  Note that this

           requirement was expressed at a high level so as to not

           preclude any particular solution.  Is is expected that the

           solution will address this in more detail.



           *Compliant*. The working group is not aware of any such

           vulnerabilities.  [This may need further analysis.]







   REQ 28: The solution MUST NOT depend on being deployed in

           environments where all Diameter nodes are completely trusted.

           It SHOULD operate as effectively as possible in environments

           where other nodes are malicious; this includes preventing

           malicious nodes from obtaining more than a fair share of

           service.  Note that this does not imply any responsibility on

           the solution to detect, or take countermeasures against,

           malicious nodes.



           *Partially Compliant*. Since all Diameter security is

           currently at the transport layer, nodes must trust immediate

           peers to enforce trust policies.  However, there are

           situations where a DOIC node cannot determine if an immediate

           peer supports DOIC.  The authors recommend an expert security

           review.







   REQ 29: It MUST be possible for a supporting node to make

           authorization decisions about what information will be sent

           to peer nodes based on the identity of those nodes.  This

           allows a domain administrator who considers the load of their

           nodes to be sensitive information to restrict access to that

           information.  Of course, in such cases, there is no

           expectation that the solution itself will help prevent

           overload from that peer node.



           *Partially Compliant*. (See response to previous

           requirement.)







   REQ 30: The solution MUST NOT interfere with any Diameter-compliant

           method that a node may use to protect itself from overload

           from non-supporting nodes or from denial-of-service attacks.



           *Compliant*. The specification recommends that any such

           protection mechanism needed without DOIC should continue to

           be employed with DOIC.







C.6.7.  Flexibility and Extensibility



   REQ 31: There are multiple situations where a Diameter node may be

           overloaded for some purposes but not others.  For example,

           this can happen to an agent or server that supports multiple

           applications, or when a server depends on multiple external

           resources, some of which may become overloaded while others

           are fully available.  The solution MUST allow Diameter nodes

           to indicate overload with sufficient granularity to allow

           clients to take action based on the overloaded resources

           without unreasonably forcing available capacity to go unused.

           The solution MUST support specification of overload

           information with granularities of at least "Diameter node",

           "realm", and "Diameter application" and MUST allow

           extensibility for others to be added in the future.



           *Partially Compliant*. All DOIC overload reports are scoped

           to the specific application and realm.  Inside that scope,

           overload can be reported at the specific server or whole

           realm scope.  As currently specified, DOIC cannot indicate

           local overload for an agent.  At the time of this writing,

           the DIME working group has plans to work on an agent-overload

           extension.



           DOIC allows new "scopes" through the use of extended report

           types.







   REQ 32: The solution MUST provide a method for extending the

           information communicated and the algorithms used for overload

           control.



           *Compliant*. DOIC allows new report types and abatement

           algorithms to be created.  These may be indicated using the

           OC-Supported-Features AVP.







   REQ 33: The solution MUST provide a default algorithm that is

           mandatory to implement.



           *Compliant*. The "loss" algorithm is mandatory to implement.







   REQ 34: The solution SHOULD provide a method for exchanging overload

           and load information between elements that are connected by

           intermediaries that do not support the solution.



           *Partially Compliant*. DOIC information can traverse non-

           supporting agents, as long as those agents do not modify

           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a

           way for supporting nodes to detect such modification.





___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime




___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


--_000_6B7134B31289DC4FAF731D844122B36E99A6E1PEXCVZYM13corpora_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi Steve,<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">For the fi=
rst paragraph, I would simply say:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; This specification defines a base so=
lution for Diameter overload<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; control, referred to as Diameter Ove=
rload Indication Conveyance<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; (DOIC), based on the requirements id=
entified in RFC 7068 [RFC7068].<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">OK for the=
 rest.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards,<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lionel<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;:</span></b>=
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:windowtext"> DiME [mailto:dime-bounces@ietf.org]
<b>De la part de</b> Steve Donovan<br>
<b>Envoy=E9&nbsp;:</b> mardi 2 d=E9cembre 2014 19:42<br>
<b>=C0&nbsp;:</b> dime@ietf.org<br>
<b>Objet&nbsp;:</b> Re: [Dime] Updated DOIC Requirements Analysis<o:p></o:p=
></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Lionel,<br>
<br>
I currently have the following for the Introduction based on other suggesti=
ons from, I believe, Ben:<o:p></o:p></p>
<pre>&nbsp;&nbsp; This specification defines a base solution for Diameter o=
verload<o:p></o:p></pre>
<pre>&nbsp;&nbsp; control, referred to as Diameter Overload Indication Conv=
eyance<o:p></o:p></pre>
<pre>&nbsp;&nbsp; (DOIC).&nbsp; The requirements for the solution are descr=
ibed and<o:p></o:p></pre>
<pre>&nbsp;&nbsp; discussed in the corresponding requirements document [RFC=
7068].<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; This specification addresses Diameter overload control be=
tween<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Diameter nodes that support the DOIC solution.&nbsp; The =
solution, which<o:p></o:p></pre>
<pre>&nbsp;&nbsp; is designed to apply to existing and future Diameter appl=
ications,<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requires no changes to the Diameter base protocol [RFC673=
3] and is<o:p></o:p></pre>
<pre>&nbsp;&nbsp; deployable in environments where some Diameter nodes do n=
ot implement<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the Diameter overload control solution defined in this sp=
ecification.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; Note that the overload control solution defined in this s=
pecification<o:p></o:p></pre>
<pre>&nbsp;&nbsp; does not address all the requirements listed in [RFC7068]=
.&nbsp; A number<o:p></o:p></pre>
<pre>&nbsp;&nbsp; of overload control related features are left for future<=
o:p></o:p></pre>
<pre>&nbsp;&nbsp; specifications.&nbsp; See Appendix A for a list of extens=
ions that are<o:p></o:p></pre>
<pre>&nbsp;&nbsp; currently being considered.&nbsp; See Appendix C for an a=
nalysis of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; conformance to the requirements specified in [RFC7068].<o=
:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Let me know if this w=
orks for you.<br>
<br>
I have included your other suggestion below.<br>
<br>
Regards,<br>
<br>
Steve<br>
<br>
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 11/25/14, 1:02 PM, <a href=3D"mailto:lionel.moran=
d@orange.com">
lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Hi Ben, Steve,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>the text in section 1 needs also to be updated. I would propose someth=
ing like:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>1.&nbsp; Introduction<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; This specification defines a base solution for Diameter O=
verload<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Control (DOC), referred to as Diameter Overload Indicatio=
n Conveyance<o:p></o:p></pre>
<pre>&nbsp;&nbsp; (DOIC).&nbsp; The requirements for the solution are descr=
ibed and<o:p></o:p></pre>
<pre>&nbsp;&nbsp; discussed in the corresponding design requirements docume=
nt<o:p></o:p></pre>
<pre>&nbsp;&nbsp; [RFC7068].&nbsp; Note that the overload control solution =
defined in this<o:p></o:p></pre>
<pre>&nbsp;&nbsp; specification does not address all the requirements liste=
d in<o:p></o:p></pre>
<pre>&nbsp;&nbsp; [RFC7068].&nbsp; See Appendix C for further details on th=
e <o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;conformance to the requirements specified in [RFC706=
8].<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>In C.1:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.1.&nbsp; Deferred Requirements<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The DIME working group chose to defer certain requirement=
s in order<o:p></o:p></pre>
<pre>&nbsp;&nbsp; to meet an an external deadline.&nbsp; The 3GPP &quot;Cor=
e Network and<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Terminal&quot; working group 4 (CT4) working group wished=
 to reference<o:p></o:p></pre>
<pre>&nbsp;&nbsp; DOIC as part of Release 12.&nbsp; This required the DOIC =
base protocol to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; be substantially complete by the end of 2014.&nbsp; The d=
eferred work<o:p></o:p></pre>
<pre>&nbsp;&nbsp; includes the following:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>it is not necessary to quote CT4, as there are other groups impacts. I=
 would propose to rephrase as below:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; 3GPP have adopted an early version of this document as no=
rmative<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reference in various Diameter related specifications to s=
upport the <o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;overload control mechanism in their release 12 frame=
work.&nbsp; The DIME<o:p></o:p></pre>
<pre>&nbsp;&nbsp; working group has therefore decided to defer certain requ=
irements in order<o:p></o:p></pre>
<pre>&nbsp;&nbsp; to complete the design of an extensible generic solution =
before the <o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;deadline scheduled by 3GPP for the completion of the=
 protocol work<o:p></o:p></pre>
<pre>&nbsp;&nbsp; in release 12 by the end of 2014.&nbsp; The deferred work=
 includes the following:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>regards,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Lionel<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>De&nbsp;: DiME [<a href=3D"mailto:dime-bounces@ietf.org">mailto:dime-b=
ounces@ietf.org</a>] De la part de Ben Campbell<o:p></o:p></pre>
<pre>Envoy=E9&nbsp;: mardi 25 novembre 2014 03:19<o:p></o:p></pre>
<pre>=C0&nbsp;: <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a> list<o:p=
></o:p></pre>
<pre>Objet&nbsp;: [Dime] Updated DOIC Requirements Analysis<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Here's the text from the updated requirements analysis. I updated the =
summary to be more general, and updated the detail based on mail discussion=
. The detail section is marked for deletion before publication as an RFC.&n=
bsp;<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>BTW, It's appendix C now because I used the section Steve had already =
reserved for it :-)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Thanks!<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ben.<o:p></o:p></pre>
<pre>-------------------<o:p></o:p></pre>
<pre>Appendix C.&nbsp; Requirements Conformance Analysis<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; This section contains the result of an analysis of the DO=
IC solutions<o:p></o:p></pre>
<pre>&nbsp;&nbsp; conformance to the requirements defined in [RFC7068].<o:p=
></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.1.&nbsp; Deferred Requirements<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The DIME working group chose to defer certain requirement=
s in order<o:p></o:p></pre>
<pre>&nbsp;&nbsp; to meet an an external deadline.&nbsp; The 3GPP &quot;Cor=
e Network and<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Terminal&quot; working group 4 (CT4) working group wished=
 to reference<o:p></o:p></pre>
<pre>&nbsp;&nbsp; DOIC as part of Release 12.&nbsp; This required the DOIC =
base protocol to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; be substantially complete by the end of 2014.&nbsp; The d=
eferred work<o:p></o:p></pre>
<pre>&nbsp;&nbsp; includes the following:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; o&nbsp; Agent Overload - The ability for an agent to repo=
rt an overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition of the agent itself.<o:p></o:=
p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; o&nbsp; Load Information - The ability for a node to repo=
rt its load level<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when not overloaded.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; At the time of this writing, DIME has begun separate work=
 efforts for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; these requirements.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.2.&nbsp; Detection of non-supporting Intermediaries<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The DOIC mechanism as currently defined does not allow su=
pporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp; nodes to automatically determine whether OC-Supported-Fea=
tures or OC-<o:p></o:p></pre>
<pre>&nbsp;&nbsp; OLR AVPs are originated by a peer node, or by a non-peer =
node and<o:p></o:p></pre>
<pre>&nbsp;&nbsp; sent across a non-supporting peer.&nbsp; This makes it im=
possible to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; detect the presence of non-supporting nodes between suppo=
rting nodes,<o:p></o:p></pre>
<pre>&nbsp;&nbsp; except by configuration.&nbsp; The working group determin=
ed that such a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; configuration requirement is acceptable.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; This limits full compliance with certain requirements rel=
ated to the<o:p></o:p></pre>
<pre>&nbsp;&nbsp; limitation of new configuration, deployment in environmen=
ts with<o:p></o:p></pre>
<pre>&nbsp;&nbsp; mixed support, operating across non-supporting agents, an=
d<o:p></o:p></pre>
<pre>&nbsp;&nbsp; authorization.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.3.&nbsp; Implicit Application Indication<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The working group elected to determine the application fo=
r an<o:p></o:p></pre>
<pre>&nbsp;&nbsp; overload report from that of the enclosing message.&nbsp;=
 This prevents<o:p></o:p></pre>
<pre>&nbsp;&nbsp; sending an OLR for an application when there are no trans=
actions for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that application.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; As a consequence, DOIC does not comply with the requireme=
nt to be<o:p></o:p></pre>
<pre>&nbsp;&nbsp; able to report overload information across quiescent conn=
ections.<o:p></o:p></pre>
<pre>&nbsp;&nbsp; DOIC does not fully comply with requirements to operate o=
n up-to-date<o:p></o:p></pre>
<pre>&nbsp;&nbsp; information, since if an OLR causes all transactions to s=
top for an<o:p></o:p></pre>
<pre>&nbsp;&nbsp; application, the only way traffic will resume is for the =
OLR to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; expire.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.4.&nbsp; Stateless Operation<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; RFC7068 explicitly discourages the sending of OLRs in eve=
ry answer<o:p></o:p></pre>
<pre>&nbsp;&nbsp; message, as part of the requirement to avoid additional w=
ork for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; overloaded nodes.&nbsp; DOIC recommends exactly that beha=
vior during<o:p></o:p></pre>
<pre>&nbsp;&nbsp; active overload conditions.&nbsp; The working group deter=
mined that doing<o:p></o:p></pre>
<pre>&nbsp;&nbsp; otherwise would reduce reliability and increase statefuln=
ess.&nbsp; (Note<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that DOIC does allow nodes to avoid sending OLRs in every=
 answer if<o:p></o:p></pre>
<pre>&nbsp;&nbsp; they have some other method of ensuring that OLRs get to =
all relevant<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reacting nodes.)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.5.&nbsp; No New Vulnerabilities<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The working group believes that DOIC is compliant with th=
e<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requirement to avoid introducing new vulnerabilities.&nbs=
p; However, this<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requirement may warrant an early security expert review.<=
o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.&nbsp; Detailed Requirements<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; [RFC Editor: Please remove this section and subsections p=
rior to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; publication as an RFC.]<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.1.&nbsp; General<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 1:&nbsp; The solution MUST provide a communication me=
thod for Diameter<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes to =
exchange load and overload information.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. The mechanism uses new AVPs<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; piggyback=
ed on existing Diameter messages to exchange<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
information.&nbsp; It does not currently support &quot;load&quot;<o:p></o:p=
></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on or the ability to report overload of an agent.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; These hav=
e been left for future extensions.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 2:&nbsp; The solution MUST allow Diameter nodes to su=
pport overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; control r=
egardless of which Diameter applications they<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support.&=
nbsp; Diameter clients and agents must be able to use the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; received =
load and overload information to support graceful<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; behavior =
during an overload condition.&nbsp; Graceful behavior<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; under ove=
rload conditions is best described by REQ 3.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. The DOIC AVPs can be used in any<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
on that allows the extension of AVPs.&nbsp; However,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;loa=
d&quot; information is not currently supported.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 3:&nbsp; The solution MUST limit the impact of overlo=
ad on the overall<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; useful th=
roughput of a Diameter server, even when the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; incoming =
load on the network is far in excess of its<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity.=
&nbsp; The overall useful throughput under load is the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ultimate =
measure of the value of a solution.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC provides information that nodes can use to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reduce th=
e impact of overload.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 4:&nbsp; Diameter allows requests to be sent from eit=
her side of a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; connectio=
n, and either side of a connection may have need to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; provide i=
ts overload status.&nbsp; The solution MUST allow each<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; side of a=
 connection to independently inform the other of its<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
status.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC AVPs can be included regardless of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; transacti=
on &quot;direction&quot;<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 5:&nbsp; Diameter allows nodes to determine their pee=
rs via dynamic<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; discovery=
 or manual configuration.&nbsp; The solution MUST work<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; consisten=
tly without regard to how peers are determined.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC contains no assumptions about how peers are<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; discovere=
d.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 6:&nbsp; The solution designers SHOULD seek to minimi=
ze the amount of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; new confi=
guration required in order to work.&nbsp; For example, it<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is better=
 to allow peers to advertise or negotiate support<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for the s=
olution, rather than to require that this knowledge<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to be con=
figured at each node.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. Most DOIC parameters are advertised<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; using the=
 DOIC capability announcement mechanism.&nbsp; However,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; there are=
 some situations where configuration is required.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For examp=
le, a DOIC node detect the fact that a peer may not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support D=
OIC when nodes on the other side of the non-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supportin=
g node do support DOIC without configuration.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.2.&nbsp; Performance<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 7:&nbsp; The solution and any associated default algo=
rithm(s) MUST<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ensure th=
at the system remains stable.&nbsp; At some point after<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; an overlo=
ad condition has ended, the solution MUST enable<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity =
to stabilize and become equal to what it would be in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the absen=
ce of an overload condition.&nbsp; Note that this also<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requires =
that the solution MUST allow nodes to shed load<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; without i=
ntroducing non-converging oscillations during or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; after an =
overload condition.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The specification offers guidance that<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; implement=
ations should apply hysteresis when recovering from<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload,=
 and avoid sudden ramp ups in offered load when<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recoverin=
g.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 8:&nbsp; Supporting nodes MUST be able to distinguish=
 current overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on from stale information.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC overload reports are &quot;soft<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; state&quo=
t;, that is they expire after an indicated period.&nbsp; DOIC<o:p></o:p></p=
re>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes may=
 also send reports that end existing overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition=
s.&nbsp; DOIC requires reporting nodes to ensure that all<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; relevant =
reacting nodes receive overload reports.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; However, =
since DOIC does not allow reporting nodes to send<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OLRs in w=
atchdog messages, if an overload condition results<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; in zero o=
ffered load, the reporting node cannot update the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition=
 until the expiration of the original OLR.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 9:&nbsp; The solution MUST function across fully load=
ed as well as<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; quiescent=
 transport connections.&nbsp; This is partially derived<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; from the =
requirement for stability in REQ 7.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. DOIC does not allow OLRs to be sent over<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; quiescent=
 transport connections.&nbsp; This is due to the fact<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that OLRs=
 cannot be sent outside of the application to which<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; they appl=
y.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 10: Consumers of overload information MUST be able to=
 determine<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when the =
overload condition improves or ends.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. (See response to previous two<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nts.)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 11: The solution MUST be able to operate in networks =
of different<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sizes.<o:=
p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC makes no assumptions about the size of the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network.&=
nbsp; DOIC can operate purely between clients and<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; servers, =
or across agents.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 12: When a single network node fails, goes into overl=
oad, or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suffers f=
rom reduced processing capacity, the solution MUST<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; make it p=
ossible to limit the impact of the affected node on<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; other nod=
es in the network.&nbsp; This helps to prevent a small-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; scale fai=
lure from becoming a widespread outage.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC allows overload reports for an<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; entire re=
alm, where abated traffic will not be redirected<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; towards a=
nother server.&nbsp; But in situations where nodes choose<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to divert=
 traffic to other nodes, DOIC offers no way of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; knowing w=
hether the new recipients can handle the traffic if<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; they have=
 not already indicated overload.&nbsp; This may be<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mitigated=
 with the use of a future &quot;load&quot; extension, or with<o:p></o:p></p=
re>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the use o=
f proprietary dynamic load-balancing mechanisms.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 13: The solution MUST NOT introduce substantial addit=
ional work<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for a nod=
e in an overloaded state.&nbsp; For example, a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nt for an overloaded node to send overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on every time it received a new request would<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; introduce=
 substantial work.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. DOIC does in fact encourage an overloaded<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; node to s=
end an OLR in every response.&nbsp; The working group<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that othe=
r mechanisms to ensure that every relevant node<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; receives =
an OLR would create even more work.&nbsp; [Note: This<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; needs dis=
cussion.]<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 14: Some scenarios that result in overload involve a =
rapid<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; increase =
of traffic with little time between normal levels<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and level=
s that induce overload.&nbsp; The solution SHOULD provide<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for rapid=
 feedback when traffic levels increase.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The piggyback mechanism allows OLRs to be sent<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; at the sa=
me rate as application traffic.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 15: The solution MUST NOT interfere with the congesti=
on control<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mechanism=
s of underlying transport protocols.&nbsp; For example, a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution =
that opened additional TCP connections when the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network i=
s congested would reduce the effectiveness of the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; underlyin=
g congestion control mechanisms.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC does not require or recommend changes in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the handl=
ing of transport protocols or connections.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.3.&nbsp; Heterogeneous Support for Solution<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 16: The solution is likely to be deployed incremental=
ly.&nbsp; The<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution =
MUST support a mixed environment where some, but not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all, node=
s implement it.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC works with most mixed-deployment<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; scenarios=
.&nbsp; However, it cannot work across a non-supporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; proxy tha=
t modifies Origin-Host AVPs in answer messages.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DOIC will=
 have limited impact in networks where the nodes<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that perf=
orm server selections do not support the mechanism.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 17: In a mixed environment with nodes that support th=
e solution<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and nodes=
 that do not, the solution MUST NOT result in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; materiall=
y less useful throughput during overload as would<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have resu=
lted if the solution were not present.&nbsp; It SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; result in=
 less severe overload in this environment.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. In most mixed-support deployment, DOIC will<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; offer at =
least some value, and will not make things worse.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 18: In a mixed environment of nodes that support the =
solution and<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes tha=
t do not, the solution MUST NOT preclude elements<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that supp=
ort overload control from treating elements that do<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not suppo=
rt overload control in an equitable fashion relative<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to those =
that do.&nbsp; Users and operators of nodes that do not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support t=
he solution MUST NOT unfairly benefit from the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution.=
&nbsp; The solution specification SHOULD provide guidance<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to implem=
entors for dealing with elements not supporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
control.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC provides mechanisms to abate load from non-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supportin=
g sources.&nbsp; Furthermore, it recommends that<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reporting=
 nodes will still need to be able to apply whatever<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protectio=
ns they would ordinarily apply if DOIC were not in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; use.<o:p>=
</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 19: It MUST be possible to use the solution between n=
odes in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; different=
 realms and in different administrative domains.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC allows sending OLRs across<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;administr=
ative domains, and potentially to nodes in other<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; realms.&n=
bsp; However, an OLR cannot indicate overload for realms<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; other tha=
n the one in the Origin-Realm AVP of the containing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; answer.<o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 20: Any explicit overload indication MUST be clearly<=
o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; distingui=
shable from other errors reported via Diameter.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC sends explicit overload indication in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
reports.&nbsp; It does not depend on error result codes.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 21: In cases where a network node fails, is so overlo=
aded that it<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cannot pr=
ocess messages, or cannot communicate due to a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network f=
ailure, it may not be able to provide explicit<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; indicatio=
ns of the nature of the failure or its levels of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload.=
&nbsp; The solution MUST result in at least as much<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; useful th=
roughput as would have resulted if the solution were<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not in pl=
ace.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC overload reports have the primary effect of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suppressi=
ng message retries in overload conditions.&nbsp; DOIC<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recommend=
s that messages never be silently dropped if at all<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; possible.=
<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.4.&nbsp; Granular Control<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 22: The solution MUST provide a way for a node to thr=
ottle the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; amount of=
 traffic it receives from a peer node.&nbsp; This<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; throttlin=
g SHOULD be graded so that it can be applied<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; gradually=
 as offered load increases.&nbsp; Overload is not a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; binary st=
ate; there may be degrees of overload.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The &quot;loss&quot; algorithm expresses a percentage<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reduction=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 23: The solution MUST provide sufficient information =
to enable a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; load-bala=
ncing node to divert messages that are rejected or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; otherwise=
 throttled by an overloaded upstream node to other<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; upstream =
nodes that are the most likely to have sufficient<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity =
to process them.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. DOIC provides no built in mechanism to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; determine=
 the best place to divert messages that would<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; otherwise=
 be throttled.&nbsp; This can be accomplished with a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; future &q=
uot;load&quot; extension, or with proprietary load balancing<o:p></o:p></pr=
e>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mechanism=
s.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 24: The solution MUST provide a mechanism for indicat=
ing load<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; levels, e=
ven when not in an overload condition, to assist<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes in =
making decisions to prevent overload conditions from<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; occurring=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. &quot;Load&quot; information has been left for a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; future ex=
tension.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.5.&nbsp; Priority and Policy<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 25: The base specification for the solution SHOULD of=
fer general<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; guidance =
on which message types might be desirable to send or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; process o=
ver others during times of overload, based on<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
on-specific considerations.&nbsp; For example, it may be<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; more bene=
ficial to process messages for existing sessions<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ahead of =
new sessions.&nbsp; Some networks may have a requirement<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to give p=
riority to requests associated with emergency<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sessions.=
&nbsp; Any normative or otherwise detailed definition of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the relat=
ive priorities of message types during an overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition=
 will be the responsibility of the application<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; specifica=
tion.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The specification offers guidance on how<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requests =
might be prioritized for different types of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
ons.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 26: The solution MUST NOT prevent a node from priorit=
izing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requests =
based on any local policy, so that certain requests<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; are given=
 preferential treatment, given additional<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; retransmi=
ssion, not throttled, or processed ahead of others.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. Nothing in the specification prevents<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
on-specific, implementation-specific, or local<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies.=
<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.6.&nbsp; Security<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 27: The solution MUST NOT provide new vulnerabilities=
 to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious=
 attack or increase the severity of any existing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vulnerabi=
lities.&nbsp; This includes vulnerabilities to DoS and<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DDoS atta=
cks as well as replay and man-in-the-middle attacks.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note that=
 the Diameter base specification [RFC6733] lacks<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; end-to-en=
d security and this must be considered (see the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Security =
Considerations in [RFC7068]).&nbsp; Note that this<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nt was expressed at a high level so as to not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; preclude =
any particular solution.&nbsp; Is is expected that the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution =
will address this in more detail.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The working group is not aware of any such<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vulnerabi=
lities.&nbsp; [This may need further analysis.]<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 28: The solution MUST NOT depend on being deployed in=
<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; environme=
nts where all Diameter nodes are completely trusted.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; It SHOULD=
 operate as effectively as possible in environments<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; where oth=
er nodes are malicious; this includes preventing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious=
 nodes from obtaining more than a fair share of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; service.&=
nbsp; Note that this does not imply any responsibility on<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the solut=
ion to detect, or take countermeasures against,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious=
 nodes.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. Since all Diameter security is<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; currently=
 at the transport layer, nodes must trust immediate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; peers to =
enforce trust policies.&nbsp; However, there are<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; situation=
s where a DOIC node cannot determine if an immediate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; peer supp=
orts DOIC.&nbsp; The authors recommend an expert security<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; review.<o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 29: It MUST be possible for a supporting node to make=
<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; authoriza=
tion decisions about what information will be sent<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to peer n=
odes based on the identity of those nodes.&nbsp; This<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; allows a =
domain administrator who considers the load of their<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes to =
be sensitive information to restrict access to that<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on.&nbsp; Of course, in such cases, there is no<o:p></o:p></pre>
<pre> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;expectati=
on that the solution itself will help prevent<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
from that peer node.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. (See response to previous<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nt.)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 30: The solution MUST NOT interfere with any Diameter=
-compliant<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; method th=
at a node may use to protect itself from overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; from non-=
supporting nodes or from denial-of-service attacks.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The specification recommends that any such<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protectio=
n mechanism needed without DOIC should continue to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be employ=
ed with DOIC.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.7.&nbsp; Flexibility and Extensibility<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 31: There are multiple situations where a Diameter no=
de may be<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overloade=
d for some purposes but not others.&nbsp; For example,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; this can =
happen to an agent or server that supports multiple<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
ons, or when a server depends on multiple external<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; resources=
, some of which may become overloaded while others<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; are fully=
 available.&nbsp; The solution MUST allow Diameter nodes<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to indica=
te overload with sufficient granularity to allow<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; clients t=
o take action based on the overloaded resources<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; without u=
nreasonably forcing available capacity to go unused.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The solut=
ion MUST support specification of overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on with granularities of at least &quot;Diameter node&quot;,<o:p></o:p></pr=
e>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;rea=
lm&quot;, and &quot;Diameter application&quot; and MUST allow<o:p></o:p></p=
re>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extensibi=
lity for others to be added in the future.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. All DOIC overload reports are scoped<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to the sp=
ecific application and realm.&nbsp; Inside that scope,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
can be reported at the specific server or whole<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; realm sco=
pe.&nbsp; As currently specified, DOIC cannot indicate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; local ove=
rload for an agent.&nbsp; At the time of this writing,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the DIME =
working group has plans to work on an agent-overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extension=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DOIC allo=
ws new &quot;scopes&quot; through the use of extended report<o:p></o:p></pr=
e>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; types.<o:=
p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 32: The solution MUST provide a method for extending =
the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on communicated and the algorithms used for overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; control.<=
o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC allows new report types and abatement<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; algorithm=
s to be created.&nbsp; These may be indicated using the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OC-Suppor=
ted-Features AVP.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 33: The solution MUST provide a default algorithm tha=
t is<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mandatory=
 to implement.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The &quot;loss&quot; algorithm is mandatory to implement.<o:p></o:p></p=
re>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 34: The solution SHOULD provide a method for exchangi=
ng overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and load =
information between elements that are connected by<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; intermedi=
aries that do not support the solution.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC information can traverse non-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supportin=
g agents, as long as those agents do not modify<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain A=
VPs. (e.g., Origin-Host).&nbsp; DOIC does not provide a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; way for s=
upporting nodes to detect such modification.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>______________________________________________________________________=
___________________________________________________<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations con=
fidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
<pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez=
 recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
<pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messag=
es electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
<pre>Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This message and its attachments may contain confidential or privilege=
d information that may be protected by law;<o:p></o:p></pre>
<pre>they should not be distributed, used or copied without authorisation.<=
o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>DiME mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/dime">https://www.iet=
f.org/mailman/listinfo/dime</a><o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<PRE>______________________________________________________________________=
___________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.
</PRE></body>
</html>

--_000_6B7134B31289DC4FAF731D844122B36E99A6E1PEXCVZYM13corpora_--


From nobody Wed Dec  3 02:55:24 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2323C1A1A47 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:55:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.599
X-Spam-Level: 
X-Spam-Status: No, score=-1.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nA-L_aGwEam1 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:55:18 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias245.francetelecom.com [80.12.204.245]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16EF01A1A3E for <dime@ietf.org>; Wed,  3 Dec 2014 02:55:18 -0800 (PST)
Received: from omfeda08.si.francetelecom.fr (unknown [xx.xx.xx.201]) by omfeda13.si.francetelecom.fr (ESMTP service) with ESMTP id E05E51903D1; Wed,  3 Dec 2014 11:55:15 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.183]) by omfeda08.si.francetelecom.fr (ESMTP service) with ESMTP id BD5B13840BD; Wed,  3 Dec 2014 11:55:15 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH02.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Wed, 3 Dec 2014 11:55:15 +0100
From: <lionel.morand@orange.com>
To: Jouni <jouni.nospam@gmail.com>, "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: Call for WG adoption: draft-donovan-dime-doc-rate-control
Thread-Index: AQHQDuGZxrULykDx2EG5Hg1F50yWbpx9sVqA
Date: Wed, 3 Dec 2014 10:55:13 +0000
Message-ID: <17900_1417604115_547EEC13_17900_1759_1_6B7134B31289DC4FAF731D844122B36E99A6FD@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com>
In-Reply-To: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.2]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.11.21.125720
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/s4YMraLJYVjIC-LBvaEry_LCY4k
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-control
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:55:19 -0000

As individual, I support.

Lionel

-----Message d'origine-----
De=A0: Jouni [mailto:jouni.nospam@gmail.com]=20
Envoy=E9=A0: mercredi 3 d=E9cembre 2014 11:12
=C0=A0: dime@ietf.org list
Cc=A0: MORAND Lionel IMT/OLN; Jouni
Objet=A0: Call for WG adoption: draft-donovan-dime-doc-rate-control

Folks,

As we discussed and agreed during the Honolulu meeting we ask for the WG ad=
option for draft-donovan-dime-doc-rate-control unless counter proposals sho=
w up. The "wait period" for counter proposals has been more than enough.

This mail starts a two week adoption call for draft-donovan-dime-doc-rate-c=
ontrol as a WG Item.

Express your support or disagreements in the mailing list. The call ends 17=
th Dec EOB (CET+1).

- Jouni & Lionel


___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


From nobody Wed Dec  3 02:55:35 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B94E1A1A74 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:55:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.599
X-Spam-Level: 
X-Spam-Status: No, score=-1.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sXJ09Ck6iMRD for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 02:55:32 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias243.francetelecom.com [80.12.204.243]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9EE6F1A1A47 for <dime@ietf.org>; Wed,  3 Dec 2014 02:55:31 -0800 (PST)
Received: from omfeda05.si.francetelecom.fr (unknown [xx.xx.xx.198]) by omfeda14.si.francetelecom.fr (ESMTP service) with ESMTP id C31342AC528; Wed,  3 Dec 2014 11:55:27 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfeda05.si.francetelecom.fr (ESMTP service) with ESMTP id 6D950180096; Wed,  3 Dec 2014 11:55:27 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Wed, 3 Dec 2014 11:55:27 +0100
From: <lionel.morand@orange.com>
To: Jouni <jouni.nospam@gmail.com>, "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: Call for WG adoption: draft-donovan-dime-agent-overload
Thread-Index: AQHQDuGe1AwI6w9Xxka8illnZAylz5x9sYHQ
Date: Wed, 3 Dec 2014 10:55:26 +0000
Message-ID: <24870_1417604127_547EEC1F_24870_1587_1_6B7134B31289DC4FAF731D844122B36E99A707@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com>
In-Reply-To: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.2]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.11.21.125720
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/lM3JFFRiJ6yYpAlFmP7zwQUIWnw
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 10:55:34 -0000

As individual, I support.

Lionel

-----Message d'origine-----
De=A0: Jouni [mailto:jouni.nospam@gmail.com]=20
Envoy=E9=A0: mercredi 3 d=E9cembre 2014 11:12
=C0=A0: dime@ietf.org list
Cc=A0: MORAND Lionel IMT/OLN; Jouni
Objet=A0: Call for WG adoption: draft-donovan-dime-agent-overload

Folks,

As we discussed and agreed during the Honolulu meeting we ask for the WG ad=
option for draft-donovan-dime-agent-overload unless counter proposals show =
up. The "wait period" for counter proposals has been more than enough.

This mail starts a two week adoption call for draft-donovan-dime-agent-over=
load as a WG Item.

Express your support or disagreements in the mailing list. The call ends 17=
th Dec EOB (CET+1).

- Jouni & Lionel


___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


From nobody Wed Dec  3 04:19:48 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F3D91A1A7A for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 04:19:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level: 
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HNITs5-C2hZs for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 04:19:31 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpida-esg-02.alcatel-lucent.com [135.245.210.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E2981A1A96 for <dime@ietf.org>; Wed,  3 Dec 2014 04:19:30 -0800 (PST)
Received: from fr712usmtp2.zeu.alcatel-lucent.com (unknown [135.239.2.42]) by Websense Email Security Gateway with ESMTPS id 1227BDEC67002; Wed,  3 Dec 2014 12:19:26 +0000 (GMT)
Received: from FR711WXCHHUB01.zeu.alcatel-lucent.com (fr711wxchhub01.zeu.alcatel-lucent.com [135.239.2.111]) by fr712usmtp2.zeu.alcatel-lucent.com (GMO) with ESMTP id sB3CJRt0024112 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 3 Dec 2014 13:19:27 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR711WXCHHUB01.zeu.alcatel-lucent.com ([135.239.2.111]) with mapi id 14.03.0195.001; Wed, 3 Dec 2014 13:19:28 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "lionel.morand@orange.com" <lionel.morand@orange.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHP96zWh2IhAI9MNUyrs2P7h3In05xXdZWAgAKB9QCAABTjgIABToGAgABXjYCAAImqAIAAtOqAgAHz+gCAAFg3AIAFNTcAgAARHgCABzpwAIAFs+cAgABIhYCACwbhAIABEZ9ggAAii9A=
Date: Wed, 3 Dec 2014 12:19:27 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <545792B6.8030502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815228ADC@DEMUMBX014.nsn-intra.net> <22181_1415728795_54624E9B_22181_12987_1_6B7134B31289DC4FAF731D844122B36E8C86C9@PEXCVZYM13.corporate.adroot.infra.ftgroup> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com>
In-Reply-To: <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.41]
Content-Type: multipart/alternative; boundary="_000_E194C2E18676714DACA9C3A2516265D2026F1036FR712WXCHMBA12z_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/qmnpwKZnTmjc612IzyI_xKPBnTU
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 12:19:46 -0000

--_000_E194C2E18676714DACA9C3A2516265D2026F1036FR712WXCHMBA12z_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear all

To continue on my remark , I would complement the Steve's text with " can u=
pdate the reduction of traffic it requires from the reacting nodes(s) by se=
nding new overload reports" as hereafter:



   Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes and can update the reductio=
n of traffic it requires from the reacting nodes(s) by sending new overload=
 reports.


Best regards

JJacques


De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN, JEAN-JACQUE=
S (JEAN-JACQUES)
Envoy=E9 : mercredi 3 d=E9cembre 2014 11:29
=C0 : Steve Donovan; lionel.morand@orange.com; Ben Campbell
Cc : dime@ietf.org
Objet : Re: [Dime] Updates to DOIC -05

Dear all

I am not against the new proposed texts from Steve or Ben to clarify this t=
opic.

My point is that, when  the reporting node has sent an OLR requiring  a tra=
ffic reduction , there is first a reaction time before receiving reduced tr=
affic, and second even if the traffic has been reduced, it can still exceed=
 the capacity of the reporting node  that has no other choice than to throt=
tle the received reduced traffic (if no diversion). This can happen when th=
e traffic at the source (reacting node) before throttling is increasing qui=
ckly, so the traffic reduced  according to the received OLR may  remain too=
 high .  Then, if the reporting node has nevertheless to do some throttle, =
it will certainly react by new OLRs requiring a higher traffic reduction fr=
om the reacting nodes. This is a dynamic process, where the reporting node =
adjust the  traffic  reduction it requires according to what it receives .

As Ben  I also think this is a guidance , and I think it is good to bring s=
ome guidance.

Best regards

JJacques

De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9 : mardi 2 d=E9cembre 2014 19:50
=C0 : lionel.morand@orange.com<mailto:lionel.morand@orange.com>; Ben Campbe=
ll
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Lionel,

The two paragraphs together now say the following:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled request may be higher than intended.  Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match or overlap with existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes.



   However, when the reporting node sends an OLR downstream, it might

   still need to apply other abatement methods such as diversion.  The

   reporting node might also need to throttle requests for reasons other

   than overload.  For example, an agent or server might have a

   configured rate limit for each client, and throttle requests that

   exceed that limit, even if such requests had already been candidates

   for throttling by downstream nodes.
Do you see the need for further clarification?

Steve
On 11/25/14, 12:26 PM, lionel.morand@orange.com<mailto:lionel.morand@orange=
.com> wrote:

I'm OK with the idea of the text proposed by Ben.

I would just make clear that throttling is applicable to the fact of sendin=
g/forwarding requests (cf. definition). A reporting node may apply local th=
rottling if it is an agent. But if it is a server, it can either drop the e=
xceeded number of requests (no response sent to the downstream) or send a s=
pecific DIAMETER-TOO-BUSY response. I think that this clarification is some=
how missing in the document.



Regards,



Lionel



-----Message d'origine-----

De : Steve Donovan [mailto:srdonovan@usdonovans.com]

Envoy=E9 : mardi 25 novembre 2014 15:07

=C0 : Ben Campbell; MORAND Lionel IMT/OLN

Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<mailto:dime@ietf.org>; =
Maria Cruz Bartolome

Objet : Re: [Dime] Updates to DOIC -05



I'm ok with Ben's wording and will make the change unless I hear objections=
 on the list.



Steve



On 11/21/14, 5:01 PM, Ben Campbell wrote:

On reflection, I think there might be a subtlety here. The resulting offere=
d-load may still exceed the reporting node's current capacity. This can be =
true even if it's sent an OLR (and thus has related OCS). As mentioned in t=
he surrounding node needs to still be able to protect itself, possibly by t=
hrottling. Therefore, I propose the sentence take the form of non-normative=
 guidance. For example:



"When a reporting node sends an OLR, it effectively delegates any necessary=
 throttling to downstream nodes.  If the reporting node also locally thrott=
les the same set of messages, the overall number of throttled request may b=
e higher than intended. Therefore, if a reporting node needs to apply local=
 throttling on a set of messages that match or overlap with existing OCS en=
tries, it needs to consider the impact of throttling by downstream nodes."





On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com<mailto:lionel.morand@=
orange.com> wrote:



I can live with the text proposed by Ulrich. But what is wrong with:



" Therefore, the reporting node SHOULD NOT apply throttling to the set of m=
essages to which an active OCS applies." ?



Envoy=E9 depuis mon Sony Xperia SP d'Orange



---- Maria Cruz Bartolome a =E9crit ----





Section 4.2.3, 13th paragraph, 2nd sentence:

Existing text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the OLR applies.

Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the sent OLR applies.



[LM] I would say that the reporting node will not remember the previously s=
ent OLR, but will take care that there is an active OCS.

SRD> I'm ok with Ulrich's change.



[LM] and this is incorrect but not fundamental. The reporting node does not=
 have to "remember" a previously sent OLR. What it will do is to refer to e=
xisting OCS to know that throttling should not be applied. An OCS is a cons=
equence of an sent OLR but it is not an OLR itself. But not fundamental her=
e.



[MCruz] I am ok with Ulrich's change. It does not mean that the reporting n=
ode needs to "remember" a previously sent OLR, though. The change only prop=
oses to "identify" which OLR we refer to.



Best regards

/MCruz





_____________________________________________________________________

____________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations

confidentielles ou privilegiees et ne doivent donc pas etre diffuses,

exploites ou copies sans autorisation. Si vous avez recu ce message

par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que le=
s pieces jointes. Les messages electroniques etant susceptibles d'alteratio=
n, Orange decline toute responsabilite si ce message a ete altere, deforme =
ou falsifie. Merci.



This message and its attachments may contain confidential or

privileged information that may be protected by law; they should not be dis=
tributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime







___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.






--_000_E194C2E18676714DACA9C3A2516265D2026F1036FR712WXCHMBA12z_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">To continue on my remark =
, I would complement the Steve&#8217;s text with &#8220;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;"=
>can update the reduction of traffic it requires from the reacting nodes(s)=
 by sending new overload reports&#8221;
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#1F497D">as hereafter: &nbsp;&nbsp;&nbsp;<o:p></o:=
p></span></p>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; Therefore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match existing OCS entries, it needs to consider<o:p=
></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes and can upda=
te the reduction of traffic it requires from the reacting nodes(s) by sendi=
ng new overload reports. <o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-bou=
nces@ietf.org]
<b>De la part de</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 11:29<br>
<b>=C0&nbsp;:</b> Steve Donovan; lionel.morand@orange.com; Ben Campbell<br>
<b>Cc&nbsp;:</b> dime@ietf.org<br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am not against the new =
proposed texts from Steve or Ben to clarify this topic.<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My point is that, when &n=
bsp;the reporting node has sent an OLR requiring &nbsp;a traffic reduction =
, there is first a reaction time before receiving reduced traffic,
 and second even if the traffic has been reduced, it can still exceed the c=
apacity of the reporting node &nbsp;that has no other choice than to thrott=
le the received reduced traffic (if no diversion). This can happen when the=
 traffic at the source (reacting node)
 before throttling is increasing quickly, so the traffic reduced&nbsp; acco=
rding to the received OLR may &nbsp;remain too high . &nbsp;Then, if the re=
porting node has nevertheless to do some throttle, it will certainly react =
by new OLRs requiring a higher traffic reduction
 from the reacting nodes. This is a dynamic process, where the reporting no=
de adjust the &nbsp;traffic &nbsp;reduction it requires according to what i=
t receives .<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As Ben&nbsp; I also think=
 this is a guidance , and I think it is good to bring some guidance.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [<a href=3D"mail=
to:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> Steve Donovan<br>
<b>Envoy=E9&nbsp;:</b> mardi 2 d=E9cembre 2014 19:50<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:lionel.morand@orange.com">lionel.morand=
@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Lionel,<br>
<br>
The two paragraphs together now say the following:<o:p></o:p></p>
<pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delega=
tes any<o:p></o:p></pre>
<pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the re=
porting node also<o:p></o:p></pre>
<pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall n=
umber of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttled request may be higher than intended.&nbsp; Ther=
efore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match or overlap with existing OCS entries, it needs=
 to consider<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes.<o:p></o:p><=
/pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; However, when the reporting node sends an OLR downstream,=
 it might<o:p></o:p></pre>
<pre>&nbsp;&nbsp; still need to apply other abatement methods such as diver=
sion.&nbsp; The<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node might also need to throttle requests for r=
easons other<o:p></o:p></pre>
<pre>&nbsp;&nbsp; than overload.&nbsp; For example, an agent or server migh=
t have a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; configured rate limit for each client, and throttle reque=
sts that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; exceed that limit, even if such requests had already been=
 candidates<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for throttling by downstream nodes.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Do you see the need f=
or further clarification?<br>
<br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 11/25/14, 12:26 PM, <a href=3D"mailto:lionel.mora=
nd@orange.com">
lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>I'm OK with the idea of the text proposed by Ben.<o:p></o:p></pre>
<pre>I would just make clear that throttling is applicable to the fact of s=
ending/forwarding requests (cf. definition). A reporting node may apply loc=
al throttling if it is an agent. But if it is a server, it can either drop =
the exceeded number of requests (no response sent to the downstream) or sen=
d a specific DIAMETER-TOO-BUSY response. I think that this clarification is=
 somehow missing in the document.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Lionel<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-----Message d'origine-----<o:p></o:p></pre>
<pre>De&nbsp;: Steve Donovan [<a href=3D"mailto:srdonovan@usdonovans.com">m=
ailto:srdonovan@usdonovans.com</a>] <o:p></o:p></pre>
<pre>Envoy=E9&nbsp;: mardi 25 novembre 2014 15:07<o:p></o:p></pre>
<pre>=C0&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN<o:p></o:p></pre>
<pre>Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a href=3D"mailto:dime@ietf=
.org">dime@ietf.org</a>; Maria Cruz Bartolome<o:p></o:p></pre>
<pre>Objet&nbsp;: Re: [Dime] Updates to DOIC -05<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I'm ok with Ben's wording and will make the change unless I hear objec=
tions on the list.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 11/21/14, 5:01 PM, Ben Campbell wrote:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On reflection, I think there might be a subtlety here. The resulting o=
ffered-load may still exceed the reporting node's current capacity. This ca=
n be true even if it's sent an OLR (and thus has related OCS). As mentioned=
 in the surrounding node needs to still be able to protect itself, possibly=
 by throttling. Therefore, I propose the sentence take the form of non-norm=
ative guidance. For example:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&quot;When a reporting node sends an OLR, it effectively delegates any=
 necessary throttling to downstream nodes.&nbsp; If the reporting node also=
 locally throttles the same set of messages, the overall number of throttle=
d request may be higher than intended. Therefore, if a reporting node needs=
 to apply local throttling on a set of messages that match or overlap with =
existing OCS entries, it needs to consider the impact of throttling by down=
stream nodes.&quot;<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp; <o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On Nov 17, 2014, at 2:38 AM, <a href=3D"mailto:lionel.morand@orange.co=
m">lionel.morand@orange.com</a> wrote:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I can live with the text proposed by Ulrich. But what is wrong with:<o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&quot; Therefore, the reporting node SHOULD NOT apply throttling to th=
e set of messages to which an active OCS applies.&quot; ?<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Envoy=E9 depuis mon Sony Xperia SP d'Orange<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>---- Maria Cruz Bartolome a =E9crit ----<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Section 4.2.3, 13th paragraph, 2nd sentence:<o:p></o:p></pre>
<pre>Existing text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the OLR applies.<o:p></o:p></pre>
<pre>Proposed text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the sent OLR applies.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>[LM] I would say that the reporting node will not remember the previou=
sly sent OLR, but will take care that there is an active OCS.<o:p></o:p></p=
re>
</blockquote>
<pre>SRD&gt; I'm ok with Ulrich's change.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>[LM] and this is incorrect but not fundamental. The reporting node doe=
s not have to &quot;remember&quot; a previously sent OLR. What it will do i=
s to refer to existing OCS to know that throttling should not be applied. A=
n OCS is a consequence of an sent OLR but it is not an OLR itself. But not =
fundamental here.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>[MCruz] I am ok with Ulrich's change. It does not mean that the report=
ing node needs to &quot;remember&quot; a previously sent OLR, though. The c=
hange only proposes to &quot;identify&quot; which OLR we refer to.<o:p></o:=
p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Best regards<o:p></o:p></pre>
<pre>/MCruz<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_____________________________________________________________________<=
o:p></o:p></pre>
<pre>____________________________________________________<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations <o:=
p></o:p></pre>
<pre>confidentielles ou privilegiees et ne doivent donc pas etre diffuses, =
<o:p></o:p></pre>
<pre>exploites ou copies sans autorisation. Si vous avez recu ce message <o=
:p></o:p></pre>
<pre>par erreur, veuillez le signaler a l'expediteur et le detruire ainsi q=
ue les pieces jointes. Les messages electroniques etant susceptibles d'alte=
ration, Orange decline toute responsabilite si ce message a ete altere, def=
orme ou falsifie. Merci.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This message and its attachments may contain confidential or <o:p></o:=
p></pre>
<pre>privileged information that may be protected by law; they should not b=
e distributed, used or copied without authorisation.<o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>DiME mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/dime">https://www.iet=
f.org/mailman/listinfo/dime</a><o:p></o:p></pre>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>______________________________________________________________________=
___________________________________________________<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations con=
fidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
<pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez=
 recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
<pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messag=
es electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
<pre>Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This message and its attachments may contain confidential or privilege=
d information that may be protected by law;<o:p></o:p></pre>
<pre>they should not be distributed, used or copied without authorisation.<=
o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_E194C2E18676714DACA9C3A2516265D2026F1036FR712WXCHMBA12z_--


From nobody Wed Dec  3 05:30:00 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 076671A1AFB for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:29:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ut37tF6kQGop for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:29:56 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6C3A1A1AF4 for <dime@ietf.org>; Wed,  3 Dec 2014 05:29:55 -0800 (PST)
Received: from [10.0.1.11] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sB3DTo7S058166 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 3 Dec 2014 07:29:51 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.11]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <17900_1417604115_547EEC13_17900_1759_1_6B7134B31289DC4FAF731D844122B36E99A6FD@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Date: Wed, 3 Dec 2014 07:29:49 -0600
X-Mao-Original-Outgoing-Id: 439306189.770499-f02219789bef8ce0f8ca63f7e06695ba
Content-Transfer-Encoding: quoted-printable
Message-Id: <A579E5AA-3B3C-4162-A050-C3F41A215704@nostrum.com>
References: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com> <17900_1417604115_547EEC13_17900_1759_1_6B7134B31289DC4FAF731D844122B36E99A6FD@PEXCVZYM13.corporate.adroot.infra.ftgroup>
To: lionel.morand@orange.com
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ntKAVikyWicSr09DZh6n1TMbtxg
Cc: "dime@ietf.org list" <dime@ietf.org>
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-control
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 13:29:58 -0000

I support adoption.

> On Dec 3, 2014, at 4:55 AM, lionel.morand@orange.com wrote:
>=20
> As individual, I support.
>=20
> Lionel
>=20
> -----Message d'origine-----
> De : Jouni [mailto:jouni.nospam@gmail.com]=20
> Envoy=E9 : mercredi 3 d=E9cembre 2014 11:12
> =C0 : dime@ietf.org list
> Cc : MORAND Lionel IMT/OLN; Jouni
> Objet : Call for WG adoption: draft-donovan-dime-doc-rate-control
>=20
> Folks,
>=20
> As we discussed and agreed during the Honolulu meeting we ask for the =
WG adoption for draft-donovan-dime-doc-rate-control unless counter =
proposals show up. The "wait period" for counter proposals has been more =
than enough.
>=20
> This mail starts a two week adoption call for =
draft-donovan-dime-doc-rate-control as a WG Item.
>=20
> Express your support or disagreements in the mailing list. The call =
ends 17th Dec EOB (CET+1).
>=20
> - Jouni & Lionel
>=20
>=20
> =
__________________________________________________________________________=
_______________________________________________
>=20
> Ce message et ses pieces jointes peuvent contenir des informations =
confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez =
recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les =
messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, =
deforme ou falsifie. Merci.
>=20
> This message and its attachments may contain confidential or =
privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and =
delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.
> Thank you.
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec  3 05:30:23 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3116C1A1A99 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:30:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1wwTSbfP5twh for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:30:16 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA9751A1AFB for <dime@ietf.org>; Wed,  3 Dec 2014 05:30:15 -0800 (PST)
Received: from [10.0.1.11] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sB3DTo7T058166 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 3 Dec 2014 07:30:14 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.11]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <24870_1417604127_547EEC1F_24870_1587_1_6B7134B31289DC4FAF731D844122B36E99A707@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Date: Wed, 3 Dec 2014 07:30:13 -0600
X-Mao-Original-Outgoing-Id: 439306213.716126-9eef3bb4ee3e75ff0272e391a5d0b223
Content-Transfer-Encoding: quoted-printable
Message-Id: <E9FAF741-9F02-4E29-9011-E8B466A9C4F1@nostrum.com>
References: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com> <24870_1417604127_547EEC1F_24870_1587_1_6B7134B31289DC4FAF731D844122B36E99A707@PEXCVZYM13.corporate.adroot.infra.ftgroup>
To: lionel.morand@orange.com
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/dkNQ57QXQxTQJqYrJNM3Lkfbmco
Cc: "dime@ietf.org list" <dime@ietf.org>
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 13:30:20 -0000

I support adoption.

/Ben

> On Dec 3, 2014, at 4:55 AM, lionel.morand@orange.com wrote:
>=20
> As individual, I support.
>=20
> Lionel
>=20
> -----Message d'origine-----
> De : Jouni [mailto:jouni.nospam@gmail.com]=20
> Envoy=E9 : mercredi 3 d=E9cembre 2014 11:12
> =C0 : dime@ietf.org list
> Cc : MORAND Lionel IMT/OLN; Jouni
> Objet : Call for WG adoption: draft-donovan-dime-agent-overload
>=20
> Folks,
>=20
> As we discussed and agreed during the Honolulu meeting we ask for the =
WG adoption for draft-donovan-dime-agent-overload unless counter =
proposals show up. The "wait period" for counter proposals has been more =
than enough.
>=20
> This mail starts a two week adoption call for =
draft-donovan-dime-agent-overload as a WG Item.
>=20
> Express your support or disagreements in the mailing list. The call =
ends 17th Dec EOB (CET+1).
>=20
> - Jouni & Lionel
>=20
>=20
> =
__________________________________________________________________________=
_______________________________________________
>=20
> Ce message et ses pieces jointes peuvent contenir des informations =
confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez =
recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les =
messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, =
deforme ou falsifie. Merci.
>=20
> This message and its attachments may contain confidential or =
privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and =
delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.
> Thank you.
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec  3 05:45:45 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEAAA1A1B1F for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:45:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DcTPk7oqfSzX for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:45:43 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8F3F1A1B15 for <dime@ietf.org>; Wed,  3 Dec 2014 05:45:43 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:56496 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XwAFN-0007p7-O0 for dime@ietf.org; Wed, 03 Dec 2014 05:45:43 -0800
Message-ID: <547F1401.1020804@usdonovans.com>
Date: Wed, 03 Dec 2014 07:45:37 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com> <17900_1417604115_547EEC13_17900_1759_1_6B7134B31289DC4FAF731D844122B36E99A6FD@PEXCVZYM13.corporate.adroot.infra.ftgroup> <A579E5AA-3B3C-4162-A050-C3F41A215704@nostrum.com>
In-Reply-To: <A579E5AA-3B3C-4162-A050-C3F41A215704@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/6jNqCJ0kUMvdKZZVdbYngD7VGpo
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-control
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 13:45:45 -0000

+1

On 12/3/14, 7:29 AM, Ben Campbell wrote:
> I support adoption.
>
>> On Dec 3, 2014, at 4:55 AM, lionel.morand@orange.com wrote:
>>
>> As individual, I support.
>>
>> Lionel
>>
>> -----Message d'origine-----
>> De : Jouni [mailto:jouni.nospam@gmail.com]
>> Envoyé : mercredi 3 décembre 2014 11:12
>> À : dime@ietf.org list
>> Cc : MORAND Lionel IMT/OLN; Jouni
>> Objet : Call for WG adoption: draft-donovan-dime-doc-rate-control
>>
>> Folks,
>>
>> As we discussed and agreed during the Honolulu meeting we ask for the WG adoption for draft-donovan-dime-doc-rate-control unless counter proposals show up. The "wait period" for counter proposals has been more than enough.
>>
>> This mail starts a two week adoption call for draft-donovan-dime-doc-rate-control as a WG Item.
>>
>> Express your support or disagreements in the mailing list. The call ends 17th Dec EOB (CET+1).
>>
>> - Jouni & Lionel
>>
>>
>> _________________________________________________________________________________________________________________________
>>
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec  3 05:46:09 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECBAB1A1B15 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:46:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h_Gv5bAxrQON for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 05:46:00 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFB861A0461 for <dime@ietf.org>; Wed,  3 Dec 2014 05:46:00 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:56497 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XwAFj-0008Fq-8w for dime@ietf.org; Wed, 03 Dec 2014 05:46:00 -0800
Message-ID: <547F1417.1090803@usdonovans.com>
Date: Wed, 03 Dec 2014 07:45:59 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com> <24870_1417604127_547EEC1F_24870_1587_1_6B7134B31289DC4FAF731D844122B36E99A707@PEXCVZYM13.corporate.adroot.infra.ftgroup> <E9FAF741-9F02-4E29-9011-E8B466A9C4F1@nostrum.com>
In-Reply-To: <E9FAF741-9F02-4E29-9011-E8B466A9C4F1@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/T1HNV8ASMFaL5ApFY2sOuEEb1hY
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 13:46:08 -0000

+1

On 12/3/14, 7:30 AM, Ben Campbell wrote:
> I support adoption.
>
> /Ben
>
>> On Dec 3, 2014, at 4:55 AM, lionel.morand@orange.com wrote:
>>
>> As individual, I support.
>>
>> Lionel
>>
>> -----Message d'origine-----
>> De : Jouni [mailto:jouni.nospam@gmail.com]
>> Envoyé : mercredi 3 décembre 2014 11:12
>> À : dime@ietf.org list
>> Cc : MORAND Lionel IMT/OLN; Jouni
>> Objet : Call for WG adoption: draft-donovan-dime-agent-overload
>>
>> Folks,
>>
>> As we discussed and agreed during the Honolulu meeting we ask for the WG adoption for draft-donovan-dime-agent-overload unless counter proposals show up. The "wait period" for counter proposals has been more than enough.
>>
>> This mail starts a two week adoption call for draft-donovan-dime-agent-overload as a WG Item.
>>
>> Express your support or disagreements in the mailing list. The call ends 17th Dec EOB (CET+1).
>>
>> - Jouni & Lionel
>>
>>
>> _________________________________________________________________________________________________________________________
>>
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec  3 09:02:20 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAA5E1A89FC for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 09:02:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level: 
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v-Yj7UlsZABC for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 09:02:06 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 792C21A1B47 for <dime@ietf.org>; Wed,  3 Dec 2014 09:01:59 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:56803 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XwDJG-0001KM-KI; Wed, 03 Dec 2014 09:01:57 -0800
Message-ID: <547F41FE.1050300@usdonovans.com>
Date: Wed, 03 Dec 2014 11:01:50 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: lionel.morand@orange.com, "dime@ietf.org" <dime@ietf.org>
References: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com> <16959_1416942163_5474D253_16959_819_1_6B7134B31289DC4FAF731D844122B36E941941@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E07E3.7090200@usdonovans.com> <17153_1417604034_547EEBC2_17153_877_1_6B7134B31289DC4FAF731D844122B36E99A6E1@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <17153_1417604034_547EEBC2_17153_877_1_6B7134B31289DC4FAF731D844122B36E99A6E1@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Content-Type: multipart/alternative; boundary="------------080001050808030500030600"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/7OGhS5J_3d6lElTDUqJRIu25KcE
Subject: Re: [Dime] Updated DOIC Requirements Analysis
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 17:02:14 -0000

This is a multi-part message in MIME format.
--------------080001050808030500030600
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit

Change made.

On 12/3/14, 4:53 AM, lionel.morand@orange.com wrote:
>
> Hi Steve,
>
> For the first paragraph, I would simply say:
>
>     This specification defines a base solution for Diameter overload
>     control, referred to as Diameter Overload Indication Conveyance
>     (DOIC), based on the requirements identified in RFC 7068 [RFC7068].
>   
>
> OK for the rest.
>
> Regards,
>
> Lionel
>
> *De :*DiME [mailto:dime-bounces@ietf.org] *De la part de* Steve Donovan
> *Envoyé :* mardi 2 décembre 2014 19:42
> *À :* dime@ietf.org
> *Objet :* Re: [Dime] Updated DOIC Requirements Analysis
>
> Lionel,
>
> I currently have the following for the Introduction based on other 
> suggestions from, I believe, Ben:
>
>     This specification defines a base solution for Diameter overload
>     control, referred to as Diameter Overload Indication Conveyance
>     (DOIC).  The requirements for the solution are described and
>     discussed in the corresponding requirements document [RFC7068].
>   
>     This specification addresses Diameter overload control between
>     Diameter nodes that support the DOIC solution.  The solution, which
>     is designed to apply to existing and future Diameter applications,
>     requires no changes to the Diameter base protocol [RFC6733] and is
>     deployable in environments where some Diameter nodes do not implement
>     the Diameter overload control solution defined in this specification.
>   
>     Note that the overload control solution defined in this specification
>     does not address all the requirements listed in [RFC7068].  A number
>     of overload control related features are left for future
>     specifications.  See Appendix A for a list of extensions that are
>     currently being considered.  See Appendix C for an analysis of
>     conformance to the requirements specified in [RFC7068].
>
> Let me know if this works for you.
>
> I have included your other suggestion below.
>
> Regards,
>
> Steve
>
> On 11/25/14, 1:02 PM, lionel.morand@orange.com 
> <mailto:lionel.morand@orange.com> wrote:
>
>     Hi Ben, Steve,
>
>       
>
>     the text in section 1 needs also to be updated. I would propose something like:
>
>       
>
>     1.  Introduction
>
>       
>
>         This specification defines a base solution for Diameter Overload
>
>         Control (DOC), referred to as Diameter Overload Indication Conveyance
>
>         (DOIC).  The requirements for the solution are described and
>
>         discussed in the corresponding design requirements document
>
>         [RFC7068].  Note that the overload control solution defined in this
>
>         specification does not address all the requirements listed in
>
>         [RFC7068].  See Appendix C for further details on the
>
>         conformance to the requirements specified in [RFC7068].
>
>       
>
>     In C.1:
>
>       
>
>     C.1.  Deferred Requirements
>
>       
>
>         The DIME working group chose to defer certain requirements in order
>
>         to meet an an external deadline.  The 3GPP "Core Network and
>
>         Terminal" working group 4 (CT4) working group wished to reference
>
>         DOIC as part of Release 12.  This required the DOIC base protocol to
>
>         be substantially complete by the end of 2014.  The deferred work
>
>         includes the following:
>
>       
>
>     it is not necessary to quote CT4, as there are other groups impacts. I would propose to rephrase as below:
>
>       
>
>         3GPP have adopted an early version of this document as normative
>
>         reference in various Diameter related specifications to support the
>
>         overload control mechanism in their release 12 framework.  The DIME
>
>         working group has therefore decided to defer certain requirements in order
>
>         to complete the design of an extensible generic solution before the
>
>         deadline scheduled by 3GPP for the completion of the protocol work
>
>         in release 12 by the end of 2014.  The deferred work includes the following:
>
>       
>
>     regards,
>
>       
>
>     Lionel
>
>       
>
>     De : DiME [mailto:dime-bounces@ietf.org] De la part de Ben Campbell
>
>     Envoyé : mardi 25 novembre 2014 03:19
>
>     À :dime@ietf.org  <mailto:dime@ietf.org>  list
>
>     Objet : [Dime] Updated DOIC Requirements Analysis
>
>       
>
>     Here's the text from the updated requirements analysis. I updated the summary to be more general, and updated the detail based on mail discussion. The detail section is marked for deletion before publication as an RFC.
>
>       
>
>     BTW, It's appendix C now because I used the section Steve had already reserved for it :-)
>
>       
>
>     Thanks!
>
>       
>
>     Ben.
>
>     -------------------
>
>     Appendix C.  Requirements Conformance Analysis
>
>       
>
>         This section contains the result of an analysis of the DOIC solutions
>
>         conformance to the requirements defined in [RFC7068].
>
>       
>
>     C.1.  Deferred Requirements
>
>       
>
>         The DIME working group chose to defer certain requirements in order
>
>         to meet an an external deadline.  The 3GPP "Core Network and
>
>         Terminal" working group 4 (CT4) working group wished to reference
>
>         DOIC as part of Release 12.  This required the DOIC base protocol to
>
>         be substantially complete by the end of 2014.  The deferred work
>
>         includes the following:
>
>       
>
>         o  Agent Overload - The ability for an agent to report an overload
>
>            condition of the agent itself.
>
>       
>
>         o  Load Information - The ability for a node to report its load level
>
>            when not overloaded.
>
>       
>
>         At the time of this writing, DIME has begun separate work efforts for
>
>         these requirements.
>
>       
>
>     C.2.  Detection of non-supporting Intermediaries
>
>       
>
>         The DOIC mechanism as currently defined does not allow supporting
>
>         nodes to automatically determine whether OC-Supported-Features or OC-
>
>         OLR AVPs are originated by a peer node, or by a non-peer node and
>
>         sent across a non-supporting peer.  This makes it impossible to
>
>         detect the presence of non-supporting nodes between supporting nodes,
>
>         except by configuration.  The working group determined that such a
>
>         configuration requirement is acceptable.
>
>       
>
>         This limits full compliance with certain requirements related to the
>
>         limitation of new configuration, deployment in environments with
>
>         mixed support, operating across non-supporting agents, and
>
>         authorization.
>
>       
>
>     C.3.  Implicit Application Indication
>
>       
>
>         The working group elected to determine the application for an
>
>         overload report from that of the enclosing message.  This prevents
>
>         sending an OLR for an application when there are no transactions for
>
>         that application.
>
>       
>
>         As a consequence, DOIC does not comply with the requirement to be
>
>         able to report overload information across quiescent connections.
>
>         DOIC does not fully comply with requirements to operate on up-to-date
>
>         information, since if an OLR causes all transactions to stop for an
>
>         application, the only way traffic will resume is for the OLR to
>
>         expire.
>
>       
>
>     C.4.  Stateless Operation
>
>       
>
>         RFC7068 explicitly discourages the sending of OLRs in every answer
>
>         message, as part of the requirement to avoid additional work for
>
>         overloaded nodes.  DOIC recommends exactly that behavior during
>
>         active overload conditions.  The working group determined that doing
>
>         otherwise would reduce reliability and increase statefulness.  (Note
>
>         that DOIC does allow nodes to avoid sending OLRs in every answer if
>
>         they have some other method of ensuring that OLRs get to all relevant
>
>         reacting nodes.)
>
>       
>
>     C.5.  No New Vulnerabilities
>
>       
>
>         The working group believes that DOIC is compliant with the
>
>         requirement to avoid introducing new vulnerabilities.  However, this
>
>         requirement may warrant an early security expert review.
>
>       
>
>     C.6.  Detailed Requirements
>
>       
>
>         [RFC Editor: Please remove this section and subsections prior to
>
>         publication as an RFC.]
>
>       
>
>     C.6.1.  General
>
>       
>
>         REQ 1:  The solution MUST provide a communication method for Diameter
>
>                 nodes to exchange load and overload information.
>
>       
>
>                 *Partially Compliant*. The mechanism uses new AVPs
>
>                 piggybacked on existing Diameter messages to exchange
>
>                 overload information.  It does not currently support "load"
>
>                 information or the ability to report overload of an agent.
>
>                 These have been left for future extensions.
>
>       
>
>       
>
>       
>
>         REQ 2:  The solution MUST allow Diameter nodes to support overload
>
>                 control regardless of which Diameter applications they
>
>                 support.  Diameter clients and agents must be able to use the
>
>                 received load and overload information to support graceful
>
>                 behavior during an overload condition.  Graceful behavior
>
>                 under overload conditions is best described by REQ 3.
>
>       
>
>                 *Partially Compliant*. The DOIC AVPs can be used in any
>
>                 application that allows the extension of AVPs.  However,
>
>                 "load" information is not currently supported.
>
>       
>
>       
>
>       
>
>         REQ 3:  The solution MUST limit the impact of overload on the overall
>
>                 useful throughput of a Diameter server, even when the
>
>                 incoming load on the network is far in excess of its
>
>                 capacity.  The overall useful throughput under load is the
>
>                 ultimate measure of the value of a solution.
>
>       
>
>                 *Compliant*. DOIC provides information that nodes can use to
>
>                 reduce the impact of overload.
>
>       
>
>       
>
>       
>
>         REQ 4:  Diameter allows requests to be sent from either side of a
>
>                 connection, and either side of a connection may have need to
>
>                 provide its overload status.  The solution MUST allow each
>
>                 side of a connection to independently inform the other of its
>
>                 overload status.
>
>       
>
>                 *Compliant*. DOIC AVPs can be included regardless of
>
>                 transaction "direction"
>
>       
>
>       
>
>       
>
>         REQ 5:  Diameter allows nodes to determine their peers via dynamic
>
>                 discovery or manual configuration.  The solution MUST work
>
>                 consistently without regard to how peers are determined.
>
>       
>
>                 *Compliant*. DOIC contains no assumptions about how peers are
>
>                 discovered.
>
>       
>
>       
>
>       
>
>         REQ 6:  The solution designers SHOULD seek to minimize the amount of
>
>                 new configuration required in order to work.  For example, it
>
>                 is better to allow peers to advertise or negotiate support
>
>                 for the solution, rather than to require that this knowledge
>
>                 to be configured at each node.
>
>       
>
>                 *Partially Compliant*. Most DOIC parameters are advertised
>
>                 using the DOIC capability announcement mechanism.  However,
>
>                 there are some situations where configuration is required.
>
>                 For example, a DOIC node detect the fact that a peer may not
>
>                 support DOIC when nodes on the other side of the non-
>
>                 supporting node do support DOIC without configuration.
>
>       
>
>       
>
>       
>
>     C.6.2.  Performance
>
>       
>
>         REQ 7:  The solution and any associated default algorithm(s) MUST
>
>                 ensure that the system remains stable.  At some point after
>
>                 an overload condition has ended, the solution MUST enable
>
>                 capacity to stabilize and become equal to what it would be in
>
>                 the absence of an overload condition.  Note that this also
>
>                 requires that the solution MUST allow nodes to shed load
>
>                 without introducing non-converging oscillations during or
>
>                 after an overload condition.
>
>       
>
>                 *Compliant*. The specification offers guidance that
>
>                 implementations should apply hysteresis when recovering from
>
>                 overload, and avoid sudden ramp ups in offered load when
>
>                 recovering.
>
>       
>
>       
>
>       
>
>         REQ 8:  Supporting nodes MUST be able to distinguish current overload
>
>                 information from stale information.
>
>       
>
>                 *Partially Compliant*. DOIC overload reports are "soft
>
>                 state", that is they expire after an indicated period.  DOIC
>
>                 nodes may also send reports that end existing overload
>
>                 conditions.  DOIC requires reporting nodes to ensure that all
>
>                 relevant reacting nodes receive overload reports.
>
>       
>
>                 However, since DOIC does not allow reporting nodes to send
>
>                 OLRs in watchdog messages, if an overload condition results
>
>                 in zero offered load, the reporting node cannot update the
>
>                 condition until the expiration of the original OLR.
>
>       
>
>       
>
>       
>
>         REQ 9:  The solution MUST function across fully loaded as well as
>
>                 quiescent transport connections.  This is partially derived
>
>                 from the requirement for stability in REQ 7.
>
>       
>
>                 *Not Compliant*. DOIC does not allow OLRs to be sent over
>
>                 quiescent transport connections.  This is due to the fact
>
>                 that OLRs cannot be sent outside of the application to which
>
>                 they apply.
>
>       
>
>       
>
>       
>
>         REQ 10: Consumers of overload information MUST be able to determine
>
>                 when the overload condition improves or ends.
>
>       
>
>                 *Partially Compliant*. (See response to previous two
>
>                 requirements.)
>
>       
>
>       
>
>       
>
>         REQ 11: The solution MUST be able to operate in networks of different
>
>                 sizes.
>
>       
>
>                 *Compliant*. DOIC makes no assumptions about the size of the
>
>                 network.  DOIC can operate purely between clients and
>
>                 servers, or across agents.
>
>       
>
>       
>
>       
>
>         REQ 12: When a single network node fails, goes into overload, or
>
>                 suffers from reduced processing capacity, the solution MUST
>
>                 make it possible to limit the impact of the affected node on
>
>                 other nodes in the network.  This helps to prevent a small-
>
>                 scale failure from becoming a widespread outage.
>
>       
>
>                 *Partially Compliant*. DOIC allows overload reports for an
>
>                 entire realm, where abated traffic will not be redirected
>
>                 towards another server.  But in situations where nodes choose
>
>                 to divert traffic to other nodes, DOIC offers no way of
>
>                 knowing whether the new recipients can handle the traffic if
>
>                 they have not already indicated overload.  This may be
>
>                 mitigated with the use of a future "load" extension, or with
>
>                 the use of proprietary dynamic load-balancing mechanisms.
>
>       
>
>       
>
>       
>
>         REQ 13: The solution MUST NOT introduce substantial additional work
>
>                 for a node in an overloaded state.  For example, a
>
>                 requirement for an overloaded node to send overload
>
>                 information every time it received a new request would
>
>                 introduce substantial work.
>
>       
>
>                 *Not Compliant*. DOIC does in fact encourage an overloaded
>
>                 node to send an OLR in every response.  The working group
>
>                 that other mechanisms to ensure that every relevant node
>
>                 receives an OLR would create even more work.  [Note: This
>
>                 needs discussion.]
>
>       
>
>       
>
>       
>
>         REQ 14: Some scenarios that result in overload involve a rapid
>
>                 increase of traffic with little time between normal levels
>
>                 and levels that induce overload.  The solution SHOULD provide
>
>                 for rapid feedback when traffic levels increase.
>
>       
>
>                 *Compliant*. The piggyback mechanism allows OLRs to be sent
>
>                 at the same rate as application traffic.
>
>       
>
>       
>
>       
>
>         REQ 15: The solution MUST NOT interfere with the congestion control
>
>                 mechanisms of underlying transport protocols.  For example, a
>
>                 solution that opened additional TCP connections when the
>
>                 network is congested would reduce the effectiveness of the
>
>                 underlying congestion control mechanisms.
>
>       
>
>                 *Compliant*. DOIC does not require or recommend changes in
>
>                 the handling of transport protocols or connections.
>
>       
>
>       
>
>       
>
>     C.6.3.  Heterogeneous Support for Solution
>
>       
>
>         REQ 16: The solution is likely to be deployed incrementally.  The
>
>                 solution MUST support a mixed environment where some, but not
>
>                 all, nodes implement it.
>
>       
>
>                 *Partially Compliant*. DOIC works with most mixed-deployment
>
>                 scenarios.  However, it cannot work across a non-supporting
>
>                 proxy that modifies Origin-Host AVPs in answer messages.
>
>                 DOIC will have limited impact in networks where the nodes
>
>                 that perform server selections do not support the mechanism.
>
>       
>
>       
>
>       
>
>         REQ 17: In a mixed environment with nodes that support the solution
>
>                 and nodes that do not, the solution MUST NOT result in
>
>                 materially less useful throughput during overload as would
>
>                 have resulted if the solution were not present.  It SHOULD
>
>                 result in less severe overload in this environment.
>
>       
>
>                 *Compliant*. In most mixed-support deployment, DOIC will
>
>                 offer at least some value, and will not make things worse.
>
>       
>
>       
>
>       
>
>         REQ 18: In a mixed environment of nodes that support the solution and
>
>                 nodes that do not, the solution MUST NOT preclude elements
>
>                 that support overload control from treating elements that do
>
>                 not support overload control in an equitable fashion relative
>
>                 to those that do.  Users and operators of nodes that do not
>
>                 support the solution MUST NOT unfairly benefit from the
>
>                 solution.  The solution specification SHOULD provide guidance
>
>                 to implementors for dealing with elements not supporting
>
>                 overload control.
>
>       
>
>                 *Compliant*. DOIC provides mechanisms to abate load from non-
>
>                 supporting sources.  Furthermore, it recommends that
>
>                 reporting nodes will still need to be able to apply whatever
>
>                 protections they would ordinarily apply if DOIC were not in
>
>                 use.
>
>       
>
>       
>
>       
>
>         REQ 19: It MUST be possible to use the solution between nodes in
>
>                 different realms and in different administrative domains.
>
>       
>
>                 *Partially Compliant*. DOIC allows sending OLRs across
>
>                 administrative domains, and potentially to nodes in other
>
>                 realms.  However, an OLR cannot indicate overload for realms
>
>                 other than the one in the Origin-Realm AVP of the containing
>
>                 answer.
>
>       
>
>       
>
>       
>
>         REQ 20: Any explicit overload indication MUST be clearly
>
>                 distinguishable from other errors reported via Diameter.
>
>       
>
>                 *Compliant*. DOIC sends explicit overload indication in
>
>                 overload reports.  It does not depend on error result codes.
>
>       
>
>       
>
>       
>
>         REQ 21: In cases where a network node fails, is so overloaded that it
>
>                 cannot process messages, or cannot communicate due to a
>
>                 network failure, it may not be able to provide explicit
>
>                 indications of the nature of the failure or its levels of
>
>                 overload.  The solution MUST result in at least as much
>
>                 useful throughput as would have resulted if the solution were
>
>                 not in place.
>
>       
>
>                 *Compliant*. DOIC overload reports have the primary effect of
>
>                 suppressing message retries in overload conditions.  DOIC
>
>                 recommends that messages never be silently dropped if at all
>
>                 possible.
>
>       
>
>       
>
>       
>
>     C.6.4.  Granular Control
>
>       
>
>         REQ 22: The solution MUST provide a way for a node to throttle the
>
>                 amount of traffic it receives from a peer node.  This
>
>                 throttling SHOULD be graded so that it can be applied
>
>                 gradually as offered load increases.  Overload is not a
>
>                 binary state; there may be degrees of overload.
>
>       
>
>                 *Compliant*. The "loss" algorithm expresses a percentage
>
>                 reduction.
>
>       
>
>       
>
>       
>
>         REQ 23: The solution MUST provide sufficient information to enable a
>
>                 load-balancing node to divert messages that are rejected or
>
>                 otherwise throttled by an overloaded upstream node to other
>
>                 upstream nodes that are the most likely to have sufficient
>
>                 capacity to process them.
>
>       
>
>                 *Not Compliant*. DOIC provides no built in mechanism to
>
>                 determine the best place to divert messages that would
>
>                 otherwise be throttled.  This can be accomplished with a
>
>                 future "load" extension, or with proprietary load balancing
>
>                 mechanisms.
>
>       
>
>       
>
>       
>
>         REQ 24: The solution MUST provide a mechanism for indicating load
>
>                 levels, even when not in an overload condition, to assist
>
>                 nodes in making decisions to prevent overload conditions from
>
>                 occurring.
>
>       
>
>                 *Not Compliant*. "Load" information has been left for a
>
>                 future extension.
>
>       
>
>       
>
>       
>
>     C.6.5.  Priority and Policy
>
>       
>
>         REQ 25: The base specification for the solution SHOULD offer general
>
>                 guidance on which message types might be desirable to send or
>
>                 process over others during times of overload, based on
>
>                 application-specific considerations.  For example, it may be
>
>                 more beneficial to process messages for existing sessions
>
>                 ahead of new sessions.  Some networks may have a requirement
>
>                 to give priority to requests associated with emergency
>
>                 sessions.  Any normative or otherwise detailed definition of
>
>                 the relative priorities of message types during an overload
>
>                 condition will be the responsibility of the application
>
>                 specification.
>
>       
>
>                 *Compliant*. The specification offers guidance on how
>
>                 requests might be prioritized for different types of
>
>                 applications.
>
>       
>
>       
>
>       
>
>         REQ 26: The solution MUST NOT prevent a node from prioritizing
>
>                 requests based on any local policy, so that certain requests
>
>                 are given preferential treatment, given additional
>
>                 retransmission, not throttled, or processed ahead of others.
>
>       
>
>                 *Compliant*. Nothing in the specification prevents
>
>                 application-specific, implementation-specific, or local
>
>                 policies.
>
>       
>
>       
>
>       
>
>     C.6.6.  Security
>
>       
>
>         REQ 27: The solution MUST NOT provide new vulnerabilities to
>
>                 malicious attack or increase the severity of any existing
>
>                 vulnerabilities.  This includes vulnerabilities to DoS and
>
>                 DDoS attacks as well as replay and man-in-the-middle attacks.
>
>                 Note that the Diameter base specification [RFC6733] lacks
>
>                 end-to-end security and this must be considered (see the
>
>                 Security Considerations in [RFC7068]).  Note that this
>
>                 requirement was expressed at a high level so as to not
>
>                 preclude any particular solution.  Is is expected that the
>
>                 solution will address this in more detail.
>
>       
>
>                 *Compliant*. The working group is not aware of any such
>
>                 vulnerabilities.  [This may need further analysis.]
>
>       
>
>       
>
>       
>
>         REQ 28: The solution MUST NOT depend on being deployed in
>
>                 environments where all Diameter nodes are completely trusted.
>
>                 It SHOULD operate as effectively as possible in environments
>
>                 where other nodes are malicious; this includes preventing
>
>                 malicious nodes from obtaining more than a fair share of
>
>                 service.  Note that this does not imply any responsibility on
>
>                 the solution to detect, or take countermeasures against,
>
>                 malicious nodes.
>
>       
>
>                 *Partially Compliant*. Since all Diameter security is
>
>                 currently at the transport layer, nodes must trust immediate
>
>                 peers to enforce trust policies.  However, there are
>
>                 situations where a DOIC node cannot determine if an immediate
>
>                 peer supports DOIC.  The authors recommend an expert security
>
>                 review.
>
>       
>
>       
>
>       
>
>         REQ 29: It MUST be possible for a supporting node to make
>
>                 authorization decisions about what information will be sent
>
>                 to peer nodes based on the identity of those nodes.  This
>
>                 allows a domain administrator who considers the load of their
>
>                 nodes to be sensitive information to restrict access to that
>
>                 information.  Of course, in such cases, there is no
>
>                 expectation that the solution itself will help prevent
>
>                 overload from that peer node.
>
>       
>
>                 *Partially Compliant*. (See response to previous
>
>                 requirement.)
>
>       
>
>       
>
>       
>
>         REQ 30: The solution MUST NOT interfere with any Diameter-compliant
>
>                 method that a node may use to protect itself from overload
>
>                 from non-supporting nodes or from denial-of-service attacks.
>
>       
>
>                 *Compliant*. The specification recommends that any such
>
>                 protection mechanism needed without DOIC should continue to
>
>                 be employed with DOIC.
>
>       
>
>       
>
>       
>
>     C.6.7.  Flexibility and Extensibility
>
>       
>
>         REQ 31: There are multiple situations where a Diameter node may be
>
>                 overloaded for some purposes but not others.  For example,
>
>                 this can happen to an agent or server that supports multiple
>
>                 applications, or when a server depends on multiple external
>
>                 resources, some of which may become overloaded while others
>
>                 are fully available.  The solution MUST allow Diameter nodes
>
>                 to indicate overload with sufficient granularity to allow
>
>                 clients to take action based on the overloaded resources
>
>                 without unreasonably forcing available capacity to go unused.
>
>                 The solution MUST support specification of overload
>
>                 information with granularities of at least "Diameter node",
>
>                 "realm", and "Diameter application" and MUST allow
>
>                 extensibility for others to be added in the future.
>
>       
>
>                 *Partially Compliant*. All DOIC overload reports are scoped
>
>                 to the specific application and realm.  Inside that scope,
>
>                 overload can be reported at the specific server or whole
>
>                 realm scope.  As currently specified, DOIC cannot indicate
>
>                 local overload for an agent.  At the time of this writing,
>
>                 the DIME working group has plans to work on an agent-overload
>
>                 extension.
>
>       
>
>                 DOIC allows new "scopes" through the use of extended report
>
>                 types.
>
>       
>
>       
>
>       
>
>         REQ 32: The solution MUST provide a method for extending the
>
>                 information communicated and the algorithms used for overload
>
>                 control.
>
>       
>
>                 *Compliant*. DOIC allows new report types and abatement
>
>                 algorithms to be created.  These may be indicated using the
>
>                 OC-Supported-Features AVP.
>
>       
>
>       
>
>       
>
>         REQ 33: The solution MUST provide a default algorithm that is
>
>                 mandatory to implement.
>
>       
>
>                 *Compliant*. The "loss" algorithm is mandatory to implement.
>
>       
>
>       
>
>       
>
>         REQ 34: The solution SHOULD provide a method for exchanging overload
>
>                 and load information between elements that are connected by
>
>                 intermediaries that do not support the solution.
>
>       
>
>                 *Partially Compliant*. DOIC information can traverse non-
>
>                 supporting agents, as long as those agents do not modify
>
>                 certain AVPs. (e.g., Origin-Host).  DOIC does not provide a
>
>                 way for supporting nodes to detect such modification.
>
>       
>
>       
>
>     _________________________________________________________________________________________________________________________
>
>       
>
>     Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>
>     pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>
>     a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>
>     Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
>       
>
>     This message and its attachments may contain confidential or privileged information that may be protected by law;
>
>     they should not be distributed, used or copied without authorisation.
>
>     If you have received this email in error, please notify the sender and delete this message and its attachments.
>
>     As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>
>     Thank you.
>
>       
>
>     _______________________________________________
>
>     DiME mailing list
>
>     DiME@ietf.org  <mailto:DiME@ietf.org>
>
>     https://www.ietf.org/mailman/listinfo/dime
>
>       
>
> _________________________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.


--------------080001050808030500030600
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Change made.<br>
    <br>
    <div class="moz-cite-prefix">On 12/3/14, 4:53 AM,
      <a class="moz-txt-link-abbreviated" href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a> wrote:<br>
    </div>
    <blockquote
cite="mid:17153_1417604034_547EEBC2_17153_877_1_6B7134B31289DC4FAF731D844122B36E99A6E1@PEXCVZYM13.corporate.adroot.infra.ftgroup"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr&eacute;format&eacute; HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr&eacute;format&eacute; HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr&eacute;format&eacute; HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Hi Steve,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">For the first paragraph, I would simply say:<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <pre><span lang="EN-US">&nbsp;&nbsp; This specification defines a base solution for Diameter overload<o:p></o:p></span></pre>
        <pre><span lang="EN-US">&nbsp;&nbsp; control, referred to as Diameter Overload Indication Conveyance<o:p></o:p></span></pre>
        <pre><span lang="EN-US">&nbsp;&nbsp; (DOIC), based on the requirements identified in RFC 7068 [RFC7068].<o:p></o:p></span></pre>
        <pre><span lang="EN-US"><o:p>&nbsp;</o:p></span></pre>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">OK for the rest.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Regards,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Lionel<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0cm 0cm 0cm">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">
                DiME [<a class="moz-txt-link-freetext" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
                <b>De la part de</b> Steve Donovan<br>
                <b>Envoy&eacute;&nbsp;:</b> mardi 2 d&eacute;cembre 2014 19:42<br>
                <b>&Agrave;&nbsp;:</b> <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                <b>Objet&nbsp;:</b> Re: [Dime] Updated DOIC Requirements
                Analysis<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Lionel,<br>
          <br>
          I currently have the following for the Introduction based on
          other suggestions from, I believe, Ben:<o:p></o:p></p>
        <pre>&nbsp;&nbsp; This specification defines a base solution for Diameter overload<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; control, referred to as Diameter Overload Indication Conveyance<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; (DOIC).&nbsp; The requirements for the solution are described and<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; discussed in the corresponding requirements document [RFC7068].<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp; This specification addresses Diameter overload control between<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; Diameter nodes that support the DOIC solution.&nbsp; The solution, which<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; is designed to apply to existing and future Diameter applications,<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; requires no changes to the Diameter base protocol [RFC6733] and is<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; deployable in environments where some Diameter nodes do not implement<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; the Diameter overload control solution defined in this specification.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp; Note that the overload control solution defined in this specification<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; does not address all the requirements listed in [RFC7068].&nbsp; A number<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; of overload control related features are left for future<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; specifications.&nbsp; See Appendix A for a list of extensions that are<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; currently being considered.&nbsp; See Appendix C for an analysis of<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; conformance to the requirements specified in [RFC7068].<o:p></o:p></pre>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Let me know if
          this works for you.<br>
          <br>
          I have included your other suggestion below.<br>
          <br>
          Regards,<br>
          <br>
          Steve<br>
          <br>
          <o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 11/25/14, 1:02 PM, <a
              moz-do-not-send="true"
              href="mailto:lionel.morand@orange.com">
              lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <pre>Hi Ben, Steve,<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>the text in section 1 needs also to be updated. I would propose something like:<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>1.&nbsp; Introduction<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; This specification defines a base solution for Diameter Overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; Control (DOC), referred to as Diameter Overload Indication Conveyance<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; (DOIC).&nbsp; The requirements for the solution are described and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; discussed in the corresponding design requirements document<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; [RFC7068].&nbsp; Note that the overload control solution defined in this<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; specification does not address all the requirements listed in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; [RFC7068].&nbsp; See Appendix C for further details on the <o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;conformance to the requirements specified in [RFC7068].<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>In C.1:<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.1.&nbsp; Deferred Requirements<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; The DIME working group chose to defer certain requirements in order<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; to meet an an external deadline.&nbsp; The 3GPP "Core Network and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; Terminal" working group 4 (CT4) working group wished to reference<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; DOIC as part of Release 12.&nbsp; This required the DOIC base protocol to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; be substantially complete by the end of 2014.&nbsp; The deferred work<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; includes the following:<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>it is not necessary to quote CT4, as there are other groups impacts. I would propose to rephrase as below:<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; 3GPP have adopted an early version of this document as normative<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; reference in various Diameter related specifications to support the <o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;overload control mechanism in their release 12 framework.&nbsp; The DIME<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; working group has therefore decided to defer certain requirements in order<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; to complete the design of an extensible generic solution before the <o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;deadline scheduled by 3GPP for the completion of the protocol work<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; in release 12 by the end of 2014.&nbsp; The deferred work includes the following:<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>regards,<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Lionel<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>De&nbsp;: DiME [<a moz-do-not-send="true" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>] De la part de Ben Campbell<o:p></o:p></pre>
          <pre>Envoy&eacute;&nbsp;: mardi 25 novembre 2014 03:19<o:p></o:p></pre>
          <pre>&Agrave;&nbsp;: <a moz-do-not-send="true" href="mailto:dime@ietf.org">dime@ietf.org</a> list<o:p></o:p></pre>
          <pre>Objet&nbsp;: [Dime] Updated DOIC Requirements Analysis<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Here's the text from the updated requirements analysis. I updated the summary to be more general, and updated the detail based on mail discussion. The detail section is marked for deletion before publication as an RFC.&nbsp;<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>BTW, It's appendix C now because I used the section Steve had already reserved for it :-)<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Thanks!<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Ben.<o:p></o:p></pre>
          <pre>-------------------<o:p></o:p></pre>
          <pre>Appendix C.&nbsp; Requirements Conformance Analysis<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; This section contains the result of an analysis of the DOIC solutions<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; conformance to the requirements defined in [RFC7068].<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.1.&nbsp; Deferred Requirements<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; The DIME working group chose to defer certain requirements in order<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; to meet an an external deadline.&nbsp; The 3GPP "Core Network and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; Terminal" working group 4 (CT4) working group wished to reference<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; DOIC as part of Release 12.&nbsp; This required the DOIC base protocol to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; be substantially complete by the end of 2014.&nbsp; The deferred work<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; includes the following:<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; o&nbsp; Agent Overload - The ability for an agent to report an overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition of the agent itself.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; o&nbsp; Load Information - The ability for a node to report its load level<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when not overloaded.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; At the time of this writing, DIME has begun separate work efforts for<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; these requirements.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.2.&nbsp; Detection of non-supporting Intermediaries<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; The DOIC mechanism as currently defined does not allow supporting<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; nodes to automatically determine whether OC-Supported-Features or OC-<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; OLR AVPs are originated by a peer node, or by a non-peer node and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; sent across a non-supporting peer.&nbsp; This makes it impossible to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; detect the presence of non-supporting nodes between supporting nodes,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; except by configuration.&nbsp; The working group determined that such a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; configuration requirement is acceptable.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; This limits full compliance with certain requirements related to the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; limitation of new configuration, deployment in environments with<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; mixed support, operating across non-supporting agents, and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; authorization.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.3.&nbsp; Implicit Application Indication<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; The working group elected to determine the application for an<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; overload report from that of the enclosing message.&nbsp; This prevents<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; sending an OLR for an application when there are no transactions for<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; that application.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; As a consequence, DOIC does not comply with the requirement to be<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; able to report overload information across quiescent connections.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; DOIC does not fully comply with requirements to operate on up-to-date<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; information, since if an OLR causes all transactions to stop for an<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; application, the only way traffic will resume is for the OLR to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; expire.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.4.&nbsp; Stateless Operation<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; RFC7068 explicitly discourages the sending of OLRs in every answer<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; message, as part of the requirement to avoid additional work for<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; overloaded nodes.&nbsp; DOIC recommends exactly that behavior during<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; active overload conditions.&nbsp; The working group determined that doing<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; otherwise would reduce reliability and increase statefulness.&nbsp; (Note<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; that DOIC does allow nodes to avoid sending OLRs in every answer if<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; they have some other method of ensuring that OLRs get to all relevant<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; reacting nodes.)<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.5.&nbsp; No New Vulnerabilities<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; The working group believes that DOIC is compliant with the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; requirement to avoid introducing new vulnerabilities.&nbsp; However, this<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; requirement may warrant an early security expert review.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.&nbsp; Detailed Requirements<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; [RFC Editor: Please remove this section and subsections prior to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; publication as an RFC.]<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.1.&nbsp; General<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 1:&nbsp; The solution MUST provide a communication method for Diameter<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes to exchange load and overload information.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. The mechanism uses new AVPs<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; piggybacked on existing Diameter messages to exchange<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload information.&nbsp; It does not currently support "load"<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information or the ability to report overload of an agent.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; These have been left for future extensions.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 2:&nbsp; The solution MUST allow Diameter nodes to support overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; control regardless of which Diameter applications they<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support.&nbsp; Diameter clients and agents must be able to use the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; received load and overload information to support graceful<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; behavior during an overload condition.&nbsp; Graceful behavior<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; under overload conditions is best described by REQ 3.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. The DOIC AVPs can be used in any<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application that allows the extension of AVPs.&nbsp; However,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "load" information is not currently supported.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 3:&nbsp; The solution MUST limit the impact of overload on the overall<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; useful throughput of a Diameter server, even when the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; incoming load on the network is far in excess of its<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity.&nbsp; The overall useful throughput under load is the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ultimate measure of the value of a solution.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC provides information that nodes can use to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reduce the impact of overload.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 4:&nbsp; Diameter allows requests to be sent from either side of a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; connection, and either side of a connection may have need to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; provide its overload status.&nbsp; The solution MUST allow each<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; side of a connection to independently inform the other of its<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload status.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC AVPs can be included regardless of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; transaction "direction"<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 5:&nbsp; Diameter allows nodes to determine their peers via dynamic<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; discovery or manual configuration.&nbsp; The solution MUST work<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; consistently without regard to how peers are determined.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC contains no assumptions about how peers are<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; discovered.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 6:&nbsp; The solution designers SHOULD seek to minimize the amount of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; new configuration required in order to work.&nbsp; For example, it<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is better to allow peers to advertise or negotiate support<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for the solution, rather than to require that this knowledge<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to be configured at each node.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. Most DOIC parameters are advertised<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; using the DOIC capability announcement mechanism.&nbsp; However,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; there are some situations where configuration is required.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For example, a DOIC node detect the fact that a peer may not<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support DOIC when nodes on the other side of the non-<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supporting node do support DOIC without configuration.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.2.&nbsp; Performance<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 7:&nbsp; The solution and any associated default algorithm(s) MUST<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ensure that the system remains stable.&nbsp; At some point after<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; an overload condition has ended, the solution MUST enable<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity to stabilize and become equal to what it would be in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the absence of an overload condition.&nbsp; Note that this also<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requires that the solution MUST allow nodes to shed load<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; without introducing non-converging oscillations during or<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; after an overload condition.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The specification offers guidance that<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; implementations should apply hysteresis when recovering from<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload, and avoid sudden ramp ups in offered load when<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recovering.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 8:&nbsp; Supporting nodes MUST be able to distinguish current overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information from stale information.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. DOIC overload reports are "soft<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; state", that is they expire after an indicated period.&nbsp; DOIC<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes may also send reports that end existing overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; conditions.&nbsp; DOIC requires reporting nodes to ensure that all<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; relevant reacting nodes receive overload reports.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; However, since DOIC does not allow reporting nodes to send<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OLRs in watchdog messages, if an overload condition results<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; in zero offered load, the reporting node cannot update the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition until the expiration of the original OLR.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 9:&nbsp; The solution MUST function across fully loaded as well as<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; quiescent transport connections.&nbsp; This is partially derived<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; from the requirement for stability in REQ 7.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Compliant*. DOIC does not allow OLRs to be sent over<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; quiescent transport connections.&nbsp; This is due to the fact<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that OLRs cannot be sent outside of the application to which<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; they apply.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 10: Consumers of overload information MUST be able to determine<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when the overload condition improves or ends.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. (See response to previous two<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requirements.)<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 11: The solution MUST be able to operate in networks of different<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sizes.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC makes no assumptions about the size of the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network.&nbsp; DOIC can operate purely between clients and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; servers, or across agents.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 12: When a single network node fails, goes into overload, or<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suffers from reduced processing capacity, the solution MUST<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; make it possible to limit the impact of the affected node on<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; other nodes in the network.&nbsp; This helps to prevent a small-<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; scale failure from becoming a widespread outage.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. DOIC allows overload reports for an<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; entire realm, where abated traffic will not be redirected<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; towards another server.&nbsp; But in situations where nodes choose<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to divert traffic to other nodes, DOIC offers no way of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; knowing whether the new recipients can handle the traffic if<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; they have not already indicated overload.&nbsp; This may be<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mitigated with the use of a future "load" extension, or with<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the use of proprietary dynamic load-balancing mechanisms.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 13: The solution MUST NOT introduce substantial additional work<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for a node in an overloaded state.&nbsp; For example, a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requirement for an overloaded node to send overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information every time it received a new request would<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; introduce substantial work.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Compliant*. DOIC does in fact encourage an overloaded<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; node to send an OLR in every response.&nbsp; The working group<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that other mechanisms to ensure that every relevant node<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; receives an OLR would create even more work.&nbsp; [Note: This<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; needs discussion.]<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 14: Some scenarios that result in overload involve a rapid<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; increase of traffic with little time between normal levels<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and levels that induce overload.&nbsp; The solution SHOULD provide<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for rapid feedback when traffic levels increase.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The piggyback mechanism allows OLRs to be sent<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; at the same rate as application traffic.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 15: The solution MUST NOT interfere with the congestion control<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mechanisms of underlying transport protocols.&nbsp; For example, a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution that opened additional TCP connections when the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network is congested would reduce the effectiveness of the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; underlying congestion control mechanisms.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC does not require or recommend changes in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the handling of transport protocols or connections.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.3.&nbsp; Heterogeneous Support for Solution<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 16: The solution is likely to be deployed incrementally.&nbsp; The<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution MUST support a mixed environment where some, but not<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all, nodes implement it.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. DOIC works with most mixed-deployment<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; scenarios.&nbsp; However, it cannot work across a non-supporting<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; proxy that modifies Origin-Host AVPs in answer messages.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DOIC will have limited impact in networks where the nodes<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that perform server selections do not support the mechanism.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 17: In a mixed environment with nodes that support the solution<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and nodes that do not, the solution MUST NOT result in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; materially less useful throughput during overload as would<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have resulted if the solution were not present.&nbsp; It SHOULD<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; result in less severe overload in this environment.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. In most mixed-support deployment, DOIC will<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; offer at least some value, and will not make things worse.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 18: In a mixed environment of nodes that support the solution and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes that do not, the solution MUST NOT preclude elements<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that support overload control from treating elements that do<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not support overload control in an equitable fashion relative<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to those that do.&nbsp; Users and operators of nodes that do not<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support the solution MUST NOT unfairly benefit from the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution.&nbsp; The solution specification SHOULD provide guidance<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to implementors for dealing with elements not supporting<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload control.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC provides mechanisms to abate load from non-<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supporting sources.&nbsp; Furthermore, it recommends that<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reporting nodes will still need to be able to apply whatever<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protections they would ordinarily apply if DOIC were not in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; use.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 19: It MUST be possible to use the solution between nodes in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; different realms and in different administrative domains.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. DOIC allows sending OLRs across<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;administrative domains, and potentially to nodes in other<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; realms.&nbsp; However, an OLR cannot indicate overload for realms<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; other than the one in the Origin-Realm AVP of the containing<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; answer.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 20: Any explicit overload indication MUST be clearly<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; distinguishable from other errors reported via Diameter.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC sends explicit overload indication in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload reports.&nbsp; It does not depend on error result codes.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 21: In cases where a network node fails, is so overloaded that it<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cannot process messages, or cannot communicate due to a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network failure, it may not be able to provide explicit<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; indications of the nature of the failure or its levels of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload.&nbsp; The solution MUST result in at least as much<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; useful throughput as would have resulted if the solution were<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not in place.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC overload reports have the primary effect of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suppressing message retries in overload conditions.&nbsp; DOIC<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recommends that messages never be silently dropped if at all<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; possible.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.4.&nbsp; Granular Control<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 22: The solution MUST provide a way for a node to throttle the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; amount of traffic it receives from a peer node.&nbsp; This<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; throttling SHOULD be graded so that it can be applied<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; gradually as offered load increases.&nbsp; Overload is not a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; binary state; there may be degrees of overload.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The "loss" algorithm expresses a percentage<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reduction.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 23: The solution MUST provide sufficient information to enable a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; load-balancing node to divert messages that are rejected or<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; otherwise throttled by an overloaded upstream node to other<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; upstream nodes that are the most likely to have sufficient<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity to process them.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Compliant*. DOIC provides no built in mechanism to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; determine the best place to divert messages that would<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; otherwise be throttled.&nbsp; This can be accomplished with a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; future "load" extension, or with proprietary load balancing<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mechanisms.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 24: The solution MUST provide a mechanism for indicating load<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; levels, even when not in an overload condition, to assist<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes in making decisions to prevent overload conditions from<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; occurring.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Compliant*. "Load" information has been left for a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; future extension.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.5.&nbsp; Priority and Policy<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 25: The base specification for the solution SHOULD offer general<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; guidance on which message types might be desirable to send or<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; process over others during times of overload, based on<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application-specific considerations.&nbsp; For example, it may be<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; more beneficial to process messages for existing sessions<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ahead of new sessions.&nbsp; Some networks may have a requirement<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to give priority to requests associated with emergency<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sessions.&nbsp; Any normative or otherwise detailed definition of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the relative priorities of message types during an overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition will be the responsibility of the application<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; specification.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The specification offers guidance on how<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requests might be prioritized for different types of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applications.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 26: The solution MUST NOT prevent a node from prioritizing<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requests based on any local policy, so that certain requests<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; are given preferential treatment, given additional<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; retransmission, not throttled, or processed ahead of others.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. Nothing in the specification prevents<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application-specific, implementation-specific, or local<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.6.&nbsp; Security<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 27: The solution MUST NOT provide new vulnerabilities to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious attack or increase the severity of any existing<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vulnerabilities.&nbsp; This includes vulnerabilities to DoS and<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DDoS attacks as well as replay and man-in-the-middle attacks.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note that the Diameter base specification [RFC6733] lacks<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; end-to-end security and this must be considered (see the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Security Considerations in [RFC7068]).&nbsp; Note that this<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requirement was expressed at a high level so as to not<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; preclude any particular solution.&nbsp; Is is expected that the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution will address this in more detail.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The working group is not aware of any such<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vulnerabilities.&nbsp; [This may need further analysis.]<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 28: The solution MUST NOT depend on being deployed in<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; environments where all Diameter nodes are completely trusted.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; It SHOULD operate as effectively as possible in environments<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; where other nodes are malicious; this includes preventing<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious nodes from obtaining more than a fair share of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; service.&nbsp; Note that this does not imply any responsibility on<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the solution to detect, or take countermeasures against,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious nodes.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. Since all Diameter security is<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; currently at the transport layer, nodes must trust immediate<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; peers to enforce trust policies.&nbsp; However, there are<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; situations where a DOIC node cannot determine if an immediate<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; peer supports DOIC.&nbsp; The authors recommend an expert security<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; review.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 29: It MUST be possible for a supporting node to make<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; authorization decisions about what information will be sent<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to peer nodes based on the identity of those nodes.&nbsp; This<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; allows a domain administrator who considers the load of their<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes to be sensitive information to restrict access to that<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information.&nbsp; Of course, in such cases, there is no<o:p></o:p></pre>
          <pre> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;expectation that the solution itself will help prevent<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload from that peer node.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. (See response to previous<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requirement.)<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 30: The solution MUST NOT interfere with any Diameter-compliant<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; method that a node may use to protect itself from overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; from non-supporting nodes or from denial-of-service attacks.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The specification recommends that any such<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protection mechanism needed without DOIC should continue to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be employed with DOIC.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>C.6.7.&nbsp; Flexibility and Extensibility<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 31: There are multiple situations where a Diameter node may be<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overloaded for some purposes but not others.&nbsp; For example,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; this can happen to an agent or server that supports multiple<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applications, or when a server depends on multiple external<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; resources, some of which may become overloaded while others<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; are fully available.&nbsp; The solution MUST allow Diameter nodes<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to indicate overload with sufficient granularity to allow<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; clients to take action based on the overloaded resources<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; without unreasonably forcing available capacity to go unused.<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The solution MUST support specification of overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information with granularities of at least "Diameter node",<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "realm", and "Diameter application" and MUST allow<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extensibility for others to be added in the future.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. All DOIC overload reports are scoped<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to the specific application and realm.&nbsp; Inside that scope,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload can be reported at the specific server or whole<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; realm scope.&nbsp; As currently specified, DOIC cannot indicate<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; local overload for an agent.&nbsp; At the time of this writing,<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the DIME working group has plans to work on an agent-overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extension.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DOIC allows new "scopes" through the use of extended report<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; types.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 32: The solution MUST provide a method for extending the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; information communicated and the algorithms used for overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; control.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. DOIC allows new report types and abatement<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; algorithms to be created.&nbsp; These may be indicated using the<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OC-Supported-Features AVP.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 33: The solution MUST provide a default algorithm that is<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mandatory to implement.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Compliant*. The "loss" algorithm is mandatory to implement.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; REQ 34: The solution SHOULD provide a method for exchanging overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and load information between elements that are connected by<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; intermediaries that do not support the solution.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partially Compliant*. DOIC information can traverse non-<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supporting agents, as long as those agents do not modify<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain AVPs. (e.g., Origin-Host).&nbsp; DOIC does not provide a<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; way for supporting nodes to detect such modification.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>_________________________________________________________________________________________________________________________<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
          <pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
          <pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
          <pre>Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>This message and its attachments may contain confidential or privileged information that may be protected by law;<o:p></o:p></pre>
          <pre>they should not be distributed, used or copied without authorisation.<o:p></o:p></pre>
          <pre>If you have received this email in error, please notify the sender and delete this message and its attachments.<o:p></o:p></pre>
          <pre>As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.<o:p></o:p></pre>
          <pre>Thank you.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>_______________________________________________<o:p></o:p></pre>
          <pre>DiME mailing list<o:p></o:p></pre>
          <pre><a moz-do-not-send="true" href="mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
          <pre><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a><o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
        </blockquote>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
      <pre>_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------080001050808030500030600--


From nobody Wed Dec  3 09:23:01 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 257DB1A1BFC for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 09:22:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level: 
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x54V-tuKfXhG for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 09:22:37 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E3881A1B32 for <dime@ietf.org>; Wed,  3 Dec 2014 09:22:37 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:56854 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XwDdF-0003BW-Uh; Wed, 03 Dec 2014 09:22:35 -0800
Message-ID: <547F46D5.7060800@usdonovans.com>
Date: Wed, 03 Dec 2014 11:22:29 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>,  "lionel.morand@orange.com" <lionel.morand@orange.com>,  Ben Campbell <ben@nostrum.com>
References: <545792B6.8030502@usdonovans.com> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com>
In-Reply-To: <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com>
Content-Type: multipart/alternative; boundary="------------050306050307030703060007"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/oymA3JTcFZnQQKRfmOMDKYPxcqA
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 17:22:47 -0000

This is a multi-part message in MIME format.
--------------050306050307030703060007
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit

I have attempted to address both Lionel's and Jean-Jacques' suggestions 
with the following text:

    When a reporting node sends an OLR, it effectively delegates any
    necessary throttling to downstream nodes.  If the reporting node also
    locally throttles the same set of messages, the overall number of
    throttled requests may be higher than intended.  Therefore, before
    applying local message throttling, a reporting node needs to check if
    these messages match existing OCS entries, indicating that these
    messages have survived throttling applied by downstream nodes that
    have received the related OLR.

    However, even if the set of messages match existing OCS entries, the
    reporting node can still apply other abatement methods such as
    diversion.  The reporting node might also need to throttle requests
    for reasons other than overload.  For example, an agent or server
    might have a configured rate limit for each client, and throttle
    requests that exceed that limit, even if such requests had already
    been candidates for throttling by downstream nodes.  The reporting
    node also has the option to send new OLRs requesting greater
    reductions in traffic, reducing the need for local throttling.


Steve

On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
>
> Dear all
>
> To continue on my remark , I would complement the Steve's text with " 
> can update the reduction of traffic it requires from the reacting 
> nodes(s) by sending new overload reports" as hereafter:
>
>   
>     Therefore, if a
>     reporting node needs to apply local throttling on a set of messages
>     that match existing OCS entries, it needs to consider
>     the impact of throttling by downstream nodes and can update the reduction of traffic it requires from the reacting nodes(s) by sending new overload reports.
>   
>
> Best regards
>
> JJacques
>
> *De :*DiME [mailto:dime-bounces@ietf.org] *De la part de* TROTTIN, 
> JEAN-JACQUES (JEAN-JACQUES)
> *Envoyé :* mercredi 3 décembre 2014 11:29
> *À :* Steve Donovan; lionel.morand@orange.com; Ben Campbell
> *Cc :* dime@ietf.org
> *Objet :* Re: [Dime] Updates to DOIC -05
>
> Dear all
>
> I am not against the new proposed texts from Steve or Ben to clarify 
> this topic.
>
> My point is that, when  the reporting node has sent an OLR requiring 
>  a traffic reduction , there is first a reaction time before receiving 
> reduced traffic, and second even if the traffic has been reduced, it 
> can still exceed the capacity of the reporting node  that has no other 
> choice than to throttle the received reduced traffic (if no 
> diversion). This can happen when the traffic at the source (reacting 
> node) before throttling is increasing quickly, so the traffic reduced  
> according to the received OLR may  remain too high .  Then, if the 
> reporting node has nevertheless to do some throttle, it will certainly 
> react by new OLRs requiring a higher traffic reduction from the 
> reacting nodes. This is a dynamic process, where the reporting node 
> adjust the  traffic  reduction it requires according to what it receives .
>
> As Ben  I also think this is a guidance , and I think it is good to 
> bring some guidance.
>
> Best regards
>
> JJacques
>
> *De :*DiME [mailto:dime-bounces@ietf.org] *De la part de* Steve Donovan
> *Envoyé :* mardi 2 décembre 2014 19:50
> *À :* lionel.morand@orange.com <mailto:lionel.morand@orange.com>; Ben 
> Campbell
> *Cc :* dime@ietf.org <mailto:dime@ietf.org>
> *Objet :* Re: [Dime] Updates to DOIC -05
>
> Lionel,
>
> The two paragraphs together now say the following:
>
>     When a reporting node sends an OLR, it effectively delegates any
>     necessary throttling to downstream nodes.  If the reporting node also
>     locally throttles the same set of messages, the overall number of
>     throttled request may be higher than intended.  Therefore, if a
>     reporting node needs to apply local throttling on a set of messages
>     that match or overlap with existing OCS entries, it needs to consider
>     the impact of throttling by downstream nodes.
>   
>     However, when the reporting node sends an OLR downstream, it might
>     still need to apply other abatement methods such as diversion.  The
>     reporting node might also need to throttle requests for reasons other
>     than overload.  For example, an agent or server might have a
>     configured rate limit for each client, and throttle requests that
>     exceed that limit, even if such requests had already been candidates
>     for throttling by downstream nodes.
>
> Do you see the need for further clarification?
>
> Steve
>
> On 11/25/14, 12:26 PM, lionel.morand@orange.com 
> <mailto:lionel.morand@orange.com> wrote:
>
>     I'm OK with the idea of the text proposed by Ben.
>
>     I would just make clear that throttling is applicable to the fact of sending/forwarding requests (cf. definition). A reporting node may apply local throttling if it is an agent. But if it is a server, it can either drop the exceeded number of requests (no response sent to the downstream) or send a specific DIAMETER-TOO-BUSY response. I think that this clarification is somehow missing in the document.
>
>       
>
>     Regards,
>
>       
>
>     Lionel
>
>       
>
>     -----Message d'origine-----
>
>     De : Steve Donovan [mailto:srdonovan@usdonovans.com]
>
>     Envoyé : mardi 25 novembre 2014 15:07
>
>     À : Ben Campbell; MORAND Lionel IMT/OLN
>
>     Cc : Wiehe, Ulrich (NSN - DE/Munich);dime@ietf.org  <mailto:dime@ietf.org>; Maria Cruz Bartolome
>
>     Objet : Re: [Dime] Updates to DOIC -05
>
>       
>
>     I'm ok with Ben's wording and will make the change unless I hear objections on the list.
>
>       
>
>     Steve
>
>       
>
>     On 11/21/14, 5:01 PM, Ben Campbell wrote:
>
>         On reflection, I think there might be a subtlety here. The resulting offered-load may still exceed the reporting node's current capacity. This can be true even if it's sent an OLR (and thus has related OCS). As mentioned in the surrounding node needs to still be able to protect itself, possibly by throttling. Therefore, I propose the sentence take the form of non-normative guidance. For example:
>
>           
>
>         "When a reporting node sends an OLR, it effectively delegates any necessary throttling to downstream nodes.  If the reporting node also locally throttles the same set of messages, the overall number of throttled request may be higher than intended. Therefore, if a reporting node needs to apply local throttling on a set of messages that match or overlap with existing OCS entries, it needs to consider the impact of throttling by downstream nodes."
>
>           
>
>            
>
>             On Nov 17, 2014, at 2:38 AM,lionel.morand@orange.com  <mailto:lionel.morand@orange.com>  wrote:
>
>               
>
>             I can live with the text proposed by Ulrich. But what is wrong with:
>
>               
>
>             " Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which an active OCS applies." ?
>
>               
>
>             Envoyé depuis mon Sony Xperia SP d'Orange
>
>               
>
>             ---- Maria Cruz Bartolome a écrit ----
>
>               
>
>               
>
>                 Section 4.2.3, 13th paragraph, 2nd sentence:
>
>                 Existing text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the OLR applies.
>
>                 Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the sent OLR applies.
>
>                   
>
>                 [LM] I would say that the reporting node will not remember the previously sent OLR, but will take care that there is an active OCS.
>
>             SRD> I'm ok with Ulrich's change.
>
>               
>
>             [LM] and this is incorrect but not fundamental. The reporting node does not have to "remember" a previously sent OLR. What it will do is to refer to existing OCS to know that throttling should not be applied. An OCS is a consequence of an sent OLR but it is not an OLR itself. But not fundamental here.
>
>               
>
>             [MCruz] I am ok with Ulrich's change. It does not mean that the reporting node needs to "remember" a previously sent OLR, though. The change only proposes to "identify" which OLR we refer to.
>
>               
>
>             Best regards
>
>             /MCruz
>
>               
>
>               
>
>             _____________________________________________________________________
>
>             ____________________________________________________
>
>               
>
>             Ce message et ses pieces jointes peuvent contenir des informations
>
>             confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>
>             exploites ou copies sans autorisation. Si vous avez recu ce message
>
>             par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
>               
>
>             This message and its attachments may contain confidential or
>
>             privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
>
>             If you have received this email in error, please notify the sender and delete this message and its attachments.
>
>             As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>
>             Thank you.
>
>               
>
>             _______________________________________________
>
>             DiME mailing list
>
>             DiME@ietf.org  <mailto:DiME@ietf.org>
>
>             https://www.ietf.org/mailman/listinfo/dime
>
>           
>
>       
>
>       
>
>     _________________________________________________________________________________________________________________________
>
>       
>
>     Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>
>     pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>
>     a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>
>     Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
>       
>
>     This message and its attachments may contain confidential or privileged information that may be protected by law;
>
>     they should not be distributed, used or copied without authorisation.
>
>     If you have received this email in error, please notify the sender and delete this message and its attachments.
>
>     As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>
>     Thank you.
>
>       
>
>       
>


--------------050306050307030703060007
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    I have attempted to address both Lionel's and Jean-Jacques'
    suggestions with the following text:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>   When a reporting node sends an OLR, it effectively delegates any
   necessary throttling to downstream nodes.  If the reporting node also
   locally throttles the same set of messages, the overall number of
   throttled requests may be higher than intended.  Therefore, before
   applying local message throttling, a reporting node needs to check if
   these messages match existing OCS entries, indicating that these
   messages have survived throttling applied by downstream nodes that
   have received the related OLR.

   However, even if the set of messages match existing OCS entries, the
   reporting node can still apply other abatement methods such as
   diversion.  The reporting node might also need to throttle requests
   for reasons other than overload.  For example, an agent or server
   might have a configured rate limit for each client, and throttle
   requests that exceed that limit, even if such requests had already
   been candidates for throttling by downstream nodes.  The reporting
   node also has the option to send new OLRs requesting greater
   reductions in traffic, reducing the need for local throttling.</pre>
    <br>
    Steve<br>
    <br>
    <div class="moz-cite-prefix">On 12/3/14, 6:19 AM, TROTTIN,
      JEAN-JACQUES (JEAN-JACQUES) wrote:<br>
    </div>
    <blockquote
cite="mid:E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 12 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr&eacute;format&eacute; HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr&eacute;format&eacute; HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr&eacute;format&eacute; HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear
            all<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">To
            continue on my remark , I would complement the Steve&#8217;s text
            with &#8220;
          </span><span style="font-size:10.0pt;font-family:&quot;Courier
            New&quot;">can update the reduction of traffic it requires
            from the reacting nodes(s) by sending new overload reports&#8221;
          </span><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">as
            hereafter: &nbsp;&nbsp;&nbsp;<o:p></o:p></span></p>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp; Therefore, if a<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set of messages<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; that match existing OCS entries, it needs to consider<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; the impact of throttling by downstream nodes and can update the reduction of traffic it requires from the reacting nodes(s) by sending new overload reports. <o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best
            regards<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
            <o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0cm 0cm 0cm">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                  lang="FR">De&nbsp;:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                lang="FR"> DiME [<a class="moz-txt-link-freetext" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
                <b>De la part de</b> TROTTIN, JEAN-JACQUES
                (JEAN-JACQUES)<br>
                <b>Envoy&eacute;&nbsp;:</b> mercredi 3 d&eacute;cembre 2014 11:29<br>
                <b>&Agrave;&nbsp;:</b> Steve Donovan; <a class="moz-txt-link-abbreviated" href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a>; Ben
                Campbell<br>
                <b>Cc&nbsp;:</b> <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                <b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear
            all<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I
            am not against the new proposed texts from Steve or Ben to
            clarify this topic.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">My
            point is that, when &nbsp;the reporting node has sent an OLR
            requiring &nbsp;a traffic reduction , there is first a reaction
            time before receiving reduced traffic, and second even if
            the traffic has been reduced, it can still exceed the
            capacity of the reporting node &nbsp;that has no other choice
            than to throttle the received reduced traffic (if no
            diversion). This can happen when the traffic at the source
            (reacting node) before throttling is increasing quickly, so
            the traffic reduced&nbsp; according to the received OLR may
            &nbsp;remain too high . &nbsp;Then, if the reporting node has
            nevertheless to do some throttle, it will certainly react by
            new OLRs requiring a higher traffic reduction from the
            reacting nodes. This is a dynamic process, where the
            reporting node adjust the &nbsp;traffic &nbsp;reduction it requires
            according to what it receives .<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">As
            Ben&nbsp; I also think this is a guidance , and I think it is
            good to bring some guidance.
            <o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best
            regards<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
            <o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0cm 0cm 0cm">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                  lang="FR">De&nbsp;:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                lang="FR"> DiME [<a moz-do-not-send="true"
                  href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
                <b>De la part de</b> Steve Donovan<br>
                <b>Envoy&eacute;&nbsp;:</b> mardi 2 d&eacute;cembre 2014 19:50<br>
                <b>&Agrave;&nbsp;:</b> <a moz-do-not-send="true"
                  href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a>;
                Ben Campbell<br>
                <b>Cc&nbsp;:</b> <a moz-do-not-send="true"
                  href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                <b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Lionel,<br>
          <br>
          The two paragraphs together now say the following:<o:p></o:p></p>
        <pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delegates any<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the reporting node also<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall number of<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; throttled request may be higher than intended.&nbsp; Therefore, if a<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set of messages<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; that match or overlap with existing OCS entries, it needs to consider<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; the impact of throttling by downstream nodes.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp; However, when the reporting node sends an OLR downstream, it might<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; still need to apply other abatement methods such as diversion.&nbsp; The<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; reporting node might also need to throttle requests for reasons other<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; than overload.&nbsp; For example, an agent or server might have a<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; configured rate limit for each client, and throttle requests that<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; exceed that limit, even if such requests had already been candidates<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; for throttling by downstream nodes.<o:p></o:p></pre>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Do you see the
          need for further clarification?<br>
          <br>
          Steve<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 11/25/14, 12:26 PM, <a
              moz-do-not-send="true"
              href="mailto:lionel.morand@orange.com">
              lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <pre>I'm OK with the idea of the text proposed by Ben.<o:p></o:p></pre>
          <pre>I would just make clear that throttling is applicable to the fact of sending/forwarding requests (cf. definition). A reporting node may apply local throttling if it is an agent. But if it is a server, it can either drop the exceeded number of requests (no response sent to the downstream) or send a specific DIAMETER-TOO-BUSY response. I think that this clarification is somehow missing in the document.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Regards,<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Lionel<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>-----Message d'origine-----<o:p></o:p></pre>
          <pre>De&nbsp;: Steve Donovan [<a moz-do-not-send="true" href="mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>] <o:p></o:p></pre>
          <pre>Envoy&eacute;&nbsp;: mardi 25 novembre 2014 15:07<o:p></o:p></pre>
          <pre>&Agrave;&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN<o:p></o:p></pre>
          <pre>Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a moz-do-not-send="true" href="mailto:dime@ietf.org">dime@ietf.org</a>; Maria Cruz Bartolome<o:p></o:p></pre>
          <pre>Objet&nbsp;: Re: [Dime] Updates to DOIC -05<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>I'm ok with Ben's wording and will make the change unless I hear objections on the list.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Steve<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>On 11/21/14, 5:01 PM, Ben Campbell wrote:<o:p></o:p></pre>
          <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
            <pre>On reflection, I think there might be a subtlety here. The resulting offered-load may still exceed the reporting node's current capacity. This can be true even if it's sent an OLR (and thus has related OCS). As mentioned in the surrounding node needs to still be able to protect itself, possibly by throttling. Therefore, I propose the sentence take the form of non-normative guidance. For example:<o:p></o:p></pre>
            <pre><o:p>&nbsp;</o:p></pre>
            <pre>"When a reporting node sends an OLR, it effectively delegates any necessary throttling to downstream nodes.&nbsp; If the reporting node also locally throttles the same set of messages, the overall number of throttled request may be higher than intended. Therefore, if a reporting node needs to apply local throttling on a set of messages that match or overlap with existing OCS entries, it needs to consider the impact of throttling by downstream nodes."<o:p></o:p></pre>
            <pre><o:p>&nbsp;</o:p></pre>
            <pre>&nbsp; <o:p></o:p></pre>
            <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
              <pre>On Nov 17, 2014, at 2:38 AM, <a moz-do-not-send="true" href="mailto:lionel.morand@orange.com">lionel.morand@orange.com</a> wrote:<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>I can live with the text proposed by Ulrich. But what is wrong with:<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>" Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which an active OCS applies." ?<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>Envoy&eacute; depuis mon Sony Xperia SP d'Orange<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>---- Maria Cruz Bartolome a &eacute;crit ----<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
                <pre>Section 4.2.3, 13th paragraph, 2nd sentence:<o:p></o:p></pre>
                <pre>Existing text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the OLR applies.<o:p></o:p></pre>
                <pre>Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the sent OLR applies.<o:p></o:p></pre>
                <pre><o:p>&nbsp;</o:p></pre>
                <pre>[LM] I would say that the reporting node will not remember the previously sent OLR, but will take care that there is an active OCS.<o:p></o:p></pre>
              </blockquote>
              <pre>SRD&gt; I'm ok with Ulrich's change.<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>[LM] and this is incorrect but not fundamental. The reporting node does not have to "remember" a previously sent OLR. What it will do is to refer to existing OCS to know that throttling should not be applied. An OCS is a consequence of an sent OLR but it is not an OLR itself. But not fundamental here.<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>[MCruz] I am ok with Ulrich's change. It does not mean that the reporting node needs to "remember" a previously sent OLR, though. The change only proposes to "identify" which OLR we refer to.<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>Best regards<o:p></o:p></pre>
              <pre>/MCruz<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>_____________________________________________________________________<o:p></o:p></pre>
              <pre>____________________________________________________<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>Ce message et ses pieces jointes peuvent contenir des informations <o:p></o:p></pre>
              <pre>confidentielles ou privilegiees et ne doivent donc pas etre diffuses, <o:p></o:p></pre>
              <pre>exploites ou copies sans autorisation. Si vous avez recu ce message <o:p></o:p></pre>
              <pre>par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>This message and its attachments may contain confidential or <o:p></o:p></pre>
              <pre>privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.<o:p></o:p></pre>
              <pre>If you have received this email in error, please notify the sender and delete this message and its attachments.<o:p></o:p></pre>
              <pre>As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.<o:p></o:p></pre>
              <pre>Thank you.<o:p></o:p></pre>
              <pre><o:p>&nbsp;</o:p></pre>
              <pre>_______________________________________________<o:p></o:p></pre>
              <pre>DiME mailing list<o:p></o:p></pre>
              <pre><a moz-do-not-send="true" href="mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
              <pre><a moz-do-not-send="true" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a><o:p></o:p></pre>
            </blockquote>
            <pre><o:p>&nbsp;</o:p></pre>
          </blockquote>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>_________________________________________________________________________________________________________________________<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
          <pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
          <pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
          <pre>Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>This message and its attachments may contain confidential or privileged information that may be protected by law;<o:p></o:p></pre>
          <pre>they should not be distributed, used or copied without authorisation.<o:p></o:p></pre>
          <pre>If you have received this email in error, please notify the sender and delete this message and its attachments.<o:p></o:p></pre>
          <pre>As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.<o:p></o:p></pre>
          <pre>Thank you.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
        </blockquote>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------050306050307030703060007--


From nobody Wed Dec  3 09:50:01 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF20E1A8AE2 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 09:49:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wztyl6HwCTDy for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 09:49:41 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CD281A8AD9 for <dime@ietf.org>; Wed,  3 Dec 2014 09:49:41 -0800 (PST)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id 388AE18C042; Wed,  3 Dec 2014 18:49:39 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 1C0742380DD; Wed,  3 Dec 2014 18:49:39 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Wed, 3 Dec 2014 18:49:38 +0100
From: <lionel.morand@orange.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHQDmC9B2lc+qnTi0KtXgvGw5tH5Jx9mmIAgAAe3ICAAFSqgIAAGEsg
Date: Wed, 3 Dec 2014 17:49:38 +0000
Message-ID: <19906_1417628979_547F4D33_19906_1955_1_6B7134B31289DC4FAF731D844122B36E99DE18@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <545792B6.8030502@usdonovans.com> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com> <547F46D5.7060800@usdonovans.com>
In-Reply-To: <547F46D5.7060800@usdonovans.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.4]
Content-Type: multipart/alternative; boundary="_000_6B7134B31289DC4FAF731D844122B36E99DE18PEXCVZYM13corpora_"
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.11.21.125720
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/s5Df5RSvhLTNK_k_NSE0V_ym3nw
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 17:49:56 -0000

--_000_6B7134B31289DC4FAF731D844122B36E99DE18PEXCVZYM13corpora_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I'm fine with the modified text.

Lionel

De : Steve Donovan [mailto:srdonovan@usdonovans.com]
Envoy=E9 : mercredi 3 d=E9cembre 2014 18:22
=C0 : TROTTIN, JEAN-JACQUES (JEAN-JACQUES); MORAND Lionel IMT/OLN; Ben Camp=
bell
Cc : dime@ietf.org
Objet : Re: [Dime] Updates to DOIC -05

I have attempted to address both Lionel's and Jean-Jacques' suggestions wit=
h the following text:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled requests may be higher than intended.  Therefore, before

   applying local message throttling, a reporting node needs to check if

   these messages match existing OCS entries, indicating that these

   messages have survived throttling applied by downstream nodes that

   have received the related OLR.



   However, even if the set of messages match existing OCS entries, the

   reporting node can still apply other abatement methods such as

   diversion.  The reporting node might also need to throttle requests

   for reasons other than overload.  For example, an agent or server

   might have a configured rate limit for each client, and throttle

   requests that exceed that limit, even if such requests had already

   been candidates for throttling by downstream nodes.  The reporting

   node also has the option to send new OLRs requesting greater

   reductions in traffic, reducing the need for local throttling.

Steve
On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
Dear all

To continue on my remark , I would complement the Steve's text with " can u=
pdate the reduction of traffic it requires from the reacting nodes(s) by se=
nding new overload reports" as hereafter:



   Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes and can update the reductio=
n of traffic it requires from the reacting nodes(s) by sending new overload=
 reports.


Best regards

JJacques


De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN, JEAN-JACQUE=
S (JEAN-JACQUES)
Envoy=E9 : mercredi 3 d=E9cembre 2014 11:29
=C0 : Steve Donovan; lionel.morand@orange.com<mailto:lionel.morand@orange.c=
om>; Ben Campbell
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Dear all

I am not against the new proposed texts from Steve or Ben to clarify this t=
opic.

My point is that, when  the reporting node has sent an OLR requiring  a tra=
ffic reduction , there is first a reaction time before receiving reduced tr=
affic, and second even if the traffic has been reduced, it can still exceed=
 the capacity of the reporting node  that has no other choice than to throt=
tle the received reduced traffic (if no diversion). This can happen when th=
e traffic at the source (reacting node) before throttling is increasing qui=
ckly, so the traffic reduced  according to the received OLR may  remain too=
 high .  Then, if the reporting node has nevertheless to do some throttle, =
it will certainly react by new OLRs requiring a higher traffic reduction fr=
om the reacting nodes. This is a dynamic process, where the reporting node =
adjust the  traffic  reduction it requires according to what it receives .

As Ben  I also think this is a guidance , and I think it is good to bring s=
ome guidance.

Best regards

JJacques

De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9 : mardi 2 d=E9cembre 2014 19:50
=C0 : lionel.morand@orange.com<mailto:lionel.morand@orange.com>; Ben Campbe=
ll
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Lionel,

The two paragraphs together now say the following:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled request may be higher than intended.  Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match or overlap with existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes.



   However, when the reporting node sends an OLR downstream, it might

   still need to apply other abatement methods such as diversion.  The

   reporting node might also need to throttle requests for reasons other

   than overload.  For example, an agent or server might have a

   configured rate limit for each client, and throttle requests that

   exceed that limit, even if such requests had already been candidates

   for throttling by downstream nodes.
Do you see the need for further clarification?

Steve
On 11/25/14, 12:26 PM, lionel.morand@orange.com<mailto:lionel.morand@orange=
.com> wrote:

I'm OK with the idea of the text proposed by Ben.

I would just make clear that throttling is applicable to the fact of sendin=
g/forwarding requests (cf. definition). A reporting node may apply local th=
rottling if it is an agent. But if it is a server, it can either drop the e=
xceeded number of requests (no response sent to the downstream) or send a s=
pecific DIAMETER-TOO-BUSY response. I think that this clarification is some=
how missing in the document.



Regards,



Lionel



-----Message d'origine-----

De : Steve Donovan [mailto:srdonovan@usdonovans.com]

Envoy=E9 : mardi 25 novembre 2014 15:07

=C0 : Ben Campbell; MORAND Lionel IMT/OLN

Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<mailto:dime@ietf.org>; =
Maria Cruz Bartolome

Objet : Re: [Dime] Updates to DOIC -05



I'm ok with Ben's wording and will make the change unless I hear objections=
 on the list.



Steve



On 11/21/14, 5:01 PM, Ben Campbell wrote:

On reflection, I think there might be a subtlety here. The resulting offere=
d-load may still exceed the reporting node's current capacity. This can be =
true even if it's sent an OLR (and thus has related OCS). As mentioned in t=
he surrounding node needs to still be able to protect itself, possibly by t=
hrottling. Therefore, I propose the sentence take the form of non-normative=
 guidance. For example:



"When a reporting node sends an OLR, it effectively delegates any necessary=
 throttling to downstream nodes.  If the reporting node also locally thrott=
les the same set of messages, the overall number of throttled request may b=
e higher than intended. Therefore, if a reporting node needs to apply local=
 throttling on a set of messages that match or overlap with existing OCS en=
tries, it needs to consider the impact of throttling by downstream nodes."





On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com<mailto:lionel.morand@=
orange.com> wrote:



I can live with the text proposed by Ulrich. But what is wrong with:



" Therefore, the reporting node SHOULD NOT apply throttling to the set of m=
essages to which an active OCS applies." ?



Envoy=E9 depuis mon Sony Xperia SP d'Orange



---- Maria Cruz Bartolome a =E9crit ----





Section 4.2.3, 13th paragraph, 2nd sentence:

Existing text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the OLR applies.

Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the sent OLR applies.



[LM] I would say that the reporting node will not remember the previously s=
ent OLR, but will take care that there is an active OCS.

SRD> I'm ok with Ulrich's change.



[LM] and this is incorrect but not fundamental. The reporting node does not=
 have to "remember" a previously sent OLR. What it will do is to refer to e=
xisting OCS to know that throttling should not be applied. An OCS is a cons=
equence of an sent OLR but it is not an OLR itself. But not fundamental her=
e.



[MCruz] I am ok with Ulrich's change. It does not mean that the reporting n=
ode needs to "remember" a previously sent OLR, though. The change only prop=
oses to "identify" which OLR we refer to.



Best regards

/MCruz





_____________________________________________________________________

____________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations

confidentielles ou privilegiees et ne doivent donc pas etre diffuses,

exploites ou copies sans autorisation. Si vous avez recu ce message

par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que le=
s pieces jointes. Les messages electroniques etant susceptibles d'alteratio=
n, Orange decline toute responsabilite si ce message a ete altere, deforme =
ou falsifie. Merci.



This message and its attachments may contain confidential or

privileged information that may be protected by law; they should not be dis=
tributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime







___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.







___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


--_000_6B7134B31289DC4FAF731D844122B36E99DE18PEXCVZYM13corpora_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
p.Preacute, li.Preacute, div.Preacute
	{mso-style-name:"Pr&eacute\,format&eacute\,HTML";
	mso-style-link:"Pr&eacute1\,format&eacute1\,HTML Car1";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
span.Preacute1
	{mso-style-name:"Pr&eacute1\,format&eacute1\,HTML Car1";
	mso-style-priority:99;
	mso-style-link:"Pr&eacute\,format&eacute\,HTML";
	font-family:Consolas;
	color:black;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I'm fine w=
ith the modified text.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lionel<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;:</span></b>=
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:windowtext"> Steve Donovan [mailto:srdonovan@usdonovans.co=
m]
<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 18:22<br>
<b>=C0&nbsp;:</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES); MORAND Lionel IMT/O=
LN; Ben Campbell<br>
<b>Cc&nbsp;:</b> dime@ietf.org<br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I have attempted to a=
ddress both Lionel's and Jean-Jacques' suggestions with the following text:=
<o:p></o:p></p>
<pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delega=
tes any<o:p></o:p></pre>
<pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the re=
porting node also<o:p></o:p></pre>
<pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall n=
umber of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttled requests may be higher than intended.&nbsp; The=
refore, before<o:p></o:p></pre>
<pre>&nbsp;&nbsp; applying local message throttling, a reporting node needs=
 to check if<o:p></o:p></pre>
<pre>&nbsp;&nbsp; these messages match existing OCS entries, indicating tha=
t these<o:p></o:p></pre>
<pre>&nbsp;&nbsp; messages have survived throttling applied by downstream n=
odes that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; have received the related OLR.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; However, even if the set of messages match existing OCS e=
ntries, the<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node can still apply other abatement methods su=
ch as<o:p></o:p></pre>
<pre>&nbsp;&nbsp; diversion.&nbsp; The reporting node might also need to th=
rottle requests<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for reasons other than overload.&nbsp; For example, an ag=
ent or server<o:p></o:p></pre>
<pre>&nbsp;&nbsp; might have a configured rate limit for each client, and t=
hrottle<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requests that exceed that limit, even if such requests ha=
d already<o:p></o:p></pre>
<pre>&nbsp;&nbsp; been candidates for throttling by downstream nodes.&nbsp;=
 The reporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp; node also has the option to send new OLRs requesting grea=
ter<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reductions in traffic, reducing the need for local thrott=
ling.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JAC=
QUES) wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">To continue on my remark =
, I would complement the Steve&#8217;s text with &#8220;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;,=
&quot;serif&quot;">can update the reduction of traffic it requires from the=
 reacting nodes(s) by sending new overload reports&#8221;
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#1F497D">as hereafter: &nbsp;&nbsp;&nbsp;</span><o=
:p></o:p></p>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Therefore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match existing OCS entries, it needs to consider<o:p=
></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes and can upda=
te the reduction of traffic it requires from the reacting nodes(s) by sendi=
ng new overload reports. <o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;:</span></b>=
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:windowtext"> DiME [<a href=3D"mailto:dime-bounces@ietf.org=
">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 11:29<br>
<b>=C0&nbsp;:</b> Steve Donovan; <a href=3D"mailto:lionel.morand@orange.com=
">lionel.morand@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am not against the new =
proposed texts from Steve or Ben to clarify this topic.</span><o:p></o:p></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My point is that, when &n=
bsp;the reporting node has sent an OLR requiring &nbsp;a traffic reduction =
, there is first a reaction time before receiving reduced traffic,
 and second even if the traffic has been reduced, it can still exceed the c=
apacity of the reporting node &nbsp;that has no other choice than to thrott=
le the received reduced traffic (if no diversion). This can happen when the=
 traffic at the source (reacting node)
 before throttling is increasing quickly, so the traffic reduced&nbsp; acco=
rding to the received OLR may &nbsp;remain too high . &nbsp;Then, if the re=
porting node has nevertheless to do some throttle, it will certainly react =
by new OLRs requiring a higher traffic reduction
 from the reacting nodes. This is a dynamic process, where the reporting no=
de adjust the &nbsp;traffic &nbsp;reduction it requires according to what i=
t receives .</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As Ben&nbsp; I also think=
 this is a guidance , and I think it is good to bring some guidance.
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;:</span></b>=
<span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-s=
erif&quot;;color:windowtext"> DiME [<a href=3D"mailto:dime-bounces@ietf.org=
">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> Steve Donovan<br>
<b>Envoy=E9&nbsp;:</b> mardi 2 d=E9cembre 2014 19:50<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:lionel.morand@orange.com">lionel.morand=
@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Lionel,<br>
<br>
The two paragraphs together now say the following:<o:p></o:p></p>
<pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delega=
tes any<o:p></o:p></pre>
<pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the re=
porting node also<o:p></o:p></pre>
<pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall n=
umber of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttled request may be higher than intended.&nbsp; Ther=
efore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match or overlap with existing OCS entries, it needs=
 to consider<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes.<o:p></o:p><=
/pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;&nbsp; However, when the reporting node sends an OLR downstream,=
 it might<o:p></o:p></pre>
<pre>&nbsp;&nbsp; still need to apply other abatement methods such as diver=
sion.&nbsp; The<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node might also need to throttle requests for r=
easons other<o:p></o:p></pre>
<pre>&nbsp;&nbsp; than overload.&nbsp; For example, an agent or server migh=
t have a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; configured rate limit for each client, and throttle reque=
sts that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; exceed that limit, even if such requests had already been=
 candidates<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for throttling by downstream nodes.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Do you see the need f=
or further clarification?<br>
<br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 11/25/14, 12:26 PM, <a href=3D"mailto:lionel.mora=
nd@orange.com">
lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>I'm OK with the idea of the text proposed by Ben.<o:p></o:p></pre>
<pre>I would just make clear that throttling is applicable to the fact of s=
ending/forwarding requests (cf. definition). A reporting node may apply loc=
al throttling if it is an agent. But if it is a server, it can either drop =
the exceeded number of requests (no response sent to the downstream) or sen=
d a specific DIAMETER-TOO-BUSY response. I think that this clarification is=
 somehow missing in the document.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Regards,<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Lionel<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>-----Message d'origine-----<o:p></o:p></pre>
<pre>De&nbsp;: Steve Donovan [<a href=3D"mailto:srdonovan@usdonovans.com">m=
ailto:srdonovan@usdonovans.com</a>] <o:p></o:p></pre>
<pre>Envoy=E9&nbsp;: mardi 25 novembre 2014 15:07<o:p></o:p></pre>
<pre>=C0&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN<o:p></o:p></pre>
<pre>Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a href=3D"mailto:dime@ietf=
.org">dime@ietf.org</a>; Maria Cruz Bartolome<o:p></o:p></pre>
<pre>Objet&nbsp;: Re: [Dime] Updates to DOIC -05<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>I'm ok with Ben's wording and will make the change unless I hear objec=
tions on the list.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>On 11/21/14, 5:01 PM, Ben Campbell wrote:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On reflection, I think there might be a subtlety here. The resulting o=
ffered-load may still exceed the reporting node's current capacity. This ca=
n be true even if it's sent an OLR (and thus has related OCS). As mentioned=
 in the surrounding node needs to still be able to protect itself, possibly=
 by throttling. Therefore, I propose the sentence take the form of non-norm=
ative guidance. For example:<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&quot;When a reporting node sends an OLR, it effectively delegates any=
 necessary throttling to downstream nodes.&nbsp; If the reporting node also=
 locally throttles the same set of messages, the overall number of throttle=
d request may be higher than intended. Therefore, if a reporting node needs=
 to apply local throttling on a set of messages that match or overlap with =
existing OCS entries, it needs to consider the impact of throttling by down=
stream nodes.&quot;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp; <o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On Nov 17, 2014, at 2:38 AM, <a href=3D"mailto:lionel.morand@orange.co=
m">lionel.morand@orange.com</a> wrote:<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>I can live with the text proposed by Ulrich. But what is wrong with:<o=
:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&quot; Therefore, the reporting node SHOULD NOT apply throttling to th=
e set of messages to which an active OCS applies.&quot; ?<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Envoy=E9 depuis mon Sony Xperia SP d'Orange<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>---- Maria Cruz Bartolome a =E9crit ----<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Section 4.2.3, 13th paragraph, 2nd sentence:<o:p></o:p></pre>
<pre>Existing text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the OLR applies.<o:p></o:p></pre>
<pre>Proposed text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the sent OLR applies.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>[LM] I would say that the reporting node will not remember the previou=
sly sent OLR, but will take care that there is an active OCS.<o:p></o:p></p=
re>
</blockquote>
<pre>SRD&gt; I'm ok with Ulrich's change.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>[LM] and this is incorrect but not fundamental. The reporting node doe=
s not have to &quot;remember&quot; a previously sent OLR. What it will do i=
s to refer to existing OCS to know that throttling should not be applied. A=
n OCS is a consequence of an sent OLR but it is not an OLR itself. But not =
fundamental here.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>[MCruz] I am ok with Ulrich's change. It does not mean that the report=
ing node needs to &quot;remember&quot; a previously sent OLR, though. The c=
hange only proposes to &quot;identify&quot; which OLR we refer to.<o:p></o:=
p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Best regards<o:p></o:p></pre>
<pre>/MCruz<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>_____________________________________________________________________<=
o:p></o:p></pre>
<pre>____________________________________________________<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations <o:=
p></o:p></pre>
<pre>confidentielles ou privilegiees et ne doivent donc pas etre diffuses, =
<o:p></o:p></pre>
<pre>exploites ou copies sans autorisation. Si vous avez recu ce message <o=
:p></o:p></pre>
<pre>par erreur, veuillez le signaler a l'expediteur et le detruire ainsi q=
ue les pieces jointes. Les messages electroniques etant susceptibles d'alte=
ration, Orange decline toute responsabilite si ce message a ete altere, def=
orme ou falsifie. Merci.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>This message and its attachments may contain confidential or <o:p></o:=
p></pre>
<pre>privileged information that may be protected by law; they should not b=
e distributed, used or copied without authorisation.<o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>DiME mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/dime">https://www.iet=
f.org/mailman/listinfo/dime</a><o:p></o:p></pre>
</blockquote>
<pre>&nbsp;<o:p></o:p></pre>
</blockquote>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>______________________________________________________________________=
___________________________________________________<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations con=
fidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
<pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez=
 recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
<pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messag=
es electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
<pre>Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>This message and its attachments may contain confidential or privilege=
d information that may be protected by law;<o:p></o:p></pre>
<pre>they should not be distributed, used or copied without authorisation.<=
o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
</blockquote>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<PRE>______________________________________________________________________=
___________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.
</PRE></body>
</html>

--_000_6B7134B31289DC4FAF731D844122B36E99DE18PEXCVZYM13corpora_--


From nobody Wed Dec  3 12:38:57 2014
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AB3A1A6F3A; Wed,  3 Dec 2014 12:38:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kSm98bGQ3HSH; Wed,  3 Dec 2014 12:38:52 -0800 (PST)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CC6A1A1E0E; Wed,  3 Dec 2014 12:38:52 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 5.7.4
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141203203852.21756.15977.idtracker@ietfa.amsl.com>
Date: Wed, 03 Dec 2014 12:38:52 -0800
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/eUq7ZhH5B19cyg9QtMz3qP-u_2o
Cc: dime@ietf.org
Subject: [Dime] I-D Action: draft-ietf-dime-ovli-05.txt
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 20:38:54 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Diameter Maintenance and Extensions Working Group of the IETF.

        Title           : Diameter Overload Indication Conveyance
        Authors         : Jouni Korhonen
                          Steve Donovan
                          Ben Campbell
                          Lionel Morand
	Filename        : draft-ietf-dime-ovli-05.txt
	Pages           : 52
	Date            : 2014-12-03

Abstract:
   This specification defines a base solution for Diameter overload
   control, referred to as Diameter Overload Indication Conveyance
   (DOIC).

Requirements

The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dime-ovli/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dime-ovli-05

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=draft-ietf-dime-ovli-05


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Dec  3 14:32:01 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE3B91ACE02 for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 14:31:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xg7O8CirG_ip for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 14:31:55 -0800 (PST)
Received: from mail-lb0-x233.google.com (mail-lb0-x233.google.com [IPv6:2a00:1450:4010:c04::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF34D1ACE18 for <dime@ietf.org>; Wed,  3 Dec 2014 14:31:40 -0800 (PST)
Received: by mail-lb0-f179.google.com with SMTP id z11so12880500lbi.24 for <dime@ietf.org>; Wed, 03 Dec 2014 14:31:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :content-type:content-transfer-encoding; bh=4/QnMG9I4V1PxYZDqoc6OMOYDY9LD8ERBWNXXaezi2A=; b=IQrvPymj04COk/SCihcfdUINgxzSyRdvCg7UvXvF63Vm59xa0qiJlEcc5uUZEBDiWW G//8Ia98+MscJyNBDPdDvp6XgnCq39JG74CaRRhJk1dbUAz5JqcsGUe+vcLPZDWDmS85 DzohQuFmWGShOs+bPVx9KrClu7AwQ6a8o6Rx8wHQ9xKTd2es0sm4P6Sbq4Bubf0LFX/7 cy4gJIIvApqgnWO5v3DsAXaaYD3eRXI/sb7bw3jZOiVxXytC4FizSmYhMYt56BsBJgqk vOK661NcuivkXsuujGxMFDNmi+Mn9QrPQWuHXStVOJzdmMEzKuZAV8/5dj5gzKs8F5il SGJw==
X-Received: by 10.152.115.172 with SMTP id jp12mr6311849lab.33.1417645899279;  Wed, 03 Dec 2014 14:31:39 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id ei11sm6710180lad.18.2014.12.03.14.31.37 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 03 Dec 2014 14:31:38 -0800 (PST)
Message-ID: <547F8F43.1010705@gmail.com>
Date: Thu, 04 Dec 2014 00:31:31 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/YlRGwh1yE-npg61xPO-nW2gJ1Dw
Subject: [Dime] WLGC #1 for draft-ietf-dime-ovli-05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 22:31:57 -0000

Folks,

We have had a considerable update on the DOIC draft based on the 
comments from the interim meeting, Honolulu meeting and discussions held 
lately on the mailinglist. Authors/chairs think the -05 draft is now 
ready for a WGLC and the rest of the potential comments can be handled 
as WGLC comments.

This email starts a two week WGLC #1 for draft-ietf-dime-ovli-05. The 
WGLC ends 18th Dec 2014 EOB (CET+1). Post your review comments and 
concerns to the mailinglist. Also make use of the issue tracker 
(remember to select "severity" as "in WG last call").

Lionel & Jouni


From nobody Wed Dec  3 23:09:18 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64FCE1A88DD for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 23:09:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level: 
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9qFQ-i7jvZlH for <dime@ietfa.amsl.com>; Wed,  3 Dec 2014 23:09:06 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpida-esg-02.alcatel-lucent.com [135.245.210.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 763161A88E1 for <dime@ietf.org>; Wed,  3 Dec 2014 23:09:05 -0800 (PST)
Received: from fr712usmtp2.zeu.alcatel-lucent.com (unknown [135.239.2.42]) by Websense Email Security Gateway with ESMTPS id 9D0FAAF2C9C59; Thu,  4 Dec 2014 07:09:01 +0000 (GMT)
Received: from FR712WXCHHUB03.zeu.alcatel-lucent.com (fr712wxchhub03.zeu.alcatel-lucent.com [135.239.2.74]) by fr712usmtp2.zeu.alcatel-lucent.com (GMO) with ESMTP id sB4791DK016687 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 4 Dec 2014 08:09:01 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR712WXCHHUB03.zeu.alcatel-lucent.com ([135.239.2.74]) with mapi id 14.03.0195.001; Thu, 4 Dec 2014 08:09:01 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: "lionel.morand@orange.com" <lionel.morand@orange.com>, Steve Donovan <srdonovan@usdonovans.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHP96zWh2IhAI9MNUyrs2P7h3In05xXdZWAgAKB9QCAABTjgIABToGAgABXjYCAAImqAIAAtOqAgAHz+gCAAFg3AIAFNTcAgAARHgCABzpwAIAFs+cAgABIhYCACwbhAIABEZ9ggAAii9CAAEXUgIAAB5YAgADv6OA=
Date: Thu, 4 Dec 2014 07:09:00 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F1197@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <545792B6.8030502@usdonovans.com> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com> <547F46D5.7060800@usdonovans.com> <19906_1417628979_547F4D33_19906_1955_1_6B7134B31289DC4FAF731D844122B36E99DE18@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <19906_1417628979_547F4D33_19906_1955_1_6B7134B31289DC4FAF731D844122B36E99DE18@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.40]
Content-Type: multipart/alternative; boundary="_000_E194C2E18676714DACA9C3A2516265D2026F1197FR712WXCHMBA12z_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/zlPuOB6BBmKlobl-R7zS1ouSfG4
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Dec 2014 07:09:14 -0000

--_000_E194C2E18676714DACA9C3A2516265D2026F1197FR712WXCHMBA12z_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Steve's text  is also fine for me.

Best regards

JJacques

De : lionel.morand@orange.com [mailto:lionel.morand@orange.com]
Envoy=E9 : mercredi 3 d=E9cembre 2014 18:50
=C0 : Steve Donovan; TROTTIN, JEAN-JACQUES (JEAN-JACQUES); Ben Campbell
Cc : dime@ietf.org
Objet : RE: [Dime] Updates to DOIC -05

I'm fine with the modified text.

Lionel

De : Steve Donovan [mailto:srdonovan@usdonovans.com]
Envoy=E9 : mercredi 3 d=E9cembre 2014 18:22
=C0 : TROTTIN, JEAN-JACQUES (JEAN-JACQUES); MORAND Lionel IMT/OLN; Ben Camp=
bell
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

I have attempted to address both Lionel's and Jean-Jacques' suggestions wit=
h the following text:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled requests may be higher than intended.  Therefore, before

   applying local message throttling, a reporting node needs to check if

   these messages match existing OCS entries, indicating that these

   messages have survived throttling applied by downstream nodes that

   have received the related OLR.



   However, even if the set of messages match existing OCS entries, the

   reporting node can still apply other abatement methods such as

   diversion.  The reporting node might also need to throttle requests

   for reasons other than overload.  For example, an agent or server

   might have a configured rate limit for each client, and throttle

   requests that exceed that limit, even if such requests had already

   been candidates for throttling by downstream nodes.  The reporting

   node also has the option to send new OLRs requesting greater

   reductions in traffic, reducing the need for local throttling.

Steve
On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
Dear all

To continue on my remark , I would complement the Steve's text with " can u=
pdate the reduction of traffic it requires from the reacting nodes(s) by se=
nding new overload reports" as hereafter:



   Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes and can update the reductio=
n of traffic it requires from the reacting nodes(s) by sending new overload=
 reports.


Best regards

JJacques


De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN, JEAN-JACQUE=
S (JEAN-JACQUES)
Envoy=E9 : mercredi 3 d=E9cembre 2014 11:29
=C0 : Steve Donovan; lionel.morand@orange.com<mailto:lionel.morand@orange.c=
om>; Ben Campbell
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Dear all

I am not against the new proposed texts from Steve or Ben to clarify this t=
opic.

My point is that, when  the reporting node has sent an OLR requiring  a tra=
ffic reduction , there is first a reaction time before receiving reduced tr=
affic, and second even if the traffic has been reduced, it can still exceed=
 the capacity of the reporting node  that has no other choice than to throt=
tle the received reduced traffic (if no diversion). This can happen when th=
e traffic at the source (reacting node) before throttling is increasing qui=
ckly, so the traffic reduced  according to the received OLR may  remain too=
 high .  Then, if the reporting node has nevertheless to do some throttle, =
it will certainly react by new OLRs requiring a higher traffic reduction fr=
om the reacting nodes. This is a dynamic process, where the reporting node =
adjust the  traffic  reduction it requires according to what it receives .

As Ben  I also think this is a guidance , and I think it is good to bring s=
ome guidance.

Best regards

JJacques

De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9 : mardi 2 d=E9cembre 2014 19:50
=C0 : lionel.morand@orange.com<mailto:lionel.morand@orange.com>; Ben Campbe=
ll
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Lionel,

The two paragraphs together now say the following:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled request may be higher than intended.  Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match or overlap with existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes.



   However, when the reporting node sends an OLR downstream, it might

   still need to apply other abatement methods such as diversion.  The

   reporting node might also need to throttle requests for reasons other

   than overload.  For example, an agent or server might have a

   configured rate limit for each client, and throttle requests that

   exceed that limit, even if such requests had already been candidates

   for throttling by downstream nodes.
Do you see the need for further clarification?

Steve
On 11/25/14, 12:26 PM, lionel.morand@orange.com<mailto:lionel.morand@orange=
.com> wrote:

I'm OK with the idea of the text proposed by Ben.

I would just make clear that throttling is applicable to the fact of sendin=
g/forwarding requests (cf. definition). A reporting node may apply local th=
rottling if it is an agent. But if it is a server, it can either drop the e=
xceeded number of requests (no response sent to the downstream) or send a s=
pecific DIAMETER-TOO-BUSY response. I think that this clarification is some=
how missing in the document.



Regards,



Lionel



-----Message d'origine-----

De : Steve Donovan [mailto:srdonovan@usdonovans.com]

Envoy=E9 : mardi 25 novembre 2014 15:07

=C0 : Ben Campbell; MORAND Lionel IMT/OLN

Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<mailto:dime@ietf.org>; =
Maria Cruz Bartolome

Objet : Re: [Dime] Updates to DOIC -05



I'm ok with Ben's wording and will make the change unless I hear objections=
 on the list.



Steve



On 11/21/14, 5:01 PM, Ben Campbell wrote:

On reflection, I think there might be a subtlety here. The resulting offere=
d-load may still exceed the reporting node's current capacity. This can be =
true even if it's sent an OLR (and thus has related OCS). As mentioned in t=
he surrounding node needs to still be able to protect itself, possibly by t=
hrottling. Therefore, I propose the sentence take the form of non-normative=
 guidance. For example:



"When a reporting node sends an OLR, it effectively delegates any necessary=
 throttling to downstream nodes.  If the reporting node also locally thrott=
les the same set of messages, the overall number of throttled request may b=
e higher than intended. Therefore, if a reporting node needs to apply local=
 throttling on a set of messages that match or overlap with existing OCS en=
tries, it needs to consider the impact of throttling by downstream nodes."





On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com<mailto:lionel.morand@=
orange.com> wrote:



I can live with the text proposed by Ulrich. But what is wrong with:



" Therefore, the reporting node SHOULD NOT apply throttling to the set of m=
essages to which an active OCS applies." ?



Envoy=E9 depuis mon Sony Xperia SP d'Orange



---- Maria Cruz Bartolome a =E9crit ----





Section 4.2.3, 13th paragraph, 2nd sentence:

Existing text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the OLR applies.

Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the sent OLR applies.



[LM] I would say that the reporting node will not remember the previously s=
ent OLR, but will take care that there is an active OCS.

SRD> I'm ok with Ulrich's change.



[LM] and this is incorrect but not fundamental. The reporting node does not=
 have to "remember" a previously sent OLR. What it will do is to refer to e=
xisting OCS to know that throttling should not be applied. An OCS is a cons=
equence of an sent OLR but it is not an OLR itself. But not fundamental her=
e.



[MCruz] I am ok with Ulrich's change. It does not mean that the reporting n=
ode needs to "remember" a previously sent OLR, though. The change only prop=
oses to "identify" which OLR we refer to.



Best regards

/MCruz





_____________________________________________________________________

____________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations

confidentielles ou privilegiees et ne doivent donc pas etre diffuses,

exploites ou copies sans autorisation. Si vous avez recu ce message

par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que le=
s pieces jointes. Les messages electroniques etant susceptibles d'alteratio=
n, Orange decline toute responsabilite si ce message a ete altere, deforme =
ou falsifie. Merci.



This message and its attachments may contain confidential or

privileged information that may be protected by law; they should not be dis=
tributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime







___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.







___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.

--_000_E194C2E18676714DACA9C3A2516265D2026F1197FR712WXCHMBA12z_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:Consolas;
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.Preacute1
	{mso-style-name:"Pr&eacute1\,format&eacute1\,HTML Car1";
	mso-style-priority:99;
	mso-style-link:"Pr&eacute\,format&eacute\,HTML";
	font-family:Consolas;
	color:black;}
p.Preacute, li.Preacute, div.Preacute
	{mso-style-name:"Pr&eacute\,format&eacute\,HTML";
	mso-style-link:"Pr&eacute1\,format&eacute1\,HTML Car1";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Steve&#8217;s text &nbsp;=
is also fine for me.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> lionel.morand@orange.=
com [mailto:lionel.morand@orange.com]
<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 18:50<br>
<b>=C0&nbsp;:</b> Steve Donovan; TROTTIN, JEAN-JACQUES (JEAN-JACQUES); Ben =
Campbell<br>
<b>Cc&nbsp;:</b> dime@ietf.org<br>
<b>Objet&nbsp;:</b> RE: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I'm fine with the modifie=
d text.</span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span lang=
=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lionel</span><span lang=
=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><span lang=
=3D"FR"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> Steve Donovan [<a hre=
f=3D"mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>]
<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 18:22<br>
<b>=C0&nbsp;:</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES); MORAND Lionel IMT/O=
LN; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><span lang=3D"FR">=
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"FR">I h=
ave attempted to address both Lionel's and Jean-Jacques' suggestions with t=
he following text:<o:p></o:p></span></p>
<pre><span lang=3D"FR">&nbsp;&nbsp; When a reporting node sends an OLR, it =
effectively delegates any<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; necessary throttling to downstream node=
s.&nbsp; If the reporting node also<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; locally throttles the same set of messa=
ges, the overall number of<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; throttled requests may be higher than i=
ntended.&nbsp; Therefore, before<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; applying local message throttling, a re=
porting node needs to check if<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; these messages match existing OCS entri=
es, indicating that these<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; messages have survived throttling appli=
ed by downstream nodes that<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; have received the related OLR.<o:p></o:=
p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; However, even if the set of messages ma=
tch existing OCS entries, the<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; reporting node can still apply other ab=
atement methods such as<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; diversion.&nbsp; The reporting node mig=
ht also need to throttle requests<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; for reasons other than overload.&nbsp; =
For example, an agent or server<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; might have a configured rate limit for =
each client, and throttle<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; requests that exceed that limit, even i=
f such requests had already<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; been candidates for throttling by downs=
tream nodes.&nbsp; The reporting<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; node also has the option to send new OL=
Rs requesting greater<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; reductions in traffic, reducing the nee=
d for local throttling.<o:p></o:p></span></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"FR"><br=
>
Steve<o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR">On 12/3/14, 6:19 AM, TROTTIN, JEAN=
-JACQUES (JEAN-JACQUES) wrote:<o:p></o:p></span></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all</spa=
n><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">To continue o=
n my remark , I would complement the Steve&#8217;s text with &#8220;
</span><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;Courie=
r New&quot;,&quot;serif&quot;">can update the reduction of traffic it requi=
res from the reacting nodes(s) by sending new overload reports&#8221;
</span><span lang=3D"FR" style=3D"font-size:11.0pt;font-family:&quot;Calibr=
i&quot;,&quot;sans-serif&quot;;color:#1F497D">as hereafter: &nbsp;&nbsp;&nb=
sp;</span><span lang=3D"FR"><o:p></o:p></span></p>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; Therefore, if a<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; reporting node needs to apply local thr=
ottling on a set of messages<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; that match existing OCS entries, it nee=
ds to consider<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; the impact of throttling by downstream =
nodes and can update the reduction of traffic it requires from the reacting=
 nodes(s) by sending new overload reports. <o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards<=
/span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
</span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [<a href=3D"mail=
to:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 11:29<br>
<b>=C0&nbsp;:</b> Steve Donovan; <a href=3D"mailto:lionel.morand@orange.com=
">lionel.morand@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><span lang=3D"FR">=
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all</spa=
n><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am not agai=
nst the new proposed texts from Steve or Ben to clarify this topic.</span><=
span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">My point is t=
hat, when &nbsp;the reporting node has sent an OLR requiring &nbsp;a traffi=
c reduction , there is first a reaction time before receiving reduced
 traffic, and second even if the traffic has been reduced, it can still exc=
eed the capacity of the reporting node &nbsp;that has no other choice than =
to throttle the received reduced traffic (if no diversion). This can happen=
 when the traffic at the source (reacting
 node) before throttling is increasing quickly, so the traffic reduced&nbsp=
; according to the received OLR may &nbsp;remain too high . &nbsp;Then, if =
the reporting node has nevertheless to do some throttle, it will certainly =
react by new OLRs requiring a higher traffic reduction
 from the reacting nodes. This is a dynamic process, where the reporting no=
de adjust the &nbsp;traffic &nbsp;reduction it requires according to what i=
t receives .</span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">As Ben&nbsp; =
I also think this is a guidance , and I think it is good to bring some guid=
ance.
</span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards<=
/span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
</span><span lang=3D"FR"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"FR" style=3D"font-size:11.0pt;font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span>=
<span lang=3D"FR"><o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [<a href=3D"mail=
to:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> Steve Donovan<br>
<b>Envoy=E9&nbsp;:</b> mardi 2 d=E9cembre 2014 19:50<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:lionel.morand@orange.com">lionel.morand=
@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><span lang=3D"FR">=
<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"FR">&nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"FR">Lio=
nel,<br>
<br>
The two paragraphs together now say the following:<o:p></o:p></span></p>
<pre><span lang=3D"FR">&nbsp;&nbsp; When a reporting node sends an OLR, it =
effectively delegates any<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; necessary throttling to downstream node=
s.&nbsp; If the reporting node also<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; locally throttles the same set of messa=
ges, the overall number of<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; throttled request may be higher than in=
tended.&nbsp; Therefore, if a<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; reporting node needs to apply local thr=
ottling on a set of messages<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; that match or overlap with existing OCS=
 entries, it needs to consider<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; the impact of throttling by downstream =
nodes.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; However, when the reporting node sends =
an OLR downstream, it might<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; still need to apply other abatement met=
hods such as diversion.&nbsp; The<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; reporting node might also need to throt=
tle requests for reasons other<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; than overload.&nbsp; For example, an ag=
ent or server might have a<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; configured rate limit for each client, =
and throttle requests that<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; exceed that limit, even if such request=
s had already been candidates<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;&nbsp; for throttling by downstream nodes.<o:p=
></o:p></span></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"FR">Do =
you see the need for further clarification?<br>
<br>
Steve<o:p></o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"FR">On 11/25/14, 12:26 PM, <a href=3D"=
mailto:lionel.morand@orange.com">
lionel.morand@orange.com</a> wrote:<o:p></o:p></span></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre><span lang=3D"FR">I'm OK with the idea of the text proposed by Ben.<o:=
p></o:p></span></pre>
<pre><span lang=3D"FR">I would just make clear that throttling is applicabl=
e to the fact of sending/forwarding requests (cf. definition). A reporting =
node may apply local throttling if it is an agent. But if it is a server, i=
t can either drop the exceeded number of requests (no response sent to the =
downstream) or send a specific DIAMETER-TOO-BUSY response. I think that thi=
s clarification is somehow missing in the document.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Regards,<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Lionel<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">-----Message d'origine-----<o:p></o:p></span></pre>
<pre><span lang=3D"FR">De&nbsp;: Steve Donovan [<a href=3D"mailto:srdonovan=
@usdonovans.com">mailto:srdonovan@usdonovans.com</a>] <o:p></o:p></span></p=
re>
<pre><span lang=3D"FR">Envoy=E9&nbsp;: mardi 25 novembre 2014 15:07<o:p></o=
:p></span></pre>
<pre><span lang=3D"FR">=C0&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN<o:p><=
/o:p></span></pre>
<pre><span lang=3D"FR">Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a href=
=3D"mailto:dime@ietf.org">dime@ietf.org</a>; Maria Cruz Bartolome<o:p></o:p=
></span></pre>
<pre><span lang=3D"FR">Objet&nbsp;: Re: [Dime] Updates to DOIC -05<o:p></o:=
p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">I'm ok with Ben's wording and will make the change u=
nless I hear objections on the list.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Steve<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">On 11/21/14, 5:01 PM, Ben Campbell wrote:<o:p></o:p>=
</span></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre><span lang=3D"FR">On reflection, I think there might be a subtlety her=
e. The resulting offered-load may still exceed the reporting node's current=
 capacity. This can be true even if it's sent an OLR (and thus has related =
OCS). As mentioned in the surrounding node needs to still be able to protec=
t itself, possibly by throttling. Therefore, I propose the sentence take th=
e form of non-normative guidance. For example:<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&quot;When a reporting node sends an OLR, it effecti=
vely delegates any necessary throttling to downstream nodes.&nbsp; If the r=
eporting node also locally throttles the same set of messages, the overall =
number of throttled request may be higher than intended. Therefore, if a re=
porting node needs to apply local throttling on a set of messages that matc=
h or overlap with existing OCS entries, it needs to consider the impact of =
throttling by downstream nodes.&quot;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp; <o:p></o:p></span></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre><span lang=3D"FR">On Nov 17, 2014, at 2:38 AM, <a href=3D"mailto:lione=
l.morand@orange.com">lionel.morand@orange.com</a> wrote:<o:p></o:p></span><=
/pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">I can live with the text proposed by Ulrich. But wha=
t is wrong with:<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&quot; Therefore, the reporting node SHOULD NOT appl=
y throttling to the set of messages to which an active OCS applies.&quot; ?=
<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Envoy=E9 depuis mon Sony Xperia SP d'Orange<o:p></o:=
p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">---- Maria Cruz Bartolome a =E9crit ----<o:p></o:p><=
/span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre><span lang=3D"FR">Section 4.2.3, 13th paragraph, 2nd sentence:<o:p></o=
:p></span></pre>
<pre><span lang=3D"FR">Existing text: Therefore, the reporting node SHOULD =
NOT apply throttling to the set of messages to which the OLR applies.<o:p><=
/o:p></span></pre>
<pre><span lang=3D"FR">Proposed text: Therefore, the reporting node SHOULD =
NOT apply throttling to the set of messages to which the sent OLR applies.<=
o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">[LM] I would say that the reporting node will not re=
member the previously sent OLR, but will take care that there is an active =
OCS.<o:p></o:p></span></pre>
</blockquote>
<pre><span lang=3D"FR">SRD&gt; I'm ok with Ulrich's change.<o:p></o:p></spa=
n></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">[LM] and this is incorrect but not fundamental. The =
reporting node does not have to &quot;remember&quot; a previously sent OLR.=
 What it will do is to refer to existing OCS to know that throttling should=
 not be applied. An OCS is a consequence of an sent OLR but it is not an OL=
R itself. But not fundamental here.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">[MCruz] I am ok with Ulrich's change. It does not me=
an that the reporting node needs to &quot;remember&quot; a previously sent =
OLR, though. The change only proposes to &quot;identify&quot; which OLR we =
refer to.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Best regards<o:p></o:p></span></pre>
<pre><span lang=3D"FR">/MCruz<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">____________________________________________________=
_________________<o:p></o:p></span></pre>
<pre><span lang=3D"FR">____________________________________________________=
<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Ce message et ses pieces jointes peuvent contenir de=
s informations <o:p></o:p></span></pre>
<pre><span lang=3D"FR">confidentielles ou privilegiees et ne doivent donc p=
as etre diffuses, <o:p></o:p></span></pre>
<pre><span lang=3D"FR">exploites ou copies sans autorisation. Si vous avez =
recu ce message <o:p></o:p></span></pre>
<pre><span lang=3D"FR">par erreur, veuillez le signaler a l'expediteur et l=
e detruire ainsi que les pieces jointes. Les messages electroniques etant s=
usceptibles d'alteration, Orange decline toute responsabilite si ce message=
 a ete altere, deforme ou falsifie. Merci.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">This message and its attachments may contain confide=
ntial or <o:p></o:p></span></pre>
<pre><span lang=3D"FR">privileged information that may be protected by law;=
 they should not be distributed, used or copied without authorisation.<o:p>=
</o:p></span></pre>
<pre><span lang=3D"FR">If you have received this email in error, please not=
ify the sender and delete this message and its attachments.<o:p></o:p></spa=
n></pre>
<pre><span lang=3D"FR">As emails may be altered, Orange is not liable for m=
essages that have been modified, changed or falsified.<o:p></o:p></span></p=
re>
<pre><span lang=3D"FR">Thank you.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">_______________________________________________<o:p>=
</o:p></span></pre>
<pre><span lang=3D"FR">DiME mailing list<o:p></o:p></span></pre>
<pre><span lang=3D"FR"><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o=
:p></o:p></span></pre>
<pre><span lang=3D"FR"><a href=3D"https://www.ietf.org/mailman/listinfo/dim=
e">https://www.ietf.org/mailman/listinfo/dime</a><o:p></o:p></span></pre>
</blockquote>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
</blockquote>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">____________________________________________________=
_____________________________________________________________________<o:p><=
/o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">Ce message et ses pieces jointes peuvent contenir de=
s informations confidentielles ou privilegiees et ne doivent donc<o:p></o:p=
></span></pre>
<pre><span lang=3D"FR">pas etre diffuses, exploites ou copies sans autorisa=
tion. Si vous avez recu ce message par erreur, veuillez le signaler<o:p></o=
:p></span></pre>
<pre><span lang=3D"FR">a l'expediteur et le detruire ainsi que les pieces j=
ointes. Les messages electroniques etant susceptibles d'alteration,<o:p></o=
:p></span></pre>
<pre><span lang=3D"FR">Orange decline toute responsabilite si ce message a =
ete altere, deforme ou falsifie. Merci.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">This message and its attachments may contain confide=
ntial or privileged information that may be protected by law;<o:p></o:p></s=
pan></pre>
<pre><span lang=3D"FR">they should not be distributed, used or copied witho=
ut authorisation.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">If you have received this email in error, please not=
ify the sender and delete this message and its attachments.<o:p></o:p></spa=
n></pre>
<pre><span lang=3D"FR">As emails may be altered, Orange is not liable for m=
essages that have been modified, changed or falsified.<o:p></o:p></span></p=
re>
<pre><span lang=3D"FR">Thank you.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
<pre><span lang=3D"FR">&nbsp;<o:p></o:p></span></pre>
</blockquote>
<p class=3D"MsoNormal"><span lang=3D"FR">&nbsp;<o:p></o:p></span></p>
</blockquote>
<p class=3D"MsoNormal"><span lang=3D"FR">&nbsp;<o:p></o:p></span></p>
<pre><span lang=3D"FR">____________________________________________________=
_____________________________________________________________________<o:p><=
/o:p></span></pre>
<pre><span lang=3D"FR"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"FR">Ce message et ses pieces jointes peuvent contenir de=
s informations confidentielles ou privilegiees et ne doivent donc<o:p></o:p=
></span></pre>
<pre><span lang=3D"FR">pas etre diffuses, exploites ou copies sans autorisa=
tion. Si vous avez recu ce message par erreur, veuillez le signaler<o:p></o=
:p></span></pre>
<pre><span lang=3D"FR">a l'expediteur et le detruire ainsi que les pieces j=
ointes. Les messages electroniques etant susceptibles d'alteration,<o:p></o=
:p></span></pre>
<pre><span lang=3D"FR">Orange decline toute responsabilite si ce message a =
ete altere, deforme ou falsifie. Merci.<o:p></o:p></span></pre>
<pre><span lang=3D"FR"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"FR">This message and its attachments may contain confide=
ntial or privileged information that may be protected by law;<o:p></o:p></s=
pan></pre>
<pre><span lang=3D"FR">they should not be distributed, used or copied witho=
ut authorisation.<o:p></o:p></span></pre>
<pre><span lang=3D"FR">If you have received this email in error, please not=
ify the sender and delete this message and its attachments.<o:p></o:p></spa=
n></pre>
<pre><span lang=3D"FR">As emails may be altered, Orange is not liable for m=
essages that have been modified, changed or falsified.<o:p></o:p></span></p=
re>
<pre><span lang=3D"FR">Thank you.<o:p></o:p></span></pre>
</div>
</body>
</html>

--_000_E194C2E18676714DACA9C3A2516265D2026F1197FR712WXCHMBA12z_--


From nobody Mon Dec  8 02:06:23 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB4C11A89E9 for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 02:06:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.901
X-Spam-Level: 
X-Spam-Status: No, score=-8.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_LETTER=-2, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cx-jyxLKDvlU for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 02:06:16 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96F411A89F5 for <dime@ietf.org>; Mon,  8 Dec 2014 02:06:15 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB8A6C8g000730 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 8 Dec 2014 10:06:12 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB8A6Bbp027265 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 8 Dec 2014 11:06:11 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC001.nsn-intra.net ([10.159.42.32]) with mapi id 14.03.0195.001; Mon, 8 Dec 2014 11:06:11 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Jouni Korhonen <jouni.nospam@gmail.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] WLGC #1 for draft-ietf-dime-ovli-05
Thread-Index: AQHQD0j2TUdPtbiANUulpB3cTV/mopyBBToA
Date: Mon, 8 Dec 2014 10:06:11 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815232D29@DEMUMBX014.nsn-intra.net>
References: <547F8F43.1010705@gmail.com>
In-Reply-To: <547F8F43.1010705@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 23516
X-purgate-ID: 151667::1418033172-0000658F-582F72EB/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/nAJg4AiHU0nRhOgfauK5_JLqmpM
Subject: Re: [Dime] WLGC #1 for draft-ietf-dime-ovli-05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 10:06:21 -0000

Dear Lionel & Jouni,

here are my review comments.=20
I think those are all not contentious.
Best regards
Ulrich

Section 3, last paragraph:
Existing text:
   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
   that are "adjacent" for DOIC purposes may not be adjacent from a
   Diameter, or transport, perspective.  For example, one or more
   Diameter agents that do not support DOIC may exist between a given
   pair of reporting and reacting nodes, as long as those agents pass
   unknown AVPs through unchanged.  The report types described in this
   document can safely pass through non-supporting agents.  This may not
   be true for report types defined in future specifications.
Comment: while this is all not wrong, the existing text may convey the erri=
ng impression that there cannot be a DOIC supporting agent on the path betw=
een a reporting node and an adjacent reacting node.=20
Proposal: It is proposed to add the following sentence at the end of the pa=
ragraph:
   Another example is where one or more Diameter agents that do support
   DOIC may exist between a given pair of reporting and reacting nodes,
   as long as those agents pass OC-specific AVPs through unchanged.

Section 3.2, 6th paragraph:
Existing text:
   The OC-Feature-Vector AVP will contain an indication of support for
   the loss overload abatement algorithm defined in this specification
   (see Section 5).  This ensures that there is at least one commonly
   supported overload abatement algorithm between the reporting node and
   the reacting node(s) in the path of the request.
Comment: I agree that within a given path between client and server there m=
ay be more than one reacting nodes. But a given reporting node on that path=
 does not have more than one adjacent reacting nodes on that given path to =
which it sends OLRs. I don't say that the existing text is wrong, but it is=
 misleading. What we want to say here is that any given pair of adjacent re=
acting and reporting nodes will have at least one commonly supported algori=
thm.
Proposal: It is proposed to replace the last line of the paragraph with:
   The adjacent reacting node on the path of the request.

Section 3.2, last two paragraphs:
Existing text:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent updates the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine the content of the modified  OC-
      Supported-Features AVP is out-of-scope for this specification and
      is left to implementation decisions.  Care must be taken not to
      introduce interoperability issues for downstream or upstream DOIC
      nodes.
Comment: It is perfectly ok (in this case) for the agent not to update and =
not to modify.=20
Proposal: It is proposed to replace the two paragraphs with the following:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent can update the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine whether and if how to modify the
      content of the OC-Supported-Features AVP is out-of-scope for this
      specification and is left to implementation decisions.  Care must
      be taken not to introduce interoperability issues for downstream
      or upstream DOIC nodes.

Section 3.3, 4th and 5th paragraph:
Existing text:
   A report of type "HOST_REPORT" is sent to indicate the overload of a
   specific Diameter node for the application-id indicated in the
   transaction.  When receiving an OLR of type host, a reacting node
   applies overload abatement to what is referred to in this document as
   host-routed requests.  The reacting node applies overload abatement
   on those host-routed requests which the reacting node knows will be
   served by the server that matches the Origin-Host AVP of the received
   message that contained the received OLR of type host.

   A report of type "REALM_REPORT" applies to realm-routed requests for
   a specific realm as indicated in the Destination-Realm AVP.
Comment: While the 4th paragraph is all fine, the 5th paragraph should be a=
ligned.
Proposal: It is proposed to replace the 5th paragraph with:
   A report of type "REALM_REPORT" is sent to indicate the overload of all
   Diameter nodes within a realm for the application-id indicated in the
   transaction.  When receiving an OLR of type realm, a reacting node
   applies overload abatement to what is referred to in this document as
   realm-routed requests.  The reacting node applies overload abatement
   on those realm-routed requests which contain  a Destination-Realm AVP
   that matches the Origin-Realm AVP of the received message that
   contained the received OLR of type realm.

Section 3.3, 8th paragraph:
Existing text:
   Reporting nodes are responsible for determining the need for a
   reduction of traffic.  The method for making this determination is
   implementation specific and depend on the type of overload report
   being generated.  A host-report, for instance, will generally be
   generated by tracking utilization of resources required by the host
   to handle transactions for the Diameter application.  A realm-report
   generally impacts the traffic sent to multiple hosts and, as such,
   requires tracking the capacity all servers for realm-routed requests
   for the application and realm.
Comment: Something is wrong with the last sentence.
Proposal: Replace the last sentence with:
                                                         A realm-report
   generally impacts the traffic sent to multiple hosts and, as such,
   requires tracking the capacity of all servers able to handle realm-
   routed requests for the application and realm.

Section 3.3, 12th paragraph:
Existing text:
   As the conditions that lead to the generation of the overload report
   change the reporting node can send new overload reports requesting
   greater reduction if the condition gets worse or less reduction if
   the condition improves.  The reporting node sends an overload report
   with a duration of zero to indicate that the overload condition has
   ended and need for use of the abatement algorithm to reduce traffic
   sent is no longer needed.
Comment: Bad style.
Proposal: Remove the words "need for" from the last sentence.

Section 4.1.2, 4th paragraph:
Existing text:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content of the OC-
   Feature-Vector AVP in the request message.
Comment: The Feature-Vector AVP may be absent. In this case knowledge canno=
t be based on the content.
Proposal: Replace the paragraph with:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content or absence of
   the OC-Feature-Vector AVP within the Supported-Features AVP in the
   request message.

Section 4.1.2, 8th paragraph:
Existing text:
   For an ongoing overload condition, a reporting node MUST NOT change
   the selected algorithm during the period of time that it is in an
   overload condition and, as a result, is sending OC-OLR AVPs in answer
   messages.
Comment: As a result of an ongoing overload condition the reporting node is=
 sending OC-OLR AVPs containing no validity duration or a validity duration=
 different from zero in answer messages.
Proposal: Replace the paragraph with:
   For an ongoing overload condition, a reporting node MUST NOT change
   the selected algorithm during the period of time that it is in an
   overload condition and, as a result, is sending OC-OLR AVPs
   containing no validity duration or a validity duration different
   from zero in answer messages.

Section 4.1.3, 1st paragraph:
Existing text:
   Diameter Agents that support DOIC SHOULD ensure that all messages
   relayed by the agent contain the OC-Supported-Features AVP.
Comment: The SHOULD in the first line is not correct based on my next comme=
nt.
Proposal: Delete the first paragraph.=20

Section 4.1.3, 4th paragraph:
Existing text:
   A Diameter Agent SHOULD take on reporting node behavior for Diameter
   endpoints that do not support the DOIC solution.  A Diameter Agent
   detects that a Diameter endpoint does not support DOIC reporting node
   behavior when there is no OC-Supported-Features AVP in an answer
   message for a transaction that contained the OC-Supported-Features
   AVP in the request message.
Comment: The first sentence can reasonably only apply to Diameter agents th=
at are immediate peers to the non-supporting Diameter endpoint. We cannot e=
xpect a far-away-agent to take on reporting node behavior when all upstream=
 agents and the server do not support DOIC. Furthermore: When the non-suppo=
rting server has two DOIC supporting immediate peer agents which both take =
on reporting node behavior we end up in problems similar to those identifie=
d in the note in section 3.3.
Proposal:Replace the paragaph with:
   A Diameter Agent that is an immediate peer to the Diameter endpoint
   that does not support DOIC SHOULD take on reporting node behavior for
   Diameter endpoints that do not support the DOIC solution.  A Diameter
   Agent detects that a Diameter endpoint does not support DOIC reporting
   node behavior when there is no OC-Supported-Features AVP in an answer
   message for a transaction that contained the OC-Supported-Features
   AVP in the request message.
      Note: Known issues exist if multiple sources for overload reports
      which apply to the same Diameter entity exist.  Reacting nodes
      have no way of determining the source and, as such, will treat
      them as coming from a single source.  Variance in sequence numbers
      between the two sources can then cause incorrect overload
      abatement treatment to be applied for indeterminate periods of
      time.
=20
Section 4.1.3, 6th paragraph:
Existing text:
   As with a Diameter endpoint taking on reporting node behavior, a
   Diameter Agent MUST only include the OC-Supported-Features AVP in
   answer messages for transactions where the request message received
   by the Diameter Agent had an OC-Supported-Features AVP.
Comments: "MUST only do x for condition y" could mean:
a) "MUST do x for condition y and MUST NOT do x for conditions other than y=
", or
b) "MUST do x and nothing else for condition y, and nothing is specified fo=
r conditions other than y".
Proposal: Replace the paragraph with:
   As with a Diameter endpoint taking on reporting node behavior, a
   Diameter Agent MUST NOT include the OC-Supported-Features AVP in
   answer messages for transactions where the request message received
   by the Diameter Agent had no OC-Supported-Features AVP.

Section 4.1.3, last paragraph:
Existing text:
   When making changes to the OC-Supported-Features AVP the Diameter
   Agent needs to ensure that there is no ambiguity in DOIC behavior for
   both upstream and downstream DOIC nodes.
Comment: while that is true, in addition problems similar to those identifi=
ed in the note in section 3.3 may result from making changes.
Proposal: Add the note:
      Note: Known issues exist if multiple sources for overload reports
      which apply to the same Diameter entity exist.  Reacting nodes
      have no way of determining the source and, as such, will treat
      them as coming from a single source.  Variance in sequence numbers
      between the two sources can then cause incorrect overload
      abatement treatment to be applied for indeterminate periods of
      time.

Section 4.2.1.1, 3rd paragraph:
Existing text:
   A realm-type OCS entry is identified by the pair of application-d and
   realm.
Comment: a letter "i" is missing.
Proposal: replace the paragraph with:
   A realm-type OCS entry is identified by the pair of application-id and
   realm.

Section 4.2.1.3, 3rd paragraph:
Existing text:
   When receiving an answer message with multiple OLRs or different
   types, a reporting node MUST process each received OLR.
Comment: The "or" is probably meant to be an "of". Furthermore, OLRs with u=
nsupported report types are not required to be processed.
Proposal: replace the paragraph with:
   When receiving an answer message with multiple OLRs of different
   supported report types, a reporting node MUST process each received OLR.

Section 4.2.1.3, 4th paragraph:
Existing text:
   When receiving an OC-OLR AVPs with unknown values, a reacting node
   SHOULD be silently discarded by reacting nodes and the event SHOULD
   be logged.
Comment: text is confusing. Maybe the intention was to say:
   When receiving an OC-OLR AVPs with an unsupported report type value, a r=
eacting node
   SHOULD silently discarded the OC-OLR AVP and the event SHOULD
   be logged.
But even that is not correct.
Proposal: Remove the paragraph.

Section 4.2.2, 5th and 6th paragraph:
Existing text:
   If the request is a host-routed request then the reacting node SHOULD
   apply throttling abatement treatment to the request.
=20
   If the request is a realm-routed request then the reacting node
   SHOULD apply diversion abatement treatment to the request.
Comment: I don't think so. If the reacting node selects the server and then=
 detects that the selected server is overloaded and then detects that the r=
equest does not survive (i.e. is subject to abatement), then the reacting n=
ode SHOULD apply diversion treatment (i.e. select an alternative server if =
possible). If the reacting node does not select the server (either a. becau=
se the server was already selected by a downstream node, or b. because the =
server will be selected by an upstream node) then there is no point in appl=
ying diversion and the reacting node SHOULD apply throttling of requests th=
at do not survive.
Proposal: replace the paragraphs with:
   If the reacting node does not select the server then it SHOULD apply
   throttling abatement to the request.

   If the reacting node selects the server then it SHOULD apply diversion
   abatement treatment (i.e. select an alternative server if possible) to
   the request.

Section 4.2.2, last paragraph:
Existing text:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires or has a
   validity duration of zero ("0"), meaning that the reporting node has
   explicitly signaled the end of the overload condition then overload
   abatement associated with the overload abatement MUST be ended in a
   controlled fashion.
Comment: If no traffic is sent, no OLR will be received, hence you cannot c=
ome out of a 100% throttling by explicit indication.
Proposal: replace the paragraph with:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires then overload
   abatement associated with the overload abatement MUST be ended in a
   controlled fashion.

Section 4.3, 3rd paragraph:
Existing text:
   The extension MAY define new AVPs for use in DOIC Capability
   Announcement and for use in DOIC Overload reporting.  These new AVPs
   SHOULD be defined to be extensions to the OC-Supported-Features and
   OC-OLR AVPs defined in this document.
Comment: It is not necessary for a new AVP to be an extension to both the O=
C-Supported-Features AVP and the OC-OLR AVP.
Proposal: Replace the paragraph with:
   The extension MAY define new AVPs for use in DOIC Capability
   Announcement and for use in DOIC Overload reporting.  These new AVPs
   SHOULD be defined to be extensions to the OC-Supported-Features and/or
   OC-OLR AVPs defined in this document.

Section 5.1, 9th paragraph:
Existing text:
   4.  The reacting node determines if overload abatement treatment
       should be applied to the request.  One approach that could be
       taken for each request is to select a random number between 1 and
       100.  If the random number is less than the indicated reduction
       percentage then the request is given abatement treatment,
       otherwise the request is given normal routing treatment.
Comment:The maths is wrong.
Proposal: Replace the paragraph with:
   4.  The reacting node determines if overload abatement treatment
       should be applied to the request.  One approach that could be
       taken for each request is to select a random number between 1 and
       100.  If the random number is less than or equal to the indicated
       reduction percentage then the request is given abatement treatment,
       otherwise the request is given normal routing treatment.

Section 5.3, 4th paragraph:
Existing text:
   When applying overload abatement treatment for the load abatement
   algorithm, the reacting node MUST abate the requested percentage of
   requests that would have otherwise been sent to the reporting host or
   realm.
Comment: probably a typo.
Proposal: Replace the paragraph with:
   When applying overload abatement treatment for the loss abatement
   algorithm, the reacting node MUST abate the requested percentage of
   requests that would have otherwise been sent to the reporting host or
   realm.

Section 5.3, 6th paragraph:
Existing text:
   If the reacting node does not receive an OLR in messages sent to the
   formerly overloaded node then the reacting node SHOULD slowly
   increase the rate of traffic sent to the overloaded node.
Comment: confusing.
Proposal: Replace paragraph with:
   If the reacting node does not receive an OLR in response to messages
   sent to the formerly overloaded node then the reacting node SHOULD
   slowly increase the rate of traffic sent to the overloaded node.

Section 6.1, last paragraph:
Existing text:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.
Comment: Absence of OC-Feature-Vector AVP indicates different things depend=
ing on the type of message (request / answer).
Proposal: Replace the paragraph with:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP in request
   messages indicates that only the default traffic abatement algorithm
   described in this specification is supported. The absence of the OC-
   Feature-Vector AVP in answer messages indicates that the default
   traffic abatement algorithm described in this specification is selected
   (while other traffic abatement algorithms may be supported), and no
   features other than abatement algorithms are supported.

Section 6.2, 2nd paragraph:
Existing text:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.
Comment: seems to be misplaced as reference is given to 6.2.
Proposal: remove the paragraph.

Section 6.3, 1st paragraph:
Existing text:
   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the
   information necessary to convey an overload report on an overload
   condition at the reporting node.  The OC-OLR AVP does not explicitly
   contain all information needed by the reacting node to decide whether
   a subsequent request must undergo abatement using the received
   reduction percentage.  The value of the OC-Report-Type AVP within the
   OC-OLR AVP indicates which implicit information is relevant for this
   decision (see Section 6.6).  The application the OC-OLR AVP applies
   to is the same as the Application-Id found in the Diameter message
   header.  The host or realm the OC-OLR AVP concerns is determined from
   the Origin-Host AVP and/or Origin-Realm AVP found in the
   encapsulating Diameter command.  The OC-OLR AVP is intended to be
   sent only by a reporting node.
Comment: Reduction percentage may not be used by all future algorithms.
Proposal: Replace the paragraph with:
   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the
   information necessary to convey an overload report on an overload
   condition at the reporting node.  The OC-OLR AVP does not explicitly
   contain all information needed by the reacting node to decide whether
   a subsequent request must undergo abatement using the selected
   abatement algorithm.  The value of the OC-Report-Type AVP within the
   OC-OLR AVP indicates which implicit information is relevant for this
   decision (see Section 6.6).  The application the OC-OLR AVP applies
   to is the same as the Application-Id found in the Diameter message
   header.  The host or realm the OC-OLR AVP concerns is determined from
   the Origin-Host AVP and/or Origin-Realm AVP found in the
   encapsulating Diameter command.  The OC-OLR AVP is intended to be
   sent only by a reporting node.

Section 6.8, last character
Proposal: remove the "."

Section 8.2, last paragraph:
Existing text:
   See Section 6.2 for the initial assignment in the registry.  New
   types can be added using the Specification Required policy [RFC5226].
Comment: wrong reference.
Proposal: Replace the paragraph with:
   See Section 6.6 for the initial assignment in the registry.  New
   types can be added using the Specification Required policy [RFC5226].




-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Jouni Korhonen
Sent: Wednesday, December 03, 2014 11:32 PM
To: dime@ietf.org
Subject: [Dime] WLGC #1 for draft-ietf-dime-ovli-05

Folks,

We have had a considerable update on the DOIC draft based on the=20
comments from the interim meeting, Honolulu meeting and discussions held=20
lately on the mailinglist. Authors/chairs think the -05 draft is now=20
ready for a WGLC and the rest of the potential comments can be handled=20
as WGLC comments.

This email starts a two week WGLC #1 for draft-ietf-dime-ovli-05. The=20
WGLC ends 18th Dec 2014 EOB (CET+1). Post your review comments and=20
concerns to the mailinglist. Also make use of the issue tracker=20
(remember to select "severity" as "in WG last call").

Lionel & Jouni

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec  8 05:31:02 2014
Return-Path: <trac+dime@trac.tools.ietf.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 508B41A8A6B for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 05:30:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GMNe30Bk8GFS for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 05:30:52 -0800 (PST)
Received: from zinfandel.tools.ietf.org (zinfandel.tools.ietf.org [IPv6:2001:1890:123a::1:2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 671941A8A6C for <dime@ietf.org>; Mon,  8 Dec 2014 05:30:52 -0800 (PST)
Received: from localhost ([::1]:37090 helo=zinfandel.tools.ietf.org) by zinfandel.tools.ietf.org with esmtp (Exim 4.82_1-5b7a7c0-XX) (envelope-from <trac+dime@trac.tools.ietf.org>) id 1XxyOq-0006C4-0h; Mon, 08 Dec 2014 05:30:52 -0800
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "dime issue tracker" <trac+dime@trac.tools.ietf.org>
X-Trac-Version: 0.12.3
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.3, by Edgewall Software
To: jouni.nospam@gmail.com
X-Trac-Project: dime
Date: Mon, 08 Dec 2014 13:30:51 -0000
X-URL: http://tools.ietf.org/wg/dime/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/dime/trac/ticket/88
Message-ID: <064.69cb533e2dbb732d0731c1452d36605e@trac.tools.ietf.org>
X-Trac-Ticket-ID: 88
X-SA-Exim-Connect-IP: ::1
X-SA-Exim-Rcpt-To: jouni.nospam@gmail.com, dime@ietf.org
X-SA-Exim-Mail-From: trac+dime@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on zinfandel.tools.ietf.org); SAEximRunCond expanded to false
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/aW5iF23R1JPNlutspMMyAuMPdH4
Cc: dime@ietf.org
Subject: [Dime] [dime] #88 (draft-ietf-dime-ovli): Editorials
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: dime@ietf.org
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 13:30:58 -0000

#88: Editorials

 In Section 7:

 OLD:
    condition SHOULD send a DIAMETER-TOO-BUSY error response, if it can

 NEW:
    condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can

-- 
------------------------------------+------------------------------------
 Reporter:  jouni.nospam@gmail.com  |      Owner:  jouni.nospam@gmail.com
     Type:  defect                  |     Status:  new
 Priority:  trivial                 |  Milestone:
Component:  draft-ietf-dime-ovli    |    Version:
 Severity:  In WG Last Call         |   Keywords:
------------------------------------+------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/dime/trac/ticket/88>
dime <http://tools.ietf.org/wg/dime/>


From nobody Mon Dec  8 14:54:53 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8800C1A00B7 for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 14:54:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.801
X-Spam-Level: 
X-Spam-Status: No, score=0.801 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0bpwI3two-pS for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 14:54:50 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBEA51A00B2 for <dime@ietf.org>; Mon,  8 Dec 2014 14:54:49 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:61044 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xy7CZ-0006Dp-Kw for dime@ietf.org; Mon, 08 Dec 2014 14:54:48 -0800
Message-ID: <54862C38.1000403@usdonovans.com>
Date: Mon, 08 Dec 2014 16:54:48 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------070507070407050105040607"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/fRNVNaFFFxPYq1_WDe5hSdnfUIQ
Subject: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 22:54:51 -0000

This is a multi-part message in MIME format.
--------------070507070407050105040607
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

I'll deal with each of your suggestion in a separate email to help 
ensure that nothing is missed.

For your first suggestion:

Section 3, last paragraph:
Existing text:
    While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
    that are "adjacent" for DOIC purposes may not be adjacent from a
    Diameter, or transport, perspective.  For example, one or more
    Diameter agents that do not support DOIC may exist between a given
    pair of reporting and reacting nodes, as long as those agents pass
    unknown AVPs through unchanged.  The report types described in this
    document can safely pass through non-supporting agents.  This may not
    be true for report types defined in future specifications.

Comment: while this is all not wrong, the existing text may convey the erring
impression that there cannot be a DOIC supporting agent on the path between a
reporting node and an adjacent reacting node.

Proposal: It is proposed to add the following sentence at the end of the paragraph:
    Another example is where one or more Diameter agents that do support
    DOIC may exist between a given pair of reporting and reacting nodes,
    as long as those agents pass OC-specific AVPs through unchanged.

I don't agree with the suggested change, as the DOIC supporting agents 
might need to change the OC-specific AVPs.  I also don't understand how 
the paragraph implies that there cannot be DOIC supporting agents in the 
path of the request.  It is talking specifically about the case where 
there agents do not support DOIC are in the path.  The remainder of the 
document makes it clear that there can be agents that do support DOIC in 
the path of a transaction.

I don't see the need for a change here.

Regards,

Steve

--------------070507070407050105040607
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    I'll deal with each of your suggestion in a separate email to help
    ensure that nothing is missed.<br>
    <br>
    For your first suggestion:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 3, last paragraph:
Existing text:
   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
   that are "adjacent" for DOIC purposes may not be adjacent from a
   Diameter, or transport, perspective.  For example, one or more
   Diameter agents that do not support DOIC may exist between a given
   pair of reporting and reacting nodes, as long as those agents pass
   unknown AVPs through unchanged.  The report types described in this
   document can safely pass through non-supporting agents.  This may not
   be true for report types defined in future specifications.

Comment: while this is all not wrong, the existing text may convey the erring 
impression that there cannot be a DOIC supporting agent on the path between a 
reporting node and an adjacent reacting node. 

Proposal: It is proposed to add the following sentence at the end of the paragraph:
   Another example is where one or more Diameter agents that do support
   DOIC may exist between a given pair of reporting and reacting nodes,
   as long as those agents pass OC-specific AVPs through unchanged.</pre>
    I don't agree with the suggested change, as the DOIC supporting
    agents might need to change the OC-specific AVPs.&nbsp; I also don't
    understand how the paragraph implies that there cannot be DOIC
    supporting agents in the path of the request.&nbsp; It is talking
    specifically about the case where there agents do not support DOIC
    are in the path.&nbsp; The remainder of the document makes it clear that
    there can be agents that do support DOIC in the path of a
    transaction.<br>
    <br>
    I don't see the need for a change here.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------070507070407050105040607--


From nobody Mon Dec  8 14:58:32 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 334DC1A0089 for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 14:58:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ow-VgSrCKPgG for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 14:58:30 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 113AF1A0086 for <dime@ietf.org>; Mon,  8 Dec 2014 14:58:30 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:61048 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xy7G7-000Adi-Ti for dime@ietf.org; Mon, 08 Dec 2014 14:58:28 -0800
Message-ID: <54862D14.2060304@usdonovans.com>
Date: Mon, 08 Dec 2014 16:58:28 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------070302020700060104020106"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/kuuhtkgS7bHs2l6f2SM06h8WWxY
Subject: [Dime] Ulrich suggested change number 2
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 22:58:31 -0000

This is a multi-part message in MIME format.
--------------070302020700060104020106
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For the second suggested change:

Section 3.2, 6th paragraph:
Existing text:
    The OC-Feature-Vector AVP will contain an indication of support for
    the loss overload abatement algorithm defined in this specification
    (see Section 5).  This ensures that there is at least one commonly
    supported overload abatement algorithm between the reporting node and
    the reacting node(s) in the path of the request.

Comment: I agree that within a given path between client and server there may
be more than one reacting nodes. But a given reporting node on that path does
not have more than one adjacent reacting nodes on that given path to which it
sends OLRs. I don't say that the existing text is wrong, but it is misleading.
What we want to say here is that any given pair of adjacent reacting and reporting
nodes will have at least one commonly supported algorithm.

Proposal: It is proposed to replace the last line of the paragraph with:
    The adjacent reacting node on the path of the request.

It's more than just about the adjacent reaction nodes.  It is important 
that all reacting nodes in the path of the request have at least one 
common abatement algorithm.

I don't see the need for the suggested change.

Regards,

Steve

--------------070302020700060104020106
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For the second suggested change:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 3.2, 6th paragraph:
Existing text:
   The OC-Feature-Vector AVP will contain an indication of support for
   the loss overload abatement algorithm defined in this specification
   (see Section 5).  This ensures that there is at least one commonly
   supported overload abatement algorithm between the reporting node and
   the reacting node(s) in the path of the request.

Comment: I agree that within a given path between client and server there may 
be more than one reacting nodes. But a given reporting node on that path does 
not have more than one adjacent reacting nodes on that given path to which it 
sends OLRs. I don't say that the existing text is wrong, but it is misleading. 
What we want to say here is that any given pair of adjacent reacting and reporting 
nodes will have at least one commonly supported algorithm.

Proposal: It is proposed to replace the last line of the paragraph with:
   The adjacent reacting node on the path of the request.
</pre>
    It's more than just about the adjacent reaction nodes.&nbsp; It is
    important that all reacting nodes in the path of the request have at
    least one common abatement algorithm. <br>
    <br>
    I don't see the need for the suggested change.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------070302020700060104020106--


From nobody Mon Dec  8 15:07:06 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6FCB1A00E1 for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 15:07:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B4H_40G5uJ7D for <dime@ietfa.amsl.com>; Mon,  8 Dec 2014 15:07:04 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF7531A00C5 for <dime@ietf.org>; Mon,  8 Dec 2014 15:07:02 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:61054 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xy7ON-0008Rf-3p for dime@ietf.org; Mon, 08 Dec 2014 15:07:01 -0800
Message-ID: <54862F13.1060907@usdonovans.com>
Date: Mon, 08 Dec 2014 17:06:59 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------040806020804040607080001"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/GHVOwA_aqzRxZ5QzVz3xZPgPVhQ
Subject: [Dime] Ulrich suggested change number 3
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 23:07:06 -0000

This is a multi-part message in MIME format.
--------------040806020804040607080001
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For suggested change number 3:

Section 3.2, last two paragraphs:
Existing text:
    The DCA mechanism must also allow the scenario where the set of
    features supported by the sender of a request and by agents in the
    path of a request differ.  In this case, the agent updates the OC-
    Supported-Features AVP to reflect the mixture of the two sets of
    supported features.

       Note: The logic to determine the content of the modified  OC-
       Supported-Features AVP is out-of-scope for this specification and
       is left to implementation decisions.  Care must be taken not to
       introduce interoperability issues for downstream or upstream DOIC
       nodes.

Comment: It is perfectly ok (in this case) for the agent not to update and not to modify.

Proposal: It is proposed to replace the two paragraphs with the following:
    The DCA mechanism must also allow the scenario where the set of
    features supported by the sender of a request and by agents in the
    path of a request differ.  In this case, the agent can update the OC-
    Supported-Features AVP to reflect the mixture of the two sets of
    supported features.

       Note: The logic to determine whether and if how to modify the
       content of the OC-Supported-Features AVP is out-of-scope for this
       specification and is left to implementation decisions.  Care must
       be taken not to introduce interoperability issues for downstream
       or upstream DOIC nodes.

I don't see the need for the change as the paragraph is talking 
specifically about the scenario where an agent would change the 
OC-Supported-Features AVP.   That said, the change in the first 
paragraph is ok.  If we make that change then I suggest a cleaned up 
first sentence of the next paragraph as follows:

"Note: The logic to determine if the content of the 
OC-Supported-Features AVP should be changed is out-of-scope for this 
document, as is the logic to determine the content of a modified 
OC-Supported-Features AVP.  These are left to implementation decisions..."

Regards,

Steve

--------------040806020804040607080001
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For suggested change number 3:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 3.2, last two paragraphs:
Existing text:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent updates the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine the content of the modified  OC-
      Supported-Features AVP is out-of-scope for this specification and
      is left to implementation decisions.  Care must be taken not to
      introduce interoperability issues for downstream or upstream DOIC
      nodes.

Comment: It is perfectly ok (in this case) for the agent not to update and not to modify. 

Proposal: It is proposed to replace the two paragraphs with the following:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent can update the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine whether and if how to modify the
      content of the OC-Supported-Features AVP is out-of-scope for this
      specification and is left to implementation decisions.  Care must
      be taken not to introduce interoperability issues for downstream
      or upstream DOIC nodes.</pre>
    I don't see the need for the change as the paragraph is talking
    specifically about the scenario where an agent would change the
    OC-Supported-Features AVP.&nbsp;&nbsp; That said, the change in the first
    paragraph is ok.&nbsp; If we make that change then I suggest a cleaned up
    first sentence of the next paragraph as follows:<br>
    <br>
    "Note: The logic to determine if the content of the&nbsp;
    OC-Supported-Features AVP should be changed is out-of-scope for this
    document, as is the logic to determine the content of a modified
    OC-Supported-Features AVP.&nbsp; These are left to implementation
    decisions..."<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------040806020804040607080001--


From nobody Tue Dec  9 04:48:48 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 658171A0363 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 04:48:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mB_NvzPO6rRQ for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 04:48:45 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC99E1A0211 for <dime@ietf.org>; Tue,  9 Dec 2014 04:48:45 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62865 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyKDa-0003r2-Qg for dime@ietf.org; Tue, 09 Dec 2014 04:48:45 -0800
Message-ID: <5486EFAA.7090902@usdonovans.com>
Date: Tue, 09 Dec 2014 06:48:42 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------020209080004070907020907"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/RAXnicgQnPR8ock_QoG_O52C0Ko
Subject: [Dime] Ulrich suggested change number 4
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 12:48:47 -0000

This is a multi-part message in MIME format.
--------------020209080004070907020907
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your fourth suggested change:

Section 3.3, 4th and 5th paragraph:
Existing text:
    A report of type "HOST_REPORT" is sent to indicate the overload of a
    specific Diameter node for the application-id indicated in the
    transaction.  When receiving an OLR of type host, a reacting node
    applies overload abatement to what is referred to in this document as
    host-routed requests.  The reacting node applies overload abatement
    on those host-routed requests which the reacting node knows will be
    served by the server that matches the Origin-Host AVP of the received
    message that contained the received OLR of type host.

    A report of type "REALM_REPORT" applies to realm-routed requests for
    a specific realm as indicated in the Destination-Realm AVP.
Comment: While the 4th paragraph is all fine, the 5th paragraph should be aligned.
Proposal: It is proposed to replace the 5th paragraph with:
    A report of type "REALM_REPORT" is sent to indicate the overload of all
    Diameter nodes within a realm for the application-id indicated in the
    transaction.  When receiving an OLR of type realm, a reacting node
    applies overload abatement to what is referred to in this document as
    realm-routed requests.  The reacting node applies overload abatement
    on those realm-routed requests which contain  a Destination-Realm AVP
    that matches the Origin-Realm AVP of the received message that
    contained the received OLR of type realm.

I support the suggested change.

Regards,

Steve



--------------020209080004070907020907
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your fourth suggested change:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 3.3, 4th and 5th paragraph:
Existing text:
   A report of type "HOST_REPORT" is sent to indicate the overload of a
   specific Diameter node for the application-id indicated in the
   transaction.  When receiving an OLR of type host, a reacting node
   applies overload abatement to what is referred to in this document as
   host-routed requests.  The reacting node applies overload abatement
   on those host-routed requests which the reacting node knows will be
   served by the server that matches the Origin-Host AVP of the received
   message that contained the received OLR of type host.

   A report of type "REALM_REPORT" applies to realm-routed requests for
   a specific realm as indicated in the Destination-Realm AVP.
Comment: While the 4th paragraph is all fine, the 5th paragraph should be aligned.
Proposal: It is proposed to replace the 5th paragraph with:
   A report of type "REALM_REPORT" is sent to indicate the overload of all
   Diameter nodes within a realm for the application-id indicated in the
   transaction.  When receiving an OLR of type realm, a reacting node
   applies overload abatement to what is referred to in this document as
   realm-routed requests.  The reacting node applies overload abatement
   on those realm-routed requests which contain  a Destination-Realm AVP
   that matches the Origin-Realm AVP of the received message that
   contained the received OLR of type realm.</pre>
    I support the suggested change.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
  </body>
</html>

--------------020209080004070907020907--


From nobody Tue Dec  9 04:52:28 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E4651A0451 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 04:52:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w4bCwsZs0VjB for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 04:52:15 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DCB11A0636 for <dime@ietf.org>; Tue,  9 Dec 2014 04:52:15 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62871 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyKH0-0007ha-44 for dime@ietf.org; Tue, 09 Dec 2014 04:52:14 -0800
Message-ID: <5486F07D.1010102@usdonovans.com>
Date: Tue, 09 Dec 2014 06:52:13 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------030709010306070201070705"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/OB5G9eLO5hfJsgKjMn0FhsG-_Oo
Subject: [Dime] Ulrich suggested change number 5
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 12:52:18 -0000

This is a multi-part message in MIME format.
--------------030709010306070201070705
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change number 5:

Section 3.3, 8th paragraph:
Existing text:
    Reporting nodes are responsible for determining the need for a
    reduction of traffic.  The method for making this determination is
    implementation specific and depend on the type of overload report
    being generated.  A host-report, for instance, will generally be
    generated by tracking utilization of resources required by the host
    to handle transactions for the Diameter application.  A realm-report
    generally impacts the traffic sent to multiple hosts and, as such,
    requires tracking the capacity all servers for realm-routed requests
    for the application and realm.
Comment: Something is wrong with the last sentence.
Proposal: Replace the last sentence with:
                                                          A realm-report
    generally impacts the traffic sent to multiple hosts and, as such,
    requires tracking the capacity of all servers able to handle realm-
    routed requests for the application and realm.


I support the change.

Regards,

Steve


--------------030709010306070201070705
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change number 5:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 3.3, 8th paragraph:
Existing text:
   Reporting nodes are responsible for determining the need for a
   reduction of traffic.  The method for making this determination is
   implementation specific and depend on the type of overload report
   being generated.  A host-report, for instance, will generally be
   generated by tracking utilization of resources required by the host
   to handle transactions for the Diameter application.  A realm-report
   generally impacts the traffic sent to multiple hosts and, as such,
   requires tracking the capacity all servers for realm-routed requests
   for the application and realm.
Comment: Something is wrong with the last sentence.
Proposal: Replace the last sentence with:
                                                         A realm-report
   generally impacts the traffic sent to multiple hosts and, as such,
   requires tracking the capacity of all servers able to handle realm-
   routed requests for the application and realm.</pre>
    <br>
    I support the change.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
  </body>
</html>

--------------030709010306070201070705--


From nobody Tue Dec  9 04:54:13 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7212B1A0397 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 04:54:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ggRtLu6V3muW for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 04:54:11 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C2A61A0395 for <dime@ietf.org>; Tue,  9 Dec 2014 04:54:11 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62877 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyKIs-0009fU-5d for dime@ietf.org; Tue, 09 Dec 2014 04:54:10 -0800
Message-ID: <5486F0F1.8000200@usdonovans.com>
Date: Tue, 09 Dec 2014 06:54:09 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------080400050602030707050104"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/_ifcDR-T0NfU4f43JXfzt7SeUro
Subject: [Dime] Ulrich's suggest change number 6
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 12:54:12 -0000

This is a multi-part message in MIME format.
--------------080400050602030707050104
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change #6:

Section 3.3, 12th paragraph:
Existing text:
    As the conditions that lead to the generation of the overload report
    change the reporting node can send new overload reports requesting
    greater reduction if the condition gets worse or less reduction if
    the condition improves.  The reporting node sends an overload report
    with a duration of zero to indicate that the overload condition has
    ended and need for use of the abatement algorithm to reduce traffic
    sent is no longer needed.
Comment: Bad style.
Proposal: Remove the words "need for" from the last sentence.

I support the suggested change.

Regards,

Steve



--------------080400050602030707050104
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change #6:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 3.3, 12th paragraph:
Existing text:
   As the conditions that lead to the generation of the overload report
   change the reporting node can send new overload reports requesting
   greater reduction if the condition gets worse or less reduction if
   the condition improves.  The reporting node sends an overload report
   with a duration of zero to indicate that the overload condition has
   ended and need for use of the abatement algorithm to reduce traffic
   sent is no longer needed.
Comment: Bad style.
Proposal: Remove the words "need for" from the last sentence.
</pre>
    I support the suggested change.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
  </body>
</html>

--------------080400050602030707050104--


From nobody Tue Dec  9 05:06:35 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD1D11A09CF for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:06:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k3IZG6wwpoMm for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:06:32 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A98ED1A03A3 for <dime@ietf.org>; Tue,  9 Dec 2014 05:06:32 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62897 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyKUp-000Bkh-Cu for dime@ietf.org; Tue, 09 Dec 2014 05:06:32 -0800
Message-ID: <5486F3D7.7040305@usdonovans.com>
Date: Tue, 09 Dec 2014 07:06:31 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------090808070703080209060508"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/c9JFbZoIrfMqhpU1Rwx4iT2fyns
Subject: [Dime] Ulrich's suggested change #7
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:06:34 -0000

This is a multi-part message in MIME format.
--------------090808070703080209060508
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change #7:

Section 4.1.2, 4th paragraph:
Existing text:
    A reporting node knows what overload control functionality is
    supported by the reacting node based on the content of the OC-
    Feature-Vector AVP in the request message.
Comment: The Feature-Vector AVP may be absent. In this case knowledge cannot be based on the content.
Proposal: Replace the paragraph with:
    A reporting node knows what overload control functionality is
    supported by the reacting node based on the content or absence of
    the OC-Feature-Vector AVP within the Supported-Features AVP in the
    request message.

I support the change with the modification of Supported-Features to 
OC-Supported-Features.

Regards,

Steve



--------------090808070703080209060508
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change #7:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.1.2, 4th paragraph:
Existing text:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content of the OC-
   Feature-Vector AVP in the request message.
Comment: The Feature-Vector AVP may be absent. In this case knowledge cannot be based on the content.
Proposal: Replace the paragraph with:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content or absence of
   the OC-Feature-Vector AVP within the Supported-Features AVP in the
   request message.
</pre>
    I support the change with the modification of Supported-Features to
    OC-Supported-Features.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
  </body>
</html>

--------------090808070703080209060508--


From nobody Tue Dec  9 05:14:10 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F30A21A1A74 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:14:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o5zgwS2qeuNC for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:14:07 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEA6E1A1A6B for <dime@ietf.org>; Tue,  9 Dec 2014 05:14:07 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62922 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyKcA-0008dH-CB for dime@ietf.org; Tue, 09 Dec 2014 05:14:07 -0800
Message-ID: <5486F59E.4000908@usdonovans.com>
Date: Tue, 09 Dec 2014 07:14:06 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------070205040900030009050307"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/55YKKnfyM2x4RqSW23bmA9yfXVc
Subject: [Dime] Ulrich's suggested change #8
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:14:09 -0000

This is a multi-part message in MIME format.
--------------070205040900030009050307
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change number 8:

Section 4.1.2, 8th paragraph:
Existing text:
    For an ongoing overload condition, a reporting node MUST NOT change
    the selected algorithm during the period of time that it is in an
    overload condition and, as a result, is sending OC-OLR AVPs in answer
    messages.

Comment: As a result of an ongoing overload condition the reporting node is
sending OC-OLR AVPs containing no validity duration or a validity duration
different from zero in answer messages.

Proposal: Replace the paragraph with:
    For an ongoing overload condition, a reporting node MUST NOT change
    the selected algorithm during the period of time that it is in an
    overload condition and, as a result, is sending OC-OLR AVPs
    containing no validity duration or a validity duration different
    from zero in answer messages.

I don't see the need for the change.  The selected algorithm should not 
change for all overload reports relating to an overload condition, 
including overload reports with a validity duration of zero.

Regards,

Steve

--------------070205040900030009050307
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change number 8:<br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.1.2, 8th paragraph:
Existing text:
   For an ongoing overload condition, a reporting node MUST NOT change
   the selected algorithm during the period of time that it is in an
   overload condition and, as a result, is sending OC-OLR AVPs in answer
   messages.

Comment: As a result of an ongoing overload condition the reporting node is 
sending OC-OLR AVPs containing no validity duration or a validity duration 
different from zero in answer messages.

Proposal: Replace the paragraph with:
   For an ongoing overload condition, a reporting node MUST NOT change
   the selected algorithm during the period of time that it is in an
   overload condition and, as a result, is sending OC-OLR AVPs
   containing no validity duration or a validity duration different
   from zero in answer messages.</pre>
    I don't see the need for the change.&nbsp; The selected algorithm should
    not change for all overload reports relating to an overload
    condition, including overload reports with a validity duration of
    zero.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------070205040900030009050307--


From nobody Tue Dec  9 05:16:45 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A27161A1A64 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:16:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ugnVeIqQPyL9 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:16:41 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 19E711A1A6B for <dime@ietf.org>; Tue,  9 Dec 2014 05:16:40 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9DGdvY015731 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 13:16:39 GMT
Received: from DEMUHTC003.nsn-intra.net ([10.159.42.34]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9DGccW013523 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 14:16:39 +0100
Received: from DEMUHTC007.nsn-intra.net (10.159.42.38) by DEMUHTC003.nsn-intra.net (10.159.42.34) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 14:16:38 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC007.nsn-intra.net ([10.159.42.38]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 14:16:38 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 1
Thread-Index: AQHQEzn9APTOpOEpnEOsWl042ZAFN5yHKxAQ
Date: Tue, 9 Dec 2014 13:16:38 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net>
References: <54862C38.1000403@usdonovans.com>
In-Reply-To: <54862C38.1000403@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 3667
X-purgate-ID: 151667::1418130999-0000658F-FB76D460/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5X_zzrjvRIujjhovRb2CsV5WUO4
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:16:43 -0000

Steve,

please see inline.

Ulrich

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Monday, December 08, 2014 11:55 PM
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 1

Ulrich,

I'll deal with each of your suggestion in a separate email to help ensure t=
hat nothing is missed.

For your first suggestion:
Section 3, last paragraph:
Existing text:
   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
   that are "adjacent" for DOIC purposes may not be adjacent from a
   Diameter, or transport, perspective.  For example, one or more
   Diameter agents that do not support DOIC may exist between a given
   pair of reporting and reacting nodes, as long as those agents pass
   unknown AVPs through unchanged.  The report types described in this
   document can safely pass through non-supporting agents.  This may not
   be true for report types defined in future specifications.

Comment: while this is all not wrong, the existing text may convey the erri=
ng=20
impression that there cannot be a DOIC supporting agent on the path between=
 a=20
reporting node and an adjacent reacting node.=20

Proposal: It is proposed to add the following sentence at the end of the pa=
ragraph:
   Another example is where one or more Diameter agents that do support
   DOIC may exist between a given pair of reporting and reacting nodes,
   as long as those agents pass OC-specific AVPs through unchanged.
I don't agree with the suggested change, as the DOIC supporting agents migh=
t need to change the OC-specific AVPs.
<Ulrich> I agree that in some cases DOIC supporting agents need to change t=
he OC-specific AVPs. However, there are also cases where DOIC supporting ag=
ents do not need to change OC-specific AVPs.</Ulrich>
=A0 I also don't understand how the paragraph implies that there cannot be =
DOIC supporting agents in the path of the request.
<Ulrich> It does not imply that. Rather it may convey the erring impression=
 that there cannot be a DOIC supporting agent on the path between a=20
reporting node and an adjacent reacting node.</Ulrich>
 =A0 It is talking specifically about the case where there agents do not su=
pport DOIC are in the path.
<Ulrich> No, my understanding is that the paragraph is talking specifically=
 about what "adjacent for DOIC purposes" means. One valid example is given =
(reporting node and reacting node are "adjacent for DOIC purposes" if one o=
r more agents that do not support DOIC but pass unsupported AVPs through un=
changed exist between reporting node and reacting node) and I do not propos=
e to remove that. However, there is another important valid example (report=
ing node and reacting node are "adjacent for DOIC purposes" if one or more =
DOIC supporting agents that pass OC-specific AVPs through unchanged exist b=
etween reporting node and reacting node), and the proposal is to add text t=
o cover this example. </Ulrich>
The remainder of the document makes it clear that there can be agents that =
do support DOIC in the path of a transaction.
<Ulrich> that is not my point. The point is to clearly state that there can=
 be DOIC supporting agents that pass through OC-specific AVPs unchanged on =
the path between reporting node and reacting node, and in this case the rep=
orting and reacting nodes are still regarded "adjacent for DOIC purposes".<=
/Ulrich> =20

I don't see the need for a change here.
<Ulrich> I'm not proposing a modification but an addition. This addition pr=
ovides useful clarification and in no way is harmful</Ulrich>

Regards,

Steve


From nobody Tue Dec  9 05:35:20 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C29041A1AF8 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:35:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 92ouZIMk4xqN for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:35:10 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CAB71A0266 for <dime@ietf.org>; Tue,  9 Dec 2014 05:35:10 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62949 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyKwV-0006Zp-JE for dime@ietf.org; Tue, 09 Dec 2014 05:35:09 -0800
Message-ID: <5486FA8B.6040503@usdonovans.com>
Date: Tue, 09 Dec 2014 07:35:07 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------030907020406050408020101"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/APf4vmTGrIhbr45r8UynSR761m4
Subject: [Dime] Ulrich's suggested changes #9 and #10
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:35:16 -0000

This is a multi-part message in MIME format.
--------------030907020406050408020101
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

Suggested changes 9 and 10 are linked so I'll deal with them in a single 
email:

Section 4.1.3, 1st paragraph:
Existing text:
    Diameter Agents that support DOIC SHOULD ensure that all messages
    relayed by the agent contain the OC-Supported-Features AVP.
Comment: The SHOULD in the first line is not correct based on my next comment.
Proposal: Delete the first paragraph.

Section 4.1.3, 4th paragraph:
Existing text:
    A Diameter Agent SHOULD take on reporting node behavior for Diameter
    endpoints that do not support the DOIC solution.  A Diameter Agent
    detects that a Diameter endpoint does not support DOIC reporting node
    behavior when there is no OC-Supported-Features AVP in an answer
    message for a transaction that contained the OC-Supported-Features
    AVP in the request message.
Comment: The first sentence can reasonably only apply to Diameter agents that are immediate peers to the non-supporting Diameter endpoint. We cannot expect a far-away-agent to take on reporting node behavior when all upstream agents and the server do not support DOIC. Furthermore: When the non-supporting server has two DOIC supporting immediate peer agents which both take on reporting node behavior we end up in problems similar to those identified in the note in section 3.3.
Proposal:Replace the paragaph with:
    A Diameter Agent that is an immediate peer to the Diameter endpoint
    that does not support DOIC SHOULD take on reporting node behavior for
    Diameter endpoints that do not support the DOIC solution.  A Diameter
    Agent detects that a Diameter endpoint does not support DOIC reporting
    node behavior when there is no OC-Supported-Features AVP in an answer
    message for a transaction that contained the OC-Supported-Features
    AVP in the request message.
       Note: Known issues exist if multiple sources for overload reports
       which apply to the same Diameter entity exist.  Reacting nodes
       have no way of determining the source and, as such, will treat
       them as coming from a single source.  Variance in sequence numbers
       between the two sources can then cause incorrect overload
       abatement treatment to be applied for indeterminate periods of
       time.

You point out an interesting issue with agents taking on reporting node 
functionality.

I don't, however, think that an agent that takes on reporting node 
functionality for a non supporting host needs to be adjacent to the 
host.  The important thing is that it has visibility to all of the 
traffic sent to the host.

I suggest keeping the first paragraph but changing the SHOULD to a MAY.

I also suggest changing the SHOULD to a MAY in the fourth paragraph and 
changing the first sentence to:

A Diameter Agent MAY take on reporting node behavior for Diameter 
endpoints that do not support the DOIC solution.  The Diameter Agent 
MUST have visibility to all traffic destined for the non supporting host 
in order to become the reporting node for the Diameter endpoint.

Regards,

Steve

--------------030907020406050408020101
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    Suggested changes 9 and 10 are linked so I'll deal with them in a
    single email:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.1.3, 1st paragraph:
Existing text:
   Diameter Agents that support DOIC SHOULD ensure that all messages
   relayed by the agent contain the OC-Supported-Features AVP.
Comment: The SHOULD in the first line is not correct based on my next comment.
Proposal: Delete the first paragraph. 

Section 4.1.3, 4th paragraph:
Existing text:
   A Diameter Agent SHOULD take on reporting node behavior for Diameter
   endpoints that do not support the DOIC solution.  A Diameter Agent
   detects that a Diameter endpoint does not support DOIC reporting node
   behavior when there is no OC-Supported-Features AVP in an answer
   message for a transaction that contained the OC-Supported-Features
   AVP in the request message.
Comment: The first sentence can reasonably only apply to Diameter agents that are immediate peers to the non-supporting Diameter endpoint. We cannot expect a far-away-agent to take on reporting node behavior when all upstream agents and the server do not support DOIC. Furthermore: When the non-supporting server has two DOIC supporting immediate peer agents which both take on reporting node behavior we end up in problems similar to those identified in the note in section 3.3.
Proposal:Replace the paragaph with:
   A Diameter Agent that is an immediate peer to the Diameter endpoint
   that does not support DOIC SHOULD take on reporting node behavior for
   Diameter endpoints that do not support the DOIC solution.  A Diameter
   Agent detects that a Diameter endpoint does not support DOIC reporting
   node behavior when there is no OC-Supported-Features AVP in an answer
   message for a transaction that contained the OC-Supported-Features
   AVP in the request message.
      Note: Known issues exist if multiple sources for overload reports
      which apply to the same Diameter entity exist.  Reacting nodes
      have no way of determining the source and, as such, will treat
      them as coming from a single source.  Variance in sequence numbers
      between the two sources can then cause incorrect overload
      abatement treatment to be applied for indeterminate periods of
      time.</pre>
    You point out an interesting issue with agents taking on reporting
    node functionality.<br>
    <br>
    I don't, however, think that an agent that takes on reporting node
    functionality for a non supporting host needs to be adjacent to the
    host.&nbsp; The important thing is that it has visibility to all of the
    traffic sent to the host.<br>
    <br>
    I suggest keeping the first paragraph but changing the SHOULD to a
    MAY.<br>
    <br>
    I also suggest changing the SHOULD to a MAY in the fourth paragraph
    and changing the first sentence to:<br>
    <br>
    A Diameter Agent MAY take on reporting node behavior for Diameter
    endpoints that do not support the DOIC solution.&nbsp; The Diameter Agent
    MUST have visibility to all traffic destined for the non supporting
    host in order to become the reporting node for the Diameter
    endpoint.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------030907020406050408020101--


From nobody Tue Dec  9 05:39:56 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14C421A1B05 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:39:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TD_ixzgv3bWR for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:39:54 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F93E1A1AF6 for <dime@ietf.org>; Tue,  9 Dec 2014 05:39:54 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62954 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyL16-000B8g-Go for dime@ietf.org; Tue, 09 Dec 2014 05:39:53 -0800
Message-ID: <5486FBA8.9020206@usdonovans.com>
Date: Tue, 09 Dec 2014 07:39:52 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------020608000006000909060109"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/K1cxATC3QdtkIvSvTdyYh4e8m5M
Subject: [Dime] Ulrich's suggested change #11
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:39:55 -0000

This is a multi-part message in MIME format.
--------------020608000006000909060109
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your  suggested change #11:

Section 4.1.3, 6th paragraph:
Existing text:
    As with a Diameter endpoint taking on reporting node behavior, a
    Diameter Agent MUST only include the OC-Supported-Features AVP in
    answer messages for transactions where the request message received
    by the Diameter Agent had an OC-Supported-Features AVP.
Comments: "MUST only do x for condition y" could mean:
a) "MUST do x for condition y and MUST NOT do x for conditions other than y", or
b) "MUST do x and nothing else for condition y, and nothing is specified for conditions other than y".
Proposal: Replace the paragraph with:
    As with a Diameter endpoint taking on reporting node behavior, a
    Diameter Agent MUST NOT include the OC-Supported-Features AVP in
    answer messages for transactions where the request message received
    by the Diameter Agent had no OC-Supported-Features AVP.

I support this change.

Regards,

Steve



--------------020608000006000909060109
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your&nbsp; suggested change #11:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.1.3, 6th paragraph:
Existing text:
   As with a Diameter endpoint taking on reporting node behavior, a
   Diameter Agent MUST only include the OC-Supported-Features AVP in
   answer messages for transactions where the request message received
   by the Diameter Agent had an OC-Supported-Features AVP.
Comments: "MUST only do x for condition y" could mean:
a) "MUST do x for condition y and MUST NOT do x for conditions other than y", or
b) "MUST do x and nothing else for condition y, and nothing is specified for conditions other than y".
Proposal: Replace the paragraph with:
   As with a Diameter endpoint taking on reporting node behavior, a
   Diameter Agent MUST NOT include the OC-Supported-Features AVP in
   answer messages for transactions where the request message received
   by the Diameter Agent had no OC-Supported-Features AVP.</pre>
    I support this change.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
  </body>
</html>

--------------020608000006000909060109--


From nobody Tue Dec  9 05:44:36 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12D8C1A1ADF for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:44:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrXH-iEkfBR5 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:44:34 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 502A01A1AEA for <dime@ietf.org>; Tue,  9 Dec 2014 05:44:33 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62960 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyL5b-0003OH-Qv for dime@ietf.org; Tue, 09 Dec 2014 05:44:32 -0800
Message-ID: <5486FCBF.4000707@usdonovans.com>
Date: Tue, 09 Dec 2014 07:44:31 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------010909040804010507060209"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/dOi9GT3tbwI6qtizQg5-Gz0inTw
Subject: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:44:36 -0000

This is a multi-part message in MIME format.
--------------010909040804010507060209
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change #12:

Section 4.1.3, last paragraph:
Existing text:
    When making changes to the OC-Supported-Features AVP the Diameter
    Agent needs to ensure that there is no ambiguity in DOIC behavior for
    both upstream and downstream DOIC nodes.

Comment: while that is true, in addition problems similar to those
identified in the note in section 3.3 may result from making changes.

Proposal: Add the note:
       Note: Known issues exist if multiple sources for overload reports
       which apply to the same Diameter entity exist.  Reacting nodes
       have no way of determining the source and, as such, will treat
       them as coming from a single source.  Variance in sequence numbers
       between the two sources can then cause incorrect overload
       abatement treatment to be applied for indeterminate periods of
       time.

I don't understand how these are related.  The change to the 
OC-Supported-Features AVP made by the agent apply only to the 
transaction.  In addition, this paragraph doesn't mention overload reports.

Regards,

Steve



--------------010909040804010507060209
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change #12:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.1.3, last paragraph:
Existing text:
   When making changes to the OC-Supported-Features AVP the Diameter
   Agent needs to ensure that there is no ambiguity in DOIC behavior for
   both upstream and downstream DOIC nodes.

Comment: while that is true, in addition problems similar to those 
identified in the note in section 3.3 may result from making changes.

Proposal: Add the note:
      Note: Known issues exist if multiple sources for overload reports
      which apply to the same Diameter entity exist.  Reacting nodes
      have no way of determining the source and, as such, will treat
      them as coming from a single source.  Variance in sequence numbers
      between the two sources can then cause incorrect overload
      abatement treatment to be applied for indeterminate periods of
      time.</pre>
    I don't understand how these are related.&nbsp; The change to the
    OC-Supported-Features AVP made by the agent apply only to the
    transaction.&nbsp; In addition, this paragraph doesn't mention overload
    reports.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
  </body>
</html>

--------------010909040804010507060209--


From nobody Tue Dec  9 05:46:15 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BBE21A0368 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:46:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.899
X-Spam-Level: 
X-Spam-Status: No, score=-3.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_LETTER=-2, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iZPm-lB_Aq-s for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:46:13 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F0B21A1B21 for <dime@ietf.org>; Tue,  9 Dec 2014 05:46:13 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62962 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyL7B-0005CV-Nz for dime@ietf.org; Tue, 09 Dec 2014 05:46:12 -0800
Message-ID: <5486FD21.8010201@usdonovans.com>
Date: Tue, 09 Dec 2014 07:46:09 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------050104070605050105060608"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/90wM7LwNhaX564Y820zTNW1az1Q
Subject: [Dime] Ulrich's suggested change #13
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:46:14 -0000

This is a multi-part message in MIME format.
--------------050104070605050105060608
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For you suggested change #13:

Section 4.2.1.1, 3rd paragraph:
Existing text:
    A realm-type OCS entry is identified by the pair of application-d and
    realm.
Comment: a letter "i" is missing.
Proposal: replace the paragraph with:
    A realm-type OCS entry is identified by the pair of application-id and
    realm.

I support the suggested change.

Steve


--------------050104070605050105060608
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For you suggested change #13:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.2.1.1, 3rd paragraph:
Existing text:
   A realm-type OCS entry is identified by the pair of application-d and
   realm.
Comment: a letter "i" is missing.
Proposal: replace the paragraph with:
   A realm-type OCS entry is identified by the pair of application-id and
   realm.</pre>
    I support the suggested change.<br>
    <br>
    Steve<br>
    <br>
  </body>
</html>

--------------050104070605050105060608--


From nobody Tue Dec  9 05:49:06 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CED0D1A1B2A for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:49:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BDhTfqWkV6v9 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:49:04 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B54401A1ADF for <dime@ietf.org>; Tue,  9 Dec 2014 05:49:04 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62970 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyL9z-00086b-F2 for dime@ietf.org; Tue, 09 Dec 2014 05:49:04 -0800
Message-ID: <5486FDCE.2010707@usdonovans.com>
Date: Tue, 09 Dec 2014 07:49:02 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------010902070805070003070905"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/OMOUjVO43t-pC75bDw5mZh2WMP0
Subject: [Dime] Ulrich's suggested change #14
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:49:06 -0000

This is a multi-part message in MIME format.
--------------010902070805070003070905
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For you suggested change number 14:

Section 4.2.1.3, 3rd paragraph:
Existing text:
    When receiving an answer message with multiple OLRs or different
    types, a reporting node MUST process each received OLR.
Comment: The "or" is probably meant to be an "of". Furthermore, OLRs with unsupported report types are not required to be processed.
Proposal: replace the paragraph with:
    When receiving an answer message with multiple OLRs of different
    supported report types, a reporting node MUST process each received OLR.


I supported the suggested change.

Regards,

Steve


--------------010902070805070003070905
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For you suggested change number 14:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.2.1.3, 3rd paragraph:
Existing text:
   When receiving an answer message with multiple OLRs or different
   types, a reporting node MUST process each received OLR.
Comment: The "or" is probably meant to be an "of". Furthermore, OLRs with unsupported report types are not required to be processed.
Proposal: replace the paragraph with:
   When receiving an answer message with multiple OLRs of different
   supported report types, a reporting node MUST process each received OLR.</pre>
    <br>
    I supported the suggested change.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
  </body>
</html>

--------------010902070805070003070905--


From nobody Tue Dec  9 05:51:50 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 610001A1A7A for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:51:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id niwN4s13gqZl for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 05:51:48 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 527761A1B0D for <dime@ietf.org>; Tue,  9 Dec 2014 05:51:48 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62973 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyLCb-000AwQ-OL for dime@ietf.org; Tue, 09 Dec 2014 05:51:47 -0800
Message-ID: <5486FE71.70205@usdonovans.com>
Date: Tue, 09 Dec 2014 07:51:45 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------080708070700090403080504"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5PJcC1O70CQh2-n51uY8qwuTYMo
Subject: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 13:51:49 -0000

This is a multi-part message in MIME format.
--------------080708070700090403080504
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change #15:

Section 4.2.1.3, 4th paragraph:
Existing text:
    When receiving an OC-OLR AVPs with unknown values, a reacting node
    SHOULD be silently discarded by reacting nodes and the event SHOULD
    be logged.
Comment: text is confusing. Maybe the intention was to say:
    When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
    SHOULD silently discarded the OC-OLR AVP and the event SHOULD
    be logged.
But even that is not correct.
Proposal: Remove the paragraph.

The intent was that an OC-OLR that contains unknown values should be 
discarded.  I agree that the wording needs to be changes as you 
suggested.  I don't agree with removing the paragraph.  Can you 
elaborate on why you think it is not correct when changed as you suggested?

Regards,

Steve


--------------080708070700090403080504
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change #15:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.2.1.3, 4th paragraph:
Existing text:
   When receiving an OC-OLR AVPs with unknown values, a reacting node
   SHOULD be silently discarded by reacting nodes and the event SHOULD
   be logged.
Comment: text is confusing. Maybe the intention was to say:
   When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
   SHOULD silently discarded the OC-OLR AVP and the event SHOULD
   be logged.
But even that is not correct.
Proposal: Remove the paragraph.
</pre>
    The intent was that an OC-OLR that contains unknown values should be
    discarded.&nbsp; I agree that the wording needs to be changes as you
    suggested.&nbsp; I don't agree with removing the paragraph.&nbsp; Can you
    elaborate on why you think it is not correct when changed as you
    suggested?<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
    <br>
  </body>
</html>

--------------080708070700090403080504--


From nobody Tue Dec  9 06:06:31 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B64F01A1EF9 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:06:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MgvrNKOWSXzH for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:06:27 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 035871A1BC9 for <dime@ietf.org>; Tue,  9 Dec 2014 06:06:26 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63035 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyLQn-0001zY-Bz for dime@ietf.org; Tue, 09 Dec 2014 06:06:26 -0800
Message-ID: <548701E1.3060502@usdonovans.com>
Date: Tue, 09 Dec 2014 08:06:25 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------020405090100040603030603"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/O7t2PQTT7G15jijb6tA7WvawKgY
Subject: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:06:30 -0000

This is a multi-part message in MIME format.
--------------020405090100040603030603
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change #16:

Section 4.2.2, 5th and 6th paragraph:
Existing text:
    If the request is a host-routed request then the reacting node SHOULD
    apply throttling abatement treatment to the request.
  
    If the request is a realm-routed request then the reacting node
    SHOULD apply diversion abatement treatment to the request.

Comment: I don't think so. If the reacting node selects the server and
then detects that the selected server is overloaded and then detects that
the request does not survive (i.e. is subject to abatement), then the reacting
node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
If the reacting node does not select the server (either a. because the server was
already selected by a downstream node, or b. because the server will be selected
by an upstream node) then there is no point in applying diversion and the reacting
node SHOULD apply throttling of requests that do not survive.

Proposal: replace the paragraphs with:
    If the reacting node does not select the server then it SHOULD apply
    throttling abatement to the request.

    If the reacting node selects the server then it SHOULD apply diversion
    abatement treatment (i.e. select an alternative server if possible) to
    the request.

Diversion is not selecting an alternative node to handle the request.  
Diversion is selecting an alternative route to the selected node.

Whether it is appropriate to select an alternative node for a request is 
an application decision that probably changes on a per command-code 
basis within the application.  Logic like this is outside the scope of 
the DOIC specification.

The text is correct based on the definition of diversion.

Regards,

Steve

--------------020405090100040603030603
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change #16:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.2.2, 5th and 6th paragraph:
Existing text:
   If the request is a host-routed request then the reacting node SHOULD
   apply throttling abatement treatment to the request.
 
   If the request is a realm-routed request then the reacting node
   SHOULD apply diversion abatement treatment to the request.

Comment: I don't think so. If the reacting node selects the server and 
then detects that the selected server is overloaded and then detects that 
the request does not survive (i.e. is subject to abatement), then the reacting 
node SHOULD apply diversion treatment (i.e. select an alternative server if possible). 
If the reacting node does not select the server (either a. because the server was 
already selected by a downstream node, or b. because the server will be selected 
by an upstream node) then there is no point in applying diversion and the reacting 
node SHOULD apply throttling of requests that do not survive.

Proposal: replace the paragraphs with:
   If the reacting node does not select the server then it SHOULD apply
   throttling abatement to the request.

   If the reacting node selects the server then it SHOULD apply diversion
   abatement treatment (i.e. select an alternative server if possible) to
   the request.</pre>
    Diversion is not selecting an alternative node to handle the
    request.&nbsp; Diversion is selecting an alternative route to the
    selected node.&nbsp; <br>
    <br>
    Whether it is appropriate to select an alternative node for a
    request is an application decision that probably changes on a per
    command-code basis within the application.&nbsp; Logic like this is
    outside the scope of the DOIC specification.<br>
    <br>
    The text is correct based on the definition of diversion.<br>
    <br>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------020405090100040603030603--


From nobody Tue Dec  9 06:09:07 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F6751A6F53 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:09:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5_UlkhofjTUh for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:09:00 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4022E1A6F20 for <dime@ietf.org>; Tue,  9 Dec 2014 06:08:27 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9E8P2S025703 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 14:08:25 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9E8OPE008122 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 15:08:24 +0100
Received: from DEMUHTC006.nsn-intra.net (10.159.42.37) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 15:08:24 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC006.nsn-intra.net ([10.159.42.37]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 15:08:24 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 2
Thread-Index: AQHQEzp/NeYxnYFinESbfvW92bFjMJyHQOig
Date: Tue, 9 Dec 2014 14:08:23 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235122@DEMUMBX014.nsn-intra.net>
References: <54862D14.2060304@usdonovans.com>
In-Reply-To: <54862D14.2060304@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 2459
X-purgate-ID: 151667::1418134105-0000658F-3EB90BE6/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5HKQRYRVoy1kcSzeWXSz0GB3qr0
Subject: Re: [Dime] Ulrich suggested change number 2
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:09:06 -0000

Steve,

please see inline.

Ulrich

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Monday, December 08, 2014 11:58 PM
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 2

Ulrich,

For the second suggested change:
Section 3.2, 6th paragraph:
Existing text:
   The OC-Feature-Vector AVP will contain an indication of support for
   the loss overload abatement algorithm defined in this specification
   (see Section 5).  This ensures that there is at least one commonly
   supported overload abatement algorithm between the reporting node and
   the reacting node(s) in the path of the request.

Comment: I agree that within a given path between client and server there m=
ay=20
be more than one reacting nodes. But a given reporting node on that path do=
es=20
not have more than one adjacent reacting nodes on that given path to which =
it=20
sends OLRs. I don't say that the existing text is wrong, but it is misleadi=
ng.=20
What we want to say here is that any given pair of adjacent reacting and re=
porting=20
nodes will have at least one commonly supported algorithm.

Proposal: It is proposed to replace the last line of the paragraph with:
   The adjacent reacting node on the path of the request.
It's more than just about the adjacent reaction nodes.=A0 It is important t=
hat all reacting nodes in the path of the request have at least one common =
abatement algorithm.=20
<Ulrich>I do not agree. It is important that a pair of two adjacent reactin=
g and reporting nodes (A,S) have at least one commonly supported algorithm,=
 so that the reporting node can always select an algorithm supported by the=
 adjacent reacting node. There may be another (non-adjacent) reacting node =
in the path (C), but its not important for C and S (which are not adjacent)=
 to have a commonly supported algorithm.
C---A---S
It is important that C and A have a commonly supported algorith, as C and A=
 are adjacent;
It is important that A and S have a commonly supported algorith, as A and S=
 are adjacent;
It is true but not important (and nothing that needs to be ensured) that C =
and S have a commonly supported algorithm (indeed S could eventually select=
 an algorithm not supported by C);</Ulrich>
It is true but not important that C, A and S have a commonly supported algo=
rithm.

I don't see the need for the suggested change.

Regards,

Steve


From nobody Tue Dec  9 06:10:21 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA7F91A6F9F for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:10:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RqlPTIzlIV1k for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:10:06 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2B561A6F39 for <dime@ietf.org>; Tue,  9 Dec 2014 06:09:57 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63037 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyLUC-000689-D9 for dime@ietf.org; Tue, 09 Dec 2014 06:09:57 -0800
Message-ID: <548702B4.3070806@usdonovans.com>
Date: Tue, 09 Dec 2014 08:09:56 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------020709060508090601020609"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/hQlaN2UUbhJGD5DgQasZhH_wABg
Subject: [Dime] Ulrich's suggested change #17
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:10:12 -0000

This is a multi-part message in MIME format.
--------------020709060508090601020609
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your suggested change #17:

Section 4.2.2, last paragraph:
Existing text:
    In the case that the OCS entry indicated no traffic was to be sent to
    the overloaded entity and the validity duration expires or has a
    validity duration of zero ("0"), meaning that the reporting node has
    explicitly signaled the end of the overload condition then overload
    abatement associated with the overload abatement MUST be ended in a
    controlled fashion.
Comment: If no traffic is sent, no OLR will be received, hence you cannot come out of a 100% throttling by explicit indication.
Proposal: replace the paragraph with:
    In the case that the OCS entry indicated no traffic was to be sent to
    the overloaded entity and the validity duration expires then overload
    abatement associated with the overload abatement MUST be ended in a
    controlled fashion.

I agree with the change with one additional modification - change the 
last abatement to report to make it:

    In the case that the OCS entry indicated no traffic was to be sent to
    the overloaded entity and the validity duration expires then overload
    abatement associated with the overload report MUST be ended in a
    controlled fashion.

Regards,

Steve





--------------020709060508090601020609
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your suggested change #17:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.2.2, last paragraph:
Existing text:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires or has a
   validity duration of zero ("0"), meaning that the reporting node has
   explicitly signaled the end of the overload condition then overload
   abatement associated with the overload abatement MUST be ended in a
   controlled fashion.
Comment: If no traffic is sent, no OLR will be received, hence you cannot come out of a 100% throttling by explicit indication.
Proposal: replace the paragraph with:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires then overload
   abatement associated with the overload abatement MUST be ended in a
   controlled fashion.
</pre>
    I agree with the change with one additional modification - change
    the last abatement to report to make it:<br>
    <br>
    <pre>   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires then overload
   abatement associated with the overload report MUST be ended in a
   controlled fashion.</pre>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <br>
    <br>
    <br>
  </body>
</html>

--------------020709060508090601020609--


From nobody Tue Dec  9 06:20:00 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E960A1A6FA3 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:19:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cH6amf3rcQ8w for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:19:58 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72E7B1A6F99 for <dime@ietf.org>; Tue,  9 Dec 2014 06:19:58 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63044 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyLds-0005Pj-Tq for dime@ietf.org; Tue, 09 Dec 2014 06:19:57 -0800
Message-ID: <5487050C.8080206@usdonovans.com>
Date: Tue, 09 Dec 2014 08:19:56 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------090602090608070107090008"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ApZX6FCgmzVihL4oU4JXLJR4AW0
Subject: [Dime] Ulrich suggested changes 18, 19, 20 and 21
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:20:00 -0000

This is a multi-part message in MIME format.
--------------090602090608070107090008
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

I support the suggested changes in your suggested changes 18, 19, 20 and 21:

Section 4.3, 3rd paragraph:
Existing text:
    The extension MAY define new AVPs for use in DOIC Capability
    Announcement and for use in DOIC Overload reporting.  These new AVPs
    SHOULD be defined to be extensions to the OC-Supported-Features and
    OC-OLR AVPs defined in this document.
Comment: It is not necessary for a new AVP to be an extension to both the OC-Supported-Features AVP and the OC-OLR AVP.
Proposal: Replace the paragraph with:
    The extension MAY define new AVPs for use in DOIC Capability
    Announcement and for use in DOIC Overload reporting.  These new AVPs
    SHOULD be defined to be extensions to the OC-Supported-Features and/or
    OC-OLR AVPs defined in this document.

Section 5.1, 9th paragraph:
Existing text:
    4.  The reacting node determines if overload abatement treatment
        should be applied to the request.  One approach that could be
        taken for each request is to select a random number between 1 and
        100.  If the random number is less than the indicated reduction
        percentage then the request is given abatement treatment,
        otherwise the request is given normal routing treatment.
Comment:The maths is wrong.
Proposal: Replace the paragraph with:
    4.  The reacting node determines if overload abatement treatment
        should be applied to the request.  One approach that could be
        taken for each request is to select a random number between 1 and
        100.  If the random number is less than or equal to the indicated
        reduction percentage then the request is given abatement treatment,
        otherwise the request is given normal routing treatment.

Section 5.3, 4th paragraph:
Existing text:
    When applying overload abatement treatment for the load abatement
    algorithm, the reacting node MUST abate the requested percentage of
    requests that would have otherwise been sent to the reporting host or
    realm.
Comment: probably a typo.
Proposal: Replace the paragraph with:
    When applying overload abatement treatment for the loss abatement
    algorithm, the reacting node MUST abate the requested percentage of
    requests that would have otherwise been sent to the reporting host or
    realm.

Section 5.3, 6th paragraph:
Existing text:
    If the reacting node does not receive an OLR in messages sent to the
    formerly overloaded node then the reacting node SHOULD slowly
    increase the rate of traffic sent to the overloaded node.
Comment: confusing.
Proposal: Replace paragraph with:
    If the reacting node does not receive an OLR in response to messages
    sent to the formerly overloaded node then the reacting node SHOULD
    slowly increase the rate of traffic sent to the overloaded node.



--------------090602090608070107090008
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    I support the suggested changes in your suggested changes 18, 19, 20
    and 21:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 4.3, 3rd paragraph:
Existing text:
   The extension MAY define new AVPs for use in DOIC Capability
   Announcement and for use in DOIC Overload reporting.  These new AVPs
   SHOULD be defined to be extensions to the OC-Supported-Features and
   OC-OLR AVPs defined in this document.
Comment: It is not necessary for a new AVP to be an extension to both the OC-Supported-Features AVP and the OC-OLR AVP.
Proposal: Replace the paragraph with:
   The extension MAY define new AVPs for use in DOIC Capability
   Announcement and for use in DOIC Overload reporting.  These new AVPs
   SHOULD be defined to be extensions to the OC-Supported-Features and/or
   OC-OLR AVPs defined in this document.

Section 5.1, 9th paragraph:
Existing text:
   4.  The reacting node determines if overload abatement treatment
       should be applied to the request.  One approach that could be
       taken for each request is to select a random number between 1 and
       100.  If the random number is less than the indicated reduction
       percentage then the request is given abatement treatment,
       otherwise the request is given normal routing treatment.
Comment:The maths is wrong.
Proposal: Replace the paragraph with:
   4.  The reacting node determines if overload abatement treatment
       should be applied to the request.  One approach that could be
       taken for each request is to select a random number between 1 and
       100.  If the random number is less than or equal to the indicated
       reduction percentage then the request is given abatement treatment,
       otherwise the request is given normal routing treatment.

Section 5.3, 4th paragraph:
Existing text:
   When applying overload abatement treatment for the load abatement
   algorithm, the reacting node MUST abate the requested percentage of
   requests that would have otherwise been sent to the reporting host or
   realm.
Comment: probably a typo.
Proposal: Replace the paragraph with:
   When applying overload abatement treatment for the loss abatement
   algorithm, the reacting node MUST abate the requested percentage of
   requests that would have otherwise been sent to the reporting host or
   realm.

Section 5.3, 6th paragraph:
Existing text:
   If the reacting node does not receive an OLR in messages sent to the
   formerly overloaded node then the reacting node SHOULD slowly
   increase the rate of traffic sent to the overloaded node.
Comment: confusing.
Proposal: Replace paragraph with:
   If the reacting node does not receive an OLR in response to messages
   sent to the formerly overloaded node then the reacting node SHOULD
   slowly increase the rate of traffic sent to the overloaded node.</pre>
    <br>
  </body>
</html>

--------------090602090608070107090008--


From nobody Tue Dec  9 06:23:33 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D0A61A1BAA for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:23:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EKF1Mz7-OLMK for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:23:30 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE2031A1AEA for <dime@ietf.org>; Tue,  9 Dec 2014 06:23:29 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63051 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyLhH-00097d-NB for dime@ietf.org; Tue, 09 Dec 2014 06:23:29 -0800
Message-ID: <548705DF.40102@usdonovans.com>
Date: Tue, 09 Dec 2014 08:23:27 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------050700040907000904020803"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/nr4jse4msGd6o6mWQg0kAokXmzw
Subject: [Dime] Ulrich's suggested changes 22 and 23
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:23:31 -0000

This is a multi-part message in MIME format.
--------------050700040907000904020803
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

For your changes 22 and 23:

Section 6.1, last paragraph:
Existing text:
    The OC-Feature-Vector sub-AVP is used to announce the DOIC features
    supported by the DOIC node, in the form of a flag-bits field in which
    each bit announces one feature or capability supported by the node
    (see Section 6.2).  The absence of the OC-Feature-Vector AVP
    indicates that only the default traffic abatement algorithm described
    in this specification is supported.
Comment: Absence of OC-Feature-Vector AVP indicates different things depending on the type of message (request / answer).
Proposal: Replace the paragraph with:
    The OC-Feature-Vector sub-AVP is used to announce the DOIC features
    supported by the DOIC node, in the form of a flag-bits field in which
    each bit announces one feature or capability supported by the node
    (see Section 6.2).  The absence of the OC-Feature-Vector AVP in request
    messages indicates that only the default traffic abatement algorithm
    described in this specification is supported. The absence of the OC-
    Feature-Vector AVP in answer messages indicates that the default
    traffic abatement algorithm described in this specification is selected
    (while other traffic abatement algorithms may be supported), and no
    features other than abatement algorithms are supported.

Section 6.2, 2nd paragraph:
Existing text:
    The OC-Feature-Vector sub-AVP is used to announce the DOIC features
    supported by the DOIC node, in the form of a flag-bits field in which
    each bit announces one feature or capability supported by the node
    (see Section 6.2).  The absence of the OC-Feature-Vector AVP
    indicates that only the default traffic abatement algorithm described
    in this specification is supported.
Comment: seems to be misplaced as reference is given to 6.2.
Proposal: remove the paragraph.



I support the wording change in #22 but suggest it be moved to section 
6.2, with the reference removed.  As a result, the paragraph should be 
removed from section 6.1 and changed in section 6.2 to the following 
(removing the reference):

    The OC-Feature-Vector sub-AVP is used to announce the DOIC features
    supported by the DOIC node, in the form of a flag-bits field in which
    each bit announces one feature or capability supported by the node.
    The absence of the OC-Feature-Vector AVP in request
    messages indicates that only the default traffic abatement algorithm
    described in this specification is supported. The absence of the OC-
    Feature-Vector AVP in answer messages indicates that the default
    traffic abatement algorithm described in this specification is selected
    (while other traffic abatement algorithms may be supported), and no
    features other than abatement algorithms are supported.

Regards,

Steve

--------------050700040907000904020803
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    For your changes 22 and 23:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 6.1, last paragraph:
Existing text:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.
Comment: Absence of OC-Feature-Vector AVP indicates different things depending on the type of message (request / answer).
Proposal: Replace the paragraph with:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP in request
   messages indicates that only the default traffic abatement algorithm
   described in this specification is supported. The absence of the OC-
   Feature-Vector AVP in answer messages indicates that the default
   traffic abatement algorithm described in this specification is selected
   (while other traffic abatement algorithms may be supported), and no
   features other than abatement algorithms are supported.

Section 6.2, 2nd paragraph:
Existing text:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.
Comment: seems to be misplaced as reference is given to 6.2.
Proposal: remove the paragraph.</pre>
    <br>
    <br>
    I support the wording change in #22 but suggest it be moved to
    section 6.2, with the reference removed.&nbsp; As a result, the paragraph
    should be removed from section 6.1 and changed in section 6.2 to the
    following (removing the reference):<br>
    <br>
    <pre>   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node.
   The absence of the OC-Feature-Vector AVP in request
   messages indicates that only the default traffic abatement algorithm
   described in this specification is supported. The absence of the OC-
   Feature-Vector AVP in answer messages indicates that the default
   traffic abatement algorithm described in this specification is selected
   (while other traffic abatement algorithms may be supported), and no
   features other than abatement algorithms are supported.
</pre>
    Regards,<br>
    <br>
    Steve<br>
  </body>
</html>

--------------050700040907000904020803--


From nobody Tue Dec  9 06:27:03 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A1901A037E for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:27:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GXD4dW6IE1wm for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:27:00 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A92A81A0451 for <dime@ietf.org>; Tue,  9 Dec 2014 06:27:00 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63056 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyLkg-0000dd-IC for dime@ietf.org; Tue, 09 Dec 2014 06:27:00 -0800
Message-ID: <548706B2.70706@usdonovans.com>
Date: Tue, 09 Dec 2014 08:26:58 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/alternative; boundary="------------080808020601050004090109"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/2chlmt8sxFuvNdMMkcW83j0ve9k
Subject: [Dime] Ulrich's suggested changes 24, 25 and 26
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:27:02 -0000

This is a multi-part message in MIME format.
--------------080808020601050004090109
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

I support your suggested changes 24, 25 and 26:

Section 6.3, 1st paragraph:
Existing text:
    The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the
    information necessary to convey an overload report on an overload
    condition at the reporting node.  The OC-OLR AVP does not explicitly
    contain all information needed by the reacting node to decide whether
    a subsequent request must undergo abatement using the received
    reduction percentage.  The value of the OC-Report-Type AVP within the
    OC-OLR AVP indicates which implicit information is relevant for this
    decision (see Section 6.6).  The application the OC-OLR AVP applies
    to is the same as the Application-Id found in the Diameter message
    header.  The host or realm the OC-OLR AVP concerns is determined from
    the Origin-Host AVP and/or Origin-Realm AVP found in the
    encapsulating Diameter command.  The OC-OLR AVP is intended to be
    sent only by a reporting node.
Comment: Reduction percentage may not be used by all future algorithms.
Proposal: Replace the paragraph with:
    The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the
    information necessary to convey an overload report on an overload
    condition at the reporting node.  The OC-OLR AVP does not explicitly
    contain all information needed by the reacting node to decide whether
    a subsequent request must undergo abatement using the selected
    abatement algorithm.  The value of the OC-Report-Type AVP within the
    OC-OLR AVP indicates which implicit information is relevant for this
    decision (see Section 6.6).  The application the OC-OLR AVP applies
    to is the same as the Application-Id found in the Diameter message
    header.  The host or realm the OC-OLR AVP concerns is determined from
    the Origin-Host AVP and/or Origin-Realm AVP found in the
    encapsulating Diameter command.  The OC-OLR AVP is intended to be
    sent only by a reporting node.

Section 6.8, last character
Proposal: remove the "."

Section 8.2, last paragraph:
Existing text:
    See Section 6.2 for the initial assignment in the registry.  New
    types can be added using the Specification Required policy [RFC5226].
Comment: wrong reference.
Proposal: Replace the paragraph with:
    See Section 6.6 for the initial assignment in the registry.  New
    types can be added using the Specification Required policy [RFC5226].



--------------080808020601050004090109
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    I support your suggested changes 24, 25 and 26:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>Section 6.3, 1st paragraph:
Existing text:
   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the
   information necessary to convey an overload report on an overload
   condition at the reporting node.  The OC-OLR AVP does not explicitly
   contain all information needed by the reacting node to decide whether
   a subsequent request must undergo abatement using the received
   reduction percentage.  The value of the OC-Report-Type AVP within the
   OC-OLR AVP indicates which implicit information is relevant for this
   decision (see Section 6.6).  The application the OC-OLR AVP applies
   to is the same as the Application-Id found in the Diameter message
   header.  The host or realm the OC-OLR AVP concerns is determined from
   the Origin-Host AVP and/or Origin-Realm AVP found in the
   encapsulating Diameter command.  The OC-OLR AVP is intended to be
   sent only by a reporting node.
Comment: Reduction percentage may not be used by all future algorithms.
Proposal: Replace the paragraph with:
   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the
   information necessary to convey an overload report on an overload
   condition at the reporting node.  The OC-OLR AVP does not explicitly
   contain all information needed by the reacting node to decide whether
   a subsequent request must undergo abatement using the selected
   abatement algorithm.  The value of the OC-Report-Type AVP within the
   OC-OLR AVP indicates which implicit information is relevant for this
   decision (see Section 6.6).  The application the OC-OLR AVP applies
   to is the same as the Application-Id found in the Diameter message
   header.  The host or realm the OC-OLR AVP concerns is determined from
   the Origin-Host AVP and/or Origin-Realm AVP found in the
   encapsulating Diameter command.  The OC-OLR AVP is intended to be
   sent only by a reporting node.

Section 6.8, last character
Proposal: remove the "."

Section 8.2, last paragraph:
Existing text:
   See Section 6.2 for the initial assignment in the registry.  New
   types can be added using the Specification Required policy [RFC5226].
Comment: wrong reference.
Proposal: Replace the paragraph with:
   See Section 6.6 for the initial assignment in the registry.  New
   types can be added using the Specification Required policy [RFC5226].</pre>
    <br>
  </body>
</html>

--------------080808020601050004090109--


From nobody Tue Dec  9 06:30:52 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B17C21A1B36 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:30:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1ZgiUF-mhuox for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:30:49 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 460DD1A1BC4 for <dime@ietf.org>; Tue,  9 Dec 2014 06:30:49 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9EUlVQ010506 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 14:30:47 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9EUkLk015287 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 15:30:47 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC004.nsn-intra.net ([10.159.42.35]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 15:30:46 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 3
Thread-Index: AQHQEzuyHw34kXDxv0iSafX1rpswJ5yHTSnA
Date: Tue, 9 Dec 2014 14:30:46 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235158@DEMUMBX014.nsn-intra.net>
References: <54862F13.1060907@usdonovans.com>
In-Reply-To: <54862F13.1060907@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 2826
X-purgate-ID: 151667::1418135447-0000677A-4B476211/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5SgqxjkwRL82YoialzTGJoj8HX4
Subject: Re: [Dime] Ulrich suggested change number 3
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:30:51 -0000

Steve,

please see inline.

Ulrich


From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 12:07 AM
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 3

Ulrich,

For suggested change number 3:
Section 3.2, last two paragraphs:
Existing text:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent updates the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine the content of the modified  OC-
      Supported-Features AVP is out-of-scope for this specification and
      is left to implementation decisions.  Care must be taken not to
      introduce interoperability issues for downstream or upstream DOIC
      nodes.

Comment: It is perfectly ok (in this case) for the agent not to update and =
not to modify.=20

Proposal: It is proposed to replace the two paragraphs with the following:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent can update the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine whether and if how to modify the
      content of the OC-Supported-Features AVP is out-of-scope for this
      specification and is left to implementation decisions.  Care must
      be taken not to introduce interoperability issues for downstream
      or upstream DOIC nodes.
I don't see the need for the change as the paragraph is talking specificall=
y about the scenario where an agent would change the OC-Supported-Features =
AVP.
<Ulrich> I do not agree. The paragraph is talking specifically about the ca=
se where the set of features supported by the sender of a request and by ag=
ents in the path of a request differ. In this case it is certainly true tha=
t the agent can update (modify, change) the OC-Supported-Features AVP. It i=
s, however, also true that in this case the agent can choose not to update.=
</Ulrich>=20
That said, the change in the first paragraph is ok.
<Ulrich> thank you </Ulrich>
If we make that change then I suggest a cleaned up first sentence of the ne=
xt paragraph as follows:

"Note: The logic to determine if the content of the=A0 OC-Supported-Feature=
s AVP should be changed is out-of-scope for this document, as is the logic =
to determine the content of a modified OC-Supported-Features AVP.=A0 These =
are left to implementation decisions..."
<Ulrich> The clean up is fine</Ulrich>

Regards,

Steve


From nobody Tue Dec  9 06:35:44 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0C621A7008 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:35:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Cow8RhZJlyB for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 06:35:41 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48D1F1A7003 for <dime@ietf.org>; Tue,  9 Dec 2014 06:35:41 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9EZdJ4001109 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 14:35:39 GMT
Received: from DEMUHTC002.nsn-intra.net ([10.159.42.33]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9EZccW003302 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 15:35:38 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC002.nsn-intra.net ([10.159.42.33]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 15:35:37 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #7
Thread-Index: AQHQE7D4su+J0E8dP06NBQiCcm0fbpyHUrVg
Date: Tue, 9 Dec 2014 14:35:37 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235171@DEMUMBX014.nsn-intra.net>
References: <5486F3D7.7040305@usdonovans.com>
In-Reply-To: <5486F3D7.7040305@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1019
X-purgate-ID: 151667::1418135739-0000658F-5916AE59/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/73o8yrE11EvzUkhTok0wLqGfco4
Subject: Re: [Dime] Ulrich's suggested change #7
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 14:35:43 -0000

Steve,

please see inline.

Ulrich


From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:07 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #7

Ulrich,

For your suggested change #7:
Section 4.1.2, 4th paragraph:
Existing text:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content of the OC-
   Feature-Vector AVP in the request message.
Comment: The Feature-Vector AVP may be absent. In this case knowledge canno=
t be based on the content.
Proposal: Replace the paragraph with:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content or absence of
   the OC-Feature-Vector AVP within the Supported-Features AVP in the
   request message.
I support the change with the modification of Supported-Features to OC-Supp=
orted-Features.
<Ulrich> fine with me</Ulrich>

Regards,

Steve


From nobody Tue Dec  9 07:30:53 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 418731A8733 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 07:30:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mQAgLex-lJkk for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 07:30:40 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D79B91A1C00 for <dime@ietf.org>; Tue,  9 Dec 2014 07:30:39 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9FUc9q009491 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 15:30:38 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9FUZUn018635 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 16:30:38 +0100
Received: from DEMUHTC011.nsn-intra.net (10.159.42.42) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 16:30:35 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC011.nsn-intra.net ([10.159.42.42]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 16:30:35 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #8
Thread-Index: AQHQE7IIHC1/0vM3HEqfMpUtT/PrYZyHWeWw
Date: Tue, 9 Dec 2014 15:30:35 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235197@DEMUMBX014.nsn-intra.net>
References: <5486F59E.4000908@usdonovans.com>
In-Reply-To: <5486F59E.4000908@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1947
X-purgate-ID: 151667::1418139038-0000658F-0A4E8594/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/vgjGfYpgxtv0eOAACfOduno5ZSQ
Subject: Re: [Dime] Ulrich's suggested change #8
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 15:30:43 -0000

Steve,

please see inline.

Ulrich


From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:14 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #8

Ulrich,

For your suggested change number 8:
Section 4.1.2, 8th paragraph:
Existing text:
   For an ongoing overload condition, a reporting node MUST NOT change
   the selected algorithm during the period of time that it is in an
   overload condition and, as a result, is sending OC-OLR AVPs in answer
   messages.

Comment: As a result of an ongoing overload condition the reporting node is=
=20
sending OC-OLR AVPs containing no validity duration or a validity duration=
=20
different from zero in answer messages.

Proposal: Replace the paragraph with:
   For an ongoing overload condition, a reporting node MUST NOT change
   the selected algorithm during the period of time that it is in an
   overload condition and, as a result, is sending OC-OLR AVPs
   containing no validity duration or a validity duration different
   from zero in answer messages.
I don't see the need for the change.=A0 The selected algorithm should not c=
hange for all overload reports relating to an overload condition, including=
 overload reports with a validity duration of zero.
<Ulrich> Isn't it so that when the overload condition ends (i.e. is no long=
er ongoing), the reporting node starts sending OLRs with validity duration =
of zero (for a long enough period of time)? (see end of section 4.2.1.4)=20
The question now is whether the change of algorithm is allowed during this =
(long enough) period, or only after that period. I don't have a strong view=
. But this was not my point.
My point is that the current text seems to suggest that an overload conditi=
on is ongoing as long as OC-OLR AVPs are sent in answer messages, and I thi=
nk that is not true. </Ulrich>

Regards,

Steve


From nobody Tue Dec  9 07:39:44 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B46DD1A19FE for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 07:39:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HOv7YxGO385E for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 07:39:36 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAA361A03B3 for <dime@ietf.org>; Tue,  9 Dec 2014 07:39:35 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9FdX3p031436 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 15:39:33 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9FdXEF019101 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 16:39:33 +0100
Received: from DEMUHTC005.nsn-intra.net (10.159.42.36) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 16:39:33 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC005.nsn-intra.net ([10.159.42.36]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 16:39:33 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested changes #9 and #10
Thread-Index: AQHQE7T7vuqzLdFcQkSln68uxDBIDZyHZFxQ
Date: Tue, 9 Dec 2014 15:39:32 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152351AC@DEMUMBX014.nsn-intra.net>
References: <5486FA8B.6040503@usdonovans.com>
In-Reply-To: <5486FA8B.6040503@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 3355
X-purgate-ID: 151667::1418139573-0000658F-383F6AEB/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/dYBkLtVi-dLDwwlrymLS3LC9I2g
Subject: Re: [Dime] Ulrich's suggested changes #9 and #10
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 15:39:43 -0000

Steve,
I agree with your suggestions.

Ulrich


From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:35 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested changes #9 and #10

Ulrich,

Suggested changes 9 and 10 are linked so I'll deal with them in a single em=
ail:
Section 4.1.3, 1st paragraph:
Existing text:
   Diameter Agents that support DOIC SHOULD ensure that all messages
   relayed by the agent contain the OC-Supported-Features AVP.
Comment: The SHOULD in the first line is not correct based on my next comme=
nt.
Proposal: Delete the first paragraph.=20

Section 4.1.3, 4th paragraph:
Existing text:
   A Diameter Agent SHOULD take on reporting node behavior for Diameter
   endpoints that do not support the DOIC solution.  A Diameter Agent
   detects that a Diameter endpoint does not support DOIC reporting node
   behavior when there is no OC-Supported-Features AVP in an answer
   message for a transaction that contained the OC-Supported-Features
   AVP in the request message.
Comment: The first sentence can reasonably only apply to Diameter agents th=
at are immediate peers to the non-supporting Diameter endpoint. We cannot e=
xpect a far-away-agent to take on reporting node behavior when all upstream=
 agents and the server do not support DOIC. Furthermore: When the non-suppo=
rting server has two DOIC supporting immediate peer agents which both take =
on reporting node behavior we end up in problems similar to those identifie=
d in the note in section 3.3.
Proposal:Replace the paragaph with:
   A Diameter Agent that is an immediate peer to the Diameter endpoint
   that does not support DOIC SHOULD take on reporting node behavior for
   Diameter endpoints that do not support the DOIC solution.  A Diameter
   Agent detects that a Diameter endpoint does not support DOIC reporting
   node behavior when there is no OC-Supported-Features AVP in an answer
   message for a transaction that contained the OC-Supported-Features
   AVP in the request message.
      Note: Known issues exist if multiple sources for overload reports
      which apply to the same Diameter entity exist.  Reacting nodes
      have no way of determining the source and, as such, will treat
      them as coming from a single source.  Variance in sequence numbers
      between the two sources can then cause incorrect overload
      abatement treatment to be applied for indeterminate periods of
      time.
You point out an interesting issue with agents taking on reporting node fun=
ctionality.

I don't, however, think that an agent that takes on reporting node function=
ality for a non supporting host needs to be adjacent to the host.=A0 The im=
portant thing is that it has visibility to all of the traffic sent to the h=
ost.

I suggest keeping the first paragraph but changing the SHOULD to a MAY.

I also suggest changing the SHOULD to a MAY in the fourth paragraph and cha=
nging the first sentence to:

A Diameter Agent MAY take on reporting node behavior for Diameter endpoints=
 that do not support the DOIC solution.=A0 The Diameter Agent MUST have vis=
ibility to all traffic destined for the non supporting host in order to bec=
ome the reporting node for the Diameter endpoint.

Regards,

Steve


From nobody Tue Dec  9 08:47:06 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A6561A8960 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 08:47:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k21cENLdtbW6 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 08:47:00 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFF561A888F for <dime@ietf.org>; Tue,  9 Dec 2014 08:46:59 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9Gkv0G005352 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 16:46:57 GMT
Received: from DEMUHTC002.nsn-intra.net ([10.159.42.33]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9GktFn004376 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 17:46:57 +0100
Received: from DEMUHTC009.nsn-intra.net (10.159.42.40) by DEMUHTC002.nsn-intra.net (10.159.42.33) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 17:46:55 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC009.nsn-intra.net ([10.159.42.40]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 17:46:54 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change @12
Thread-Index: AQHQE7ZHD23zRsD0mUyK0fJgC7jhrJyHbHpA
Date: Tue, 9 Dec 2014 16:46:54 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net>
References: <5486FCBF.4000707@usdonovans.com>
In-Reply-To: <5486FCBF.4000707@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: multipart/alternative; boundary="_000_5BCBA1FC2B7F0B4C9D935572D9000668152351D9DEMUMBX014nsnin_"
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 9653
X-purgate-ID: 151667::1418143617-0000677A-32D29B6A/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/cpWHBFSEU0jnxlUTjiLqgG4oCII
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 16:47:03 -0000

--_000_5BCBA1FC2B7F0B4C9D935572D9000668152351D9DEMUMBX014nsnin_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Steve,

I agree, my comment and proposal do not hit the mark.



The intention was to say that known issues exist if there are multiple agen=
ts on multiple paths between client and server. The agents may not be able =
to ensure that there is no ambiguity in DOIC behaviour for the client. E.g.=
 from the client's point of view the answer to a first request (which was m=
odified by agent A1) could indicate: DOIC is supported, currenty no overloa=
d, once in overload loss will be selected; and the answer to the next reque=
st (which was modified by agent A2) could indicate: DOIC is supported, some=
?? reduction is requested using rate. The client, however, may not be prepa=
red for rate.



Maybe a warning note could be added to say that the agent may not always be=
 able to ensure that there is no ambiguity.



Ulrich



From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:45 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change @12

Ulrich,

For your suggested change #12:

Section 4.1.3, last paragraph:

Existing text:

   When making changes to the OC-Supported-Features AVP the Diameter

   Agent needs to ensure that there is no ambiguity in DOIC behavior for

   both upstream and downstream DOIC nodes.



Comment: while that is true, in addition problems similar to those

identified in the note in section 3.3 may result from making changes.



Proposal: Add the note:

      Note: Known issues exist if multiple sources for overload reports

      which apply to the same Diameter entity exist.  Reacting nodes

      have no way of determining the source and, as such, will treat

      them as coming from a single source.  Variance in sequence numbers

      between the two sources can then cause incorrect overload

      abatement treatment to be applied for indeterminate periods of

      time.
I don't understand how these are related.  The change to the OC-Supported-F=
eatures AVP made by the agent apply only to the transaction.  In addition, =
this paragraph doesn't mention overload reports.

Regards,

Steve


--_000_5BCBA1FC2B7F0B4C9D935572D9000668152351D9DEMUMBX014nsnin_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"DE" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Steve,<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">I agree, my comment and prop=
osal do not hit the mark.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">The intention was to say tha=
t known issues exist if there are multiple agents on multiple paths between=
 client and server. The agents may not be able to ensure that there is no a=
mbiguity in DOIC behaviour for the client.
 E.g. from the client&#8217;s point of view the answer to a first request (=
which was modified by agent A1) could indicate: DOIC is supported, currenty=
 no overload, once in overload loss will be selected; and the answer to the=
 next request (which was modified by agent
 A2) could indicate: DOIC is supported, some?? reduction is requested using=
 rate. The client, however, may not be prepared for rate.<o:p></o:p></span>=
</p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Maybe a warning note could b=
e added to say that the agent may not always be able to ensure that there i=
s no ambiguity.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Ulrich<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-b=
ounces@ietf.org]
<b>On Behalf Of </b>ext Steve Donovan<br>
<b>Sent:</b> Tuesday, December 09, 2014 2:45 PM<br>
<b>To:</b> dime@ietf.org<br>
<b>Subject:</b> [Dime] Ulrich's suggested change @12<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Ulrich,<br>
<br>
For your suggested change #12:<o:p></o:p></p>
<pre>Section 4.1.3, last paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; When making changes to the OC-Supported-Features AVP the =
Diameter<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Agent needs to ensure that there is no ambiguity in DOIC =
behavior for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; both upstream and downstream DOIC nodes.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Comment: while that is true, in addition problems similar to those <o:=
p></o:p></pre>
<pre>identified in the note in section 3.3 may result from making changes.<=
o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Proposal: Add the note:<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note: Known issues exist if multiple so=
urces for overload reports<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; which apply to the same Diameter entity=
 exist.&nbsp; Reacting nodes<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have no way of determining the source a=
nd, as such, will treat<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; them as coming from a single source.&nb=
sp; Variance in sequence numbers<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; between the two sources can then cause =
incorrect overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; abatement treatment to be applied for i=
ndeterminate periods of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; time.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I don't understand ho=
w these are related.&nbsp; The change to the OC-Supported-Features AVP made=
 by the agent apply only to the transaction.&nbsp; In addition, this paragr=
aph doesn't mention overload reports.<br>
<br>
Regards,<br>
<br>
Steve<br>
<br>
<o:p></o:p></p>
</div>
</body>
</html>

--_000_5BCBA1FC2B7F0B4C9D935572D9000668152351D9DEMUMBX014nsnin_--


From nobody Tue Dec  9 09:04:59 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFE0B1A1A22 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:04:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Be2-iM5rrTZq for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:04:53 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF4A81A09CF for <dime@ietf.org>; Tue,  9 Dec 2014 09:04:52 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9H4plk007224 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 17:04:51 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9H4oI0013141 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 18:04:50 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC004.nsn-intra.net ([10.159.42.35]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 18:04:50 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWg
Date: Tue, 9 Dec 2014 17:04:50 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com>
In-Reply-To: <5486FE71.70205@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1396
X-purgate-ID: 151667::1418144691-0000677A-CE6A3457/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/zDHuuKc7aQQX5QQuF9mnkAytxGY
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 17:04:55 -0000

Hi Steve,

I think it was pointed out by Ben that we do not specify behaviour of a nod=
e for cases where it detects that another node is breaking the rule.
The rule is:
   A reporting node MUST NOT send overload reports of a type that has
   not been advertised as supported by the reacting node.
See section 4.2.3.

Regards
Ulrich

 =20

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:52 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #15

Ulrich,

For your suggested change #15:
Section 4.2.1.3, 4th paragraph:
Existing text:
   When receiving an OC-OLR AVPs with unknown values, a reacting node
   SHOULD be silently discarded by reacting nodes and the event SHOULD
   be logged.
Comment: text is confusing. Maybe the intention was to say:
   When receiving an OC-OLR AVPs with an unsupported report type value, a r=
eacting node
   SHOULD silently discarded the OC-OLR AVP and the event SHOULD
   be logged.
But even that is not correct.
Proposal: Remove the paragraph.
The intent was that an OC-OLR that contains unknown values should be discar=
ded.=A0 I agree that the wording needs to be changes as you suggested.=A0 I=
 don't agree with removing the paragraph.=A0 Can you elaborate on why you t=
hink it is not correct when changed as you suggested?

Regards,

Steve


From nobody Tue Dec  9 09:30:03 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0384F1A8986 for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:30:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ukvQHLF1spdO for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:29:56 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 802E71A88DD for <dime@ietf.org>; Tue,  9 Dec 2014 09:29:55 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9HTrdl018402 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 17:29:53 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9HTqKL032257 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 18:29:53 +0100
Received: from DEMUHTC012.nsn-intra.net (10.159.42.43) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 18:29:52 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC012.nsn-intra.net ([10.159.42.43]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 18:29:52 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #16
Thread-Index: AQHQE7lXyc+G3J0M1EW8kbPFxFEQNZyHfq1Q
Date: Tue, 9 Dec 2014 17:29:51 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net>
References: <548701E1.3060502@usdonovans.com>
In-Reply-To: <548701E1.3060502@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 2820
X-purgate-ID: 151667::1418146193-0000677A-08D434AC/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/kKye2MN6cF0ppqSSWZSChQapMFI
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 17:30:01 -0000

Steve,
yes, then, maybe, the definition of Diversion is not correct?
What are other people's views?

My assumption was:
If a host is overloaded, it does not help to direct traffic to that host vi=
a a different path.
If a realm is overloaded, it does not help to direct traffic to that realm =
via a different path.
If a host is overloaded, it helps to select an alternative (not overloaded)=
 host (if possible) and direct traffic to that host.
If a realm is overloaded, there never is an alternative (not overloaded) re=
alm to which traffic could be directed.

With the current definition of Diversion, Diversion is no appropriate means=
 to address host overload and is no appropriate means to address realm over=
load. It may be ok for agent overload only.

Regards
Ulrich

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 3:06 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #16

Ulrich,

For your suggested change #16:
Section 4.2.2, 5th and 6th paragraph:
Existing text:
   If the request is a host-routed request then the reacting node SHOULD
   apply throttling abatement treatment to the request.
=20
   If the request is a realm-routed request then the reacting node
   SHOULD apply diversion abatement treatment to the request.

Comment: I don't think so. If the reacting node selects the server and=20
then detects that the selected server is overloaded and then detects that=20
the request does not survive (i.e. is subject to abatement), then the react=
ing=20
node SHOULD apply diversion treatment (i.e. select an alternative server if=
 possible).=20
If the reacting node does not select the server (either a. because the serv=
er was=20
already selected by a downstream node, or b. because the server will be sel=
ected=20
by an upstream node) then there is no point in applying diversion and the r=
eacting=20
node SHOULD apply throttling of requests that do not survive.

Proposal: replace the paragraphs with:
   If the reacting node does not select the server then it SHOULD apply
   throttling abatement to the request.

   If the reacting node selects the server then it SHOULD apply diversion
   abatement treatment (i.e. select an alternative server if possible) to
   the request.
Diversion is not selecting an alternative node to handle the request.=A0 Di=
version is selecting an alternative route to the selected node.=A0=20

Whether it is appropriate to select an alternative node for a request is an=
 application decision that probably changes on a per command-code basis wit=
hin the application.=A0 Logic like this is outside the scope of the DOIC sp=
ecification.

The text is correct based on the definition of diversion.

Regards,

Steve


From nobody Tue Dec  9 09:32:22 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3819E1A899C for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:32:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 785wwLY8i_Rh for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:32:18 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FDED1A897E for <dime@ietf.org>; Tue,  9 Dec 2014 09:32:18 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9HWGnQ022632 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 17:32:16 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9HWGRZ003203 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 18:32:16 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC004.nsn-intra.net ([10.159.42.35]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 18:32:16 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #17
Thread-Index: AQHQE7nkAgYKgsAcYUGaff72Vzht6pyHhJEA
Date: Tue, 9 Dec 2014 17:32:16 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235248@DEMUMBX014.nsn-intra.net>
References: <548702B4.3070806@usdonovans.com>
In-Reply-To: <548702B4.3070806@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1483
X-purgate-ID: 151667::1418146336-0000677A-8928D061/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Qz87AT3m3AeiXWRYIhKOfzVA7eo
Subject: Re: [Dime] Ulrich's suggested change #17
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 17:32:20 -0000

Steve,

I agree.

Ulrich

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 3:10 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #17

Ulrich,

For your suggested change #17:
Section 4.2.2, last paragraph:
Existing text:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires or has a
   validity duration of zero ("0"), meaning that the reporting node has
   explicitly signaled the end of the overload condition then overload
   abatement associated with the overload abatement MUST be ended in a
   controlled fashion.
Comment: If no traffic is sent, no OLR will be received, hence you cannot c=
ome out of a 100% throttling by explicit indication.
Proposal: replace the paragraph with:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires then overload
   abatement associated with the overload abatement MUST be ended in a
   controlled fashion.
I agree with the change with one additional modification - change the last =
abatement to report to make it:
   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires then overload
   abatement associated with the overload report MUST be ended in a
   controlled fashion.
Regards,

Steve




From nobody Tue Dec  9 09:38:25 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77A4D1A8A3C for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:38:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9uJwLZOSYdmV for <dime@ietfa.amsl.com>; Tue,  9 Dec 2014 09:38:22 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B89821A8A0B for <dime@ietf.org>; Tue,  9 Dec 2014 09:38:21 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sB9HcKt4032397 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 9 Dec 2014 17:38:20 GMT
Received: from DEMUHTC003.nsn-intra.net ([10.159.42.34]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sB9HcJPV012030 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 9 Dec 2014 18:38:19 +0100
Received: from DEMUHTC009.nsn-intra.net (10.159.42.40) by DEMUHTC003.nsn-intra.net (10.159.42.34) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 9 Dec 2014 18:38:19 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC009.nsn-intra.net ([10.159.42.40]) with mapi id 14.03.0195.001; Tue, 9 Dec 2014 18:38:19 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested changes 22 and 23
Thread-Index: AQHQE7u4hKYu0ZpjaUmm3zWsLOmME5yHhjkg
Date: Tue, 9 Dec 2014 17:38:19 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D90006681523525E@DEMUMBX014.nsn-intra.net>
References: <548705DF.40102@usdonovans.com>
In-Reply-To: <548705DF.40102@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 3102
X-purgate-ID: 151667::1418146700-0000677A-15CEFDBF/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/IL4dtJZ3OikHrc4BoAB4VoJ9kOM
Subject: Re: [Dime] Ulrich's suggested changes 22 and 23
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Dec 2014 17:38:23 -0000

Steve,

I agree.

Regards
Ulrich

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 3:23 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested changes 22 and 23

Ulrich,

For your changes 22 and 23:
Section 6.1, last paragraph:
Existing text:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.
Comment: Absence of OC-Feature-Vector AVP indicates different things depend=
ing on the type of message (request / answer).
Proposal: Replace the paragraph with:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP in request
   messages indicates that only the default traffic abatement algorithm
   described in this specification is supported. The absence of the OC-
   Feature-Vector AVP in answer messages indicates that the default
   traffic abatement algorithm described in this specification is selected
   (while other traffic abatement algorithms may be supported), and no
   features other than abatement algorithms are supported.

Section 6.2, 2nd paragraph:
Existing text:
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node
   (see Section 6.2).  The absence of the OC-Feature-Vector AVP
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.
Comment: seems to be misplaced as reference is given to 6.2.
Proposal: remove the paragraph.


I support the wording change in #22 but suggest it be moved to section 6.2,=
 with the reference removed.=A0 As a result, the paragraph should be remove=
d from section 6.1 and changed in section 6.2 to the following (removing th=
e reference):
   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node.
   The absence of the OC-Feature-Vector AVP in request
   messages indicates that only the default traffic abatement algorithm
   described in this specification is supported. The absence of the OC-
   Feature-Vector AVP in answer messages indicates that the default
   traffic abatement algorithm described in this specification is selected
   (while other traffic abatement algorithms may be supported), and no
   features other than abatement algorithms are supported.
Regards,

Steve


From nobody Wed Dec 10 04:29:54 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8D471A88C8 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:29:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cfi15uKcXVuo for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:29:51 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85EA31A8890 for <dime@ietf.org>; Wed, 10 Dec 2014 04:29:51 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:50072 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XygOo-0002Pw-Ug; Wed, 10 Dec 2014 04:29:50 -0800
Message-ID: <54883CBA.7060503@usdonovans.com>
Date: Wed, 10 Dec 2014 06:29:46 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <54862C38.1000403@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/qvKtgT92wuZuGEw443lvqeMpkCM
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 12:29:52 -0000

Ulrich,

I think I see the source of confusion.  It is meant to talk about 
sending to adjacent DOIC nodes but it uses the words reacting and 
reporting nodes.  I suggest changing the paragraph to the following, 
removing the concept of reporting and reacting nodes from the description.

    While a DOIC node sends OLRs to "adjacent" DOIC nodes, nodes
    that are "adjacent" for DOIC purposes may not be adjacent from a
    Diameter, or transport, perspective.  For example, one or more
    Diameter agents that do not support DOIC may exist between a given
    pair of DOIC nodes, as long as those agents pass
    unknown AVPs through unchanged.  The report types described in this
    document can safely pass through non-supporting agents.  This may not
    be true for report types defined in future specifications.

Regards,

Steve

On 12/9/14, 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
>
> please see inline.
>
> Ulrich
>
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
> Sent: Monday, December 08, 2014 11:55 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich suggested change number 1
>
> Ulrich,
>
> I'll deal with each of your suggestion in a separate email to help ensure that nothing is missed.
>
> For your first suggestion:
> Section 3, last paragraph:
> Existing text:
>     While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
>     that are "adjacent" for DOIC purposes may not be adjacent from a
>     Diameter, or transport, perspective.  For example, one or more
>     Diameter agents that do not support DOIC may exist between a given
>     pair of reporting and reacting nodes, as long as those agents pass
>     unknown AVPs through unchanged.  The report types described in this
>     document can safely pass through non-supporting agents.  This may not
>     be true for report types defined in future specifications.
>
> Comment: while this is all not wrong, the existing text may convey the erring
> impression that there cannot be a DOIC supporting agent on the path between a
> reporting node and an adjacent reacting node.
>
> Proposal: It is proposed to add the following sentence at the end of the paragraph:
>     Another example is where one or more Diameter agents that do support
>     DOIC may exist between a given pair of reporting and reacting nodes,
>     as long as those agents pass OC-specific AVPs through unchanged.
> I don't agree with the suggested change, as the DOIC supporting agents might need to change the OC-specific AVPs.
> <Ulrich> I agree that in some cases DOIC supporting agents need to change the OC-specific AVPs. However, there are also cases where DOIC supporting agents do not need to change OC-specific AVPs.</Ulrich>
>    I also don't understand how the paragraph implies that there cannot be DOIC supporting agents in the path of the request.
> <Ulrich> It does not imply that. Rather it may convey the erring impression that there cannot be a DOIC supporting agent on the path between a
> reporting node and an adjacent reacting node.</Ulrich>
>     It is talking specifically about the case where there agents do not support DOIC are in the path.
> <Ulrich> No, my understanding is that the paragraph is talking specifically about what "adjacent for DOIC purposes" means. One valid example is given (reporting node and reacting node are "adjacent for DOIC purposes" if one or more agents that do not support DOIC but pass unsupported AVPs through unchanged exist between reporting node and reacting node) and I do not propose to remove that. However, there is another important valid example (reporting node and reacting node are "adjacent for DOIC purposes" if one or more DOIC supporting agents that pass OC-specific AVPs through unchanged exist between reporting node and reacting node), and the proposal is to add text to cover this example. </Ulrich>
> The remainder of the document makes it clear that there can be agents that do support DOIC in the path of a transaction.
> <Ulrich> that is not my point. The point is to clearly state that there can be DOIC supporting agents that pass through OC-specific AVPs unchanged on the path between reporting node and reacting node, and in this case the reporting and reacting nodes are still regarded "adjacent for DOIC purposes".</Ulrich>
>
> I don't see the need for a change here.
> <Ulrich> I'm not proposing a modification but an addition. This addition provides useful clarification and in no way is harmful</Ulrich>
>
> Regards,
>
> Steve
>


From nobody Wed Dec 10 04:34:30 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D29521A1A81 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:34:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.778
X-Spam-Level: 
X-Spam-Status: No, score=0.778 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r1OEzsM1xFMr for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:34:27 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D856A1A870D for <dime@ietf.org>; Wed, 10 Dec 2014 04:34:26 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:50090 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XygT5-0006de-1A; Wed, 10 Dec 2014 04:34:26 -0800
Message-ID: <54883DC2.20504@usdonovans.com>
Date: Wed, 10 Dec 2014 06:34:10 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <54862D14.2060304@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235122@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235122@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/grnZDirj2c71LT6OU3uIVObEymk
Subject: Re: [Dime] Ulrich suggested change number 2
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 12:34:28 -0000

Ulrich,

How about changing the last sentence to:

"This ensures that there is at least one commonly supported overload 
abatement algorithm supported by all DOIC nodes in the path of the request."

Regards,

Steve

On 12/9/14, 8:08 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
>
> please see inline.
>
> Ulrich
>
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
> Sent: Monday, December 08, 2014 11:58 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich suggested change number 2
>
> Ulrich,
>
> For the second suggested change:
> Section 3.2, 6th paragraph:
> Existing text:
>     The OC-Feature-Vector AVP will contain an indication of support for
>     the loss overload abatement algorithm defined in this specification
>     (see Section 5).  This ensures that there is at least one commonly
>     supported overload abatement algorithm between the reporting node and
>     the reacting node(s) in the path of the request.
>
> Comment: I agree that within a given path between client and server there may
> be more than one reacting nodes. But a given reporting node on that path does
> not have more than one adjacent reacting nodes on that given path to which it
> sends OLRs. I don't say that the existing text is wrong, but it is misleading.
> What we want to say here is that any given pair of adjacent reacting and reporting
> nodes will have at least one commonly supported algorithm.
>
> Proposal: It is proposed to replace the last line of the paragraph with:
>     The adjacent reacting node on the path of the request.
> It's more than just about the adjacent reaction nodes.  It is important that all reacting nodes in the path of the request have at least one common abatement algorithm.
> <Ulrich>I do not agree. It is important that a pair of two adjacent reacting and reporting nodes (A,S) have at least one commonly supported algorithm, so that the reporting node can always select an algorithm supported by the adjacent reacting node. There may be another (non-adjacent) reacting node in the path (C), but its not important for C and S (which are not adjacent) to have a commonly supported algorithm.
> C---A---S
> It is important that C and A have a commonly supported algorith, as C and A are adjacent;
> It is important that A and S have a commonly supported algorith, as A and S are adjacent;
> It is true but not important (and nothing that needs to be ensured) that C and S have a commonly supported algorithm (indeed S could eventually select an algorithm not supported by C);</Ulrich>
> It is true but not important that C, A and S have a commonly supported algorithm.
>
> I don't see the need for the suggested change.
>
> Regards,
>
> Steve
>


From nobody Wed Dec 10 04:41:06 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 549B41A896F for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:41:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level: 
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KcXW1i6Wv2_Q for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:41:03 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9DA3A1A88D3 for <dime@ietf.org>; Wed, 10 Dec 2014 04:41:03 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:50109 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XygZg-0000We-Sq; Wed, 10 Dec 2014 04:41:03 -0800
Message-ID: <54883F5C.1060603@usdonovans.com>
Date: Wed, 10 Dec 2014 06:41:00 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net>
Content-Type: multipart/alternative; boundary="------------060405030408090602050005"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/QdRbz-0Gs0GlHtdm-uig9t5QLEg
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 12:41:05 -0000

This is a multi-part message in MIME format.
--------------060405030408090602050005
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

This paragraph is talking about capability announcement.  We deal with 
the issues related to multiple sources of overload reports already 
elsewhere in the document.

I still do see the need for a change.

Steve

On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>
> Steve,
>
> I agree, my comment and proposal do not hit the mark.
>
> The intention was to say that known issues exist if there are multiple 
> agents on multiple paths between client and server. The agents may not 
> be able to ensure that there is no ambiguity in DOIC behaviour for the 
> client. E.g. from the client's point of view the answer to a first 
> request (which was modified by agent A1) could indicate: DOIC is 
> supported, currenty no overload, once in overload loss will be 
> selected; and the answer to the next request (which was modified by 
> agent A2) could indicate: DOIC is supported, some?? reduction is 
> requested using rate. The client, however, may not be prepared for rate.
>
> Maybe a warning note could be added to say that the agent may not 
> always be able to ensure that there is no ambiguity.
>
> Ulrich
>
> *From:*DiME [mailto:dime-bounces@ietf.org] *On Behalf Of *ext Steve 
> Donovan
> *Sent:* Tuesday, December 09, 2014 2:45 PM
> *To:* dime@ietf.org
> *Subject:* [Dime] Ulrich's suggested change @12
>
> Ulrich,
>
> For your suggested change #12:
>
> Section 4.1.3, last paragraph:
> Existing text:
>     When making changes to the OC-Supported-Features AVP the Diameter
>     Agent needs to ensure that there is no ambiguity in DOIC behavior for
>     both upstream and downstream DOIC nodes.
>   
> Comment: while that is true, in addition problems similar to those
> identified in the note in section 3.3 may result from making changes.
>   
> Proposal: Add the note:
>        Note: Known issues exist if multiple sources for overload reports
>        which apply to the same Diameter entity exist.  Reacting nodes
>        have no way of determining the source and, as such, will treat
>        them as coming from a single source.  Variance in sequence numbers
>        between the two sources can then cause incorrect overload
>        abatement treatment to be applied for indeterminate periods of
>        time.
>
> I don't understand how these are related.  The change to the 
> OC-Supported-Features AVP made by the agent apply only to the 
> transaction.  In addition, this paragraph doesn't mention overload 
> reports.
>
> Regards,
>
> Steve
>


--------------060405030408090602050005
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    This paragraph is talking about capability announcement.&nbsp; We deal
    with the issues related to multiple sources of overload reports
    already elsewhere in the document.<br>
    <br>
    I still do see the need for a change.<br>
    <br>
    Steve<br>
    <br>
    <div class="moz-cite-prefix">On 12/9/14, 10:46 AM, Wiehe, Ulrich
      (NSN - DE/Munich) wrote:<br>
    </div>
    <blockquote
cite="mid:5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 12 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoPlainText"><span lang="EN-US">Steve,<o:p></o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US">I agree, my comment
            and proposal do not hit the mark.<o:p></o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US">The intention was to
            say that known issues exist if there are multiple agents on
            multiple paths between client and server. The agents may not
            be able to ensure that there is no ambiguity in DOIC
            behaviour for the client. E.g. from the client&#8217;s point of
            view the answer to a first request (which was modified by
            agent A1) could indicate: DOIC is supported, currenty no
            overload, once in overload loss will be selected; and the
            answer to the next request (which was modified by agent A2)
            could indicate: DOIC is supported, some?? reduction is
            requested using rate. The client, however, may not be
            prepared for rate.<o:p></o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US">Maybe a warning note
            could be added to say that the agent may not always be able
            to ensure that there is no ambiguity.<o:p></o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoPlainText"><span lang="EN-US">Ulrich<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0cm 0cm 0cm">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                  lang="EN-US">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                lang="EN-US"> DiME [<a class="moz-txt-link-freetext" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
                <b>On Behalf Of </b>ext Steve Donovan<br>
                <b>Sent:</b> Tuesday, December 09, 2014 2:45 PM<br>
                <b>To:</b> <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                <b>Subject:</b> [Dime] Ulrich's suggested change @12<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Ulrich,<br>
          <br>
          For your suggested change #12:<o:p></o:p></p>
        <pre>Section 4.1.3, last paragraph:<o:p></o:p></pre>
        <pre>Existing text:<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; When making changes to the OC-Supported-Features AVP the Diameter<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; Agent needs to ensure that there is no ambiguity in DOIC behavior for<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; both upstream and downstream DOIC nodes.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>Comment: while that is true, in addition problems similar to those <o:p></o:p></pre>
        <pre>identified in the note in section 3.3 may result from making changes.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>Proposal: Add the note:<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note: Known issues exist if multiple sources for overload reports<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; which apply to the same Diameter entity exist.&nbsp; Reacting nodes<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have no way of determining the source and, as such, will treat<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; them as coming from a single source.&nbsp; Variance in sequence numbers<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; between the two sources can then cause incorrect overload<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; abatement treatment to be applied for indeterminate periods of<o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; time.<o:p></o:p></pre>
        <p class="MsoNormal" style="margin-bottom:12.0pt">I don't
          understand how these are related.&nbsp; The change to the
          OC-Supported-Features AVP made by the agent apply only to the
          transaction.&nbsp; In addition, this paragraph doesn't mention
          overload reports.<br>
          <br>
          Regards,<br>
          <br>
          Steve<br>
          <br>
          <o:p></o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------060405030408090602050005--


From nobody Wed Dec 10 04:49:14 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27B9D1A1BBC for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:49:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.778
X-Spam-Level: 
X-Spam-Status: No, score=0.778 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y1WwSJe8hbDF for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 04:49:04 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CD341A1BDD for <dime@ietf.org>; Wed, 10 Dec 2014 04:48:58 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:50126 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XyghL-0007wE-U2; Wed, 10 Dec 2014 04:48:57 -0800
Message-ID: <54884137.4050209@usdonovans.com>
Date: Wed, 10 Dec 2014 06:48:55 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/81045IzGBR5Ee5-sxW7A4dRQE2A
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 12:49:14 -0000

Ulrich,

Actually, the wording you suggested wasn't quite right.  It should be:

    When receiving an OC-OLR AVP with unknown values, the overload report
    SHOULD be silently discarded by reacting nodes and the event SHOULD
    be logged.

It's not just about report type values but unknown values for any of the 
AVPs in the OLR.

This seems like a good requirement to include in the specification to 
ensure common behavior in reacting nodes.  I don't feel strongly about 
this but I would like to hear other opinions.

Steve

On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Hi Steve,
>
> I think it was pointed out by Ben that we do not specify behaviour of a node for cases where it detects that another node is breaking the rule.
> The rule is:
>     A reporting node MUST NOT send overload reports of a type that has
>     not been advertised as supported by the reacting node.
> See section 4.2.3.
>
> Regards
> Ulrich
>
>    
>
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
> Sent: Tuesday, December 09, 2014 2:52 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich's suggested change #15
>
> Ulrich,
>
> For your suggested change #15:
> Section 4.2.1.3, 4th paragraph:
> Existing text:
>     When receiving an OC-OLR AVPs with unknown values, a reacting node
>     SHOULD be silently discarded by reacting nodes and the event SHOULD
>     be logged.
> Comment: text is confusing. Maybe the intention was to say:
>     When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
>     SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>     be logged.
> But even that is not correct.
> Proposal: Remove the paragraph.
> The intent was that an OC-OLR that contains unknown values should be discarded.  I agree that the wording needs to be changes as you suggested.  I don't agree with removing the paragraph.  Can you elaborate on why you think it is not correct when changed as you suggested?
>
> Regards,
>
> Steve
>


From nobody Wed Dec 10 05:06:41 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F3E91A8714 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 05:06:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.779
X-Spam-Level: 
X-Spam-Status: No, score=0.779 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8NlJ8llfzEY4 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 05:06:36 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [74.124.197.190]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AED011A6F42 for <dime@ietf.org>; Wed, 10 Dec 2014 05:06:36 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:50162 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1XygyM-0001sW-Ls; Wed, 10 Dec 2014 05:06:34 -0800
Message-ID: <54884556.90108@usdonovans.com>
Date: Wed, 10 Dec 2014 07:06:30 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net>
Content-Type: multipart/alternative; boundary="------------050102010806030006050809"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/YO8wqX_TpdymRBPvtxpY5K6fzzc
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 13:06:38 -0000

This is a multi-part message in MIME format.
--------------050102010806030006050809
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

I agree with your assumptions below.  For the third one, the only time 
it is possible, at least from a DOIC perspective, to send to another 
host is if it is a realm-routed request.  I might also change the "not 
overloaded" to "less overloaded".

I do think the statements can be improved to differentiate between 
behavior for host reports and realm reports.

How about the following:

    For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
    apply throttling abatement treatment to the request.

    For OLRs of type host, If the request is a realm-routed request then the reacting node
    SHOULD apply diversion abatement treatment to the request.

    For OLRs of type realm, the reacting node SHOULD
    apply throttling abatement treatment to the request, independent of the type (host-routed or
    realm-routed) of request.

Regards,

Steve

On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
> yes, then, maybe, the definition of Diversion is not correct?
> What are other people's views?
>
> My assumption was:
> If a host is overloaded, it does not help to direct traffic to that host via a different path.
> If a realm is overloaded, it does not help to direct traffic to that realm via a different path.
> If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.
> If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.
>
> With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.
>
> Regards
> Ulrich
>
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
> Sent: Tuesday, December 09, 2014 3:06 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich's suggested change #16
>
> Ulrich,
>
> For your suggested change #16:
> Section 4.2.2, 5th and 6th paragraph:
> Existing text:
>     If the request is a host-routed request then the reacting node SHOULD
>     apply throttling abatement treatment to the request.
>   
>     If the request is a realm-routed request then the reacting node
>     SHOULD apply diversion abatement treatment to the request.
>
> Comment: I don't think so. If the reacting node selects the server and
> then detects that the selected server is overloaded and then detects that
> the request does not survive (i.e. is subject to abatement), then the reacting
> node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
> If the reacting node does not select the server (either a. because the server was
> already selected by a downstream node, or b. because the server will be selected
> by an upstream node) then there is no point in applying diversion and the reacting
> node SHOULD apply throttling of requests that do not survive.
>
> Proposal: replace the paragraphs with:
>     If the reacting node does not select the server then it SHOULD apply
>     throttling abatement to the request.
>
>     If the reacting node selects the server then it SHOULD apply diversion
>     abatement treatment (i.e. select an alternative server if possible) to
>     the request.
> Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
>
> Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.  Logic like this is outside the scope of the DOIC specification.
>
> The text is correct based on the definition of diversion.
>
> Regards,
>
> Steve
>


--------------050102010806030006050809
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Ulrich,<br>
    <br>
    I agree with your assumptions below.&nbsp; For the third one, the only
    time it is possible, at least from a DOIC perspective, to send to
    another host is if it is a realm-routed request.&nbsp; I might also
    change the "not overloaded" to "less overloaded".<br>
    <br>
    I do think the statements can be improved to differentiate between
    behavior for host reports and realm reports.<br>
    <br>
    How about the following:<br>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>   For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
   apply throttling abatement treatment to the request.

   For OLRs of type host, If the request is a realm-routed request then the reacting node
   SHOULD apply diversion abatement treatment to the request.
</pre>
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <pre>   For OLRs of type realm, the reacting node SHOULD
   apply throttling abatement treatment to the request, independent of the type (host-routed or 
   realm-routed) of request.

</pre>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <div class="moz-cite-prefix">On 12/9/14, 11:29 AM, Wiehe, Ulrich
      (NSN - DE/Munich) wrote:<br>
    </div>
    <blockquote
cite="mid:5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net"
      type="cite">
      <pre wrap="">Steve,
yes, then, maybe, the definition of Diversion is not correct?
What are other people's views?

My assumption was:
If a host is overloaded, it does not help to direct traffic to that host via a different path.
If a realm is overloaded, it does not help to direct traffic to that realm via a different path.
If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.
If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.

With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.

Regards
Ulrich

From: DiME [<a class="moz-txt-link-freetext" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 3:06 PM
To: <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a>
Subject: [Dime] Ulrich's suggested change #16

Ulrich,

For your suggested change #16:
Section 4.2.2, 5th and 6th paragraph:
Existing text:
   If the request is a host-routed request then the reacting node SHOULD
   apply throttling abatement treatment to the request.
 
   If the request is a realm-routed request then the reacting node
   SHOULD apply diversion abatement treatment to the request.

Comment: I don't think so. If the reacting node selects the server and 
then detects that the selected server is overloaded and then detects that 
the request does not survive (i.e. is subject to abatement), then the reacting 
node SHOULD apply diversion treatment (i.e. select an alternative server if possible). 
If the reacting node does not select the server (either a. because the server was 
already selected by a downstream node, or b. because the server will be selected 
by an upstream node) then there is no point in applying diversion and the reacting 
node SHOULD apply throttling of requests that do not survive.

Proposal: replace the paragraphs with:
   If the reacting node does not select the server then it SHOULD apply
   throttling abatement to the request.

   If the reacting node selects the server then it SHOULD apply diversion
   abatement treatment (i.e. select an alternative server if possible) to
   the request.
Diversion is not selecting an alternative node to handle the request.&nbsp; Diversion is selecting an alternative route to the selected node.&nbsp; 

Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.&nbsp; Logic like this is outside the scope of the DOIC specification.

The text is correct based on the definition of diversion.

Regards,

Steve

</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------050102010806030006050809--


From nobody Wed Dec 10 07:09:40 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8F2F1A6FC0 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SWB0hTpMbktC for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:23 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E42F01A0103 for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:20 -0800 (PST)
X-AuditID: c1b4fb3a-f79116d000000fec-86-5488621f47a6
Received: from ESESSHC008.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id F6.4F.04076.F1268845; Wed, 10 Dec 2014 16:09:19 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC008.ericsson.se ([153.88.183.42]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:18 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>, "lionel.morand@orange.com" <lionel.morand@orange.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHP96zTVLWd5veGrkqAoFDKpocx+ZxXdZWAgAKB9QCAABTjgIABToGAgABXjYCAAImqAIAAtOqAgAHz+gCAAFg3AIAFNTcAgAARHgCABzpwAIAFs+cAgABIhYCACwbhAIABEZ9ggAATtICAAFSrgIAKq7Mg
Date: Wed, 10 Dec 2014 15:09:18 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F790@ESESSMB101.ericsson.se>
References: <545792B6.8030502@usdonovans.com> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com> <547F46D5.7060800@usdonovans.com>
In-Reply-To: <547F46D5.7060800@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: multipart/alternative; boundary="_000_087A34937E64E74E848732CFF8354B920987F790ESESSMB101erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrGIsWRmVeSWpSXmKPExsUyM+Jvja58UkeIwYrVAhbzO0+zW8ztXcFm sen8OhaL29szLTY08TiwerQ+28vqsWTJTyaPWTufsHi0PDvJ5rHqbR9rAGsUl01Kak5mWWqR vl0CV0bLzAesBW3rmCpuTV3I3sA4p4Wpi5GTQ0LAROJ29zRGCFtM4sK99WxdjFwcQgJHGCVu fjzNCuEsZpRo+jYPrIpNwE7i0ukXTCAJEYHbjBL/Dr5lBkkwCyhLzN7xgB3EFhZQl1i+8xcr iC0ioCHRd2Q1M0TDKkaJay2tLCAJFgFViVXnv4M18wr4ShzffBUsLiTwm11i8iY+EJtTQE/i cvdVNhCbEei+76fWMEEsE5e49WQ+1A8CEkv2nGeGsEUlXj7+xwphK0ksuv0Zqj5fYkXrH6hd ghInZz5hmcAoOgvJqFlIymYhKYOI60ncmDqFDcLWlli28DUzhK0rMePfIRZk8QWM7KsYRYtT i4tz042M9FKLMpOLi/Pz9PJSSzYxAiP24JbfVjsYDz53PMQowMGoxMNb8L49RIg1say4MvcQ ozQHi5I478Jz84KFBNITS1KzU1MLUovii0pzUosPMTJxcEo1MIq0LrHYfzrBbOHmNwVZFeJf F0hWXKu6rmL1tWbn4zNTf5y5HZq0jEl6xz+1FHbrf1VZIimsLzds2pN/vE4mb/mcc3MeP+Fd JnHtlp61ZAj37NusnvnvlbtSCt1dGgV2qFZtP+viK/nulb+ahJvEXb/by/ayH5110VH87P6Z Kg1bFCfM9slWCVFiKc5INNRiLipOBABKnWiDuQIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/SuCvVETmhi52EG9FGdm4oRtdBk0
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:31 -0000

--_000_087A34937E64E74E848732CFF8354B920987F790ESESSMB101erics_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear all,

I have the following proposal, for first paragraph
Now:

Therefore, before

   applying local message throttling, a reporting node needs to check if
   these messages match existing OCS entries,

Proposal

Therefore, before

   applying local message throttling, a reporting node MAY check if
   these messages match existing OCS entries,

I think the reporting node may or not check whether the received messages m=
atch a "delegated" active OCS. This is a processing consuming task that cou=
ld be avoided if the reporting node uses different criteria to choose messa=
ges to drop/reject. This is up to  implementation.

Best regards
/MCruz

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
Sent: mi=E9rcoles, 03 de diciembre de 2014 18:22
To: TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@orange.com; Ben Cam=
pbell
Cc: dime@ietf.org
Subject: Re: [Dime] Updates to DOIC -05

I have attempted to address both Lionel's and Jean-Jacques' suggestions wit=
h the following text:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled requests may be higher than intended.  Therefore, before

   applying local message throttling, a reporting node needs to check if

   these messages match existing OCS entries, indicating that these

   messages have survived throttling applied by downstream nodes that

   have received the related OLR.



   However, even if the set of messages match existing OCS entries, the

   reporting node can still apply other abatement methods such as

   diversion.  The reporting node might also need to throttle requests

   for reasons other than overload.  For example, an agent or server

   might have a configured rate limit for each client, and throttle

   requests that exceed that limit, even if such requests had already

   been candidates for throttling by downstream nodes.  The reporting

   node also has the option to send new OLRs requesting greater

   reductions in traffic, reducing the need for local throttling.

Steve
On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
Dear all

To continue on my remark , I would complement the Steve's text with " can u=
pdate the reduction of traffic it requires from the reacting nodes(s) by se=
nding new overload reports" as hereafter:



   Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes and can update the reductio=
n of traffic it requires from the reacting nodes(s) by sending new overload=
 reports.


Best regards

JJacques


De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN, JEAN-JACQUE=
S (JEAN-JACQUES)
Envoy=E9 : mercredi 3 d=E9cembre 2014 11:29
=C0 : Steve Donovan; lionel.morand@orange.com<mailto:lionel.morand@orange.c=
om>; Ben Campbell
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Dear all

I am not against the new proposed texts from Steve or Ben to clarify this t=
opic.

My point is that, when  the reporting node has sent an OLR requiring  a tra=
ffic reduction , there is first a reaction time before receiving reduced tr=
affic, and second even if the traffic has been reduced, it can still exceed=
 the capacity of the reporting node  that has no other choice than to throt=
tle the received reduced traffic (if no diversion). This can happen when th=
e traffic at the source (reacting node) before throttling is increasing qui=
ckly, so the traffic reduced  according to the received OLR may  remain too=
 high .  Then, if the reporting node has nevertheless to do some throttle, =
it will certainly react by new OLRs requiring a higher traffic reduction fr=
om the reacting nodes. This is a dynamic process, where the reporting node =
adjust the  traffic  reduction it requires according to what it receives .

As Ben  I also think this is a guidance , and I think it is good to bring s=
ome guidance.

Best regards

JJacques

De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9 : mardi 2 d=E9cembre 2014 19:50
=C0 : lionel.morand@orange.com<mailto:lionel.morand@orange.com>; Ben Campbe=
ll
Cc : dime@ietf.org<mailto:dime@ietf.org>
Objet : Re: [Dime] Updates to DOIC -05

Lionel,

The two paragraphs together now say the following:

   When a reporting node sends an OLR, it effectively delegates any

   necessary throttling to downstream nodes.  If the reporting node also

   locally throttles the same set of messages, the overall number of

   throttled request may be higher than intended.  Therefore, if a

   reporting node needs to apply local throttling on a set of messages

   that match or overlap with existing OCS entries, it needs to consider

   the impact of throttling by downstream nodes.



   However, when the reporting node sends an OLR downstream, it might

   still need to apply other abatement methods such as diversion.  The

   reporting node might also need to throttle requests for reasons other

   than overload.  For example, an agent or server might have a

   configured rate limit for each client, and throttle requests that

   exceed that limit, even if such requests had already been candidates

   for throttling by downstream nodes.
Do you see the need for further clarification?

Steve
On 11/25/14, 12:26 PM, lionel.morand@orange.com<mailto:lionel.morand@orange=
.com> wrote:

I'm OK with the idea of the text proposed by Ben.

I would just make clear that throttling is applicable to the fact of sendin=
g/forwarding requests (cf. definition). A reporting node may apply local th=
rottling if it is an agent. But if it is a server, it can either drop the e=
xceeded number of requests (no response sent to the downstream) or send a s=
pecific DIAMETER-TOO-BUSY response. I think that this clarification is some=
how missing in the document.



Regards,



Lionel



-----Message d'origine-----

De : Steve Donovan [mailto:srdonovan@usdonovans.com]

Envoy=E9 : mardi 25 novembre 2014 15:07

=C0 : Ben Campbell; MORAND Lionel IMT/OLN

Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<mailto:dime@ietf.org>; =
Maria Cruz Bartolome

Objet : Re: [Dime] Updates to DOIC -05



I'm ok with Ben's wording and will make the change unless I hear objections=
 on the list.



Steve



On 11/21/14, 5:01 PM, Ben Campbell wrote:

On reflection, I think there might be a subtlety here. The resulting offere=
d-load may still exceed the reporting node's current capacity. This can be =
true even if it's sent an OLR (and thus has related OCS). As mentioned in t=
he surrounding node needs to still be able to protect itself, possibly by t=
hrottling. Therefore, I propose the sentence take the form of non-normative=
 guidance. For example:



"When a reporting node sends an OLR, it effectively delegates any necessary=
 throttling to downstream nodes.  If the reporting node also locally thrott=
les the same set of messages, the overall number of throttled request may b=
e higher than intended. Therefore, if a reporting node needs to apply local=
 throttling on a set of messages that match or overlap with existing OCS en=
tries, it needs to consider the impact of throttling by downstream nodes."





On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com<mailto:lionel.morand@=
orange.com> wrote:



I can live with the text proposed by Ulrich. But what is wrong with:



" Therefore, the reporting node SHOULD NOT apply throttling to the set of m=
essages to which an active OCS applies." ?



Envoy=E9 depuis mon Sony Xperia SP d'Orange



---- Maria Cruz Bartolome a =E9crit ----





Section 4.2.3, 13th paragraph, 2nd sentence:

Existing text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the OLR applies.

Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to=
 the set of messages to which the sent OLR applies.



[LM] I would say that the reporting node will not remember the previously s=
ent OLR, but will take care that there is an active OCS.

SRD> I'm ok with Ulrich's change.



[LM] and this is incorrect but not fundamental. The reporting node does not=
 have to "remember" a previously sent OLR. What it will do is to refer to e=
xisting OCS to know that throttling should not be applied. An OCS is a cons=
equence of an sent OLR but it is not an OLR itself. But not fundamental her=
e.



[MCruz] I am ok with Ulrich's change. It does not mean that the reporting n=
ode needs to "remember" a previously sent OLR, though. The change only prop=
oses to "identify" which OLR we refer to.



Best regards

/MCruz





_____________________________________________________________________

____________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations

confidentielles ou privilegiees et ne doivent donc pas etre diffuses,

exploites ou copies sans autorisation. Si vous avez recu ce message

par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que le=
s pieces jointes. Les messages electroniques etant susceptibles d'alteratio=
n, Orange decline toute responsabilite si ce message a ete altere, deforme =
ou falsifie. Merci.



This message and its attachments may contain confidential or

privileged information that may be protected by law; they should not be dis=
tributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime







___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.







--_000_087A34937E64E74E848732CFF8354B920987F790ESESSMB101erics_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
p.Preacute, li.Preacute, div.Preacute
	{mso-style-name:"Pr&eacute\,format&eacute\,HTML";
	mso-style-link:"Pr&eacute1\,format&eacute1\,HTML Car1";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
span.Preacute1
	{mso-style-name:"Pr&eacute1\,format&eacute1\,HTML Car1";
	mso-style-priority:99;
	mso-style-link:"Pr&eacute\,format&eacute\,HTML";
	font-family:Consolas;
	color:black;}
p.Textedebulles, li.Textedebulles, div.Textedebulles
	{mso-style-name:"Texte de bulles";
	mso-style-link:"Texte de bulles Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
span.TextedebullesCar
	{mso-style-name:"Texte de bulles Car";
	mso-style-priority:99;
	mso-style-link:"Texte de bulles";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle27
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"ES" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all,<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I have the=
 following proposal, for first paragraph<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Now:<o:p><=
/o:p></span></p>
<pre><span lang=3D"EN-US">Therefore, before<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; applying local message throttling, a=
 reporting node needs to check if<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; these messages mat=
ch existing OCS entries,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Proposal<o=
:p></o:p></span></p>
<pre><span lang=3D"EN-US">Therefore, before<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; applying local message throttling, a=
 reporting node MAY check if<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; these messages mat=
ch existing OCS entries,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I think th=
e reporting node may or not check whether the received messages match a &#8=
220;delegated&#8221; active OCS. This is a processing consuming task that
 could be avoided if the reporting node uses different criteria to choose m=
essages to drop/reject. This is up to&nbsp; implementation.<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regar=
ds<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">/MCruz<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-b=
ounces@ietf.org]
<b>On Behalf Of </b>Steve Donovan<br>
<b>Sent:</b> mi=E9rcoles, 03 de diciembre de 2014 18:22<br>
<b>To:</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@orange.com; =
Ben Campbell<br>
<b>Cc:</b> dime@ietf.org<br>
<b>Subject:</b> Re: [Dime] Updates to DOIC -05<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I have attempted to a=
ddress both Lionel's and Jean-Jacques' suggestions with the following text:=
<o:p></o:p></p>
<pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delega=
tes any<o:p></o:p></pre>
<pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the re=
porting node also<o:p></o:p></pre>
<pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall n=
umber of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttled requests may be higher than intended.&nbsp; The=
refore, before<o:p></o:p></pre>
<pre>&nbsp;&nbsp; applying local message throttling, a reporting node needs=
 to check if<o:p></o:p></pre>
<pre>&nbsp;&nbsp; these messages match existing OCS entries, indicating tha=
t these<o:p></o:p></pre>
<pre>&nbsp;&nbsp; messages have survived throttling applied by downstream n=
odes that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; have received the related OLR.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; However, even if the set of messages match existing OCS e=
ntries, the<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node can still apply other abatement methods su=
ch as<o:p></o:p></pre>
<pre>&nbsp;&nbsp; diversion.&nbsp; The reporting node might also need to th=
rottle requests<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for reasons other than overload.&nbsp; For example, an ag=
ent or server<o:p></o:p></pre>
<pre>&nbsp;&nbsp; might have a configured rate limit for each client, and t=
hrottle<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requests that exceed that limit, even if such requests ha=
d already<o:p></o:p></pre>
<pre>&nbsp;&nbsp; been candidates for throttling by downstream nodes.&nbsp;=
 The reporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp; node also has the option to send new OLRs requesting grea=
ter<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reductions in traffic, reducing the need for local thrott=
ling.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JAC=
QUES) wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">To continue on my remark =
, I would complement the Steve&#8217;s text with &#8220;
</span><span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;,=
&quot;serif&quot;">can update the reduction of traffic it requires from the=
 reacting nodes(s) by sending new overload reports&#8221;
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#1F497D">as hereafter: &nbsp;&nbsp;&nbsp;</span><o=
:p></o:p></p>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Therefore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match existing OCS entries, it needs to consider<o:p=
></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes and can upda=
te the reduction of traffic it requires from the reacting nodes(s) by sendi=
ng new overload reports. <o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [<a href=3D"mail=
to:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> TROTTIN, JEAN-JACQUES (JEAN-JACQUES)<br>
<b>Envoy=E9&nbsp;:</b> mercredi 3 d=E9cembre 2014 11:29<br>
<b>=C0&nbsp;:</b> Steve Donovan; <a href=3D"mailto:lionel.morand@orange.com=
">lionel.morand@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Dear all</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am not against the new =
proposed texts from Steve or Ben to clarify this topic.</span><o:p></o:p></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My point is that, when &n=
bsp;the reporting node has sent an OLR requiring &nbsp;a traffic reduction =
, there is first a reaction time before receiving reduced traffic,
 and second even if the traffic has been reduced, it can still exceed the c=
apacity of the reporting node &nbsp;that has no other choice than to thrott=
le the received reduced traffic (if no diversion). This can happen when the=
 traffic at the source (reacting node)
 before throttling is increasing quickly, so the traffic reduced&nbsp; acco=
rding to the received OLR may &nbsp;remain too high . &nbsp;Then, if the re=
porting node has nevertheless to do some throttle, it will certainly react =
by new OLRs requiring a higher traffic reduction
 from the reacting nodes. This is a dynamic process, where the reporting no=
de adjust the &nbsp;traffic &nbsp;reduction it requires according to what i=
t receives .</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As Ben&nbsp; I also think=
 this is a guidance , and I think it is good to bring some guidance.
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Best regards</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">JJacques
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"FR" style=3D"font-size:10.0pt;font-=
family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">De&nbsp;=
:</span></b><span lang=3D"FR" style=3D"font-size:10.0pt;font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [<a href=3D"mail=
to:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
<b>De la part de</b> Steve Donovan<br>
<b>Envoy=E9&nbsp;:</b> mardi 2 d=E9cembre 2014 19:50<br>
<b>=C0&nbsp;:</b> <a href=3D"mailto:lionel.morand@orange.com">lionel.morand=
@orange.com</a>; Ben Campbell<br>
<b>Cc&nbsp;:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Objet&nbsp;:</b> Re: [Dime] Updates to DOIC -05</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Lionel,<br>
<br>
The two paragraphs together now say the following:<o:p></o:p></p>
<pre>&nbsp;&nbsp; When a reporting node sends an OLR, it effectively delega=
tes any<o:p></o:p></pre>
<pre>&nbsp;&nbsp; necessary throttling to downstream nodes.&nbsp; If the re=
porting node also<o:p></o:p></pre>
<pre>&nbsp;&nbsp; locally throttles the same set of messages, the overall n=
umber of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttled request may be higher than intended.&nbsp; Ther=
efore, if a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node needs to apply local throttling on a set o=
f messages<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that match or overlap with existing OCS entries, it needs=
 to consider<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the impact of throttling by downstream nodes.<o:p></o:p><=
/pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;&nbsp; However, when the reporting node sends an OLR downstream,=
 it might<o:p></o:p></pre>
<pre>&nbsp;&nbsp; still need to apply other abatement methods such as diver=
sion.&nbsp; The<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reporting node might also need to throttle requests for r=
easons other<o:p></o:p></pre>
<pre>&nbsp;&nbsp; than overload.&nbsp; For example, an agent or server migh=
t have a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; configured rate limit for each client, and throttle reque=
sts that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; exceed that limit, even if such requests had already been=
 candidates<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for throttling by downstream nodes.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Do you see the need f=
or further clarification?<br>
<br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 11/25/14, 12:26 PM, <a href=3D"mailto:lionel.mora=
nd@orange.com">
lionel.morand@orange.com</a> wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>I'm OK with the idea of the text proposed by Ben.<o:p></o:p></pre>
<pre>I would just make clear that throttling is applicable to the fact of s=
ending/forwarding requests (cf. definition). A reporting node may apply loc=
al throttling if it is an agent. But if it is a server, it can either drop =
the exceeded number of requests (no response sent to the downstream) or sen=
d a specific DIAMETER-TOO-BUSY response. I think that this clarification is=
 somehow missing in the document.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Regards,<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Lionel<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>-----Message d'origine-----<o:p></o:p></pre>
<pre>De&nbsp;: Steve Donovan [<a href=3D"mailto:srdonovan@usdonovans.com">m=
ailto:srdonovan@usdonovans.com</a>] <o:p></o:p></pre>
<pre>Envoy=E9&nbsp;: mardi 25 novembre 2014 15:07<o:p></o:p></pre>
<pre>=C0&nbsp;: Ben Campbell; MORAND Lionel IMT/OLN<o:p></o:p></pre>
<pre>Cc&nbsp;: Wiehe, Ulrich (NSN - DE/Munich); <a href=3D"mailto:dime@ietf=
.org">dime@ietf.org</a>; Maria Cruz Bartolome<o:p></o:p></pre>
<pre>Objet&nbsp;: Re: [Dime] Updates to DOIC -05<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>I'm ok with Ben's wording and will make the change unless I hear objec=
tions on the list.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>On 11/21/14, 5:01 PM, Ben Campbell wrote:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On reflection, I think there might be a subtlety here. The resulting o=
ffered-load may still exceed the reporting node's current capacity. This ca=
n be true even if it's sent an OLR (and thus has related OCS). As mentioned=
 in the surrounding node needs to still be able to protect itself, possibly=
 by throttling. Therefore, I propose the sentence take the form of non-norm=
ative guidance. For example:<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&quot;When a reporting node sends an OLR, it effectively delegates any=
 necessary throttling to downstream nodes.&nbsp; If the reporting node also=
 locally throttles the same set of messages, the overall number of throttle=
d request may be higher than intended. Therefore, if a reporting node needs=
 to apply local throttling on a set of messages that match or overlap with =
existing OCS entries, it needs to consider the impact of throttling by down=
stream nodes.&quot;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp; <o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On Nov 17, 2014, at 2:38 AM, <a href=3D"mailto:lionel.morand@orange.co=
m">lionel.morand@orange.com</a> wrote:<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>I can live with the text proposed by Ulrich. But what is wrong with:<o=
:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&quot; Therefore, the reporting node SHOULD NOT apply throttling to th=
e set of messages to which an active OCS applies.&quot; ?<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Envoy=E9 depuis mon Sony Xperia SP d'Orange<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>---- Maria Cruz Bartolome a =E9crit ----<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Section 4.2.3, 13th paragraph, 2nd sentence:<o:p></o:p></pre>
<pre>Existing text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the OLR applies.<o:p></o:p></pre>
<pre>Proposed text: Therefore, the reporting node SHOULD NOT apply throttli=
ng to the set of messages to which the sent OLR applies.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>[LM] I would say that the reporting node will not remember the previou=
sly sent OLR, but will take care that there is an active OCS.<o:p></o:p></p=
re>
</blockquote>
<pre>SRD&gt; I'm ok with Ulrich's change.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>[LM] and this is incorrect but not fundamental. The reporting node doe=
s not have to &quot;remember&quot; a previously sent OLR. What it will do i=
s to refer to existing OCS to know that throttling should not be applied. A=
n OCS is a consequence of an sent OLR but it is not an OLR itself. But not =
fundamental here.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>[MCruz] I am ok with Ulrich's change. It does not mean that the report=
ing node needs to &quot;remember&quot; a previously sent OLR, though. The c=
hange only proposes to &quot;identify&quot; which OLR we refer to.<o:p></o:=
p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Best regards<o:p></o:p></pre>
<pre>/MCruz<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>_____________________________________________________________________<=
o:p></o:p></pre>
<pre>____________________________________________________<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations <o:=
p></o:p></pre>
<pre>confidentielles ou privilegiees et ne doivent donc pas etre diffuses, =
<o:p></o:p></pre>
<pre>exploites ou copies sans autorisation. Si vous avez recu ce message <o=
:p></o:p></pre>
<pre>par erreur, veuillez le signaler a l'expediteur et le detruire ainsi q=
ue les pieces jointes. Les messages electroniques etant susceptibles d'alte=
ration, Orange decline toute responsabilite si ce message a ete altere, def=
orme ou falsifie. Merci.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>This message and its attachments may contain confidential or <o:p></o:=
p></pre>
<pre>privileged information that may be protected by law; they should not b=
e distributed, used or copied without authorisation.<o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>DiME mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/dime">https://www.iet=
f.org/mailman/listinfo/dime</a><o:p></o:p></pre>
</blockquote>
<pre>&nbsp;<o:p></o:p></pre>
</blockquote>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>______________________________________________________________________=
___________________________________________________<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations con=
fidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
<pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez=
 recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
<pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messag=
es electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
<pre>Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>This message and its attachments may contain confidential or privilege=
d information that may be protected by law;<o:p></o:p></pre>
<pre>they should not be distributed, used or copied without authorisation.<=
o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
</blockquote>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_087A34937E64E74E848732CFF8354B920987F790ESESSMB101erics_--


From nobody Wed Dec 10 07:09:42 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80A4D1A0047 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4RfPXdcR0ttp for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:31 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BDAA1A0173 for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:22 -0800 (PST)
X-AuditID: c1b4fb3a-f79116d000000fec-96-548862215784
Received: from ESESSHC016.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id C8.4F.04076.12268845; Wed, 10 Dec 2014 16:09:21 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC016.ericsson.se ([153.88.183.66]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:20 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "lionel.morand@orange.com" <lionel.morand@orange.com>, Jouni <jouni.nospam@gmail.com>, "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: Call for WG adoption: draft-donovan-dime-doc-rate-control
Thread-Index: AQHQDuelOYAgmWNJ6UiPoL1QuUCDoZyIvBgw
Date: Wed, 10 Dec 2014 15:09:19 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F796@ESESSMB101.ericsson.se>
References: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com> <17900_1417604115_547EEC13_17900_1759_1_6B7134B31289DC4FAF731D844122B36E99A6FD@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <17900_1417604115_547EEC13_17900_1759_1_6B7134B31289DC4FAF731D844122B36E99A6FD@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrDLMWRmVeSWpSXmKPExsUyM+Jvja5iUkeIwZv3AhZze1ewWexf18Bk cXt7pgOzx85Zd9k9liz5yeTR8uwkWwBzFJdNSmpOZllqkb5dAlfG3B1vmAsuCFas+hbdwPiA r4uRk0NCwESiofUPE4QtJnHh3nq2LkYuDiGBI4wSc75+YIZwFjNK/Pm/hBmkik3ATuLS6Rdg HSICjYwSL1rUQGxhATeJX5cvsUHE3SWuL57HCGEbSXzsWQJWzyKgKvH53wqwGl4BX4kLa+ey QyzYwShxfW0HC4jDKdDGKNH5ZCdYByPQTd9PrQGzmQXEJW49mQ91q4DEkj3nmSFsUYmXj/+x QthKEotuf4aq15O4MXUKG4StLbFs4WtmiM2CEidnPmGZwCg6C8nYWUhaZiFpmYWkZQEjyypG 0eLU4uLcdCMjvdSizOTi4vw8vbzUkk2MwOg5uOW31Q7Gg88dDzEKcDAq8fAWvG8PEWJNLCuu zD3EKM3BoiTOu/DcvGAhgfTEktTs1NSC1KL4otKc1OJDjEwcnFINjCL6Het+VS7PKCl+c+eI XYD6rb3HQ646bfNVCuR+mqA+OYNTeFrrZSPujc+//nhcznDh/OpzVnP+V762O3kr2MFc42sk d4eJsp1P+NVpJ6O9leaVOQnfiHd85s6aWmQVc5SjeMv+wnsaK9Zqv3sap6W1YldV4g9lKeUr /wsN7t+yPPRUbeK/YCWW4oxEQy3mouJEAELjLxZ/AgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Hk9QkKpKgrjUM5JvSgezGsj7Qpo
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-control
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:33 -0000

Dear all,

I support adoption.
Best regards
/MCruz

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of lionel.morand@orange=
.com
Sent: mi=E9rcoles, 03 de diciembre de 2014 11:55
To: Jouni; dime@ietf.org list
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-contr=
ol

As individual, I support.

Lionel

-----Message d'origine-----
De=A0: Jouni [mailto:jouni.nospam@gmail.com] Envoy=E9=A0: mercredi 3 d=E9ce=
mbre 2014 11:12 =C0=A0: dime@ietf.org list Cc=A0: MORAND Lionel IMT/OLN; Jo=
uni Objet=A0: Call for WG adoption: draft-donovan-dime-doc-rate-control

Folks,

As we discussed and agreed during the Honolulu meeting we ask for the WG ad=
option for draft-donovan-dime-doc-rate-control unless counter proposals sho=
w up. The "wait period" for counter proposals has been more than enough.

This mail starts a two week adoption call for draft-donovan-dime-doc-rate-c=
ontrol as a WG Item.

Express your support or disagreements in the mailing list. The call ends 17=
th Dec EOB (CET+1).

- Jouni & Lionel


___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou =
copies sans autorisation. Si vous avez recu ce message par erreur, veuillez=
 le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Le=
s messages electroniques etant susceptibles d'alteration, Orange decline to=
ute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law; they should not be distributed, used=
 or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 07:09:43 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 132E21A0047 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.301
X-Spam-Level: 
X-Spam-Status: No, score=-2.301 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJrRHjswBBpG for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:21 -0800 (PST)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 825491A0065 for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:19 -0800 (PST)
X-AuditID: c1b4fb2d-f79fc6d000001087-b5-5488621dae02
Received: from ESESSHC006.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id 51.DF.04231.D1268845; Wed, 10 Dec 2014 16:09:17 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC006.ericsson.se ([153.88.183.36]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:16 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Ben Campbell <ben@nostrum.com>, "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: [Dime] Updated DOIC Requirements Analysis
Thread-Index: AQHQCFYt6tScBxBsq0iC3L6bres0LpyIv54A
Date: Wed, 10 Dec 2014 15:09:16 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F783@ESESSMB101.ericsson.se>
References: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com>
In-Reply-To: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: multipart/alternative; boundary="_000_087A34937E64E74E848732CFF8354B920987F783ESESSMB101erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrDLMWRmVeSWpSXmKPExsUyM+Jvja5sUkeIwcmbqhbzO0+zW8ztXcHm wOSxZMlPJo9ZO5+wBDBFcdmkpOZklqUW6dslcGVcv9jDWHChlbXixIWDzA2MM+eydDFyckgI mEj8X/uDGcIWk7hwbz1bFyMXh5DAEUaJ2X3fWSGcxYwSJ1b9YwepYhOwk7h0+gUTiC0i4CHx YnMb2CRhATOJrlk72CDi5hJTF2xmhrCNJPY3n2MFsVkEVCVWPdwHFucV8JU4/XIt2BwhoJnv tnwG6+UUsJd4tfMD2C5GoIu+n1oDVsMsIC5x68l8JohLBSSW7DkPdbWoxMvH/1ghbCWJRbc/ Q9XnS8yeP4kNYpegxMmZT1gmMIrMQjJqFpKyWUjKIOI6Egt2f2KDsLUlli18zQxjnznwmAlZ fAEj+ypG0eLU4uLcdCNjvdSizOTi4vw8vbzUkk2MwOg6uOW37g7G1a8dDzEKcDAq8fAWvG8P EWJNLCuuzD3EKM3BoiTOu+jcvGAhgfTEktTs1NSC1KL4otKc1OJDjEwcnFINjOZW7+ctM7m7 x8HCwjTqxOU7AjfslXPOruZbMOmLxyNf28vZZetnTl18TcO64OTv43NvTkm/9q/F6Or7DX98 HB68uyX11ft5nf2nV/srgg89O2DjukqZY2P9CQYG6+YlV0sPz/pevSBha3/BMsXdU4R0Hecz zff3Xca3Sb3wxMWflcw779841u6ixFKckWioxVxUnAgAQkyJEI8CAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/51qrOR5GnHH8ALwm5pEpT03I9vU
Subject: Re: [Dime] Updated DOIC Requirements Analysis
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:35 -0000

--_000_087A34937E64E74E848732CFF8354B920987F783ESESSMB101erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hello,

See some comments below
Thanks
/MCruz

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Ben Campbell
Sent: martes, 25 de noviembre de 2014 3:19
To: dime@ietf.org list
Subject: [Dime] Updated DOIC Requirements Analysis

Here's the text from the updated requirements analysis. I updated the summa=
ry to be more general, and updated the detail based on mail discussion. The=
 detail section is marked for deletion before publication as an RFC.

BTW, It's appendix C now because I used the section Steve had already reser=
ved for it :-)

Thanks!

Ben.
-------------------

Appendix C.  Requirements Conformance Analysis



   This section contains the result of an analysis of the DOIC solutions

   conformance to the requirements defined in [RFC7068].



C.1.  Deferred Requirements



   The DIME working group chose to defer certain requirements in order

   to meet an an external deadline.  The 3GPP "Core Network and

   Terminal" working group 4 (CT4) working group wished to reference

   DOIC as part of Release 12.  This required the DOIC base protocol to

   be substantially complete by the end of 2014.  The deferred work

   includes the following:



   o  Agent Overload - The ability for an agent to report an overload

      condition of the agent itself.



   o  Load Information - The ability for a node to report its load level

      when not overloaded.



   At the time of this writing, DIME has begun separate work efforts for

   these requirements.



C.2.  Detection of non-supporting Intermediaries



   The DOIC mechanism as currently defined does not allow supporting

   nodes to automatically determine whether OC-Supported-Features or OC-

   OLR AVPs are originated by a peer node, or by a non-peer node and

   sent across a non-supporting peer.  This makes it impossible to

   detect the presence of non-supporting nodes between supporting nodes,

   except by configuration.  The working group determined that such a

   configuration requirement is acceptable.



   This limits full compliance with certain requirements related to the

   limitation of new configuration, deployment in environments with

   mixed support, operating across non-supporting agents, and

   authorization.

[MCruz] I think this paragraph should state what are the limitations (gener=
ally, like you did for rest of them)

Morever, since detailed descriptions will be deleted.



C.3.  Implicit Application Indication



   The working group elected to determine the application for an

   overload report from that of the enclosing message.  This prevents

   sending an OLR for an application when there are no transactions for

   that application.



   As a consequence, DOIC does not comply with the requirement to be

   able to report overload information across quiescent connections.

   DOIC does not fully comply with requirements to operate on up-to-date

   information, since if an OLR causes all transactions to stop for an

   application, the only way traffic will resume is for the OLR to

   expire.



C.4.  Stateless Operation



   RFC7068 explicitly discourages the sending of OLRs in every answer

   message, as part of the requirement to avoid additional work for

   overloaded nodes.  DOIC recommends exactly that behavior during

   active overload conditions.  The working group determined that doing

   otherwise would reduce reliability and increase statefulness.  (Note

   that DOIC does allow nodes to avoid sending OLRs in every answer if

   they have some other method of ensuring that OLRs get to all relevant

   reacting nodes.)



C.5.  No New Vulnerabilities



   The working group believes that DOIC is compliant with the

   requirement to avoid introducing new vulnerabilities.  However, this

   requirement may warrant an early security expert review.



C.6.  Detailed Requirements



   [RFC Editor: Please remove this section and subsections prior to

   publication as an RFC.]



C.6.1.  General



   REQ 1:  The solution MUST provide a communication method for Diameter

           nodes to exchange load and overload information.



           *Partially Compliant*. The mechanism uses new AVPs

           piggybacked on existing Diameter messages to exchange

           overload information.  It does not currently support "load"

           information or the ability to report overload of an agent.

           These have been left for future extensions.







   REQ 2:  The solution MUST allow Diameter nodes to support overload

           control regardless of which Diameter applications they

           support.  Diameter clients and agents must be able to use the

           received load and overload information to support graceful

           behavior during an overload condition.  Graceful behavior

           under overload conditions is best described by REQ 3.



           *Partially Compliant*. The DOIC AVPs can be used in any

           application that allows the extension of AVPs.  However,

           "load" information is not currently supported.







   REQ 3:  The solution MUST limit the impact of overload on the overall

           useful throughput of a Diameter server, even when the

           incoming load on the network is far in excess of its

           capacity.  The overall useful throughput under load is the

           ultimate measure of the value of a solution.



           *Compliant*. DOIC provides information that nodes can use to

           reduce the impact of overload.







   REQ 4:  Diameter allows requests to be sent from either side of a

           connection, and either side of a connection may have need to

           provide its overload status.  The solution MUST allow each

           side of a connection to independently inform the other of its

           overload status.



           *Compliant*. DOIC AVPs can be included regardless of

           transaction "direction"







   REQ 5:  Diameter allows nodes to determine their peers via dynamic

           discovery or manual configuration.  The solution MUST work

           consistently without regard to how peers are determined.



           *Compliant*. DOIC contains no assumptions about how peers are

           discovered.







   REQ 6:  The solution designers SHOULD seek to minimize the amount of

           new configuration required in order to work.  For example, it

           is better to allow peers to advertise or negotiate support

           for the solution, rather than to require that this knowledge

           to be configured at each node.



           *Partially Compliant*. Most DOIC parameters are advertised

           using the DOIC capability announcement mechanism.  However,

           there are some situations where configuration is required.

           For example, a DOIC node detect the fact that a peer may not

           support DOIC when nodes on the other side of the non-

           supporting node do support DOIC without configuration.



[MCruz] Could you clarify last example? "withoug configuration"? I do not u=
nderstand what you meant.



C.6.2.  Performance



   REQ 7:  The solution and any associated default algorithm(s) MUST

           ensure that the system remains stable.  At some point after

           an overload condition has ended, the solution MUST enable

           capacity to stabilize and become equal to what it would be in

           the absence of an overload condition.  Note that this also

           requires that the solution MUST allow nodes to shed load

           without introducing non-converging oscillations during or

           after an overload condition.



           *Compliant*. The specification offers guidance that

           implementations should apply hysteresis when recovering from

           overload, and avoid sudden ramp ups in offered load when

           recovering.







   REQ 8:  Supporting nodes MUST be able to distinguish current overload

           information from stale information.



           *Partially Compliant*. DOIC overload reports are "soft

           state", that is they expire after an indicated period.  DOIC

           nodes may also send reports that end existing overload

           conditions.  DOIC requires reporting nodes to ensure that all

           relevant reacting nodes receive overload reports.



           However, since DOIC does not allow reporting nodes to send

           OLRs in watchdog messages, if an overload condition results

           in zero offered load, the reporting node cannot update the

           condition until the expiration of the original OLR.







   REQ 9:  The solution MUST function across fully loaded as well as

           quiescent transport connections.  This is partially derived

           from the requirement for stability in REQ 7.



           *Not Compliant*. DOIC does not allow OLRs to be sent over

           quiescent transport connections.  This is due to the fact

           that OLRs cannot be sent outside of the application to which

           they apply.







   REQ 10: Consumers of overload information MUST be able to determine

           when the overload condition improves or ends.



           *Partially Compliant*. (See response to previous two

           requirements.)







   REQ 11: The solution MUST be able to operate in networks of different

           sizes.



           *Compliant*. DOIC makes no assumptions about the size of the

           network.  DOIC can operate purely between clients and

           servers, or across agents.







   REQ 12: When a single network node fails, goes into overload, or

           suffers from reduced processing capacity, the solution MUST

           make it possible to limit the impact of the affected node on

           other nodes in the network.  This helps to prevent a small-

           scale failure from becoming a widespread outage.



           *Partially Compliant*. DOIC allows overload reports for an

           entire realm, where abated traffic will not be redirected

           towards another server.  But in situations where nodes choose

           to divert traffic to other nodes, DOIC offers no way of

           knowing whether the new recipients can handle the traffic if

           they have not already indicated overload.  This may be

           mitigated with the use of a future "load" extension, or with

           the use of proprietary dynamic load-balancing mechanisms.







   REQ 13: The solution MUST NOT introduce substantial additional work

           for a node in an overloaded state.  For example, a

           requirement for an overloaded node to send overload

           information every time it received a new request would

           introduce substantial work.



           *Not Compliant*. DOIC does in fact encourage an overloaded

           node to send an OLR in every response.  The working group

           that other mechanisms to ensure that every relevant node

           receives an OLR would create even more work.  [Note: This

           needs discussion.]







   REQ 14: Some scenarios that result in overload involve a rapid

           increase of traffic with little time between normal levels

           and levels that induce overload.  The solution SHOULD provide

           for rapid feedback when traffic levels increase.



           *Compliant*. The piggyback mechanism allows OLRs to be sent

           at the same rate as application traffic.







   REQ 15: The solution MUST NOT interfere with the congestion control

           mechanisms of underlying transport protocols.  For example, a

           solution that opened additional TCP connections when the

           network is congested would reduce the effectiveness of the

           underlying congestion control mechanisms.



           *Compliant*. DOIC does not require or recommend changes in

           the handling of transport protocols or connections.







C.6.3.  Heterogeneous Support for Solution



   REQ 16: The solution is likely to be deployed incrementally.  The

           solution MUST support a mixed environment where some, but not

           all, nodes implement it.



           *Partially Compliant*. DOIC works with most mixed-deployment

           scenarios.  However, it cannot work across a non-supporting

           proxy that modifies Origin-Host AVPs in answer messages.

           DOIC will have limited impact in networks where the nodes

           that perform server selections do not support the mechanism.







   REQ 17: In a mixed environment with nodes that support the solution

           and nodes that do not, the solution MUST NOT result in

           materially less useful throughput during overload as would

           have resulted if the solution were not present.  It SHOULD

           result in less severe overload in this environment.



           *Compliant*. In most mixed-support deployment, DOIC will

           offer at least some value, and will not make things worse.







   REQ 18: In a mixed environment of nodes that support the solution and

           nodes that do not, the solution MUST NOT preclude elements

           that support overload control from treating elements that do

           not support overload control in an equitable fashion relative

           to those that do.  Users and operators of nodes that do not

           support the solution MUST NOT unfairly benefit from the

           solution.  The solution specification SHOULD provide guidance

           to implementors for dealing with elements not supporting

           overload control.



           *Compliant*. DOIC provides mechanisms to abate load from non-

           supporting sources.  Furthermore, it recommends that

           reporting nodes will still need to be able to apply whatever

           protections they would ordinarily apply if DOIC were not in

           use.







   REQ 19: It MUST be possible to use the solution between nodes in

           different realms and in different administrative domains.



           *Partially Compliant*. DOIC allows sending OLRs across

           administrative domains, and potentially to nodes in other

           realms.  However, an OLR cannot indicate overload for realms

           other than the one in the Origin-Realm AVP of the containing

           answer.







   REQ 20: Any explicit overload indication MUST be clearly

           distinguishable from other errors reported via Diameter.



           *Compliant*. DOIC sends explicit overload indication in

           overload reports.  It does not depend on error result codes.







   REQ 21: In cases where a network node fails, is so overloaded that it

           cannot process messages, or cannot communicate due to a

           network failure, it may not be able to provide explicit

           indications of the nature of the failure or its levels of

           overload.  The solution MUST result in at least as much

           useful throughput as would have resulted if the solution were

           not in place.



           *Compliant*. DOIC overload reports have the primary effect of

           suppressing message retries in overload conditions.  DOIC

           recommends that messages never be silently dropped if at all

           possible.







C.6.4.  Granular Control



   REQ 22: The solution MUST provide a way for a node to throttle the

           amount of traffic it receives from a peer node.  This

           throttling SHOULD be graded so that it can be applied

           gradually as offered load increases.  Overload is not a

           binary state; there may be degrees of overload.



           *Compliant*. The "loss" algorithm expresses a percentage

           reduction.







   REQ 23: The solution MUST provide sufficient information to enable a

           load-balancing node to divert messages that are rejected or

           otherwise throttled by an overloaded upstream node to other

           upstream nodes that are the most likely to have sufficient

           capacity to process them.



           *Not Compliant*. DOIC provides no built in mechanism to

           determine the best place to divert messages that would

           otherwise be throttled.  This can be accomplished with a

           future "load" extension, or with proprietary load balancing

           mechanisms.



[MCruz] Partly Compliant. DOIC Overload information can be used already by =
proprietary load-balancing implementations.

Load information will be a plus to this.





   REQ 24: The solution MUST provide a mechanism for indicating load

           levels, even when not in an overload condition, to assist

           nodes in making decisions to prevent overload conditions from

           occurring.



           *Not Compliant*. "Load" information has been left for a

           future extension.







C.6.5.  Priority and Policy



   REQ 25: The base specification for the solution SHOULD offer general

           guidance on which message types might be desirable to send or

           process over others during times of overload, based on

           application-specific considerations.  For example, it may be

           more beneficial to process messages for existing sessions

           ahead of new sessions.  Some networks may have a requirement

           to give priority to requests associated with emergency

           sessions.  Any normative or otherwise detailed definition of

           the relative priorities of message types during an overload

           condition will be the responsibility of the application

           specification.



           *Compliant*. The specification offers guidance on how

           requests might be prioritized for different types of

           applications.







   REQ 26: The solution MUST NOT prevent a node from prioritizing

           requests based on any local policy, so that certain requests

           are given preferential treatment, given additional

           retransmission, not throttled, or processed ahead of others.



           *Compliant*. Nothing in the specification prevents

           application-specific, implementation-specific, or local

           policies.







C.6.6.  Security



   REQ 27: The solution MUST NOT provide new vulnerabilities to

           malicious attack or increase the severity of any existing

           vulnerabilities.  This includes vulnerabilities to DoS and

           DDoS attacks as well as replay and man-in-the-middle attacks.

           Note that the Diameter base specification [RFC6733] lacks

           end-to-end security and this must be considered (see the

           Security Considerations in [RFC7068]).  Note that this

           requirement was expressed at a high level so as to not

           preclude any particular solution.  Is is expected that the

           solution will address this in more detail.



           *Compliant*. The working group is not aware of any such

           vulnerabilities.  [This may need further analysis.]







   REQ 28: The solution MUST NOT depend on being deployed in

           environments where all Diameter nodes are completely trusted.

           It SHOULD operate as effectively as possible in environments

           where other nodes are malicious; this includes preventing

           malicious nodes from obtaining more than a fair share of

           service.  Note that this does not imply any responsibility on

           the solution to detect, or take countermeasures against,

           malicious nodes.



           *Partially Compliant*. Since all Diameter security is

           currently at the transport layer, nodes must trust immediate

           peers to enforce trust policies.  However, there are

           situations where a DOIC node cannot determine if an immediate

           peer supports DOIC.  The authors recommend an expert security

           review.







   REQ 29: It MUST be possible for a supporting node to make

           authorization decisions about what information will be sent

           to peer nodes based on the identity of those nodes.  This

           allows a domain administrator who considers the load of their

           nodes to be sensitive information to restrict access to that

           information.  Of course, in such cases, there is no

           expectation that the solution itself will help prevent

           overload from that peer node.



           *Partially Compliant*. (See response to previous

           requirement.)







   REQ 30: The solution MUST NOT interfere with any Diameter-compliant

           method that a node may use to protect itself from overload

           from non-supporting nodes or from denial-of-service attacks.



           *Compliant*. The specification recommends that any such

           protection mechanism needed without DOIC should continue to

           be employed with DOIC.

[MCruz] Could you point our where in the draft it is described?





C.6.7.  Flexibility and Extensibility



   REQ 31: There are multiple situations where a Diameter node may be

           overloaded for some purposes but not others.  For example,

           this can happen to an agent or server that supports multiple

           applications, or when a server depends on multiple external

           resources, some of which may become overloaded while others

           are fully available.  The solution MUST allow Diameter nodes

           to indicate overload with sufficient granularity to allow

           clients to take action based on the overloaded resources

           without unreasonably forcing available capacity to go unused.

           The solution MUST support specification of overload

           information with granularities of at least "Diameter node",

           "realm", and "Diameter application" and MUST allow

           extensibility for others to be added in the future.



           *Partially Compliant*. All DOIC overload reports are scoped

           to the specific application and realm.  Inside that scope,

           overload can be reported at the specific server or whole

           realm scope.  As currently specified, DOIC cannot indicate

           local overload for an agent.  At the time of this writing,

           the DIME working group has plans to work on an agent-overload

           extension.



           DOIC allows new "scopes" through the use of extended report

           types.







   REQ 32: The solution MUST provide a method for extending the

           information communicated and the algorithms used for overload

           control.



           *Compliant*. DOIC allows new report types and abatement

           algorithms to be created.  These may be indicated using the

           OC-Supported-Features AVP.







   REQ 33: The solution MUST provide a default algorithm that is

           mandatory to implement.



           *Compliant*. The "loss" algorithm is mandatory to implement.







   REQ 34: The solution SHOULD provide a method for exchanging overload

           and load information between elements that are connected by

           intermediaries that do not support the solution.



           *Partially Compliant*. DOIC information can traverse non-

           supporting agents, as long as those agents do not modify

           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a

           way for supporting nodes to detect such modification.


--_000_087A34937E64E74E848732CFF8354B920987F783ESESSMB101erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
p.MsoCommentText, li.MsoCommentText, div.MsoCommentText
	{mso-style-priority:99;
	mso-style-link:"Comment Text Char";
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:10.0pt;
	margin-left:0cm;
	font-size:10.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.CommentTextChar
	{mso-style-name:"Comment Text Char";
	mso-style-priority:99;
	mso-style-link:"Comment Text";
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ES" link=3D"blue" vlink=3D"purple" style=3D"word-wrap: break-=
word;-webkit-nbsp-mode: space;-webkit-line-break: after-white-space">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hello,<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">See some comments below<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Thanks<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">/MCruz<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;"> DiME [mailto:dime-bounces@ietf.org]
<b>On Behalf Of </b>Ben Campbell<br>
<b>Sent:</b> martes, 25 de noviembre de 2014 3:19<br>
<b>To:</b> dime@ietf.org list<br>
<b>Subject:</b> [Dime] Updated DOIC Requirements Analysis<o:p></o:p></span>=
</p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Here's the text from the updated requirements analys=
is. I updated the summary to be more general, and updated the detail based =
on mail discussion. The detail section is marked for deletion before public=
ation as an RFC.&nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">BTW, It's appendix C now because I used the section =
Steve had already reserved for it :-)<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Thanks!<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Ben.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">-------------------<o:p></o:p></p>
</div>
<div>
<pre style=3D"word-wrap: break-word;white-space:pre-wrap">Appendix C.&nbsp;=
 Requirements Conformance Analysis<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; This section contains the result of an analysis of the DO=
IC solutions<o:p></o:p></pre>
<pre>&nbsp;&nbsp; conformance to the requirements defined in [RFC7068].<o:p=
></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.1.&nbsp; Deferred Requirements<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The DIME working group chose to defer certain requirement=
s in order<o:p></o:p></pre>
<pre>&nbsp;&nbsp; to meet an an external deadline.&nbsp; The 3GPP &quot;Cor=
e Network and<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Terminal&quot; working group 4 (CT4) working group wished=
 to reference<o:p></o:p></pre>
<pre>&nbsp;&nbsp; DOIC as part of Release 12.&nbsp; This required the DOIC =
base protocol to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; be substantially complete by the end of 2014.&nbsp; The d=
eferred work<o:p></o:p></pre>
<pre>&nbsp;&nbsp; includes the following:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; o&nbsp; Agent Overload - The ability for an agent to repo=
rt an overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition of the agent itself.<o:p></o:=
p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; o&nbsp; Load Information - The ability for a node to repo=
rt its load level<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when not overloaded.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; At the time of this writing, DIME has begun separate work=
 efforts for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; these requirements.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.2.&nbsp; Detection of non-supporting Intermediaries<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The DOIC mechanism as currently defined does not allow su=
pporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp; nodes to automatically determine whether OC-Supported-Fea=
tures or OC-<o:p></o:p></pre>
<pre>&nbsp;&nbsp; OLR AVPs are originated by a peer node, or by a non-peer =
node and<o:p></o:p></pre>
<pre> &nbsp;&nbsp;sent across a non-supporting peer.&nbsp; This makes it im=
possible to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; detect the presence of non-supporting nodes between suppo=
rting nodes,<o:p></o:p></pre>
<pre>&nbsp;&nbsp; except by configuration.&nbsp; The working group determin=
ed that such a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; configuration requirement is acceptable.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp; &nbsp;This limits full compliance with certain requirements rel=
ated to the<o:p></o:p></pre>
<pre>&nbsp;&nbsp; limitation of new configuration, deployment in environmen=
ts with<o:p></o:p></pre>
<pre>&nbsp;&nbsp; mixed support, operating across non-supporting agents, an=
d<o:p></o:p></pre>
<pre>&nbsp;&nbsp; authorization.<o:p></o:p></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">[MCruz] I think this paragra=
ph should state what are the limitations (generally, like you did for rest =
of them)<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Morever, since detailed desc=
riptions will be deleted.<o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre>C.3.&nbsp; Implicit Application Indication<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The working group elected to determine the application fo=
r an<o:p></o:p></pre>
<pre>&nbsp;&nbsp; overload report from that of the enclosing message.&nbsp;=
 This prevents<o:p></o:p></pre>
<pre>&nbsp;&nbsp; sending an OLR for an application when there are no trans=
actions for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that application.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; As a consequence, DOIC does not comply with the requireme=
nt to be<o:p></o:p></pre>
<pre>&nbsp;&nbsp; able to report overload information across quiescent conn=
ections.<o:p></o:p></pre>
<pre>&nbsp;&nbsp; DOIC does not fully comply with requirements to operate o=
n up-to-date<o:p></o:p></pre>
<pre>&nbsp;&nbsp; information, since if an OLR causes all transactions to s=
top for an<o:p></o:p></pre>
<pre>&nbsp;&nbsp; application, the only way traffic will resume is for the =
OLR to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; expire.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.4.&nbsp; Stateless Operation<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; RFC7068 explicitly discourages the sending of OLRs in eve=
ry answer<o:p></o:p></pre>
<pre>&nbsp;&nbsp; message, as part of the requirement to avoid additional w=
ork for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; overloaded nodes.&nbsp; DOIC recommends exactly that beha=
vior during<o:p></o:p></pre>
<pre>&nbsp;&nbsp; active overload conditions.&nbsp; The working group deter=
mined that doing<o:p></o:p></pre>
<pre>&nbsp;&nbsp; otherwise would reduce reliability and increase statefuln=
ess.&nbsp; (Note<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that DOIC does allow nodes to avoid sending OLRs in every=
 answer if<o:p></o:p></pre>
<pre>&nbsp;&nbsp; they have some other method of ensuring that OLRs get to =
all relevant<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reacting nodes.)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.5.&nbsp; No New Vulnerabilities<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; The working group believes that DOIC is compliant with th=
e<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requirement to avoid introducing new vulnerabilities.&nbs=
p; However, this<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requirement may warrant an early security expert review.<=
o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.&nbsp; Detailed Requirements<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; [RFC Editor: Please remove this section and subsections p=
rior to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; publication as an RFC.]<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.1.&nbsp; General<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 1:&nbsp; The solution MUST provide a communication me=
thod for Diameter<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes to =
exchange load and overload information.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. The mechanism uses new AVPs<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; piggyback=
ed on existing Diameter messages to exchange<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
information.&nbsp; It does not currently support &quot;load&quot;<o:p></o:p=
></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on or the ability to report overload of an agent.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; These hav=
e been left for future extensions.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 2:&nbsp; The solution MUST allow Diameter nodes to su=
pport overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; control r=
egardless of which Diameter applications they<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support.&=
nbsp; Diameter clients and agents must be able to use the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; received =
load and overload information to support graceful<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; behavior =
during an overload condition.&nbsp; Graceful behavior<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; under ove=
rload conditions is best described by REQ 3.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. The DOIC AVPs can be used in any<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
on that allows the extension of AVPs.&nbsp; However,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;loa=
d&quot; information is not currently supported.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 3:&nbsp; The solution MUST limit the impact of overlo=
ad on the overall<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; useful th=
roughput of a Diameter server, even when the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; incoming =
load on the network is far in excess of its<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity.=
&nbsp; The overall useful throughput under load is the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ultimate =
measure of the value of a solution.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC provides information that nodes can use to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reduce th=
e impact of overload.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 4:&nbsp; Diameter allows requests to be sent from eit=
her side of a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; connectio=
n, and either side of a connection may have need to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; provide i=
ts overload status.&nbsp; The solution MUST allow each<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; side of a=
 connection to independently inform the other of its<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
status.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC AVPs can be included regardless of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; transacti=
on &quot;direction&quot;<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 5:&nbsp; Diameter allows nodes to determine their pee=
rs via dynamic<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; discovery=
 or manual configuration.&nbsp; The solution MUST work<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; consisten=
tly without regard to how peers are determined.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC contains no assumptions about how peers are<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; discovere=
d.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 6:&nbsp; The solution designers SHOULD seek to minimi=
ze the amount of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; new confi=
guration required in order to work.&nbsp; For example, it<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is better=
 to allow peers to advertise or negotiate support<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for the s=
olution, rather than to require that this knowledge<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to be con=
figured at each node.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. Most DOIC parameters are advertised<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; using the=
 DOIC capability announcement mechanism.&nbsp; However,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; there are=
 some situations where configuration is required.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; For examp=
le, a DOIC node detect the fact that a peer may not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support D=
OIC when nodes on the other side of the non-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supportin=
g node do support DOIC without configuration.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">[MCruz] Could you clarify la=
st example? &#8220;withoug configuration&#8221;? I do not understand what y=
ou meant.</span><span lang=3D"EN-US"><o:p></o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre>C.6.2.&nbsp; Performance<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 7:&nbsp; The solution and any associated default algo=
rithm(s) MUST<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ensure th=
at the system remains stable.&nbsp; At some point after<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; an overlo=
ad condition has ended, the solution MUST enable<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity =
to stabilize and become equal to what it would be in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the absen=
ce of an overload condition.&nbsp; Note that this also<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requires =
that the solution MUST allow nodes to shed load<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; without i=
ntroducing non-converging oscillations during or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; after an =
overload condition.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The specification offers guidance that<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; implement=
ations should apply hysteresis when recovering from<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload,=
 and avoid sudden ramp ups in offered load when<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recoverin=
g.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 8:&nbsp; Supporting nodes MUST be able to distinguish=
 current overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on from stale information.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC overload reports are &quot;soft<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; state&quo=
t;, that is they expire after an indicated period.&nbsp; DOIC<o:p></o:p></p=
re>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes may=
 also send reports that end existing overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition=
s.&nbsp; DOIC requires reporting nodes to ensure that all<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; relevant =
reacting nodes receive overload reports.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; However, =
since DOIC does not allow reporting nodes to send<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OLRs in w=
atchdog messages, if an overload condition results<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; in zero o=
ffered load, the reporting node cannot update the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition=
 until the expiration of the original OLR.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 9:&nbsp; The solution MUST function across fully load=
ed as well as<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; quiescent=
 transport connections.&nbsp; This is partially derived<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; from the =
requirement for stability in REQ 7.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. DOIC does not allow OLRs to be sent over<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; quiescent=
 transport connections.&nbsp; This is due to the fact<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that OLRs=
 cannot be sent outside of the application to which<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; they appl=
y.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 10: Consumers of overload information MUST be able to=
 determine<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when the =
overload condition improves or ends.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. (See response to previous two<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nts.)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 11: The solution MUST be able to operate in networks =
of different<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sizes.<o:=
p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC makes no assumptions about the size of the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network.&=
nbsp; DOIC can operate purely between clients and<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; servers, =
or across agents.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 12: When a single network node fails, goes into overl=
oad, or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suffers f=
rom reduced processing capacity, the solution MUST<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; make it p=
ossible to limit the impact of the affected node on<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; other nod=
es in the network.&nbsp; This helps to prevent a small-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; scale fai=
lure from becoming a widespread outage.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;*Partiall=
y Compliant*. DOIC allows overload reports for an<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; entire re=
alm, where abated traffic will not be redirected<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; towards a=
nother server.&nbsp; But in situations where nodes choose<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to divert=
 traffic to other nodes, DOIC offers no way of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; knowing w=
hether the new recipients can handle the traffic if<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; they have=
 not already indicated overload.&nbsp; This may be<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mitigated=
 with the use of a future &quot;load&quot; extension, or with<o:p></o:p></p=
re>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the use o=
f proprietary dynamic load-balancing mechanisms.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 13: The solution MUST NOT introduce substantial addit=
ional work<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for a nod=
e in an overloaded state.&nbsp; For example, a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nt for an overloaded node to send overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on every time it received a new request would<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; introduce=
 substantial work.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. DOIC does in fact encourage an overloaded<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; node to s=
end an OLR in every response.&nbsp; The working group<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that othe=
r mechanisms to ensure that every relevant node<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; receives =
an OLR would create even more work.&nbsp; [Note: This<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; needs dis=
cussion.]<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 14: Some scenarios that result in overload involve a =
rapid<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; increase =
of traffic with little time between normal levels<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and level=
s that induce overload.&nbsp; The solution SHOULD provide<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for rapid=
 feedback when traffic levels increase.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The piggyback mechanism allows OLRs to be sent<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; at the sa=
me rate as application traffic.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 15: The solution MUST NOT interfere with the congesti=
on control<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mechanism=
s of underlying transport protocols.&nbsp; For example, a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution =
that opened additional TCP connections when the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network i=
s congested would reduce the effectiveness of the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; underlyin=
g congestion control mechanisms.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC does not require or recommend changes in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the handl=
ing of transport protocols or connections.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.3.&nbsp; Heterogeneous Support for Solution<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 16: The solution is likely to be deployed incremental=
ly.&nbsp; The<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution =
MUST support a mixed environment where some, but not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all, node=
s implement it.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC works with most mixed-deployment<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; scenarios=
.&nbsp; However, it cannot work across a non-supporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; proxy tha=
t modifies Origin-Host AVPs in answer messages.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DOIC will=
 have limited impact in networks where the nodes<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that perf=
orm server selections do not support the mechanism.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 17: In a mixed environment with nodes that support th=
e solution<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and nodes=
 that do not, the solution MUST NOT result in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; materiall=
y less useful throughput during overload as would<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have resu=
lted if the solution were not present.&nbsp; It SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; result in=
 less severe overload in this environment.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. In most mixed-support deployment, DOIC will<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; offer at =
least some value, and will not make things worse.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 18: In a mixed environment of nodes that support the =
solution and<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes tha=
t do not, the solution MUST NOT preclude elements<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that supp=
ort overload control from treating elements that do<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not suppo=
rt overload control in an equitable fashion relative<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to those =
that do.&nbsp; Users and operators of nodes that do not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; support t=
he solution MUST NOT unfairly benefit from the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution.=
&nbsp; The solution specification SHOULD provide guidance<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to implem=
entors for dealing with elements not supporting<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
control.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC provides mechanisms to abate load from non-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supportin=
g sources.&nbsp; Furthermore, it recommends that<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;reporting=
 nodes will still need to be able to apply whatever<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protectio=
ns they would ordinarily apply if DOIC were not in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; use.<o:p>=
</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 19: It MUST be possible to use the solution between n=
odes in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; different=
 realms and in different administrative domains.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC allows sending OLRs across<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; administr=
ative domains, and potentially to nodes in other<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; realms.&n=
bsp; However, an OLR cannot indicate overload for realms<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;other tha=
n the one in the Origin-Realm AVP of the containing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; answer.<o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 20: Any explicit overload indication MUST be clearly<=
o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; distingui=
shable from other errors reported via Diameter.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC sends explicit overload indication in<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
reports.&nbsp; It does not depend on error result codes.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 21: In cases where a network node fails, is so overlo=
aded that it<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cannot pr=
ocess messages, or cannot communicate due to a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network f=
ailure, it may not be able to provide explicit<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; indicatio=
ns of the nature of the failure or its levels of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload.=
&nbsp; The solution MUST result in at least as much<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; useful th=
roughput as would have resulted if the solution were<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not in pl=
ace.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC overload reports have the primary effect of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; suppressi=
ng message retries in overload conditions.&nbsp; DOIC<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recommend=
s that messages never be silently dropped if at all<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; possible.=
<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.4.&nbsp; Granular Control<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 22: The solution MUST provide a way for a node to thr=
ottle the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; amount of=
 traffic it receives from a peer node.&nbsp; This<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; throttlin=
g SHOULD be graded so that it can be applied<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; gradually=
 as offered load increases.&nbsp; Overload is not a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; binary st=
ate; there may be degrees of overload.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The &quot;loss&quot; algorithm expresses a percentage<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;reduction=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 23: The solution MUST provide sufficient information =
to enable a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; load-bala=
ncing node to divert messages that are rejected or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; otherwise=
 throttled by an overloaded upstream node to other<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; upstream =
nodes that are the most likely to have sufficient<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity =
to process them.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. DOIC provides no built in mechanism to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; determine=
 the best place to divert messages that would<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; otherwise=
 be throttled.&nbsp; This can be accomplished with a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; future &q=
uot;load&quot; extension, or with proprietary load balancing<o:p></o:p></pr=
e>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mechanism=
s.<o:p></o:p></pre>
<pre><span style=3D"color:#002060"><o:p>&nbsp;</o:p></span></pre>
<p class=3D"MsoCommentText"><span lang=3D"EN-US" style=3D"color:#002060">[M=
Cruz] Partly Compliant. DOIC Overload information can be used already by pr=
oprietary load-balancing implementations.<o:p></o:p></span></p>
<p class=3D"MsoCommentText"><span lang=3D"EN-US" style=3D"color:#002060">Lo=
ad information will be a plus to this.<o:p></o:p></span></p>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"EN-US">&nbsp;&nbsp; </span>REQ 24: The solution MUST pro=
vide a mechanism for indicating load<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; levels, e=
ven when not in an overload condition, to assist<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes in =
making decisions to prevent overload conditions from<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; occurring=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Not Comp=
liant*. &quot;Load&quot; information has been left for a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; future ex=
tension.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.5.&nbsp; Priority and Policy<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 25: The base specification for the solution SHOULD of=
fer general<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; guidance =
on which message types might be desirable to send or<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; process o=
ver others during times of overload, based on<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
on-specific considerations. &nbsp;For example, it may be<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; more bene=
ficial to process messages for existing sessions<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ahead of =
new sessions.&nbsp; Some networks may have a requirement<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to give p=
riority to requests associated with emergency<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sessions.=
&nbsp; Any normative or otherwise detailed definition of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the relat=
ive priorities of message types during an overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition=
 will be the responsibility of the application<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; specifica=
tion.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The specification offers guidance on how<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requests =
might be prioritized for different types of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
ons.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 26: The solution MUST NOT prevent a node from priorit=
izing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requests =
based on any local policy, so that certain requests<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;are given=
 preferential treatment, given additional<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; retransmi=
ssion, not throttled, or processed ahead of others.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. Nothing in the specification prevents<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
on-specific, implementation-specific, or local<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; policies.=
<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>C.6.6.&nbsp; Security<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 27: The solution MUST NOT provide new vulnerabilities=
 to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious=
 attack or increase the severity of any existing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vulnerabi=
lities.&nbsp; This includes vulnerabilities to DoS and<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DDoS atta=
cks as well as replay and man-in-the-middle attacks.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note that=
 the Diameter base specification [RFC6733] lacks<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; end-to-en=
d security and this must be considered (see the<o:p></o:p></pre>
<pre> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Security =
Considerations in [RFC7068]).&nbsp; Note that this<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nt was expressed at a high level so as to not<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; preclude =
any particular solution.&nbsp; Is is expected that the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; solution =
will address this in more detail.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The working group is not aware of any such<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; vulnerabi=
lities.&nbsp; [This may need further analysis.]<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 28: The solution MUST NOT depend on being deployed in=
<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; environme=
nts where all Diameter nodes are completely trusted.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; It SHOULD=
 operate as effectively as possible in environments<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; where oth=
er nodes are malicious; this includes preventing<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious=
 nodes from obtaining more than a fair share of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; service.&=
nbsp; Note that this does not imply any responsibility on<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the solut=
ion to detect, or take countermeasures against,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; malicious=
 nodes.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. Since all Diameter security is<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; currently=
 at the transport layer, nodes must trust immediate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; peers to =
enforce trust policies.&nbsp; However, there are<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; situation=
s where a DOIC node cannot determine if an immediate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; peer supp=
orts DOIC.&nbsp; The authors recommend an expert security<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; review.<o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 29: It MUST be possible for a supporting node to make=
<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; authoriza=
tion decisions about what information will be sent<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to peer n=
odes based on the identity of those nodes.&nbsp; This<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; allows a =
domain administrator who considers the load of their<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nodes to =
be sensitive information to restrict access to that<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on.&nbsp; Of course, in such cases, there is no<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; expectati=
on that the solution itself will help prevent<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
from that peer node.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. (See response to previous<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; requireme=
nt.)<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 30: The solution MUST NOT interfere with any Diameter=
-compliant<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; method th=
at a node may use to protect itself from overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; from non-=
supporting nodes or from denial-of-service attacks.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The specification recommends that any such<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; protectio=
n mechanism needed without DOIC should continue to<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be employ=
ed with DOIC.<o:p></o:p></pre>
<pre><span lang=3D"EN-US" style=3D"color:#1F497D">[MCruz] Could you point o=
ur where in the draft it is described?</span><span lang=3D"EN-US"><o:p></o:=
p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></pre>
<pre>C.6.7.&nbsp; Flexibility and Extensibility<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 31: There are multiple situations where a Diameter no=
de may be<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overloade=
d for some purposes but not others.&nbsp; For example,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; this can =
happen to an agent or server that supports multiple<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; applicati=
ons, or when a server depends on multiple external<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; resources=
, some of which may become overloaded while others<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; are fully=
 available.&nbsp; The solution MUST allow Diameter nodes<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to indica=
te overload with sufficient granularity to allow<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; clients t=
o take action based on the overloaded resources<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; without u=
nreasonably forcing available capacity to go unused.<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The solut=
ion MUST support specification of overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on with granularities of at least &quot;Diameter node&quot;,<o:p></o:p></pr=
e>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;rea=
lm&quot;, and &quot;Diameter application&quot; and MUST allow<o:p></o:p></p=
re>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extensibi=
lity for others to be added in the future.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. All DOIC overload reports are scoped<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to the sp=
ecific application and realm.&nbsp; Inside that scope,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; overload =
can be reported at the specific server or whole<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; realm sco=
pe.&nbsp; As currently specified, DOIC cannot indicate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; local ove=
rload for an agent.&nbsp; At the time of this writing,<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the DIME =
working group has plans to work on an agent-overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extension=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DOIC allo=
ws new &quot;scopes&quot; through the use of extended report<o:p></o:p></pr=
e>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; types.<o:=
p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 32: The solution MUST provide a method for extending =
the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; informati=
on communicated and the algorithms used for overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; control.<=
o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. DOIC allows new report types and abatement<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; algorithm=
s to be created.&nbsp; These may be indicated using the<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OC-Suppor=
ted-Features AVP.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 33: The solution MUST provide a default algorithm tha=
t is<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mandatory=
 to implement.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Complian=
t*. The &quot;loss&quot; algorithm is mandatory to implement.<o:p></o:p></p=
re>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; REQ 34: The solution SHOULD provide a method for exchangi=
ng overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;and load =
information between elements that are connected by<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; intermedi=
aries that do not support the solution.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *Partiall=
y Compliant*. DOIC information can traverse non-<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supportin=
g agents, as long as those agents do not modify<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain A=
VPs. (e.g., Origin-Host).&nbsp; DOIC does not provide a<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; way for s=
upporting nodes to detect such modification.<o:p></o:p></pre>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_087A34937E64E74E848732CFF8354B920987F783ESESSMB101erics_--


From nobody Wed Dec 10 07:09:45 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 561831A0047 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1cXtxRG1LMa1 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:33 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 623E01A02BE for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:23 -0800 (PST)
X-AuditID: c1b4fb3a-f79116d000000fec-9f-54886222d820
Received: from ESESSHC020.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 5A.4F.04076.22268845; Wed, 10 Dec 2014 16:09:22 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC020.ericsson.se ([153.88.183.78]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:21 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>, "ext Steve Donovan" <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 1
Thread-Index: AQHQEzn9APTOpOEpnEOsWl042ZAFN5yHKxAQgAGJnHA=
Date: Wed, 10 Dec 2014 15:09:21 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F7A8@ESESSMB101.ericsson.se>
References: <54862C38.1000403@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrNLMWRmVeSWpSXmKPExsUyM+Jvja5SUkeIwZQzIhZze1ewWWxo4rFY 93YFkwOzx5IlP5k8fq6/yu6x6m0fawBzFJdNSmpOZllqkb5dAlfG9ms3GAuWyFUsvLuZqYFx u0QXIyeHhICJxIp3+xkhbDGJC/fWs3UxcnEICRxhlOhd+JIJwlnMKNG8/AArSBWbgJ3EpdMv wBIiAv2MEkeuTmACSQgDjTo+cwvQKA6ghKnEhVn5IGERASuJ7lU3wHpZBFQlzt67BmbzCvhK zDuxFswWEiiWeH7yIZjNKRAgsax5O9hIRqCLvp9aA2YzC4hL3HoynwniUgGJJXvOM0PYohIv H/9jhbCVJBbd/gxVrydxY+oUNghbW2LZwtfMEHsFJU7OfMIygVF0FpKxs5C0zELSMgtJywJG llWMosWpxcW56UZGeqlFmcnFxfl5enmpJZsYgbFzcMtvqx2MB587HmIU4GBU4uEteN8eIsSa WFZcmXuIUZqDRUmcd+G5ecFCAumJJanZqakFqUXxRaU5qcWHGJk4OKUaGB1dtJb5pylciuie Xj/3tn29bJL5gT96sut2b9C8skBOeNGyJ9IbUyZej3nyOOd1ibTs3sdNhirTHl/TvjD9RfZL RkuHSBMdayb7fVs97/E/qN7xJFPsH5P/1OfX8l1N2z5MM3rwaunc36cPHLAz/f3QTfi62bTA lDvnPrIeyqlbHVOttkOK4bASS3FGoqEWc1FxIgD9hyUTfgIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/jVZ0NLGVLgNgQe9KX2Sft2De5jM
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:36 -0000

Steve, Ulrich,

I agree with proposed changed by Ulrich.
I am in line with his explanations below.

Best regards
/MCruz

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Monday, December 08, 2014 11:55 PM
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 1

Ulrich,

I'll deal with each of your suggestion in a separate email to help ensure t=
hat nothing is missed.

For your first suggestion:
Section 3, last paragraph:
Existing text:
   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
   that are "adjacent" for DOIC purposes may not be adjacent from a
   Diameter, or transport, perspective.  For example, one or more
   Diameter agents that do not support DOIC may exist between a given
   pair of reporting and reacting nodes, as long as those agents pass
   unknown AVPs through unchanged.  The report types described in this
   document can safely pass through non-supporting agents.  This may not
   be true for report types defined in future specifications.

Comment: while this is all not wrong, the existing text may convey the erri=
ng impression that there cannot be a DOIC supporting agent on the path betw=
een a reporting node and an adjacent reacting node.=20

Proposal: It is proposed to add the following sentence at the end of the pa=
ragraph:
   Another example is where one or more Diameter agents that do support
   DOIC may exist between a given pair of reporting and reacting nodes,
   as long as those agents pass OC-specific AVPs through unchanged.
I don't agree with the suggested change, as the DOIC supporting agents migh=
t need to change the OC-specific AVPs.
<Ulrich> I agree that in some cases DOIC supporting agents need to change t=
he OC-specific AVPs. However, there are also cases where DOIC supporting ag=
ents do not need to change OC-specific AVPs.</Ulrich>
=A0 I also don't understand how the paragraph implies that there cannot be =
DOIC supporting agents in the path of the request.
<Ulrich> It does not imply that. Rather it may convey the erring impression=
 that there cannot be a DOIC supporting agent on the path between a reporti=
ng node and an adjacent reacting node.</Ulrich>
 =A0 It is talking specifically about the case where there agents do not su=
pport DOIC are in the path.
<Ulrich> No, my understanding is that the paragraph is talking specifically=
 about what "adjacent for DOIC purposes" means. One valid example is given =
(reporting node and reacting node are "adjacent for DOIC purposes" if one o=
r more agents that do not support DOIC but pass unsupported AVPs through un=
changed exist between reporting node and reacting node) and I do not propos=
e to remove that. However, there is another important valid example (report=
ing node and reacting node are "adjacent for DOIC purposes" if one or more =
DOIC supporting agents that pass OC-specific AVPs through unchanged exist b=
etween reporting node and reacting node), and the proposal is to add text t=
o cover this example. </Ulrich> The remainder of the document makes it clea=
r that there can be agents that do support DOIC in the path of a transactio=
n.
<Ulrich> that is not my point. The point is to clearly state that there can=
 be DOIC supporting agents that pass through OC-specific AVPs unchanged on =
the path between reporting node and reacting node, and in this case the rep=
orting and reacting nodes are still regarded "adjacent for DOIC purposes".<=
/Ulrich> =20

I don't see the need for a change here.
<Ulrich> I'm not proposing a modification but an addition. This addition pr=
ovides useful clarification and in no way is harmful</Ulrich>

Regards,

Steve

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 07:09:46 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 482361A0047 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TlFZnk25bF4t for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:35 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 697ED1A1A7B for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:23 -0800 (PST)
X-AuditID: c1b4fb30-f79d66d00000744c-c9-548862217c95
Received: from ESESSHC018.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id DB.64.29772.12268845; Wed, 10 Dec 2014 16:09:21 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC018.ericsson.se ([153.88.183.72]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:20 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "lionel.morand@orange.com" <lionel.morand@orange.com>, Jouni <jouni.nospam@gmail.com>, "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: Call for WG adoption: draft-donovan-dime-agent-overload
Thread-Index: AQHQDuesc80u5oIrU027Q9q+mcP6KZyIvDXw
Date: Wed, 10 Dec 2014 15:09:20 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F79E@ESESSMB101.ericsson.se>
References: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com> <24870_1417604127_547EEC1F_24870_1587_1_6B7134B31289DC4FAF731D844122B36E99A707@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <24870_1417604127_547EEC1F_24870_1587_1_6B7134B31289DC4FAF731D844122B36E99A707@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrNLMWRmVeSWpSXmKPExsUyM+Jvja5iUkeIQddpTYu5vSvYLPava2Cy uL0904HZY+esu+weS5b8ZPJoeXaSLYA5issmJTUnsyy1SN8ugSvjSssexoKjghV7ll5lamC8 ztfFyMEhIWAiMXmHWBcjJ5ApJnHh3nq2LkYuDiGBI4wSLW+boJzFjBKvzv1iBqliE7CTuHT6 BROILSLQyCjxokUNxBYWcJF4/LidBWSoiICrxNL90RAlRhJNf2azgtgsAqoSh9bcBRvDK+Ar ce3WKlaI+TsYJXonXWYHcTgF2hglFn1oYgepYgQ66fupNWDLmAXEJW49mc8EcaqAxJI955kh bFGJl4//sULYShKLbn+GqteTuDF1ChuErS2xbOFrqM2CEidnPmGZwCg6C8nYWUhaZiFpmYWk ZQEjyypG0eLU4qTcdCMjvdSizOTi4vw8vbzUkk2MwNg5uOW3wQ7Gl88dDzEKcDAq8fAWvG8P EWJNLCuuzD3EKM3BoiTOu/DcvGAhgfTEktTs1NSC1KL4otKc1OJDjEwcnFINjPVH7ihwuFyt eHvaPvTRocypjPPZf92Ts5eYPKs3c4JYvvvqm+d7N9SHVBjeunpO+G/DjWWyS+2+ztup7RKm eiSqzd0j76zNLSfZO5tmCt1r//W1pvb3/d7VrpPFG/wtr+6sf+zpGtg1cVXvrmuWRxbFqe8r eeO6Jf12+eJrwsf3bK0oUdVRtVFiKc5INNRiLipOBABD0GKLfgIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/y2jtJL6VUxy013nV6RdgagOhTDc
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:38 -0000

Dear all,

I support adoption.
Best regards
/MCruz

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of lionel.morand@orange=
.com
Sent: mi=E9rcoles, 03 de diciembre de 2014 11:55
To: Jouni; dime@ietf.org list
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload

As individual, I support.

Lionel

-----Message d'origine-----
De=A0: Jouni [mailto:jouni.nospam@gmail.com] Envoy=E9=A0: mercredi 3 d=E9ce=
mbre 2014 11:12 =C0=A0: dime@ietf.org list Cc=A0: MORAND Lionel IMT/OLN; Jo=
uni Objet=A0: Call for WG adoption: draft-donovan-dime-agent-overload

Folks,

As we discussed and agreed during the Honolulu meeting we ask for the WG ad=
option for draft-donovan-dime-agent-overload unless counter proposals show =
up. The "wait period" for counter proposals has been more than enough.

This mail starts a two week adoption call for draft-donovan-dime-agent-over=
load as a WG Item.

Express your support or disagreements in the mailing list. The call ends 17=
th Dec EOB (CET+1).

- Jouni & Lionel


___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou =
copies sans autorisation. Si vous avez recu ce message par erreur, veuillez=
 le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Le=
s messages electroniques etant susceptibles d'alteration, Orange decline to=
ute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law; they should not be distributed, used=
 or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 07:09:56 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D2B41A6FD2 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YMVAQk5O6iun for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:38 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DA491A1B2A for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:24 -0800 (PST)
X-AuditID: c1b4fb30-f79d66d00000744c-d6-548862232959
Received: from ESESSHC001.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 9D.64.29772.32268845; Wed, 10 Dec 2014 16:09:23 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC001.ericsson.se ([153.88.183.21]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:23 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>, "ext Steve Donovan" <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 3
Thread-Index: AQHQEzuyHw34kXDxv0iSafX1rpswJ5yHTSnAgAFp5/A=
Date: Wed, 10 Dec 2014 15:09:22 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F7B0@ESESSMB101.ericsson.se>
References: <54862F13.1060907@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235158@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235158@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrDLMWRmVeSWpSXmKPExsUyM+Jvja5yUkeIwerlIhZze1ewWWxo4rFY 93YFkwOzx5IlP5k8fq6/yu6x6m0fawBzFJdNSmpOZllqkb5dAlfGorbFbAVXJStmtP9jb2Bc LNLFyMkhIWAi8eLAHFYIW0ziwr31bF2MXBxCAkcYJZb/vs8I4SxmlJhyfwFYFZuAncSl0y+Y QBIiAv2MEkeuTmACSQgDjTq3bzeYLSJgKrH+bB8bhG0lcefxMrBmFgFViZ3X9zKD2LwCvhKL Fl5lB7GFBIolbs/ZwgJicwoESPxobQKLMwKd9P3UGrCZzALiEreezGeCOFVAYsme88wQtqjE y8f/oF5Qklh0+zNUvZ7EjalT2CBsbYllC19D7RWUODnzCcsERtFZSMbOQtIyC0nLLCQtCxhZ VjGKFqcWJ+WmGxnppRZlJhcX5+fp5aWWbGIERs/BLb8NdjC+fO54iFGAg1GJh7fgfXuIEGti WXFl7iFGaQ4WJXHehefmBQsJpCeWpGanphakFsUXleakFh9iZOLglGpgnF+x5WDh5WzRR/65 VezVtXvX/3oQmfOn2+W3rd/naclTP56YVObzs2Ri2fpbxVcWybFsPH3/253GYMdJWU1CKX7n 1/1oOuv3JdXjdmbYm8MhB1wFVFa8ZZhlYLtQzG+BK6eu3Ib+6G+Fm8p5js6TOjxtT/uF78c6 HfzOeE3blnnJ0SFtYsGqhUosxRmJhlrMRcWJADDuLnF/AgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Zfw4yeiFQKUfWZYgMusEnP18FRY
Subject: Re: [Dime] Ulrich suggested change number 3
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:40 -0000

Steve, Ulrich,

I am fine with modification agreement.
Thanks
/MCruz

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Wiehe, Ulrich (NSN -=
 DE/Munich)
Sent: martes, 09 de diciembre de 2014 15:31
To: ext Steve Donovan; dime@ietf.org
Subject: Re: [Dime] Ulrich suggested change number 3

Steve,

please see inline.

Ulrich


From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 12:07 AM
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 3

Ulrich,

For suggested change number 3:
Section 3.2, last two paragraphs:
Existing text:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent updates the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine the content of the modified  OC-
      Supported-Features AVP is out-of-scope for this specification and
      is left to implementation decisions.  Care must be taken not to
      introduce interoperability issues for downstream or upstream DOIC
      nodes.

Comment: It is perfectly ok (in this case) for the agent not to update and =
not to modify.=20

Proposal: It is proposed to replace the two paragraphs with the following:
   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent can update the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine whether and if how to modify the
      content of the OC-Supported-Features AVP is out-of-scope for this
      specification and is left to implementation decisions.  Care must
      be taken not to introduce interoperability issues for downstream
      or upstream DOIC nodes.
I don't see the need for the change as the paragraph is talking specificall=
y about the scenario where an agent would change the OC-Supported-Features =
AVP.
<Ulrich> I do not agree. The paragraph is talking specifically about the ca=
se where the set of features supported by the sender of a request and by ag=
ents in the path of a request differ. In this case it is certainly true tha=
t the agent can update (modify, change) the OC-Supported-Features AVP. It i=
s, however, also true that in this case the agent can choose not to update.=
</Ulrich> That said, the change in the first paragraph is ok.
<Ulrich> thank you </Ulrich>
If we make that change then I suggest a cleaned up first sentence of the ne=
xt paragraph as follows:

"Note: The logic to determine if the content of the=A0 OC-Supported-Feature=
s AVP should be changed is out-of-scope for this document, as is the logic =
to determine the content of a modified OC-Supported-Features AVP.=A0 These =
are left to implementation decisions..."
<Ulrich> The clean up is fine</Ulrich>

Regards,

Steve

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 07:09:58 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1366A1A6FEF for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SjVeQ1KbSTTP for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:38 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C77B1A3B9D for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:24 -0800 (PST)
X-AuditID: c1b4fb3a-f79116d000000fec-a6-548862246d77
Received: from ESESSHC003.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 6B.4F.04076.42268845; Wed, 10 Dec 2014 16:09:24 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC003.ericsson.se ([153.88.183.27]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:23 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 4
Thread-Index: AQHQE658JlNue1qo10W5Gt9YB0I+bJyItskw
Date: Wed, 10 Dec 2014 15:09:23 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F7B8@ESESSMB101.ericsson.se>
References: <5486EFAA.7090902@usdonovans.com>
In-Reply-To: <5486EFAA.7090902@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: multipart/alternative; boundary="_000_087A34937E64E74E848732CFF8354B920987F7B8ESESSMB101erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrJLMWRmVeSWpSXmKPExsUyM+Jvja5KUkeIwbw+YYu5vSvYLDY08Tgw eSxZ8pPJY9XbPtYApigum5TUnMyy1CJ9uwSujF2/3rAWnLarONl0gqWB8ZlpFyMnh4SAicTU deeZIWwxiQv31rN1MXJxCAkcYZRY9X83O4SzmFHizfGDTCBVbAJ2EpdOvwCzRQR8JY53nmYB sYWBJu09vpUFIm4qsWTDQlYI20ji68/ZbCA2i4CqxJJ9h8F6eYF6n148zghiCwnoSrxt/AdW wymgJ3Ht8muwXkagi76fWgNWzywgLnHryXwmiEsFJJbsgblaVOLl43+sELaSxKLbn6Hq8yWe Tl/LArFLUOLkzCcsExhFZiEZNQtJ2SwkZRBxHYkFuz+xQdjaEssWvmaGsc8ceMyELL6AkX0V o2hxanFxbrqRkV5qUWZycXF+nl5easkmRmBcHdzy22oH48HnjocYBTgYlXh4C963hwixJpYV V+YeYpTmYFES5114bl6wkEB6YklqdmpqQWpRfFFpTmrxIUYmDk6pBsZJAmzcR+QNpd5Z8dsf MtjLsmeGzxTlGOmvUVtdTq7/c29tUL4027Ifm7ntTh+paHzw1zeH/3xOkhNLgculBGO5tbwT iv7Y2/rtZmZf85irXXmTjNjF64ocf0qTi9ZLHJ2yLuTvnlW+v2fFJR08vFLV7nGz0FG762bW x3w5Xyt9V5NO2/V+YZcSS3FGoqEWc1FxIgC50bERjAIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/s-AvlRpjxOrUEwNmpOzc1Tjk5eQ
Subject: Re: [Dime] Ulrich suggested change number 4
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:41 -0000

--_000_087A34937E64E74E848732CFF8354B920987F7B8ESESSMB101erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I agree
/MCruz

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
Sent: martes, 09 de diciembre de 2014 13:49
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 4

Ulrich,

For your fourth suggested change:

Section 3.3, 4th and 5th paragraph:

Existing text:

   A report of type "HOST_REPORT" is sent to indicate the overload of a

   specific Diameter node for the application-id indicated in the

   transaction.  When receiving an OLR of type host, a reacting node

   applies overload abatement to what is referred to in this document as

   host-routed requests.  The reacting node applies overload abatement

   on those host-routed requests which the reacting node knows will be

   served by the server that matches the Origin-Host AVP of the received

   message that contained the received OLR of type host.



   A report of type "REALM_REPORT" applies to realm-routed requests for

   a specific realm as indicated in the Destination-Realm AVP.

Comment: While the 4th paragraph is all fine, the 5th paragraph should be a=
ligned.

Proposal: It is proposed to replace the 5th paragraph with:

   A report of type "REALM_REPORT" is sent to indicate the overload of all

   Diameter nodes within a realm for the application-id indicated in the

   transaction.  When receiving an OLR of type realm, a reacting node

   applies overload abatement to what is referred to in this document as

   realm-routed requests.  The reacting node applies overload abatement

   on those realm-routed requests which contain  a Destination-Realm AVP

   that matches the Origin-Realm AVP of the received message that

   contained the received OLR of type realm.
I support the suggested change.

Regards,

Steve


--_000_087A34937E64E74E848732CFF8354B920987F7B8ESESSMB101erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"ES" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">/MCruz<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-b=
ounces@ietf.org]
<b>On Behalf Of </b>Steve Donovan<br>
<b>Sent:</b> martes, 09 de diciembre de 2014 13:49<br>
<b>To:</b> dime@ietf.org<br>
<b>Subject:</b> [Dime] Ulrich suggested change number 4<o:p></o:p></span></=
p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Ulrich,<br>
<br>
For your fourth suggested change:<o:p></o:p></p>
<pre>Section 3.3, 4th and 5th paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; A report of type &quot;HOST_REPORT&quot; is sent to indic=
ate the overload of a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; specific Diameter node for the application-id indicated i=
n the<o:p></o:p></pre>
<pre>&nbsp;&nbsp; transaction.&nbsp; When receiving an OLR of type host, a =
reacting node<o:p></o:p></pre>
<pre>&nbsp;&nbsp; applies overload abatement to what is referred to in this=
 document as<o:p></o:p></pre>
<pre>&nbsp;&nbsp; host-routed requests.&nbsp; The reacting node applies ove=
rload abatement<o:p></o:p></pre>
<pre>&nbsp;&nbsp; on those host-routed requests which the reacting node kno=
ws will be<o:p></o:p></pre>
<pre>&nbsp;&nbsp; served by the server that matches the Origin-Host AVP of =
the received<o:p></o:p></pre>
<pre>&nbsp;&nbsp; message that contained the received OLR of type host.<o:p=
></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; A report of type &quot;REALM_REPORT&quot; applies to real=
m-routed requests for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; a specific realm as indicated in the Destination-Realm AV=
P.<o:p></o:p></pre>
<pre>Comment: While the 4th paragraph is all fine, the 5th paragraph should=
 be aligned.<o:p></o:p></pre>
<pre>Proposal: It is proposed to replace the 5th paragraph with:<o:p></o:p>=
</pre>
<pre>&nbsp;&nbsp; A report of type &quot;REALM_REPORT&quot; is sent to indi=
cate the overload of all<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Diameter nodes within a realm for the application-id indi=
cated in the<o:p></o:p></pre>
<pre>&nbsp;&nbsp; transaction.&nbsp; When receiving an OLR of type realm, a=
 reacting node<o:p></o:p></pre>
<pre>&nbsp;&nbsp; applies overload abatement to what is referred to in this=
 document as<o:p></o:p></pre>
<pre>&nbsp;&nbsp; realm-routed requests.&nbsp; The reacting node applies ov=
erload abatement<o:p></o:p></pre>
<pre>&nbsp;&nbsp; on those realm-routed requests which contain&nbsp; a Dest=
ination-Realm AVP<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that matches the Origin-Realm AVP of the received message=
 that<o:p></o:p></pre>
<pre>&nbsp;&nbsp; contained the received OLR of type realm.<o:p></o:p></pre=
>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I support the suggest=
ed change.<br>
<br>
Regards,<br>
<br>
Steve<br>
<br>
<o:p></o:p></p>
</div>
</body>
</html>

--_000_087A34937E64E74E848732CFF8354B920987F7B8ESESSMB101erics_--


From nobody Wed Dec 10 07:09:59 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FC9E1A6FD2 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V7bfKCuvcKSj for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:41 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A0BA01A6F2F for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:26 -0800 (PST)
X-AuditID: c1b4fb3a-f79116d000000fec-ad-54886226ae2d
Received: from ESESSHC013.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 3C.4F.04076.62268845; Wed, 10 Dec 2014 16:09:26 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC013.ericsson.se ([153.88.183.57]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:26 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>, "ext Steve Donovan" <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #7
Thread-Index: AQHQE7D4grL00xcS/0y1e/ob6rXZ/JyHQqWAgAF1yAA=
Date: Wed, 10 Dec 2014 15:09:25 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F7C8@ESESSMB101.ericsson.se>
References: <5486F3D7.7040305@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235171@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235171@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrFLMWRmVeSWpSXmKPExsUyM+Jvja5aUkeIwey74hZze1ewWWxo4rFY 93YFkwOzx5IlP5k8fq6/yu6x6m0fawBzFJdNSmpOZllqkb5dAlfGhce3WQsmcFfM7Z/D2MDY xtnFyMkhIWAicWxaDyuELSZx4d56ti5GLg4hgSOMEvsOz2UHSQgJLGaUeHvWD8RmE7CTuHT6 BRNIkYhAP6PEkasTmEASwgIGEicWHGTsYuQAShhKvHmRBRIWEbCSePr6KhuIzSKgKtHYdxts Ga+Ar8TyB9eYIOYXS5zoPQYW5xQIkHi9qp0FxGYEOuj7qTVgNcwC4hK3nsxngjhUQGLJnvPM ELaoxMvH/6AeUJJYdPszVL2OxILdn9ggbG2JZQtfM0PsFZQ4OfMJywRG0VlIxs5C0jILScss JC0LGFlWMYoWpxYX56YbGemlFmUmFxfn5+nlpZZsYgRGzsEtv612MB587niIUYCDUYmHt+B9 e4gQa2JZcWXuIUZpDhYlcd6F5+YFCwmkJ5akZqemFqQWxReV5qQWH2Jk4uCUamDM73dj2Wyo WaEU9X2Ope2uDxeCnb//5rn7MkZk/6Oi0xkFzKdUjoawZFionfT43B/idz60YH/Du2lzJetW 6p/oO5v04/d7wcp/IdtZi5dNmPfE9NK3xQsSL03pvrE8yCBmnuaq8I3LrCT31juw57MfF1k6 y0Y17Y5Q6Bptu/glSYJXpv3qmHxUiaU4I9FQi7moOBEAeX5T/n0CAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/HUecy6oL239SweBs8MdCRk1pHo0
Subject: Re: [Dime] Ulrich's suggested change #7
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:43 -0000

Fine with me
/MCruz

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Wiehe, Ulrich (NSN -=
 DE/Munich)
Sent: martes, 09 de diciembre de 2014 15:36
To: ext Steve Donovan; dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #7

Steve,

please see inline.

Ulrich


From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:07 PM
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #7

Ulrich,

For your suggested change #7:
Section 4.1.2, 4th paragraph:
Existing text:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content of the OC-
   Feature-Vector AVP in the request message.
Comment: The Feature-Vector AVP may be absent. In this case knowledge canno=
t be based on the content.
Proposal: Replace the paragraph with:
   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content or absence of
   the OC-Feature-Vector AVP within the Supported-Features AVP in the
   request message.
I support the change with the modification of Supported-Features to OC-Supp=
orted-Features.
<Ulrich> fine with me</Ulrich>

Regards,

Steve

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 07:10:01 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14C1A1A6F2F for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ketfQATZMdjA for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:40 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA4091A6F12 for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:25 -0800 (PST)
X-AuditID: c1b4fb30-f79d66d00000744c-de-54886225ad54
Received: from ESESSHC007.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id CE.64.29772.52268845; Wed, 10 Dec 2014 16:09:25 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC007.ericsson.se ([153.88.183.39]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:24 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 5
Thread-Index: AQHQE68GCcS3l2M5okuebV1UmT60rJyIt06w
Date: Wed, 10 Dec 2014 15:09:24 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F7C0@ESESSMB101.ericsson.se>
References: <5486F07D.1010102@usdonovans.com>
In-Reply-To: <5486F07D.1010102@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: multipart/alternative; boundary="_000_087A34937E64E74E848732CFF8354B920987F7C0ESESSMB101erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrOLMWRmVeSWpSXmKPExsUyM+Jvja5qUkeIwZ3LshZze1ewWWxo4nFg 8liy5CeTx6q3fawBTFFcNimpOZllqUX6dglcGWt3f2QuOGxesXzNPMYGxgkGXYwcHBICJhLP FgCZnECmmMSFe+vZuhi5OIQEjjBK3F36ih3CWcwoce3JU3aQKjYBO4lLp18wgdgiAr4SxztP s4DYwkCDJuy7zQIyVETAVOJcdyJEiZHEs4bnYCUsAqoSh04vYAaxeYFaH7fOYwSxhQR0Jfa/ Pwc2klNAT2L/r61gqxiBDvp+ag1YnFlAXOLWk/lMEIcKSCzZc54ZwhaVePn4HyuErSSx6PZn qPp8iWNnv7BA7BKUODnzCcsERpFZSEbNQlI2C0kZRFxHYsHuT2wQtrbEsoWvmWHsMwceMyGL L2BkX8UoWpxanJSbbmSkl1qUmVxcnJ+nl5dasokRGFMHt/w22MH48rnjIUYBDkYlHt6C9+0h QqyJZcWVuYcYpTlYlMR5F56bFywkkJ5YkpqdmlqQWhRfVJqTWnyIkYmDU6qB0c9Xm62o4emJ Qr77wTtUAn7eP/xN89DHRuPuTLNFGXfTb98StQjdxzz3mKkFz4sdhYe3pVjk7M+QlTLxkK1z WveklWnpW+YbMwurDnyoVj8YnCHYmXO2aMr+Em191+SDcxcvctVnOm+d9kfixttlfL93ZDDO 7X+z/vxE8YOWPQqyAr4vP0VOV2Ipzkg01GIuKk4EAO+DyRqKAgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/P85JrywxEvPnkklKeunbS20o828
Subject: Re: [Dime] Ulrich suggested change number 5
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:46 -0000

--_000_087A34937E64E74E848732CFF8354B920987F7C0ESESSMB101erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Fine
/MCruz

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
Sent: martes, 09 de diciembre de 2014 13:52
To: dime@ietf.org
Subject: [Dime] Ulrich suggested change number 5

Ulrich,

For your suggested change number 5:

Section 3.3, 8th paragraph:

Existing text:

   Reporting nodes are responsible for determining the need for a

   reduction of traffic.  The method for making this determination is

   implementation specific and depend on the type of overload report

   being generated.  A host-report, for instance, will generally be

   generated by tracking utilization of resources required by the host

   to handle transactions for the Diameter application.  A realm-report

   generally impacts the traffic sent to multiple hosts and, as such,

   requires tracking the capacity all servers for realm-routed requests

   for the application and realm.

Comment: Something is wrong with the last sentence.

Proposal: Replace the last sentence with:

                                                         A realm-report

   generally impacts the traffic sent to multiple hosts and, as such,

   requires tracking the capacity of all servers able to handle realm-

   routed requests for the application and realm.

I support the change.

Regards,

Steve

--_000_087A34937E64E74E848732CFF8354B920987F7C0ESESSMB101erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"ES" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Fine<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">/MCruz<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-b=
ounces@ietf.org]
<b>On Behalf Of </b>Steve Donovan<br>
<b>Sent:</b> martes, 09 de diciembre de 2014 13:52<br>
<b>To:</b> dime@ietf.org<br>
<b>Subject:</b> [Dime] Ulrich suggested change number 5<o:p></o:p></span></=
p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Ulrich,<br>
<br>
For your suggested change number 5:<o:p></o:p></p>
<pre>Section 3.3, 8th paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Reporting nodes are responsible for determining the need =
for a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; reduction of traffic.&nbsp; The method for making this de=
termination is<o:p></o:p></pre>
<pre>&nbsp;&nbsp; implementation specific and depend on the type of overloa=
d report<o:p></o:p></pre>
<pre>&nbsp;&nbsp; being generated.&nbsp; A host-report, for instance, will =
generally be<o:p></o:p></pre>
<pre>&nbsp;&nbsp; generated by tracking utilization of resources required b=
y the host<o:p></o:p></pre>
<pre>&nbsp;&nbsp; to handle transactions for the Diameter application.&nbsp=
; A realm-report<o:p></o:p></pre>
<pre>&nbsp;&nbsp; generally impacts the traffic sent to multiple hosts and,=
 as such,<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requires tracking the capacity all servers for realm-rout=
ed requests<o:p></o:p></pre>
<pre>&nbsp;&nbsp; for the application and realm.<o:p></o:p></pre>
<pre>Comment: Something is wrong with the last sentence.<o:p></o:p></pre>
<pre>Proposal: Replace the last sentence with:<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A realm-report<o:p></o:p></pre>
<pre>&nbsp;&nbsp; generally impacts the traffic sent to multiple hosts and,=
 as such,<o:p></o:p></pre>
<pre>&nbsp;&nbsp; requires tracking the capacity of all servers able to han=
dle realm-<o:p></o:p></pre>
<pre>&nbsp;&nbsp; routed requests for the application and realm.<o:p></o:p>=
</pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
I support the change.<br>
<br>
Regards,<br>
<br>
Steve<o:p></o:p></p>
</div>
</body>
</html>

--_000_087A34937E64E74E848732CFF8354B920987F7C0ESESSMB101erics_--


From nobody Wed Dec 10 07:10:02 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B17F61A6F12 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2aOSX1Ijka8f for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:09:43 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E225D1A6F9F for <dime@ietf.org>; Wed, 10 Dec 2014 07:09:27 -0800 (PST)
X-AuditID: c1b4fb30-f79d66d00000744c-ea-54886227b53f
Received: from ESESSHC015.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 40.74.29772.72268845; Wed, 10 Dec 2014 16:09:27 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC015.ericsson.se ([153.88.183.63]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:09:26 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #11
Thread-Index: AQHQE7WgFE9wft/vFEGkP2TygOAcPpyIvO5g
Date: Wed, 10 Dec 2014 15:09:26 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920987F7D0@ESESSMB101.ericsson.se>
References: <5486FBA8.9020206@usdonovans.com>
In-Reply-To: <5486FBA8.9020206@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.154]
Content-Type: multipart/alternative; boundary="_000_087A34937E64E74E848732CFF8354B920987F7D0ESESSMB101erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrMLMWRmVeSWpSXmKPExsUyM+Jvja56UkeIwZ61ahZze1ewWWxo4nFg 8liy5CeTx6q3fawBTFFcNimpOZllqUX6dglcGfN/72AvaDKseHXkBFMD426tLkZODgkBE4mf qz8zQthiEhfurWcDsYUEjjBKbJxn18XIBWQvZpTY9/0gWBGbgJ3EpdMvmEBsEQFfieOdp1lA bGEBQ4lpF5exQ8SNJM5veg1UwwFm/9qgBhJmEVCV+H9gLhtImBeo9eRKsAohAV2JGeuTQCo4 BfQkVm9fxgxiMwJd8/3UGrBFzALiEreezGeCuFJAYsme88wQtqjEy8f/WCFsJYlFtz+DjWQW yJfYfaAYJMwrIChxcuYTlgmMIrOQTJqFUDULSRVEiY7Egt2f2CBsbYllC18zw9hnDjxmQhZf wMi+ilG0OLU4KTfdyEgvtSgzubg4P08vL7VkEyMwlg5u+W2wg/Hlc8dDjAIcjEo8vAXv20OE WBPLiitzDzFKc7AoifMuPDcvWEggPbEkNTs1tSC1KL6oNCe1+BAjEwenVAOjdcQKea9fDEIB jCsWZC0O/DxBOegID0dN9v0fcZ5WM5SDMv4vK5GeouO6NV3jWd96va87TvWk6Wxa+vFl7I4V H6eumTqR1W4nN5fo8nu8b+rtOUK73XaxHLIV35vD7tLUkrTx+fzGiH3lbJP3mQpWhD4P9fz6 Zo/zDYFp/hwpnxP3fL9hbDRfiaU4I9FQi7moOBEARShDLoYCAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/zi4nkc1MXpsoMZznwqRgeClNmOU
Subject: Re: [Dime] Ulrich's suggested change #11
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:09:46 -0000

--_000_087A34937E64E74E848732CFF8354B920987F7D0ESESSMB101erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Fine

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
Sent: martes, 09 de diciembre de 2014 14:40
To: dime@ietf.org
Subject: [Dime] Ulrich's suggested change #11

Ulrich,

For your  suggested change #11:

Section 4.1.3, 6th paragraph:

Existing text:

   As with a Diameter endpoint taking on reporting node behavior, a

   Diameter Agent MUST only include the OC-Supported-Features AVP in

   answer messages for transactions where the request message received

   by the Diameter Agent had an OC-Supported-Features AVP.

Comments: "MUST only do x for condition y" could mean:

a) "MUST do x for condition y and MUST NOT do x for conditions other than y=
", or

b) "MUST do x and nothing else for condition y, and nothing is specified fo=
r conditions other than y".

Proposal: Replace the paragraph with:

   As with a Diameter endpoint taking on reporting node behavior, a

   Diameter Agent MUST NOT include the OC-Supported-Features AVP in

   answer messages for transactions where the request message received

   by the Diameter Agent had no OC-Supported-Features AVP.
I support this change.

Regards,

Steve


--_000_087A34937E64E74E848732CFF8354B920987F7D0ESESSMB101erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New","serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"ES" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Fine<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [mailto:dime-b=
ounces@ietf.org]
<b>On Behalf Of </b>Steve Donovan<br>
<b>Sent:</b> martes, 09 de diciembre de 2014 14:40<br>
<b>To:</b> dime@ietf.org<br>
<b>Subject:</b> [Dime] Ulrich's suggested change #11<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Ulrich,<br>
<br>
For your&nbsp; suggested change #11:<o:p></o:p></p>
<pre>Section 4.1.3, 6th paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; As with a Diameter endpoint taking on reporting node beha=
vior, a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Diameter Agent MUST only include the OC-Supported-Feature=
s AVP in<o:p></o:p></pre>
<pre>&nbsp;&nbsp; answer messages for transactions where the request messag=
e received<o:p></o:p></pre>
<pre>&nbsp;&nbsp; by the Diameter Agent had an OC-Supported-Features AVP.<o=
:p></o:p></pre>
<pre>Comments: &quot;MUST only do x for condition y&quot; could mean:<o:p><=
/o:p></pre>
<pre>a) &quot;MUST do x for condition y and MUST NOT do x for conditions ot=
her than y&quot;, or<o:p></o:p></pre>
<pre>b) &quot;MUST do x and nothing else for condition y, and nothing is sp=
ecified for conditions other than y&quot;.<o:p></o:p></pre>
<pre>Proposal: Replace the paragraph with:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; As with a Diameter endpoint taking on reporting node beha=
vior, a<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Diameter Agent MUST NOT include the OC-Supported-Features=
 AVP in<o:p></o:p></pre>
<pre>&nbsp;&nbsp; answer messages for transactions where the request messag=
e received<o:p></o:p></pre>
<pre>&nbsp;&nbsp; by the Diameter Agent had no OC-Supported-Features AVP.<o=
:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I support this change=
.<br>
<br>
Regards,<br>
<br>
Steve<br>
<br>
<o:p></o:p></p>
</div>
</body>
</html>

--_000_087A34937E64E74E848732CFF8354B920987F7D0ESESSMB101erics_--


From nobody Wed Dec 10 07:54:27 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 749531A0115 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:54:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ElT-n1Q5Pk1L for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 07:54:06 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85C8A1A7010 for <dime@ietf.org>; Wed, 10 Dec 2014 07:53:30 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBAFrS2q014889 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 10 Dec 2014 15:53:28 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBAFrS7I000978 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 10 Dec 2014 16:53:28 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC004.nsn-intra.net ([10.159.42.35]) with mapi id 14.03.0195.001; Wed, 10 Dec 2014 16:53:27 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich suggested change number 2
Thread-Index: AQHQEzp/NeYxnYFinESbfvW92bFjMJyHQOiggAFzEACAAEV2MA==
Date: Wed, 10 Dec 2014 15:53:27 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235452@DEMUMBX014.nsn-intra.net>
References: <54862D14.2060304@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235122@DEMUMBX014.nsn-intra.net> <54883DC2.20504@usdonovans.com>
In-Reply-To: <54883DC2.20504@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 3272
X-purgate-ID: 151667::1418226808-0000658F-C2E325A7/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/sxwy4sOfg91dncq8BLu0ZGbsZ_w
Subject: Re: [Dime] Ulrich suggested change number 2
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 15:54:09 -0000

Steve,

How about something like this:

"This ensures that a reporting node allways supports at least one of the ad=
vertized abatement algorithms received in a request messages."

Regards
Ulrich


-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
Sent: Wednesday, December 10, 2014 1:34 PM
To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich suggested change number 2

Ulrich,

How about changing the last sentence to:

"This ensures that there is at least one commonly supported overload=20
abatement algorithm supported by all DOIC nodes in the path of the request.=
"

Regards,

Steve

On 12/9/14, 8:08 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
>
> please see inline.
>
> Ulrich
>
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
> Sent: Monday, December 08, 2014 11:58 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich suggested change number 2
>
> Ulrich,
>
> For the second suggested change:
> Section 3.2, 6th paragraph:
> Existing text:
>     The OC-Feature-Vector AVP will contain an indication of support for
>     the loss overload abatement algorithm defined in this specification
>     (see Section 5).  This ensures that there is at least one commonly
>     supported overload abatement algorithm between the reporting node and
>     the reacting node(s) in the path of the request.
>
> Comment: I agree that within a given path between client and server there=
 may
> be more than one reacting nodes. But a given reporting node on that path =
does
> not have more than one adjacent reacting nodes on that given path to whic=
h it
> sends OLRs. I don't say that the existing text is wrong, but it is mislea=
ding.
> What we want to say here is that any given pair of adjacent reacting and =
reporting
> nodes will have at least one commonly supported algorithm.
>
> Proposal: It is proposed to replace the last line of the paragraph with:
>     The adjacent reacting node on the path of the request.
> It's more than just about the adjacent reaction nodes.  It is important t=
hat all reacting nodes in the path of the request have at least one common =
abatement algorithm.
> <Ulrich>I do not agree. It is important that a pair of two adjacent react=
ing and reporting nodes (A,S) have at least one commonly supported algorith=
m, so that the reporting node can always select an algorithm supported by t=
he adjacent reacting node. There may be another (non-adjacent) reacting nod=
e in the path (C), but its not important for C and S (which are not adjacen=
t) to have a commonly supported algorithm.
> C---A---S
> It is important that C and A have a commonly supported algorith, as C and=
 A are adjacent;
> It is important that A and S have a commonly supported algorith, as A and=
 S are adjacent;
> It is true but not important (and nothing that needs to be ensured) that =
C and S have a commonly supported algorithm (indeed S could eventually sele=
ct an algorithm not supported by C);</Ulrich>
> It is true but not important that C, A and S have a commonly supported al=
gorithm.
>
> I don't see the need for the suggested change.
>
> Regards,
>
> Steve
>


From nobody Wed Dec 10 14:02:15 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1E7A1A90C1 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 14:02:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yZkIW9t0AuE2 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 14:02:03 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E6251A90B1 for <dime@ietf.org>; Wed, 10 Dec 2014 14:02:03 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBAM22CW085129 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 16:02:02 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5486F0F1.8000200@usdonovans.com>
Date: Wed, 10 Dec 2014 16:02:01 -0600
X-Mao-Original-Outgoing-Id: 439941721.591634-3905282a87a801cb8b7519ccec526854
Content-Transfer-Encoding: quoted-printable
Message-Id: <ED3019AE-A6DB-443F-AD28-1F058EB81676@nostrum.com>
References: <5486F0F1.8000200@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/sr8z9i9_ERFjlZYT2-HBnR0g45Y
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggest change number 6
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 22:02:13 -0000

> On Dec 9, 2014, at 6:54 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> For your suggested change #6:
>=20
> Section 3.3, 12th paragraph:
> Existing text:
>    As the conditions that lead to the generation of the overload =
report
>    change the reporting node can send new overload reports requesting
>    greater reduction if the condition gets worse or less reduction if
>    the condition improves.  The reporting node sends an overload =
report
>    with a duration of zero to indicate that the overload condition has
>    ended and need for use of the abatement algorithm to reduce traffic
>    sent is no longer needed.
> Comment: Bad style.
> Proposal: Remove the words "need for" from the last sentence.
>=20
> I support the suggested change.

If we are going to change it, I propose a further simplification of the =
last sentence:

"... and abatement is no longer needed."


From nobody Wed Dec 10 14:07:07 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B06731A8755 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 14:07:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZqZ1NHG2LAoR for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 14:06:57 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6C701A8A4C for <dime@ietf.org>; Wed, 10 Dec 2014 14:06:56 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBAM6tS8085583 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 16:06:56 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5487050C.8080206@usdonovans.com>
Date: Wed, 10 Dec 2014 16:06:55 -0600
X-Mao-Original-Outgoing-Id: 439942015.285245-f89d0546ae8b108763149754fe43ee9a
Content-Transfer-Encoding: quoted-printable
Message-Id: <CCD3DCD4-3A1D-462C-9B52-AD5568CE8446@nostrum.com>
References: <5487050C.8080206@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/6daJg97VLXnxJl7YXiqpaN4HeTE
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested changes 18, 19, 20 and 21
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 22:07:06 -0000

> On Dec 9, 2014, at 8:19 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> I support the suggested changes in your suggested changes 18, 19, 20 =
and 21:
>=20
> Section 4.3, 3rd paragraph:
> Existing text:
>    The extension MAY define new AVPs for use in DOIC Capability
>    Announcement and for use in DOIC Overload reporting.  These new =
AVPs
>    SHOULD be defined to be extensions to the OC-Supported-Features and
>    OC-OLR AVPs defined in this document.
> Comment: It is not necessary for a new AVP to be an extension to both =
the OC-Supported-Features AVP and the OC-OLR AVP.
> Proposal: Replace the paragraph with:
>    The extension MAY define new AVPs for use in DOIC Capability
>    Announcement and for use in DOIC Overload reporting.  These new =
AVPs
>    SHOULD be defined to be extensions to the OC-Supported-Features =
and/or
>    OC-OLR AVPs defined in this document.


"And/or" is an awkward construct. How about just "or"?  I think the =
context makes it pretty clear that it's not "xor".

[...]


From nobody Wed Dec 10 14:57:54 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81F1E1AC40E for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 14:57:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O6CJrcKWV9Q2 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 14:57:49 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 184201AC406 for <dime@ietf.org>; Wed, 10 Dec 2014 14:57:49 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBAMvkDj010057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 16:57:48 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235197@DEMUMBX014.nsn-intra.net>
Date: Wed, 10 Dec 2014 16:57:46 -0600
X-Mao-Original-Outgoing-Id: 439945066.663541-7ff482f386f4a2489c13b6aeb5439432
Content-Transfer-Encoding: quoted-printable
Message-Id: <57CA5812-ABE6-4974-8632-1BC40FA84082@nostrum.com>
References: <5486F59E.4000908@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235197@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/7OKkVMvgc8NFJoV45yToq2Yk-9c
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #8
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 22:57:50 -0000

> On Dec 9, 2014, at 9:30 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> Steve,
>=20
> please see inline.
>=20
> Ulrich
>=20
>=20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
> Sent: Tuesday, December 09, 2014 2:14 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich's suggested change #8
>=20
> Ulrich,
>=20
> For your suggested change number 8:
> Section 4.1.2, 8th paragraph:
> Existing text:
>   For an ongoing overload condition, a reporting node MUST NOT change
>   the selected algorithm during the period of time that it is in an
>   overload condition and, as a result, is sending OC-OLR AVPs in =
answer
>   messages.
>=20
> Comment: As a result of an ongoing overload condition the reporting =
node is=20
> sending OC-OLR AVPs containing no validity duration or a validity =
duration=20
> different from zero in answer messages.
>=20
> Proposal: Replace the paragraph with:
>   For an ongoing overload condition, a reporting node MUST NOT change
>   the selected algorithm during the period of time that it is in an
>   overload condition and, as a result, is sending OC-OLR AVPs
>   containing no validity duration or a validity duration different
>   from zero in answer messages.
> I don't see the need for the change.  The selected algorithm should =
not change for all overload reports relating to an overload condition, =
including overload reports with a validity duration of zero.
> <Ulrich> Isn't it so that when the overload condition ends (i.e. is no =
longer ongoing), the reporting node starts sending OLRs with validity =
duration of zero (for a long enough period of time)? (see end of section =
4.2.1.4)=20
> The question now is whether the change of algorithm is allowed during =
this (long enough) period, or only after that period. I don't have a =
strong view. But this was not my point.
> My point is that the current text seems to suggest that an overload =
condition is ongoing as long as OC-OLR AVPs are sent in answer messages, =
and I think that is not true. </Ulrich>
>=20

I think the proscription should last until the reporting node is (at =
least reasonably) sure that all reacting nodes have removed the OCS. The =
original text comes closer to that than Ulrich's proposal, but I wonder =
if we shouldn't cast this in similar terms as we do for the part about =
resending zero duration OLRs.


From nobody Wed Dec 10 15:06:09 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C02771A1A9E for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:06:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AiQrR8wSOK-J for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:06:07 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4748E1A1A9D for <dime@ietf.org>; Wed, 10 Dec 2014 15:06:07 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBAN667G010746 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 17:06:06 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5486FA8B.6040503@usdonovans.com>
Date: Wed, 10 Dec 2014 17:06:05 -0600
X-Mao-Original-Outgoing-Id: 439945565.681195-2ff3432eb017bb526d1c0634e16bf783
Content-Transfer-Encoding: quoted-printable
Message-Id: <BA5AEFCE-D814-44F8-939B-5BC5CDDA69B2@nostrum.com>
References: <5486FA8B.6040503@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/44XEMdCKC7C8_t9jn0Se13iUso8
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested changes #9 and #10
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 23:06:08 -0000

> On Dec 9, 2014, at 7:35 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> Suggested changes 9 and 10 are linked so I'll deal with them in a =
single email:
>=20
> Section 4.1.3, 1st paragraph:
> Existing text:
>    Diameter Agents that support DOIC SHOULD ensure that all messages
>    relayed by the agent contain the OC-Supported-Features AVP.
> Comment: The SHOULD in the first line is not correct based on my next =
comment.
> Proposal: Delete the first paragraph.=20
>=20
> Section 4.1.3, 4th paragraph:
> Existing text:
>    A Diameter Agent SHOULD take on reporting node behavior for =
Diameter
>    endpoints that do not support the DOIC solution.  A Diameter Agent
>    detects that a Diameter endpoint does not support DOIC reporting =
node
>    behavior when there is no OC-Supported-Features AVP in an answer
>    message for a transaction that contained the OC-Supported-Features
>    AVP in the request message.
> Comment: The first sentence can reasonably only apply to Diameter =
agents that are immediate peers to the non-supporting Diameter endpoint. =
We cannot expect a far-away-agent to take on reporting node behavior =
when all upstream agents and the server do not support DOIC. =
Furthermore: When the non-supporting server has two DOIC supporting =
immediate peer agents which both take on reporting node behavior we end =
up in problems similar to those identified in the note in section 3.3.
> Proposal:Replace the paragaph with:
>    A Diameter Agent that is an immediate peer to the Diameter endpoint
>    that does not support DOIC SHOULD take on reporting node behavior =
for
>    Diameter endpoints that do not support the DOIC solution.  A =
Diameter
>    Agent detects that a Diameter endpoint does not support DOIC =
reporting
>    node behavior when there is no OC-Supported-Features AVP in an =
answer
>    message for a transaction that contained the OC-Supported-Features
>    AVP in the request message.
>       Note: Known issues exist if multiple sources for overload =
reports
>       which apply to the same Diameter entity exist.  Reacting nodes
>       have no way of determining the source and, as such, will treat
>       them as coming from a single source.  Variance in sequence =
numbers
>       between the two sources can then cause incorrect overload
>       abatement treatment to be applied for indeterminate periods of
>       time.
>=20
> You point out an interesting issue with agents taking on reporting =
node functionality.
>=20
> I don't, however, think that an agent that takes on reporting node =
functionality for a non supporting host needs to be adjacent to the =
host.  The important thing is that it has visibility to all of the =
traffic sent to the host.
>=20
> I suggest keeping the first paragraph but changing the SHOULD to a =
MAY.
>=20
> I also suggest changing the SHOULD to a MAY in the fourth paragraph =
and changing the first sentence to:
>=20
> A Diameter Agent MAY take on reporting node behavior for Diameter =
endpoints that do not support the DOIC solution. =20

I agree with everything up to there. (Not necessarily for the reasons =
given, but I've been pushing for this to be MAY or non-normative for a =
while now :-) )


> The Diameter Agent MUST have visibility to all traffic destined for =
the non supporting host in order to become the reporting node for the =
Diameter endpoint.

I see the issue, but I think that answer needs more thought. It seems to =
disallow the case where you have a pair of agents in an active-active =
configuration in front of a non-supporting server, unless they sync OCS. =
I strongly suspect that case will be the rule, at least for telecom =
deployments.

/Ben=


From nobody Wed Dec 10 15:20:42 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 339101AC41E for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:20:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sxB21jxhHNba for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:20:35 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93ADD1AC41B for <dime@ietf.org>; Wed, 10 Dec 2014 15:20:35 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBANKY6k012009 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 17:20:35 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54883F5C.1060603@usdonovans.com>
Date: Wed, 10 Dec 2014 17:20:34 -0600
X-Mao-Original-Outgoing-Id: 439946434.09916-6e086a2ab21bfec16ec7566804855652
Content-Transfer-Encoding: quoted-printable
Message-Id: <7BF0F726-12CE-4236-8809-6B5E518F393D@nostrum.com>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/aHXNDWm8601N589OgGjnj3wNd_4
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 23:20:41 -0000

> On Dec 10, 2014, at 6:41 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> This paragraph is talking about capability announcement.  We deal with =
the issues related to multiple sources of overload reports already =
elsewhere in the document.
>=20
> I still do see the need for a change.

Those sentences seem contradictory, at least in town. Did you mean to =
say you do _not_ see the need for a change?

>=20
> Steve
>=20
> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>> I agree, my comment and proposal do not hit the mark.
>> =20
>> The intention was to say that known issues exist if there are =
multiple agents on multiple paths between client and server. The agents =
may not be able to ensure that there is no ambiguity in DOIC behaviour =
for the client. E.g. from the client=92s point of view the answer to a =
first request (which was modified by agent A1) could indicate: DOIC is =
supported, currenty no overload, once in overload loss will be selected; =
and the answer to the next request (which was modified by agent A2) =
could indicate: DOIC is supported, some?? reduction is requested using =
rate. The client, however, may not be prepared for rate.
>> =20
>> Maybe a warning note could be added to say that the agent may not =
always be able to ensure that there is no ambiguity.
>> =20
>> Ulrich
>> =20
>> =20
>> =20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>> Sent: Tuesday, December 09, 2014 2:45 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich's suggested change @12
>> =20
>> Ulrich,
>>=20
>> For your suggested change #12:
>>=20
>> Section 4.1.3, last paragraph:
>> Existing text:
>>    When making changes to the OC-Supported-Features AVP the Diameter
>>    Agent needs to ensure that there is no ambiguity in DOIC behavior =
for
>>    both upstream and downstream DOIC nodes.
>> =20
>> Comment: while that is true, in addition problems similar to those=20
>> identified in the note in section 3.3 may result from making changes.
>> =20
>> Proposal: Add the note:
>>       Note: Known issues exist if multiple sources for overload =
reports
>>       which apply to the same Diameter entity exist.  Reacting nodes
>>       have no way of determining the source and, as such, will treat
>>       them as coming from a single source.  Variance in sequence =
numbers
>>       between the two sources can then cause incorrect overload
>>       abatement treatment to be applied for indeterminate periods of
>>       time.
>> I don't understand how these are related.  The change to the =
OC-Supported-Features AVP made by the agent apply only to the =
transaction.  In addition, this paragraph doesn't mention overload =
reports.
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 15:26:17 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1825D1AC429 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:26:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JWnck0YdTE9x for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:26:12 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDB751AC423 for <dime@ietf.org>; Wed, 10 Dec 2014 15:26:12 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBANQBlB012457 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 17:26:12 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54884137.4050209@usdonovans.com>
Date: Wed, 10 Dec 2014 17:26:11 -0600
X-Mao-Original-Outgoing-Id: 439946771.388686-06111d28fca061cf35f0cfca154f6fe1
Content-Transfer-Encoding: quoted-printable
Message-Id: <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/4ikF2SauDODcqiE1fO3PaYuMxas
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 23:26:15 -0000

>=20
> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> Actually, the wording you suggested wasn't quite right.  It should be:
>=20
>   When receiving an OC-OLR AVP with unknown values, the overload =
report
>   SHOULD be silently discarded by reacting nodes and the event SHOULD
>   be logged.
>=20
> It's not just about report type values but unknown values for any of =
the AVPs in the OLR.
>=20
> This seems like a good requirement to include in the specification to =
ensure common behavior in reacting nodes.  I don't feel strongly about =
this but I would like to hear other opinions.

I think this is still not quite complete.

If you receive a sub-AVP that you don't understand, then you should =
ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the =
unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a =
value you don't understand, the behavior should be AVP specific. For =
Report-Type, that means ignore the whole OLR.

It's not clear to me whether the original text was about arbitrary avps, =
or Report-Type.

>=20
> Steve
>=20
> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Hi Steve,
>>=20
>> I think it was pointed out by Ben that we do not specify behaviour of =
a node for cases where it detects that another node is breaking the =
rule.
>> The rule is:
>>    A reporting node MUST NOT send overload reports of a type that has
>>    not been advertised as supported by the reacting node.
>> See section 4.2.3.
>>=20
>> Regards
>> Ulrich
>>=20
>>  =20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>> Sent: Tuesday, December 09, 2014 2:52 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich's suggested change #15
>>=20
>> Ulrich,
>>=20
>> For your suggested change #15:
>> Section 4.2.1.3, 4th paragraph:
>> Existing text:
>>    When receiving an OC-OLR AVPs with unknown values, a reacting node
>>    SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>>    be logged.
>> Comment: text is confusing. Maybe the intention was to say:
>>    When receiving an OC-OLR AVPs with an unsupported report type =
value, a reacting node
>>    SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>    be logged.
>> But even that is not correct.
>> Proposal: Remove the paragraph.
>> The intent was that an OC-OLR that contains unknown values should be =
discarded.  I agree that the wording needs to be changes as you =
suggested.  I don't agree with removing the paragraph.  Can you =
elaborate on why you think it is not correct when changed as you =
suggested?
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 15:43:01 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 298CF1A6FCC for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:43:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2SyQ6g-J3tTG for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:42:58 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B0C41AC41A for <dime@ietf.org>; Wed, 10 Dec 2014 15:42:58 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBANgvqp013854 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 17:42:57 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <548701E1.3060502@usdonovans.com>
Date: Wed, 10 Dec 2014 17:42:56 -0600
X-Mao-Original-Outgoing-Id: 439947776.847133-1386f3fc4ec59ac378a6f4af09e223dc
Content-Transfer-Encoding: quoted-printable
Message-Id: <6A70A6FF-1A7B-4372-BD05-B96C7DE69F9F@nostrum.com>
References: <548701E1.3060502@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/iTCLCWw-ZNN5OFMreH3TNYfqJgA
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 23:43:00 -0000

> On Dec 9, 2014, at 8:06 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> For your suggested change #16:
>=20
> Section 4.2.2, 5th and 6th paragraph:
> Existing text:
>    If the request is a host-routed request then the reacting node =
SHOULD
>    apply throttling abatement treatment to the request.
> =20
>    If the request is a realm-routed request then the reacting node
>    SHOULD apply diversion abatement treatment to the request.
>=20
> Comment: I don't think so. If the reacting node selects the server and=20=

> then detects that the selected server is overloaded and then detects =
that=20
> the request does not survive (i.e. is subject to abatement), then the =
reacting=20
> node SHOULD apply diversion treatment (i.e. select an alternative =
server if possible).=20
> If the reacting node does not select the server (either a. because the =
server was=20
> already selected by a downstream node, or b. because the server will =
be selected=20
> by an upstream node) then there is no point in applying diversion and =
the reacting=20
> node SHOULD apply throttling of requests that do not survive.
>=20
> Proposal: replace the paragraphs with:
>    If the reacting node does not select the server then it SHOULD =
apply
>    throttling abatement to the request.
>=20
>    If the reacting node selects the server then it SHOULD apply =
diversion
>    abatement treatment (i.e. select an alternative server if possible) =
to
>    the request.
>=20
> Diversion is not selecting an alternative node to handle the request.  =
Diversion is selecting an alternative route to the selected node.

Hmm. Isn't that only true for the proposed Peer-Report type in the Agent =
draft?

> =20
>=20
> Whether it is appropriate to select an alternative node for a request =
is an application decision that probably changes on a per command-code =
basis within the application.  Logic like this is outside the scope of =
the DOIC specification.

So how does it work for existing applications? But I agree in principle. =
I somehow missed that we had 2119 language around this. I think the =
choice to apply diversion vs throttling should be local policy. We don't =
need to state it normatively.

>=20
> The text is correct based on the definition of diversion.

I'm not sure we have that definition right.

>=20
> Regards,
>=20
> Steve
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 15:46:34 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF0FF1A8893 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:46:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1kviUC1mURAn for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:46:30 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EA3D1A0105 for <dime@ietf.org>; Wed, 10 Dec 2014 15:46:30 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBANkLkk014188 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 17:46:22 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <087A34937E64E74E848732CFF8354B920987F790@ESESSMB101.ericsson.se>
Date: Wed, 10 Dec 2014 17:46:20 -0600
X-Mao-Original-Outgoing-Id: 439947980.746668-a78412d98b2ed0e7d07df1b550061c6b
Content-Transfer-Encoding: quoted-printable
Message-Id: <F9D57A16-94F6-4F1E-82B4-46B342D51B1E@nostrum.com>
References: <545792B6.8030502@usdonovans.com> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com> <547F46D5.7060800@usdonovans.! com> <087A34937E64E74E848732CFF8354B920987F790@ESESSMB101.ericsson.se>
To: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/0QraW2gZBLTXvLGnugZAeGQtdds
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 23:46:33 -0000

> On Dec 10, 2014, at 9:09 AM, Maria Cruz Bartolome =
<maria.cruz.bartolome@ericsson.com> wrote:
>=20
> Dear all,
> =20
> I have the following proposal, for first paragraph
> Now:
> Therefore, before
>    applying local message throttling, a reporting node needs to check =
if
>    these messages match existing OCS entries,
> =20
> Proposal
> Therefore, before
>    applying local message throttling, a reporting node MAY check if
>    these messages match existing OCS entries,
> =20
> I think the reporting node may or not check whether the received =
messages match a =93delegated=94 active OCS. This is a processing =
consuming task that could be avoided if the reporting node uses =
different criteria to choose messages to drop/reject. This is up to  =
implementation.

I am okay with it being up to the implementation. I think the point of =
the warning is to let implementers know they need to consider this.=20

But I wonder why you want to add 2119 language when it didn't have it =
before?


> =20
> Best regards
> /MCruz
> =20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
> Sent: mi=E9rcoles, 03 de diciembre de 2014 18:22
> To: TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@orange.com; =
Ben Campbell
> Cc: dime@ietf.org
> Subject: Re: [Dime] Updates to DOIC -05
> =20
> I have attempted to address both Lionel's and Jean-Jacques' =
suggestions with the following text:
>=20
>    When a reporting node sends an OLR, it effectively delegates any
>    necessary throttling to downstream nodes.  If the reporting node =
also
>    locally throttles the same set of messages, the overall number of
>    throttled requests may be higher than intended.  Therefore, before
>    applying local message throttling, a reporting node needs to check =
if
>    these messages match existing OCS entries, indicating that these
>    messages have survived throttling applied by downstream nodes that
>    have received the related OLR.
> =20
>    However, even if the set of messages match existing OCS entries, =
the
>    reporting node can still apply other abatement methods such as
>    diversion.  The reporting node might also need to throttle requests
>    for reasons other than overload.  For example, an agent or server
>    might have a configured rate limit for each client, and throttle
>    requests that exceed that limit, even if such requests had already
>    been candidates for throttling by downstream nodes.  The reporting
>    node also has the option to send new OLRs requesting greater
>    reductions in traffic, reducing the need for local throttling.
>=20
> Steve
>=20
> On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
> Dear all
> =20
> To continue on my remark , I would complement the Steve=92s text with =
=93 can update the reduction of traffic it requires from the reacting =
nodes(s) by sending new overload reports=94 as hereafter:   =20
> =20
>    Therefore, if a
>    reporting node needs to apply local throttling on a set of messages
>    that match existing OCS entries, it needs to consider
>    the impact of throttling by downstream nodes and can update the =
reduction of traffic it requires from the reacting nodes(s) by sending =
new overload reports.=20
> =20
> Best regards
> =20
> JJacques
> =20
> =20
> De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN, =
JEAN-JACQUES (JEAN-JACQUES)
> Envoy=E9 : mercredi 3 d=E9cembre 2014 11:29
> =C0 : Steve Donovan; lionel.morand@orange.com; Ben Campbell
> Cc : dime@ietf.org
> Objet : Re: [Dime] Updates to DOIC -05
> =20
> Dear all
> =20
> I am not against the new proposed texts from Steve or Ben to clarify =
this topic.
> =20
> My point is that, when  the reporting node has sent an OLR requiring  =
a traffic reduction , there is first a reaction time before receiving =
reduced traffic, and second even if the traffic has been reduced, it can =
still exceed the capacity of the reporting node  that has no other =
choice than to throttle the received reduced traffic (if no diversion). =
This can happen when the traffic at the source (reacting node) before =
throttling is increasing quickly, so the traffic reduced  according to =
the received OLR may  remain too high .  Then, if the reporting node has =
nevertheless to do some throttle, it will certainly react by new OLRs =
requiring a higher traffic reduction from the reacting nodes. This is a =
dynamic process, where the reporting node adjust the  traffic  reduction =
it requires according to what it receives .
> =20
> As Ben  I also think this is a guidance , and I think it is good to =
bring some guidance.
> =20
> Best regards
> =20
> JJacques
> =20
> De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
> Envoy=E9 : mardi 2 d=E9cembre 2014 19:50
> =C0 : lionel.morand@orange.com; Ben Campbell
> Cc : dime@ietf.org
> Objet : Re: [Dime] Updates to DOIC -05
> =20
> Lionel,
>=20
> The two paragraphs together now say the following:
>=20
>    When a reporting node sends an OLR, it effectively delegates any
>    necessary throttling to downstream nodes.  If the reporting node =
also
>    locally throttles the same set of messages, the overall number of
>    throttled request may be higher than intended.  Therefore, if a
>    reporting node needs to apply local throttling on a set of messages
>    that match or overlap with existing OCS entries, it needs to =
consider
>    the impact of throttling by downstream nodes.
> =20
>    However, when the reporting node sends an OLR downstream, it might
>    still need to apply other abatement methods such as diversion.  The
>    reporting node might also need to throttle requests for reasons =
other
>    than overload.  For example, an agent or server might have a
>    configured rate limit for each client, and throttle requests that
>    exceed that limit, even if such requests had already been =
candidates
>    for throttling by downstream nodes.
> Do you see the need for further clarification?
>=20
> Steve
>=20
> On 11/25/14, 12:26 PM, lionel.morand@orange.com wrote:
> I'm OK with the idea of the text proposed by Ben.
> I would just make clear that throttling is applicable to the fact of =
sending/forwarding requests (cf. definition). A reporting node may apply =
local throttling if it is an agent. But if it is a server, it can either =
drop the exceeded number of requests (no response sent to the =
downstream) or send a specific DIAMETER-TOO-BUSY response. I think that =
this clarification is somehow missing in the document.
> =20
> Regards,
> =20
> Lionel
> =20
> -----Message d'origine-----
> De : Steve Donovan [mailto:srdonovan@usdonovans.com]=20
> Envoy=E9 : mardi 25 novembre 2014 15:07
> =C0 : Ben Campbell; MORAND Lionel IMT/OLN
> Cc : Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org; Maria Cruz =
Bartolome
> Objet : Re: [Dime] Updates to DOIC -05
> =20
> I'm ok with Ben's wording and will make the change unless I hear =
objections on the list.
> =20
> Steve
> =20
> On 11/21/14, 5:01 PM, Ben Campbell wrote:
> On reflection, I think there might be a subtlety here. The resulting =
offered-load may still exceed the reporting node's current capacity. =
This can be true even if it's sent an OLR (and thus has related OCS). As =
mentioned in the surrounding node needs to still be able to protect =
itself, possibly by throttling. Therefore, I propose the sentence take =
the form of non-normative guidance. For example:
> =20
> "When a reporting node sends an OLR, it effectively delegates any =
necessary throttling to downstream nodes.  If the reporting node also =
locally throttles the same set of messages, the overall number of =
throttled request may be higher than intended. Therefore, if a reporting =
node needs to apply local throttling on a set of messages that match or =
overlap with existing OCS entries, it needs to consider the impact of =
throttling by downstream nodes."
> =20
>  =20
> On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com wrote:
> =20
> I can live with the text proposed by Ulrich. But what is wrong with:
> =20
> " Therefore, the reporting node SHOULD NOT apply throttling to the set =
of messages to which an active OCS applies." ?
> =20
> Envoy=E9 depuis mon Sony Xperia SP d'Orange
> =20
> ---- Maria Cruz Bartolome a =E9crit ----
> =20
> =20
> Section 4.2.3, 13th paragraph, 2nd sentence:
> Existing text: Therefore, the reporting node SHOULD NOT apply =
throttling to the set of messages to which the OLR applies.
> Proposed text: Therefore, the reporting node SHOULD NOT apply =
throttling to the set of messages to which the sent OLR applies.
> =20
> [LM] I would say that the reporting node will not remember the =
previously sent OLR, but will take care that there is an active OCS.
> SRD> I'm ok with Ulrich's change.
> =20
> [LM] and this is incorrect but not fundamental. The reporting node =
does not have to "remember" a previously sent OLR. What it will do is to =
refer to existing OCS to know that throttling should not be applied. An =
OCS is a consequence of an sent OLR but it is not an OLR itself. But not =
fundamental here.
> =20
> [MCruz] I am ok with Ulrich's change. It does not mean that the =
reporting node needs to "remember" a previously sent OLR, though. The =
change only proposes to "identify" which OLR we refer to.
> =20
> Best regards
> /MCruz
> =20
> =20
> _____________________________________________________________________
> ____________________________________________________
> =20
> Ce message et ses pieces jointes peuvent contenir des informations=20
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,=20=

> exploites ou copies sans autorisation. Si vous avez recu ce message=20
> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi =
que les pieces jointes. Les messages electroniques etant susceptibles =
d'alteration, Orange decline toute responsabilite si ce message a ete =
altere, deforme ou falsifie. Merci.
> =20
> This message and its attachments may contain confidential or=20
> privileged information that may be protected by law; they should not =
be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and =
delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.
> Thank you.
> =20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
> =20
> =20
> =20
> =
__________________________________________________________________________=
_______________________________________________
> =20
> Ce message et ses pieces jointes peuvent contenir des informations =
confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez =
recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les =
messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, =
deforme ou falsifie. Merci.
> =20
> This message and its attachments may contain confidential or =
privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and =
delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.
> Thank you.
> =20
> =20
> =20
> =20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 15:50:31 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5ECF1A1B15 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:50:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id piHH5pS4eRDs for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 15:50:28 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B1B51A1A4D for <dime@ietf.org>; Wed, 10 Dec 2014 15:50:28 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBANoRi3014486 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 17:50:27 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54883CBA.7060503@usdonovans.com>
Date: Wed, 10 Dec 2014 17:50:26 -0600
X-Mao-Original-Outgoing-Id: 439948226.837631-9906c435ce13a3d7ef44a08acb0101e6
Content-Transfer-Encoding: quoted-printable
Message-Id: <D7333DA1-093F-449B-B95C-2012C70D4C64@nostrum.com>
References: <54862C38.1000403@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net> <54883CBA.7060503@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/sxqEZMo_EhgUxcPwDpIxJz37SAs
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Dec 2014 23:50:30 -0000

> On Dec 10, 2014, at 6:29 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> I think I see the source of confusion.  It is meant to talk about =
sending to adjacent DOIC nodes but it uses the words reacting and =
reporting nodes.  I suggest changing the paragraph to the following, =
removing the concept of reporting and reacting nodes from the =
description.
>=20
>   While a DOIC node sends OLRs to "adjacent" DOIC nodes, nodes
>   that are "adjacent" for DOIC purposes may not be adjacent from a
>   Diameter, or transport, perspective.  For example, one or more
>   Diameter agents that do not support DOIC may exist between a given
>   pair of DOIC nodes, as long as those agents pass
>   unknown AVPs through unchanged.  The report types described in this
>   document can safely pass through non-supporting agents.  This may =
not
>   be true for report types defined in future specifications.
>=20

I like this approach.

I also note that, for a given transaction, the black-box behavior of a =
supporting-agent that passes OC AVPs unchanged id identical to that of =
an a non-supporting agent.


> Regards,
>=20



> Steve
>=20
> On 12/9/14, 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>>=20
>> please see inline.
>>=20
>> Ulrich
>>=20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>> Sent: Monday, December 08, 2014 11:55 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich suggested change number 1
>>=20
>> Ulrich,
>>=20
>> I'll deal with each of your suggestion in a separate email to help =
ensure that nothing is missed.
>>=20
>> For your first suggestion:
>> Section 3, last paragraph:
>> Existing text:
>>    While a reporting node sends OLRs to "adjacent" reacting nodes, =
nodes
>>    that are "adjacent" for DOIC purposes may not be adjacent from a
>>    Diameter, or transport, perspective.  For example, one or more
>>    Diameter agents that do not support DOIC may exist between a given
>>    pair of reporting and reacting nodes, as long as those agents pass
>>    unknown AVPs through unchanged.  The report types described in =
this
>>    document can safely pass through non-supporting agents.  This may =
not
>>    be true for report types defined in future specifications.
>>=20
>> Comment: while this is all not wrong, the existing text may convey =
the erring
>> impression that there cannot be a DOIC supporting agent on the path =
between a
>> reporting node and an adjacent reacting node.
>>=20
>> Proposal: It is proposed to add the following sentence at the end of =
the paragraph:
>>    Another example is where one or more Diameter agents that do =
support
>>    DOIC may exist between a given pair of reporting and reacting =
nodes,
>>    as long as those agents pass OC-specific AVPs through unchanged.
>> I don't agree with the suggested change, as the DOIC supporting =
agents might need to change the OC-specific AVPs.
>> <Ulrich> I agree that in some cases DOIC supporting agents need to =
change the OC-specific AVPs. However, there are also cases where DOIC =
supporting agents do not need to change OC-specific AVPs.</Ulrich>
>>   I also don't understand how the paragraph implies that there cannot =
be DOIC supporting agents in the path of the request.
>> <Ulrich> It does not imply that. Rather it may convey the erring =
impression that there cannot be a DOIC supporting agent on the path =
between a
>> reporting node and an adjacent reacting node.</Ulrich>
>>    It is talking specifically about the case where there agents do =
not support DOIC are in the path.
>> <Ulrich> No, my understanding is that the paragraph is talking =
specifically about what "adjacent for DOIC purposes" means. One valid =
example is given (reporting node and reacting node are "adjacent for =
DOIC purposes" if one or more agents that do not support DOIC but pass =
unsupported AVPs through unchanged exist between reporting node and =
reacting node) and I do not propose to remove that. However, there is =
another important valid example (reporting node and reacting node are =
"adjacent for DOIC purposes" if one or more DOIC supporting agents that =
pass OC-specific AVPs through unchanged exist between reporting node and =
reacting node), and the proposal is to add text to cover this example. =
</Ulrich>
>> The remainder of the document makes it clear that there can be agents =
that do support DOIC in the path of a transaction.
>> <Ulrich> that is not my point. The point is to clearly state that =
there can be DOIC supporting agents that pass through OC-specific AVPs =
unchanged on the path between reporting node and reacting node, and in =
this case the reporting and reacting nodes are still regarded "adjacent =
for DOIC purposes".</Ulrich>
>>=20
>> I don't see the need for a change here.
>> <Ulrich> I'm not proposing a modification but an addition. This =
addition provides useful clarification and in no way is harmful</Ulrich>
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 16:08:43 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0999C1ACCFF for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 16:08:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 44WHds3PUMf5 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 16:08:34 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78C951ACCF3 for <dime@ietf.org>; Wed, 10 Dec 2014 16:08:34 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBB08T7l016004 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 18:08:29 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <087A34937E64E74E848732CFF8354B920987F783@ESESSMB101.ericsson.se>
Date: Wed, 10 Dec 2014 18:08:28 -0600
X-Mao-Original-Outgoing-Id: 439949308.66784-9b50e8340da5c00e315e097b4add93a9
Content-Transfer-Encoding: quoted-printable
Message-Id: <767BF9E5-A72B-44B5-A324-A0CF74F70A69@nostrum.com>
References: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com> <087A34937E64E74E848732CFF8354B920987F783@ESESSMB101.ericsson.se>
To: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5S_cHheZPQNoHM9jOPQBiAV7vd8
Cc: "dime@ietf.org list" <dime@ietf.org>
Subject: Re: [Dime] Updated DOIC Requirements Analysis
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 00:08:38 -0000

> On Dec 10, 2014, at 9:09 AM, Maria Cruz Bartolome =
<maria.cruz.bartolome@ericsson.com> wrote:
>=20
> Hello,
> =20
> See some comments below
> Thanks
> /MCruz
> =20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Ben Campbell
> Sent: martes, 25 de noviembre de 2014 3:19
> To: dime@ietf.org list
> Subject: [Dime] Updated DOIC Requirements Analysis

[...]

> =20
> C.2.  Detection of non-supporting Intermediaries
> =20
>    The DOIC mechanism as currently defined does not allow supporting
>    nodes to automatically determine whether OC-Supported-Features or =
OC-
>    OLR AVPs are originated by a peer node, or by a non-peer node and
>    sent across a non-supporting peer.  This makes it impossible to
>    detect the presence of non-supporting nodes between supporting =
nodes,
>    except by configuration.  The working group determined that such a
>    configuration requirement is acceptable.
> =20
>    This limits full compliance with certain requirements related to =
the
>    limitation of new configuration, deployment in environments with
>    mixed support, operating across non-supporting agents, and
>    authorization.
> [MCruz] I think this paragraph should state what are the limitations =
(generally, like you did for rest of them)
> Morever, since detailed descriptions will be deleted.
> =20

The limitations are discussed in the security consideration section. =
Basically if a node expects an agent to enforce any DOIC related policy =
(e.g. making sure DOIC avps do not leak to unauthorized nodes), it has =
to know that the agent itself supports DOIC. Right now it can only know =
that by having an administrator tell it that (violating the limitation =
on new configuration), by knowing that all agents in the network support =
DOIC (violating the mixed support and non-supporting agent =
requirements.)

[...]

> =20
> =20
> =20
>    REQ 6:  The solution designers SHOULD seek to minimize the amount =
of
>            new configuration required in order to work.  For example, =
it
>            is better to allow peers to advertise or negotiate support
>            for the solution, rather than to require that this =
knowledge
>            to be configured at each node.
> =20
>            *Partially Compliant*. Most DOIC parameters are advertised
>            using the DOIC capability announcement mechanism.  However,
>            there are some situations where configuration is required.
>            For example, a DOIC node detect the fact that a peer may =
not
>            support DOIC when nodes on the other side of the non-
>            supporting node do support DOIC without configuration.
> =20
> [MCruz] Could you clarify last example? =E2=80=9Cwithoug =
configuration=E2=80=9D? I do not understand what you meant.

Here's an example:

C ------ A ------ S

If both C and S support DOIC, there is no way for them to tell whether A =
supports DOIC. Consider two cases:

1) A supports DOIC. But since C already inserts OC-S-F in all requests, =
and S inserts it in all answers, A passes them through unchanged.
2) A does not support DOIC, but passes through unknown AVPs. Since =
OC-S-F will be unknown to it, it passes it through unchanged.

=46rom the perspective of C and S, the requests and answers look =
identical for both cases. Even if A actually changes the content of an =
OC-S-F avp, neither endpoint can tell if the resulting AVP came from A =
or the opposite endpoint.

Personally, I think this is a showstopper. But the working group =
consensus did not agree.

[...]


> =20
>    REQ 23: The solution MUST provide sufficient information to enable =
a
>            load-balancing node to divert messages that are rejected or
>            otherwise throttled by an overloaded upstream node to other
>            upstream nodes that are the most likely to have sufficient
>            capacity to process them.
> =20
>            *Not Compliant*. DOIC provides no built in mechanism to
>            determine the best place to divert messages that would
>            otherwise be throttled.  This can be accomplished with a
>            future "load" extension, or with proprietary load balancing
>            mechanisms.
> =20
> [MCruz] Partly Compliant. DOIC Overload information can be used =
already by proprietary load-balancing implementations.
>=20
> Load information will be a plus to this.
>=20

I disagree, or at least think that would be _very_ partial. You won't =
have any overload information unless the potential diversion targets are =
also overloaded.

[...]

> =20
> =20
>    REQ 30: The solution MUST NOT interfere with any Diameter-compliant
>            method that a node may use to protect itself from overload
>            from non-supporting nodes or from denial-of-service =
attacks.
> =20
>            *Compliant*. The specification recommends that any such
>            protection mechanism needed without DOIC should continue to
>            be employed with DOIC.
> [MCruz] Could you point our where in the draft it is described?

9.3

/Ben.


From nobody Wed Dec 10 16:16:48 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C353C1ACD12 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 16:16:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iqq1hk14Gwcr for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 16:16:39 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EBF31ACD13 for <dime@ietf.org>; Wed, 10 Dec 2014 16:16:39 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBB0GZha016614 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 18:16:36 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <087A34937E64E74E848732CFF8354B920987F7B8@ESESSMB101.ericsson.se>
Date: Wed, 10 Dec 2014 18:16:35 -0600
X-Mao-Original-Outgoing-Id: 439949795.324448-c64d21a5739dbbe7cfd784648939c154
Content-Transfer-Encoding: quoted-printable
Message-Id: <4D865883-A81C-429D-9829-8A23761DC903@nostrum.com>
References: <5486EFAA.7090902@usdonovans.com> <087A34937E64E74E848732CFF8354B920987F7B8@ESESSMB101.ericsson.se>
To: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/wyJT7Z0S0mjf3UP5ITi-jJa8eVM
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested change number 4
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 00:16:45 -0000

I am okay with either the old or the proposed text. I can construct a =
style argument that favors each :-)

> On Dec 10, 2014, at 9:09 AM, Maria Cruz Bartolome =
<maria.cruz.bartolome@ericsson.com> wrote:
>=20
> I agree
> /MCruz
> =20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
> Sent: martes, 09 de diciembre de 2014 13:49
> To: dime@ietf.org
> Subject: [Dime] Ulrich suggested change number 4
> =20
> Ulrich,
>=20
> For your fourth suggested change:
>=20
> Section 3.3, 4th and 5th paragraph:
> Existing text:
>    A report of type "HOST_REPORT" is sent to indicate the overload of =
a
>    specific Diameter node for the application-id indicated in the
>    transaction.  When receiving an OLR of type host, a reacting node
>    applies overload abatement to what is referred to in this document =
as
>    host-routed requests.  The reacting node applies overload abatement
>    on those host-routed requests which the reacting node knows will be
>    served by the server that matches the Origin-Host AVP of the =
received
>    message that contained the received OLR of type host.
> =20
>    A report of type "REALM_REPORT" applies to realm-routed requests =
for
>    a specific realm as indicated in the Destination-Realm AVP.
> Comment: While the 4th paragraph is all fine, the 5th paragraph should =
be aligned.
> Proposal: It is proposed to replace the 5th paragraph with:
>    A report of type "REALM_REPORT" is sent to indicate the overload of =
all
>    Diameter nodes within a realm for the application-id indicated in =
the
>    transaction.  When receiving an OLR of type realm, a reacting node
>    applies overload abatement to what is referred to in this document =
as
>    realm-routed requests.  The reacting node applies overload =
abatement
>    on those realm-routed requests which contain  a Destination-Realm =
AVP
>    that matches the Origin-Realm AVP of the received message that
>    contained the received OLR of type realm.
> I support the suggested change.
>=20
> Regards,
>=20
> Steve
>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 10 16:21:20 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 867611ACD16 for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 16:21:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w5QQ2Xckk8Hg for <dime@ietfa.amsl.com>; Wed, 10 Dec 2014 16:21:12 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BB8E1A1A2D for <dime@ietf.org>; Wed, 10 Dec 2014 16:21:12 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBB0L8R4016930 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 10 Dec 2014 18:21:09 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <087A34937E64E74E848732CFF8354B920987F7D0@ESESSMB101.ericsson.se>
Date: Wed, 10 Dec 2014 18:21:08 -0600
X-Mao-Original-Outgoing-Id: 439950068.326793-af41c7e3c3a90be9b6e4b709296cfaa0
Content-Transfer-Encoding: quoted-printable
Message-Id: <509E2BC4-23E2-4966-83DD-95A479766D41@nostrum.com>
References: <5486FBA8.9020206@usdonovans.com> <087A34937E64E74E848732CFF8354B920987F7D0@ESESSMB101.ericsson.se>
To: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/wiK3SfjQm0G6FLuopHu3QV64FXU
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #11
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 00:21:17 -0000

Agreed. "MUST only" is actually one of my pet peeves for 2119 language =
abuse. I'm mortified to have missed that one :-)


> On Dec 10, 2014, at 9:09 AM, Maria Cruz Bartolome =
<maria.cruz.bartolome@ericsson.com> wrote:
>=20
> Fine
> =20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
> Sent: martes, 09 de diciembre de 2014 14:40
> To: dime@ietf.org
> Subject: [Dime] Ulrich's suggested change #11
> =20
> Ulrich,
>=20
> For your  suggested change #11:
>=20
> Section 4.1.3, 6th paragraph:
> Existing text:
>    As with a Diameter endpoint taking on reporting node behavior, a
>    Diameter Agent MUST only include the OC-Supported-Features AVP in
>    answer messages for transactions where the request message received
>    by the Diameter Agent had an OC-Supported-Features AVP.
> Comments: "MUST only do x for condition y" could mean:
> a) "MUST do x for condition y and MUST NOT do x for conditions other =
than y", or
> b) "MUST do x and nothing else for condition y, and nothing is =
specified for conditions other than y".
> Proposal: Replace the paragraph with:
>    As with a Diameter endpoint taking on reporting node behavior, a
>    Diameter Agent MUST NOT include the OC-Supported-Features AVP in
>    answer messages for transactions where the request message received
>    by the Diameter Agent had no OC-Supported-Features AVP.
> I support this change.
>=20
> Regards,
>=20
> Steve
>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 00:32:14 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18CE61A2119 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 00:32:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HTx0I-rBZAB5 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 00:32:11 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FF101A0110 for <dime@ietf.org>; Thu, 11 Dec 2014 00:32:11 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBB8W7pd031767 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 08:32:08 GMT
Received: from DEMUHTC002.nsn-intra.net ([10.159.42.33]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBB8W3Lt030725 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 09:32:06 +0100
Received: from DEMUHTC014.nsn-intra.net (10.159.42.45) by DEMUHTC002.nsn-intra.net (10.159.42.33) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 11 Dec 2014 09:32:03 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC014.nsn-intra.net ([10.159.42.45]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 09:32:03 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAE9+YCAALINgIAAn1BQ
Date: Thu, 11 Dec 2014 08:32:03 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235522@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com>
In-Reply-To: <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 3869
X-purgate-ID: 151667::1418286728-0000677A-7DE93ADA/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/O-pXPGQgyeEtYMnF3YV4Px91po4
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 08:32:14 -0000

Ben,
for my clarification:
you wrote: "If you receive a known sub-AVP, with a value you don't understa=
nd, the behavior should be AVP specific. For Report-Type, that means ignore=
 the whole OLR."

I would have thought that "For Report-Type, that means ignore the whole set=
 of OLRs".
At least it should be allowed to do that.

The requirement for the reporting node is to not send OLRs with report type=
 values that are unknown/unsupported by the reacting node.=20
The reporting node cannot assume that, when breaking this rule, the reactin=
g node will act in a predictable way. It should even be ok for the reportin=
g node to ignore the complete answer message.

Please let me know your comments.

Ulrich


-----Original Message-----
From: ext Ben Campbell [mailto:ben@nostrum.com]=20
Sent: Thursday, December 11, 2014 12:26 AM
To: Steve Donovan
Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #15

>=20
> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> wro=
te:
>=20
> Ulrich,
>=20
> Actually, the wording you suggested wasn't quite right.  It should be:
>=20
>   When receiving an OC-OLR AVP with unknown values, the overload report
>   SHOULD be silently discarded by reacting nodes and the event SHOULD
>   be logged.
>=20
> It's not just about report type values but unknown values for any of the =
AVPs in the OLR.
>=20
> This seems like a good requirement to include in the specification to ens=
ure common behavior in reacting nodes.  I don't feel strongly about this bu=
t I would like to hear other opinions.

I think this is still not quite complete.

If you receive a sub-AVP that you don't understand, then you should ignore =
that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP =
has the m-bit set.) If you receive a known sub-AVP, with a value you don't =
understand, the behavior should be AVP specific. For Report-Type, that mean=
s ignore the whole OLR.

It's not clear to me whether the original text was about arbitrary avps, or=
 Report-Type.

>=20
> Steve
>=20
> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Hi Steve,
>>=20
>> I think it was pointed out by Ben that we do not specify behaviour of a =
node for cases where it detects that another node is breaking the rule.
>> The rule is:
>>    A reporting node MUST NOT send overload reports of a type that has
>>    not been advertised as supported by the reacting node.
>> See section 4.2.3.
>>=20
>> Regards
>> Ulrich
>>=20
>>  =20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>> Sent: Tuesday, December 09, 2014 2:52 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich's suggested change #15
>>=20
>> Ulrich,
>>=20
>> For your suggested change #15:
>> Section 4.2.1.3, 4th paragraph:
>> Existing text:
>>    When receiving an OC-OLR AVPs with unknown values, a reacting node
>>    SHOULD be silently discarded by reacting nodes and the event SHOULD
>>    be logged.
>> Comment: text is confusing. Maybe the intention was to say:
>>    When receiving an OC-OLR AVPs with an unsupported report type value, =
a reacting node
>>    SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>    be logged.
>> But even that is not correct.
>> Proposal: Remove the paragraph.
>> The intent was that an OC-OLR that contains unknown values should be dis=
carded.  I agree that the wording needs to be changes as you suggested.  I =
don't agree with removing the paragraph.  Can you elaborate on why you thin=
k it is not correct when changed as you suggested?
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 01:55:22 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDC901ACDB2 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 01:55:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NmonI9UE-c2N for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 01:55:16 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C14741ACDB0 for <dime@ietf.org>; Thu, 11 Dec 2014 01:55:14 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBB9tCRe026964 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 09:55:12 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBB9t9k8016932 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 10:55:11 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC001.nsn-intra.net ([10.159.42.32]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 10:55:10 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Ulrich suggested change number 1
Thread-Index: AQHQEzn9APTOpOEpnEOsWl042ZAFN5yHKxAQgAGHrwCAAL4tAIAApwBQ
Date: Thu, 11 Dec 2014 09:55:10 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235563@DEMUMBX014.nsn-intra.net>
References: <54862C38.1000403@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net> <54883CBA.7060503@usdonovans.com> <D7333DA1-093F-449B-B95C-2012C70D4C64@nostrum.com>
In-Reply-To: <D7333DA1-093F-449B-B95C-2012C70D4C64@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 6853
X-purgate-ID: 151667::1418291713-0000658F-BFB3E100/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/kuo7gWFLwBteAQiP4s-S1m5lVrQ
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 09:55:19 -0000

Ben, Steve,

the confusion I think comes from the following:
1. the paragraph seems to try to define what "adjacent for DOIC purposes" m=
eans, but gives only one example and leaves it open whether other examples =
exist.
e.g.: Are two DOIC nodes adjacent for DOIC purposes when there is a DOIC su=
pporting agent (that passes OC-specific AVPs through unchanged) on the path=
 between them?
2. The paragraph says that OLRs are sent to nodes that are "adjacent for DO=
IC purpose". It's not clear whether the intention is to say=20
a) OLRs are sent to adjacent DOIC nodes rather than to adjacent Diameter no=
des, or
b) OLRs are sent to adjacent DOIC nodes rather than to non-adjacent DOIC no=
des.
And it's not clear whether OLRs are also sent to DOIC nodes that are not ad=
jacent for DOIC purposes.

In a configuration like this:

C-----A1------A2------S

where C, A1 and S support DOIC and A2 does not support DOIC but passes unkn=
own AVPs through unchanged we need to distinguish two cases:
1)  A1 passes OC-specific AVPs through unchanged
In this case C and S are adjacent for DOIC purposes, hence S sends OLRs to =
C.
2)  A1 modifies/replaces OC-specific AVPs
In this case C and A1 are adjacent for DOIC purpose and A1 and S are adjace=
nt for DOIC purpose, hence S ends OLRs to A1 and A1 sends OLRs to C.

Regards
Ulrich

=20

-----Original Message-----
From: ext Ben Campbell [mailto:ben@nostrum.com]=20
Sent: Thursday, December 11, 2014 12:50 AM
To: Steve Donovan
Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich suggested change number 1


> On Dec 10, 2014, at 6:29 AM, Steve Donovan <srdonovan@usdonovans.com> wro=
te:
>=20
> Ulrich,
>=20
> I think I see the source of confusion.  It is meant to talk about sending=
 to adjacent DOIC nodes but it uses the words reacting and reporting nodes.=
  I suggest changing the paragraph to the following, removing the concept o=
f reporting and reacting nodes from the description.
>=20
>   While a DOIC node sends OLRs to "adjacent" DOIC nodes, nodes
>   that are "adjacent" for DOIC purposes may not be adjacent from a
>   Diameter, or transport, perspective.  For example, one or more
>   Diameter agents that do not support DOIC may exist between a given
>   pair of DOIC nodes, as long as those agents pass
>   unknown AVPs through unchanged.  The report types described in this
>   document can safely pass through non-supporting agents.  This may not
>   be true for report types defined in future specifications.
>=20

I like this approach.

I also note that, for a given transaction, the black-box behavior of a supp=
orting-agent that passes OC AVPs unchanged id identical to that of an a non=
-supporting agent.


> Regards,
>=20



> Steve
>=20
> On 12/9/14, 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>>=20
>> please see inline.
>>=20
>> Ulrich
>>=20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>> Sent: Monday, December 08, 2014 11:55 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich suggested change number 1
>>=20
>> Ulrich,
>>=20
>> I'll deal with each of your suggestion in a separate email to help ensur=
e that nothing is missed.
>>=20
>> For your first suggestion:
>> Section 3, last paragraph:
>> Existing text:
>>    While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
>>    that are "adjacent" for DOIC purposes may not be adjacent from a
>>    Diameter, or transport, perspective.  For example, one or more
>>    Diameter agents that do not support DOIC may exist between a given
>>    pair of reporting and reacting nodes, as long as those agents pass
>>    unknown AVPs through unchanged.  The report types described in this
>>    document can safely pass through non-supporting agents.  This may not
>>    be true for report types defined in future specifications.
>>=20
>> Comment: while this is all not wrong, the existing text may convey the e=
rring
>> impression that there cannot be a DOIC supporting agent on the path betw=
een a
>> reporting node and an adjacent reacting node.
>>=20
>> Proposal: It is proposed to add the following sentence at the end of the=
 paragraph:
>>    Another example is where one or more Diameter agents that do support
>>    DOIC may exist between a given pair of reporting and reacting nodes,
>>    as long as those agents pass OC-specific AVPs through unchanged.
>> I don't agree with the suggested change, as the DOIC supporting agents m=
ight need to change the OC-specific AVPs.
>> <Ulrich> I agree that in some cases DOIC supporting agents need to chang=
e the OC-specific AVPs. However, there are also cases where DOIC supporting=
 agents do not need to change OC-specific AVPs.</Ulrich>
>>   I also don't understand how the paragraph implies that there cannot be=
 DOIC supporting agents in the path of the request.
>> <Ulrich> It does not imply that. Rather it may convey the erring impress=
ion that there cannot be a DOIC supporting agent on the path between a
>> reporting node and an adjacent reacting node.</Ulrich>
>>    It is talking specifically about the case where there agents do not s=
upport DOIC are in the path.
>> <Ulrich> No, my understanding is that the paragraph is talking specifica=
lly about what "adjacent for DOIC purposes" means. One valid example is giv=
en (reporting node and reacting node are "adjacent for DOIC purposes" if on=
e or more agents that do not support DOIC but pass unsupported AVPs through=
 unchanged exist between reporting node and reacting node) and I do not pro=
pose to remove that. However, there is another important valid example (rep=
orting node and reacting node are "adjacent for DOIC purposes" if one or mo=
re DOIC supporting agents that pass OC-specific AVPs through unchanged exis=
t between reporting node and reacting node), and the proposal is to add tex=
t to cover this example. </Ulrich>
>> The remainder of the document makes it clear that there can be agents th=
at do support DOIC in the path of a transaction.
>> <Ulrich> that is not my point. The point is to clearly state that there =
can be DOIC supporting agents that pass through OC-specific AVPs unchanged =
on the path between reporting node and reacting node, and in this case the =
reporting and reacting nodes are still regarded "adjacent for DOIC purposes=
".</Ulrich>
>>=20
>> I don't see the need for a change here.
>> <Ulrich> I'm not proposing a modification but an addition. This addition=
 provides useful clarification and in no way is harmful</Ulrich>
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 03:33:55 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A0821A8788 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 03:33:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D5kK5ZBFjqpS for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 03:33:51 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5FD3B1A1BEE for <dime@ietf.org>; Thu, 11 Dec 2014 03:33:51 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBBBXnka016548 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 11:33:49 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBBBXm9k005030 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 12:33:49 +0100
Received: from DEMUHTC012.nsn-intra.net (10.159.42.43) by DEMUHTC004.nsn-intra.net (10.159.42.35) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 11 Dec 2014 12:33:48 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC012.nsn-intra.net ([10.159.42.43]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 12:33:48 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Ulrich suggested changes 18, 19, 20 and 21
Thread-Index: AQHQFMWmX6ykzn5Ua0e5RAuJ+XtmdJyKQujA
Date: Thu, 11 Dec 2014 11:33:48 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152355EE@DEMUMBX014.nsn-intra.net>
References: <5487050C.8080206@usdonovans.com> <CCD3DCD4-3A1D-462C-9B52-AD5568CE8446@nostrum.com>
In-Reply-To: <CCD3DCD4-3A1D-462C-9B52-AD5568CE8446@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1488
X-purgate-ID: 151667::1418297629-0000658F-285E2725/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/tlSLlW2N4yjy6VkSNxjMOwoW1DI
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested changes 18, 19, 20 and 21
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 11:33:53 -0000

Ok for me to say just "or"
Ulrich

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
Sent: Wednesday, December 10, 2014 11:07 PM
To: Steve Donovan
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich suggested changes 18, 19, 20 and 21


> On Dec 9, 2014, at 8:19 AM, Steve Donovan <srdonovan@usdonovans.com> wrot=
e:
>=20
> Ulrich,
>=20
> I support the suggested changes in your suggested changes 18, 19, 20 and =
21:
>=20
> Section 4.3, 3rd paragraph:
> Existing text:
>    The extension MAY define new AVPs for use in DOIC Capability
>    Announcement and for use in DOIC Overload reporting.  These new AVPs
>    SHOULD be defined to be extensions to the OC-Supported-Features and
>    OC-OLR AVPs defined in this document.
> Comment: It is not necessary for a new AVP to be an extension to both the=
 OC-Supported-Features AVP and the OC-OLR AVP.
> Proposal: Replace the paragraph with:
>    The extension MAY define new AVPs for use in DOIC Capability
>    Announcement and for use in DOIC Overload reporting.  These new AVPs
>    SHOULD be defined to be extensions to the OC-Supported-Features and/or
>    OC-OLR AVPs defined in this document.


"And/or" is an awkward construct. How about just "or"?  I think the context=
 makes it pretty clear that it's not "xor".

[...]

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 03:36:08 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC1BF1ACDD2 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 03:36:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1bEU15Rzfp61 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 03:36:06 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9FE361ACD98 for <dime@ietf.org>; Thu, 11 Dec 2014 03:36:05 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBBBa3wW022830 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 11:36:04 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBBBa3lU009177 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 12:36:03 +0100
Received: from DEMUHTC012.nsn-intra.net (10.159.42.43) by DEMUHTC004.nsn-intra.net (10.159.42.35) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 11 Dec 2014 12:36:03 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC012.nsn-intra.net ([10.159.42.43]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 12:36:03 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Ulrich's suggest change number 6
Thread-Index: AQHQFMT4fdA9mts0YEGhUzVGlhazQJyKQ1lw
Date: Thu, 11 Dec 2014 11:36:03 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235600@DEMUMBX014.nsn-intra.net>
References: <5486F0F1.8000200@usdonovans.com> <ED3019AE-A6DB-443F-AD28-1F058EB81676@nostrum.com>
In-Reply-To: <ED3019AE-A6DB-443F-AD28-1F058EB81676@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1360
X-purgate-ID: 151667::1418297764-0000658F-DE69068E/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Qjbpkbrq4Wj4G9Fiz25YvDzfyy0
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggest change number 6
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 11:36:07 -0000

The proposed simplification is ok for me.
Ulrich

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
Sent: Wednesday, December 10, 2014 11:02 PM
To: Steve Donovan
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggest change number 6


> On Dec 9, 2014, at 6:54 AM, Steve Donovan <srdonovan@usdonovans.com> wrot=
e:
>=20
> Ulrich,
>=20
> For your suggested change #6:
>=20
> Section 3.3, 12th paragraph:
> Existing text:
>    As the conditions that lead to the generation of the overload report
>    change the reporting node can send new overload reports requesting
>    greater reduction if the condition gets worse or less reduction if
>    the condition improves.  The reporting node sends an overload report
>    with a duration of zero to indicate that the overload condition has
>    ended and need for use of the abatement algorithm to reduce traffic
>    sent is no longer needed.
> Comment: Bad style.
> Proposal: Remove the words "need for" from the last sentence.
>=20
> I support the suggested change.

If we are going to change it, I propose a further simplification of the las=
t sentence:

"... and abatement is no longer needed."

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 04:40:55 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 050651ACEC8 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 04:40:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kaN_vkPbnQbo for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 04:40:50 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8161E1ACECB for <dime@ietf.org>; Thu, 11 Dec 2014 04:40:50 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBBCemGS019827 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 12:40:48 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBBCejGH025753 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 13:40:47 +0100
Received: from DEMUHTC013.nsn-intra.net (10.159.42.44) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 11 Dec 2014 13:40:45 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC013.nsn-intra.net ([10.159.42.44]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 13:40:45 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change #16
Thread-Index: AQHQE7lXyc+G3J0M1EW8kbPFxFEQNZyHfq1QgAE9VgCAAZrNMA==
Date: Thu, 11 Dec 2014 12:40:44 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D90006681523562D@DEMUMBX014.nsn-intra.net>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com>
In-Reply-To: <54884556.90108@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: multipart/alternative; boundary="_000_5BCBA1FC2B7F0B4C9D935572D90006681523562DDEMUMBX014nsnin_"
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 15559
X-purgate-ID: 151667::1418301648-0000658F-B32F7F84/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/oaKQmxSpLLJgrO-BqjaQi2-u4ig
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 12:40:54 -0000

--_000_5BCBA1FC2B7F0B4C9D935572D90006681523562DDEMUMBX014nsnin_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Steve,
I find your new proposal more confusing.

I still think my original proposal is preferred. In addition the definition=
 for diversion may need to be updated.

Regards
Ulrich

From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
Sent: Wednesday, December 10, 2014 2:07 PM
To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #16

Ulrich,

I agree with your assumptions below.  For the third one, the only time it i=
s possible, at least from a DOIC perspective, to send to another host is if=
 it is a realm-routed request.  I might also change the "not overloaded" to=
 "less overloaded".

I do think the statements can be improved to differentiate between behavior=
 for host reports and realm reports.

How about the following:

   For OLRs of type host, if the request is a host-routed request then the =
reacting node SHOULD

   apply throttling abatement treatment to the request.



   For OLRs of type host, If the request is a realm-routed request then the=
 reacting node

   SHOULD apply diversion abatement treatment to the request.

   For OLRs of type realm, the reacting node SHOULD

   apply throttling abatement treatment to the request, independent of the =
type (host-routed or

   realm-routed) of request.


Regards,

Steve
On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:

Steve,

yes, then, maybe, the definition of Diversion is not correct?

What are other people's views?



My assumption was:

If a host is overloaded, it does not help to direct traffic to that host vi=
a a different path.

If a realm is overloaded, it does not help to direct traffic to that realm =
via a different path.

If a host is overloaded, it helps to select an alternative (not overloaded)=
 host (if possible) and direct traffic to that host.

If a realm is overloaded, there never is an alternative (not overloaded) re=
alm to which traffic could be directed.



With the current definition of Diversion, Diversion is no appropriate means=
 to address host overload and is no appropriate means to address realm over=
load. It may be ok for agent overload only.



Regards

Ulrich



From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan

Sent: Tuesday, December 09, 2014 3:06 PM

To: dime@ietf.org<mailto:dime@ietf.org>

Subject: [Dime] Ulrich's suggested change #16



Ulrich,



For your suggested change #16:

Section 4.2.2, 5th and 6th paragraph:

Existing text:

   If the request is a host-routed request then the reacting node SHOULD

   apply throttling abatement treatment to the request.



   If the request is a realm-routed request then the reacting node

   SHOULD apply diversion abatement treatment to the request.



Comment: I don't think so. If the reacting node selects the server and

then detects that the selected server is overloaded and then detects that

the request does not survive (i.e. is subject to abatement), then the react=
ing

node SHOULD apply diversion treatment (i.e. select an alternative server if=
 possible).

If the reacting node does not select the server (either a. because the serv=
er was

already selected by a downstream node, or b. because the server will be sel=
ected

by an upstream node) then there is no point in applying diversion and the r=
eacting

node SHOULD apply throttling of requests that do not survive.



Proposal: replace the paragraphs with:

   If the reacting node does not select the server then it SHOULD apply

   throttling abatement to the request.



   If the reacting node selects the server then it SHOULD apply diversion

   abatement treatment (i.e. select an alternative server if possible) to

   the request.

Diversion is not selecting an alternative node to handle the request.  Dive=
rsion is selecting an alternative route to the selected node.



Whether it is appropriate to select an alternative node for a request is an=
 application decision that probably changes on a per command-code basis wit=
hin the application.  Logic like this is outside the scope of the DOIC spec=
ification.



The text is correct based on the definition of diversion.



Regards,



Steve




--_000_5BCBA1FC2B7F0B4C9D935572D90006681523562DDEMUMBX014nsnin_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"DE" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Steve,<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I find you=
r new proposal more confusing.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I still th=
ink my original proposal is preferred. In addition the definition for diver=
sion may need to be updated.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Ulrich<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> ext Steve Donovan [=
mailto:srdonovan@usdonovans.com]
<br>
<b>Sent:</b> Wednesday, December 10, 2014 2:07 PM<br>
<b>To:</b> Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<br>
<b>Subject:</b> Re: [Dime] Ulrich's suggested change #16<o:p></o:p></span><=
/p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ulrich,<br>
<br>
I agree with your assumptions below.&nbsp; For the third one, the only time=
 it is possible, at least from a DOIC perspective, to send to another host =
is if it is a realm-routed request.&nbsp; I might also change the &quot;not=
 overloaded&quot; to &quot;less overloaded&quot;.<br>
<br>
I do think the statements can be improved to differentiate between behavior=
 for host reports and realm reports.<br>
<br>
How about the following:<o:p></o:p></p>
<pre>&nbsp;&nbsp; For OLRs of type host, if the request is a host-routed re=
quest then the reacting node SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp; apply throttling abatement treatment to the request.<o:p>=
</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; For OLRs of type host, If the request is a realm-routed r=
equest then the reacting node<o:p></o:p></pre>
<pre>&nbsp;&nbsp; SHOULD apply diversion abatement treatment to the request=
.<o:p></o:p></pre>
<pre>&nbsp;&nbsp; For OLRs of type realm, the reacting node SHOULD<o:p></o:=
p></pre>
<pre>&nbsp;&nbsp; apply throttling abatement treatment to the request, inde=
pendent of the type (host-routed or <o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;realm-routed) of request.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Regards,<br>
<br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich=
) wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Steve,<o:p></o:p></pre>
<pre>yes, then, maybe, the definition of Diversion is not correct?<o:p></o:=
p></pre>
<pre>What are other people's views?<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>My assumption was:<o:p></o:p></pre>
<pre>If a host is overloaded, it does not help to direct traffic to that ho=
st via a different path.<o:p></o:p></pre>
<pre>If a realm is overloaded, it does not help to direct traffic to that r=
ealm via a different path.<o:p></o:p></pre>
<pre>If a host is overloaded, it helps to select an alternative (not overlo=
aded) host (if possible) and direct traffic to that host.<o:p></o:p></pre>
<pre>If a realm is overloaded, there never is an alternative (not overloade=
d) realm to which traffic could be directed.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>With the current definition of Diversion, Diversion is no appropriate =
means to address host overload and is no appropriate means to address realm=
 overload. It may be ok for agent overload only.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards<o:p></o:p></pre>
<pre>Ulrich<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>From: DiME [<a href=3D"mailto:dime-bounces@ietf.org">mailto:dime-bounc=
es@ietf.org</a>] On Behalf Of ext Steve Donovan<o:p></o:p></pre>
<pre>Sent: Tuesday, December 09, 2014 3:06 PM<o:p></o:p></pre>
<pre>To: <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><o:p></o:p></pre=
>
<pre>Subject: [Dime] Ulrich's suggested change #16<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ulrich,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>For your suggested change #16:<o:p></o:p></pre>
<pre>Section 4.2.2, 5th and 6th paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; If the request is a host-routed request then the reacting=
 node SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp; apply throttling abatement treatment to the request.<o:p>=
</o:p></pre>
<pre> <o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;If the request is a realm-routed request then the re=
acting node<o:p></o:p></pre>
<pre>&nbsp;&nbsp; SHOULD apply diversion abatement treatment to the request=
.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Comment: I don't think so. If the reacting node selects the server and=
 <o:p></o:p></pre>
<pre>then detects that the selected server is overloaded and then detects t=
hat <o:p></o:p></pre>
<pre>the request does not survive (i.e. is subject to abatement), then the =
reacting <o:p></o:p></pre>
<pre>node SHOULD apply diversion treatment (i.e. select an alternative serv=
er if possible). <o:p></o:p></pre>
<pre>If the reacting node does not select the server (either a. because the=
 server was <o:p></o:p></pre>
<pre>already selected by a downstream node, or b. because the server will b=
e selected <o:p></o:p></pre>
<pre>by an upstream node) then there is no point in applying diversion and =
the reacting <o:p></o:p></pre>
<pre>node SHOULD apply throttling of requests that do not survive.<o:p></o:=
p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Proposal: replace the paragraphs with:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; If the reacting node does not select the server then it S=
HOULD apply<o:p></o:p></pre>
<pre>&nbsp;&nbsp; throttling abatement to the request.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; If the reacting node selects the server then it SHOULD ap=
ply diversion<o:p></o:p></pre>
<pre>&nbsp;&nbsp; abatement treatment (i.e. select an alternative server if=
 possible) to<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the request.<o:p></o:p></pre>
<pre>Diversion is not selecting an alternative node to handle the request.&=
nbsp; Diversion is selecting an alternative route to the selected node.&nbs=
p; <o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Whether it is appropriate to select an alternative node for a request =
is an application decision that probably changes on a per command-code basi=
s within the application.&nbsp; Logic like this is outside the scope of the=
 DOIC specification.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>The text is correct based on the definition of diversion.<o:p></o:p></=
pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_5BCBA1FC2B7F0B4C9D935572D90006681523562DDEMUMBX014nsnin_--


From nobody Thu Dec 11 05:17:09 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 067421ACE47 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:17:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N5Zy43le0Epo for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:17:04 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1E911A88B0 for <dime@ietf.org>; Thu, 11 Dec 2014 05:17:03 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBBDH1qV000464 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 13:17:01 GMT
Received: from DEMUHTC002.nsn-intra.net ([10.159.42.33]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBBDGvNx017898 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 14:17:00 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC002.nsn-intra.net ([10.159.42.33]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 14:17:00 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #8
Thread-Index: AQHQE7IIHC1/0vM3HEqfMpUtT/PrYZyHWeWwgAIHYACAAP1BQA==
Date: Thu, 11 Dec 2014 13:16:59 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235657@DEMUMBX014.nsn-intra.net>
References: <5486F59E.4000908@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235197@DEMUMBX014.nsn-intra.net> <57CA5812-ABE6-4974-8632-1BC40FA84082@nostrum.com>
In-Reply-To: <57CA5812-ABE6-4974-8632-1BC40FA84082@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 3660
X-purgate-ID: 151667::1418303821-0000677A-02A3F38C/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/arWUGEyaO5Q_z0oaaXmzJII9gNA
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #8
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 13:17:06 -0000

Ben,
would the following proposed text address your concern:

   A reporting node MUST NOT change the selected algorithm during the perio=
d
   of time that starts when entering an overload condition and ends when it
   is ensured that any non-expired reacting node's OCS entry created as a
   result of the overload condition in the reporting node is deleted.

In addition, is it so that outside that period the algorithm change can occ=
ur arbitrarily?
e.g. is it ok to change the algorithm in every second answer message while =
outside the period?
Or, is it ok to send rate while outside the period and send loss once the o=
verload condition is entered?
Note that section 3.2. says:

   Reacting nodes can use the indicated overload abatement algorithm to
   prepare for possible overload reports

Should we recommend not to change the algorithm too often while outside the=
 periode where change is prohibited?

Regards
Ulrich

-----Original Message-----
From: ext Ben Campbell [mailto:ben@nostrum.com]=20
Sent: Wednesday, December 10, 2014 11:58 PM
To: Wiehe, Ulrich (NSN - DE/Munich)
Cc: ext Steve Donovan; dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #8


> On Dec 9, 2014, at 9:30 AM, Wiehe, Ulrich (NSN - DE/Munich) <ulrich.wiehe=
@nsn.com> wrote:
>=20
> Steve,
>=20
> please see inline.
>=20
> Ulrich
>=20
>=20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
> Sent: Tuesday, December 09, 2014 2:14 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich's suggested change #8
>=20
> Ulrich,
>=20
> For your suggested change number 8:
> Section 4.1.2, 8th paragraph:
> Existing text:
>   For an ongoing overload condition, a reporting node MUST NOT change
>   the selected algorithm during the period of time that it is in an
>   overload condition and, as a result, is sending OC-OLR AVPs in answer
>   messages.
>=20
> Comment: As a result of an ongoing overload condition the reporting node =
is=20
> sending OC-OLR AVPs containing no validity duration or a validity duratio=
n=20
> different from zero in answer messages.
>=20
> Proposal: Replace the paragraph with:
>   For an ongoing overload condition, a reporting node MUST NOT change
>   the selected algorithm during the period of time that it is in an
>   overload condition and, as a result, is sending OC-OLR AVPs
>   containing no validity duration or a validity duration different
>   from zero in answer messages.
> I don't see the need for the change.  The selected algorithm should not c=
hange for all overload reports relating to an overload condition, including=
 overload reports with a validity duration of zero.
> <Ulrich> Isn't it so that when the overload condition ends (i.e. is no lo=
nger ongoing), the reporting node starts sending OLRs with validity duratio=
n of zero (for a long enough period of time)? (see end of section 4.2.1.4)=
=20
> The question now is whether the change of algorithm is allowed during thi=
s (long enough) period, or only after that period. I don't have a strong vi=
ew. But this was not my point.
> My point is that the current text seems to suggest that an overload condi=
tion is ongoing as long as OC-OLR AVPs are sent in answer messages, and I t=
hink that is not true. </Ulrich>
>=20

I think the proscription should last until the reporting node is (at least =
reasonably) sure that all reacting nodes have removed the OCS. The original=
 text comes closer to that than Ulrich's proposal, but I wonder if we shoul=
dn't cast this in similar terms as we do for the part about resending zero =
duration OLRs.


From nobody Thu Dec 11 05:31:09 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABBCD1A1A20 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:31:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VQ7C4geAWHBj for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:31:05 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E29A1A1B30 for <dime@ietf.org>; Thu, 11 Dec 2014 05:31:05 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBBDV3Kw000739 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 11 Dec 2014 13:31:03 GMT
Received: from DEMUHTC003.nsn-intra.net ([10.159.42.34]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBBDV33g014629 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 11 Dec 2014 14:31:03 +0100
Received: from DEMUHTC012.nsn-intra.net (10.159.42.43) by DEMUHTC003.nsn-intra.net (10.159.42.34) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 11 Dec 2014 14:31:02 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC012.nsn-intra.net ([10.159.42.43]) with mapi id 14.03.0195.001; Thu, 11 Dec 2014 14:31:02 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] Ulrich's suggested change @12
Thread-Index: AQHQE7ZHD23zRsD0mUyK0fJgC7jhrJyHbHpAgAFIcACAAa52UA==
Date: Thu, 11 Dec 2014 13:31:01 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com>
In-Reply-To: <54883F5C.1060603@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.107]
Content-Type: multipart/alternative; boundary="_000_5BCBA1FC2B7F0B4C9D935572D900066815235675DEMUMBX014nsnin_"
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 13771
X-purgate-ID: 151667::1418304663-0000677A-108D045E/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/NTudeHzoW_ukqcmoKGnOMW1vPeE
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 13:31:08 -0000

--_000_5BCBA1FC2B7F0B4C9D935572D900066815235675DEMUMBX014nsnin_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Steve,

yes, it's about capability announcement, and my concern in with announcing =
the selected algorithm in answer messages (while no OLRs are sent). Multipl=
e  agents modifying the selected algorithm in the Supported-Features AVPs i=
n answer messages may  result in ambiguity in DOIC behaviour for downstream=
 DOIC nodes.

Ulrich

From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
Sent: Wednesday, December 10, 2014 1:41 PM
To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change @12

Ulrich,

This paragraph is talking about capability announcement.  We deal with the =
issues related to multiple sources of overload reports already elsewhere in=
 the document.

I still do see the need for a change.

Steve
On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:

Steve,

I agree, my comment and proposal do not hit the mark.



The intention was to say that known issues exist if there are multiple agen=
ts on multiple paths between client and server. The agents may not be able =
to ensure that there is no ambiguity in DOIC behaviour for the client. E.g.=
 from the client's point of view the answer to a first request (which was m=
odified by agent A1) could indicate: DOIC is supported, currenty no overloa=
d, once in overload loss will be selected; and the answer to the next reque=
st (which was modified by agent A2) could indicate: DOIC is supported, some=
?? reduction is requested using rate. The client, however, may not be prepa=
red for rate.



Maybe a warning note could be added to say that the agent may not always be=
 able to ensure that there is no ambiguity.



Ulrich



From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:45 PM
To: dime@ietf.org<mailto:dime@ietf.org>
Subject: [Dime] Ulrich's suggested change @12

Ulrich,

For your suggested change #12:

Section 4.1.3, last paragraph:

Existing text:

   When making changes to the OC-Supported-Features AVP the Diameter

   Agent needs to ensure that there is no ambiguity in DOIC behavior for

   both upstream and downstream DOIC nodes.



Comment: while that is true, in addition problems similar to those

identified in the note in section 3.3 may result from making changes.



Proposal: Add the note:

      Note: Known issues exist if multiple sources for overload reports

      which apply to the same Diameter entity exist.  Reacting nodes

      have no way of determining the source and, as such, will treat

      them as coming from a single source.  Variance in sequence numbers

      between the two sources can then cause incorrect overload

      abatement treatment to be applied for indeterminate periods of

      time.
I don't understand how these are related.  The change to the OC-Supported-F=
eatures AVP made by the agent apply only to the transaction.  In addition, =
this paragraph doesn't mention overload reports.

Regards,

Steve




--_000_5BCBA1FC2B7F0B4C9D935572D900066815235675DEMUMBX014nsnin_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;
	color:black;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"DE" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Steve,<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">yes, it&#8=
217;s about capability announcement, and my concern in with announcing the =
selected algorithm in answer messages (while no OLRs are sent).
 Multiple &nbsp;agents modifying the selected algorithm in the Supported-Fe=
atures AVPs in answer messages may &nbsp;result in ambiguity in DOIC behavi=
our for downstream DOIC nodes.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Ulrich<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> ext Steve Donovan [=
mailto:srdonovan@usdonovans.com]
<br>
<b>Sent:</b> Wednesday, December 10, 2014 1:41 PM<br>
<b>To:</b> Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<br>
<b>Subject:</b> Re: [Dime] Ulrich's suggested change @12<o:p></o:p></span><=
/p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Ulrich,<br>
<br>
This paragraph is talking about capability announcement.&nbsp; We deal with=
 the issues related to multiple sources of overload reports already elsewhe=
re in the document.<br>
<br>
I still do see the need for a change.<br>
<br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich=
) wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Steve,</span><o:p></o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">I agree, my comment and prop=
osal do not hit the mark.</span><o:p></o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">The intention was to say tha=
t known issues exist if there are multiple agents on multiple paths between=
 client and server. The agents may not be able to ensure that there is no a=
mbiguity in DOIC behaviour for the client.
 E.g. from the client&#8217;s point of view the answer to a first request (=
which was modified by agent A1) could indicate: DOIC is supported, currenty=
 no overload, once in overload loss will be selected; and the answer to the=
 next request (which was modified by agent
 A2) could indicate: DOIC is supported, some?? reduction is requested using=
 rate. The client, however, may not be prepared for rate.</span><o:p></o:p>=
</p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Maybe a warning note could b=
e added to say that the agent may not always be able to ensure that there i=
s no ambiguity.</span><o:p></o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Ulrich</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><o:p></o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><o:p></o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><o:p></o:p></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> DiME [<a href=3D"ma=
ilto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
<b>On Behalf Of </b>ext Steve Donovan<br>
<b>Sent:</b> Tuesday, December 09, 2014 2:45 PM<br>
<b>To:</b> <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><br>
<b>Subject:</b> [Dime] Ulrich's suggested change @12</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Ulrich,<br>
<br>
For your suggested change #12:<o:p></o:p></p>
<pre>Section 4.1.3, last paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp; When making changes to the OC-Supported-Features AVP the =
Diameter<o:p></o:p></pre>
<pre>&nbsp;&nbsp; Agent needs to ensure that there is no ambiguity in DOIC =
behavior for<o:p></o:p></pre>
<pre>&nbsp;&nbsp; both upstream and downstream DOIC nodes.<o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Comment: while that is true, in addition problems similar to those <o:=
p></o:p></pre>
<pre>identified in the note in section 3.3 may result from making changes.<=
o:p></o:p></pre>
<pre>&nbsp;<o:p></o:p></pre>
<pre>Proposal: Add the note:<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note: Known issues exist if multiple so=
urces for overload reports<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; which apply to the same Diameter entity=
 exist.&nbsp; Reacting nodes<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have no way of determining the source a=
nd, as such, will treat<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; them as coming from a single source.&nb=
sp; Variance in sequence numbers<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; between the two sources can then cause =
incorrect overload<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; abatement treatment to be applied for i=
ndeterminate periods of<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; time.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I don't understand ho=
w these are related.&nbsp; The change to the OC-Supported-Features AVP made=
 by the agent apply only to the transaction.&nbsp; In addition, this paragr=
aph doesn't mention overload reports.<br>
<br>
Regards,<br>
<br>
Steve<br>
<br>
<br>
<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_5BCBA1FC2B7F0B4C9D935572D900066815235675DEMUMBX014nsnin_--


From nobody Thu Dec 11 05:50:36 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0328C1ACE5D for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:50:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WLP8BYVRRme6 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:50:23 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 372011ACE75 for <dime@ietf.org>; Thu, 11 Dec 2014 05:50:23 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58398 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz48G-0006C6-FA; Thu, 11 Dec 2014 05:50:21 -0800
Message-ID: <5489A118.10506@usdonovans.com>
Date: Thu, 11 Dec 2014 07:50:16 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  ext Ben Campbell <ben@nostrum.com>
References: <54862C38.1000403@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net> <54883CBA.7060503@usdonovans.com> <D7333DA1-093F-449B-B95C-2012C70D4C64@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235563@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235563@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/NC2wTbW9BOtP2FgeWkhM1cCT8dY
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 13:50:25 -0000

Ulrich,

The paragraph is only trying to state that DOIC works through non 
supporting Diameter Agents, which is one of the requirements.

Furthermore, adjacent means "next to".  In your example, C and A1 are 
adjacent DOIC nodes and A1 and S are adjacent DOIC nodes.  C and S are 
never adjacent DOIC nodes because there is a DOIC node between them.

We could simplify the paragraph by saying "DOIC works through non 
supporting Diameter Agents that properly pass unknown AVPs unchanges."  
Maybe that would do away with the confusion about what adjacent means.

Steve


On 12/11/14, 3:55 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Ben, Steve,
>
> the confusion I think comes from the following:
> 1. the paragraph seems to try to define what "adjacent for DOIC purposes" means, but gives only one example and leaves it open whether other examples exist.
> e.g.: Are two DOIC nodes adjacent for DOIC purposes when there is a DOIC supporting agent (that passes OC-specific AVPs through unchanged) on the path between them?
> 2. The paragraph says that OLRs are sent to nodes that are "adjacent for DOIC purpose". It's not clear whether the intention is to say
> a) OLRs are sent to adjacent DOIC nodes rather than to adjacent Diameter nodes, or
> b) OLRs are sent to adjacent DOIC nodes rather than to non-adjacent DOIC nodes.
> And it's not clear whether OLRs are also sent to DOIC nodes that are not adjacent for DOIC purposes.
>
> In a configuration like this:
>
> C-----A1------A2------S
>
> where C, A1 and S support DOIC and A2 does not support DOIC but passes unknown AVPs through unchanged we need to distinguish two cases:
> 1)  A1 passes OC-specific AVPs through unchanged
> In this case C and S are adjacent for DOIC purposes, hence S sends OLRs to C.
> 2)  A1 modifies/replaces OC-specific AVPs
> In this case C and A1 are adjacent for DOIC purpose and A1 and S are adjacent for DOIC purpose, hence S ends OLRs to A1 and A1 sends OLRs to C.
>
> Regards
> Ulrich
>
>   
>
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]
> Sent: Thursday, December 11, 2014 12:50 AM
> To: Steve Donovan
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich suggested change number 1
>
>
>> On Dec 10, 2014, at 6:29 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> I think I see the source of confusion.  It is meant to talk about sending to adjacent DOIC nodes but it uses the words reacting and reporting nodes.  I suggest changing the paragraph to the following, removing the concept of reporting and reacting nodes from the description.
>>
>>    While a DOIC node sends OLRs to "adjacent" DOIC nodes, nodes
>>    that are "adjacent" for DOIC purposes may not be adjacent from a
>>    Diameter, or transport, perspective.  For example, one or more
>>    Diameter agents that do not support DOIC may exist between a given
>>    pair of DOIC nodes, as long as those agents pass
>>    unknown AVPs through unchanged.  The report types described in this
>>    document can safely pass through non-supporting agents.  This may not
>>    be true for report types defined in future specifications.
>>
> I like this approach.
>
> I also note that, for a given transaction, the black-box behavior of a supporting-agent that passes OC AVPs unchanged id identical to that of an a non-supporting agent.
>
>
>> Regards,
>>
>
>
>> Steve
>>
>> On 12/9/14, 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>>
>>> please see inline.
>>>
>>> Ulrich
>>>
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>> Sent: Monday, December 08, 2014 11:55 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich suggested change number 1
>>>
>>> Ulrich,
>>>
>>> I'll deal with each of your suggestion in a separate email to help ensure that nothing is missed.
>>>
>>> For your first suggestion:
>>> Section 3, last paragraph:
>>> Existing text:
>>>     While a reporting node sends OLRs to "adjacent" reacting nodes, nodes
>>>     that are "adjacent" for DOIC purposes may not be adjacent from a
>>>     Diameter, or transport, perspective.  For example, one or more
>>>     Diameter agents that do not support DOIC may exist between a given
>>>     pair of reporting and reacting nodes, as long as those agents pass
>>>     unknown AVPs through unchanged.  The report types described in this
>>>     document can safely pass through non-supporting agents.  This may not
>>>     be true for report types defined in future specifications.
>>>
>>> Comment: while this is all not wrong, the existing text may convey the erring
>>> impression that there cannot be a DOIC supporting agent on the path between a
>>> reporting node and an adjacent reacting node.
>>>
>>> Proposal: It is proposed to add the following sentence at the end of the paragraph:
>>>     Another example is where one or more Diameter agents that do support
>>>     DOIC may exist between a given pair of reporting and reacting nodes,
>>>     as long as those agents pass OC-specific AVPs through unchanged.
>>> I don't agree with the suggested change, as the DOIC supporting agents might need to change the OC-specific AVPs.
>>> <Ulrich> I agree that in some cases DOIC supporting agents need to change the OC-specific AVPs. However, there are also cases where DOIC supporting agents do not need to change OC-specific AVPs.</Ulrich>
>>>    I also don't understand how the paragraph implies that there cannot be DOIC supporting agents in the path of the request.
>>> <Ulrich> It does not imply that. Rather it may convey the erring impression that there cannot be a DOIC supporting agent on the path between a
>>> reporting node and an adjacent reacting node.</Ulrich>
>>>     It is talking specifically about the case where there agents do not support DOIC are in the path.
>>> <Ulrich> No, my understanding is that the paragraph is talking specifically about what "adjacent for DOIC purposes" means. One valid example is given (reporting node and reacting node are "adjacent for DOIC purposes" if one or more agents that do not support DOIC but pass unsupported AVPs through unchanged exist between reporting node and reacting node) and I do not propose to remove that. However, there is another important valid example (reporting node and reacting node are "adjacent for DOIC purposes" if one or more DOIC supporting agents that pass OC-specific AVPs through unchanged exist between reporting node and reacting node), and the proposal is to add text to cover this example. </Ulrich>
>>> The remainder of the document makes it clear that there can be agents that do support DOIC in the path of a transaction.
>>> <Ulrich> that is not my point. The point is to clearly state that there can be DOIC supporting agents that pass through OC-specific AVPs unchanged on the path between reporting node and reacting node, and in this case the reporting and reacting nodes are still regarded "adjacent for DOIC purposes".</Ulrich>
>>>
>>> I don't see the need for a change here.
>>> <Ulrich> I'm not proposing a modification but an addition. This addition provides useful clarification and in no way is harmful</Ulrich>
>>>
>>> Regards,
>>>
>>> Steve
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 05:54:07 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7725A1A3B9F for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:54:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ZKDt_kOpChz for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:54:04 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41E311A1B30 for <dime@ietf.org>; Thu, 11 Dec 2014 05:54:04 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58402 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4Bt-000Ati-HO; Thu, 11 Dec 2014 05:54:03 -0800
Message-ID: <5489A1F9.906@usdonovans.com>
Date: Thu, 11 Dec 2014 07:54:01 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <54862D14.2060304@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235122@DEMUMBX014.nsn-intra.net> <54883DC2.20504@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235452@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235452@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/DBqlUCwa-pjFoNBpPWclmzRUwlM
Subject: Re: [Dime] Ulrich suggested change number 2
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 13:54:05 -0000

I'm ok with this, as long as always is spelled correctly. :-)

Steve

On 12/10/14, 9:53 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
>
> How about something like this:
>
> "This ensures that a reporting node allways supports at least one of the advertized abatement algorithms received in a request messages."
>
> Regards
> Ulrich
>
>
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Wednesday, December 10, 2014 1:34 PM
> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich suggested change number 2
>
> Ulrich,
>
> How about changing the last sentence to:
>
> "This ensures that there is at least one commonly supported overload
> abatement algorithm supported by all DOIC nodes in the path of the request."
>
> Regards,
>
> Steve
>
> On 12/9/14, 8:08 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>>
>> please see inline.
>>
>> Ulrich
>>
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>> Sent: Monday, December 08, 2014 11:58 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich suggested change number 2
>>
>> Ulrich,
>>
>> For the second suggested change:
>> Section 3.2, 6th paragraph:
>> Existing text:
>>      The OC-Feature-Vector AVP will contain an indication of support for
>>      the loss overload abatement algorithm defined in this specification
>>      (see Section 5).  This ensures that there is at least one commonly
>>      supported overload abatement algorithm between the reporting node and
>>      the reacting node(s) in the path of the request.
>>
>> Comment: I agree that within a given path between client and server there may
>> be more than one reacting nodes. But a given reporting node on that path does
>> not have more than one adjacent reacting nodes on that given path to which it
>> sends OLRs. I don't say that the existing text is wrong, but it is misleading.
>> What we want to say here is that any given pair of adjacent reacting and reporting
>> nodes will have at least one commonly supported algorithm.
>>
>> Proposal: It is proposed to replace the last line of the paragraph with:
>>      The adjacent reacting node on the path of the request.
>> It's more than just about the adjacent reaction nodes.  It is important that all reacting nodes in the path of the request have at least one common abatement algorithm.
>> <Ulrich>I do not agree. It is important that a pair of two adjacent reacting and reporting nodes (A,S) have at least one commonly supported algorithm, so that the reporting node can always select an algorithm supported by the adjacent reacting node. There may be another (non-adjacent) reacting node in the path (C), but its not important for C and S (which are not adjacent) to have a commonly supported algorithm.
>> C---A---S
>> It is important that C and A have a commonly supported algorith, as C and A are adjacent;
>> It is important that A and S have a commonly supported algorith, as A and S are adjacent;
>> It is true but not important (and nothing that needs to be ensured) that C and S have a commonly supported algorithm (indeed S could eventually select an algorithm not supported by C);</Ulrich>
>> It is true but not important that C, A and S have a commonly supported algorithm.
>>
>> I don't see the need for the suggested change.
>>
>> Regards,
>>
>> Steve
>>
>


From nobody Thu Dec 11 05:55:04 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EFEB1A701A for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:55:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XpZc7mUG28Wk for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 05:54:58 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26E111A1B30 for <dime@ietf.org>; Thu, 11 Dec 2014 05:54:58 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58403 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4Ck-000Bvu-Id; Thu, 11 Dec 2014 05:54:57 -0800
Message-ID: <5489A22E.9040200@usdonovans.com>
Date: Thu, 11 Dec 2014 07:54:54 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <7BF0F726-12CE-4236-8809-6B5E518F393D@nostrum.com>
In-Reply-To: <7BF0F726-12CE-4236-8809-6B5E518F393D@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/wHLT7f_G2p11hvLIlcMbt5A5L_s
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 13:55:02 -0000

Yes, I meant I do NOT see the need for a change.

Steve

On 12/10/14, 5:20 PM, Ben Campbell wrote:
>> On Dec 10, 2014, at 6:41 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> This paragraph is talking about capability announcement.  We deal with the issues related to multiple sources of overload reports already elsewhere in the document.
>>
>> I still do see the need for a change.
> Those sentences seem contradictory, at least in town. Did you mean to say you do _not_ see the need for a change?
>
>> Steve
>>
>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>> I agree, my comment and proposal do not hit the mark.
>>>   
>>> The intention was to say that known issues exist if there are multiple agents on multiple paths between client and server. The agents may not be able to ensure that there is no ambiguity in DOIC behaviour for the client. E.g. from the client’s point of view the answer to a first request (which was modified by agent A1) could indicate: DOIC is supported, currenty no overload, once in overload loss will be selected; and the answer to the next request (which was modified by agent A2) could indicate: DOIC is supported, some?? reduction is requested using rate. The client, however, may not be prepared for rate.
>>>   
>>> Maybe a warning note could be added to say that the agent may not always be able to ensure that there is no ambiguity.
>>>   
>>> Ulrich
>>>   
>>>   
>>>   
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>> Sent: Tuesday, December 09, 2014 2:45 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change @12
>>>   
>>> Ulrich,
>>>
>>> For your suggested change #12:
>>>
>>> Section 4.1.3, last paragraph:
>>> Existing text:
>>>     When making changes to the OC-Supported-Features AVP the Diameter
>>>     Agent needs to ensure that there is no ambiguity in DOIC behavior for
>>>     both upstream and downstream DOIC nodes.
>>>   
>>> Comment: while that is true, in addition problems similar to those
>>> identified in the note in section 3.3 may result from making changes.
>>>   
>>> Proposal: Add the note:
>>>        Note: Known issues exist if multiple sources for overload reports
>>>        which apply to the same Diameter entity exist.  Reacting nodes
>>>        have no way of determining the source and, as such, will treat
>>>        them as coming from a single source.  Variance in sequence numbers
>>>        between the two sources can then cause incorrect overload
>>>        abatement treatment to be applied for indeterminate periods of
>>>        time.
>>> I don't understand how these are related.  The change to the OC-Supported-Features AVP made by the agent apply only to the transaction.  In addition, this paragraph doesn't mention overload reports.
>>>
>>> Regards,
>>>
>>> Steve
>>>
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 06:03:10 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B70141A88C0 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:03:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level: 
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yj_QQYuSgv1Y for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:03:07 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1906B1ACE47 for <dime@ietf.org>; Thu, 11 Dec 2014 06:03:07 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58413 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4Kc-0008vM-Gy; Thu, 11 Dec 2014 06:03:06 -0800
Message-ID: <5489A416.2000403@usdonovans.com>
Date: Thu, 11 Dec 2014 08:03:02 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net>
Content-Type: multipart/alternative; boundary="------------090302070700000800000502"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/oUqEOJQaY5SD_sGwycxEqmhQifM
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:03:08 -0000

This is a multi-part message in MIME format.
--------------090302070700000800000502
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

I see your concern.  To summarize, if we have the following configuration:

    ----A1----
   /          \
  C            S
   \          /
    ----A2----

And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 
indicates rate then there is ambiguity.

I agree, this warrants a warning statement somewhere in the document.

If there is general agreement on this then I'll propose wording and 
location.

Steve

On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>
> Steve,
>
> yes, it's about capability announcement, and my concern in with 
> announcing the selected algorithm in answer messages (while no OLRs 
> are sent). Multiple  agents modifying the selected algorithm in the 
> Supported-Features AVPs in answer messages may  result in ambiguity in 
> DOIC behaviour for downstream DOIC nodes.
>
> Ulrich
>
> *From:*ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> *Sent:* Wednesday, December 10, 2014 1:41 PM
> *To:* Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> *Subject:* Re: [Dime] Ulrich's suggested change @12
>
> Ulrich,
>
> This paragraph is talking about capability announcement.  We deal with 
> the issues related to multiple sources of overload reports already 
> elsewhere in the document.
>
> I still do see the need for a change.
>
> Steve
>
> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>
>     Steve,
>
>     I agree, my comment and proposal do not hit the mark.
>
>     The intention was to say that known issues exist if there are
>     multiple agents on multiple paths between client and server. The
>     agents may not be able to ensure that there is no ambiguity in
>     DOIC behaviour for the client. E.g. from the client's point of
>     view the answer to a first request (which was modified by agent
>     A1) could indicate: DOIC is supported, currenty no overload, once
>     in overload loss will be selected; and the answer to the next
>     request (which was modified by agent A2) could indicate: DOIC is
>     supported, some?? reduction is requested using rate. The client,
>     however, may not be prepared for rate.
>
>     Maybe a warning note could be added to say that the agent may not
>     always be able to ensure that there is no ambiguity.
>
>     Ulrich
>
>     *From:*DiME [mailto:dime-bounces@ietf.org] *On Behalf Of *ext
>     Steve Donovan
>     *Sent:* Tuesday, December 09, 2014 2:45 PM
>     *To:* dime@ietf.org <mailto:dime@ietf.org>
>     *Subject:* [Dime] Ulrich's suggested change @12
>
>     Ulrich,
>
>     For your suggested change #12:
>
>     Section 4.1.3, last paragraph:
>
>     Existing text:
>
>         When making changes to the OC-Supported-Features AVP the Diameter
>
>         Agent needs to ensure that there is no ambiguity in DOIC behavior for
>
>         both upstream and downstream DOIC nodes.
>
>       
>
>     Comment: while that is true, in addition problems similar to those
>
>     identified in the note in section 3.3 may result from making changes.
>
>       
>
>     Proposal: Add the note:
>
>            Note: Known issues exist if multiple sources for overload reports
>
>            which apply to the same Diameter entity exist.  Reacting nodes
>
>            have no way of determining the source and, as such, will treat
>
>            them as coming from a single source.  Variance in sequence numbers
>
>            between the two sources can then cause incorrect overload
>
>            abatement treatment to be applied for indeterminate periods of
>
>            time.
>
>     I don't understand how these are related.  The change to the
>     OC-Supported-Features AVP made by the agent apply only to the
>     transaction.  In addition, this paragraph doesn't mention overload
>     reports.
>
>     Regards,
>
>     Steve
>
>


--------------090302070700000800000502
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Ulrich,<br>
    <br>
    I see your concern.&nbsp; To summarize, if we have the following
    configuration:<br>
    <br>
    <tt>&nbsp;&nbsp; ----A1----<br>
      &nbsp; /&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \<br>
      &nbsp;C &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S<br>
      &nbsp; \&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; /<br>
    </tt><tt>&nbsp;&nbsp; ----A2----</tt><br>
    <br>
    And A1 indicates loss in in the OC-S-F AVP in answer messages and A2
    indicates rate then there is ambiguity.&nbsp; <br>
    <br>
    I agree, this warrants a warning statement somewhere in the
    document. <br>
    <br>
    If there is general agreement on this then I'll propose wording and
    location.<br>
    <br>
    Steve<br>
    <br>
    <div class="moz-cite-prefix">On 12/11/14, 7:31 AM, Wiehe, Ulrich
      (NSN - DE/Munich) wrote:<br>
    </div>
    <blockquote
cite="mid:5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 12 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;
	color:black;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Steve,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">yes, it&#8217;s about capability announcement, and my
            concern in with announcing the selected algorithm in answer
            messages (while no OLRs are sent). Multiple &nbsp;agents
            modifying the selected algorithm in the Supported-Features
            AVPs in answer messages may &nbsp;result in ambiguity in DOIC
            behaviour for downstream DOIC nodes.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Ulrich<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0cm 0cm 0cm">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                  lang="EN-US">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                lang="EN-US"> ext Steve Donovan
                [<a class="moz-txt-link-freetext" href="mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>]
                <br>
                <b>Sent:</b> Wednesday, December 10, 2014 1:41 PM<br>
                <b>To:</b> Wiehe, Ulrich (NSN - DE/Munich);
                <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                <b>Subject:</b> Re: [Dime] Ulrich's suggested change @12<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Ulrich,<br>
          <br>
          This paragraph is talking about capability announcement.&nbsp; We
          deal with the issues related to multiple sources of overload
          reports already elsewhere in the document.<br>
          <br>
          I still do see the need for a change.<br>
          <br>
          Steve<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN
            - DE/Munich) wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <p class="MsoPlainText"><span lang="EN-US">Steve,</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">I agree, my comment
              and proposal do not hit the mark.</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">&nbsp;</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">The intention was
              to say that known issues exist if there are multiple
              agents on multiple paths between client and server. The
              agents may not be able to ensure that there is no
              ambiguity in DOIC behaviour for the client. E.g. from the
              client&#8217;s point of view the answer to a first request
              (which was modified by agent A1) could indicate: DOIC is
              supported, currenty no overload, once in overload loss
              will be selected; and the answer to the next request
              (which was modified by agent A2) could indicate: DOIC is
              supported, some?? reduction is requested using rate. The
              client, however, may not be prepared for rate.</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">&nbsp;</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">Maybe a warning
              note could be added to say that the agent may not always
              be able to ensure that there is no ambiguity.</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">&nbsp;</span><o:p></o:p></p>
          <p class="MsoPlainText"><span lang="EN-US">Ulrich</span><o:p></o:p></p>
          <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
              lang="EN-US">&nbsp;</span><o:p></o:p></p>
          <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
              lang="EN-US">&nbsp;</span><o:p></o:p></p>
          <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
              lang="EN-US">&nbsp;</span><o:p></o:p></p>
          <div>
            <div style="border:none;border-top:solid #B5C4DF
              1.0pt;padding:3.0pt 0cm 0cm 0cm">
              <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                    lang="EN-US">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                  lang="EN-US"> DiME [<a moz-do-not-send="true"
                    href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>]
                  <b>On Behalf Of </b>ext Steve Donovan<br>
                  <b>Sent:</b> Tuesday, December 09, 2014 2:45 PM<br>
                  <b>To:</b> <a moz-do-not-send="true"
                    href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                  <b>Subject:</b> [Dime] Ulrich's suggested change @12</span><o:p></o:p></p>
            </div>
          </div>
          <p class="MsoNormal">&nbsp;<o:p></o:p></p>
          <p class="MsoNormal" style="margin-bottom:12.0pt">Ulrich,<br>
            <br>
            For your suggested change #12:<o:p></o:p></p>
          <pre>Section 4.1.3, last paragraph:<o:p></o:p></pre>
          <pre>Existing text:<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; When making changes to the OC-Supported-Features AVP the Diameter<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; Agent needs to ensure that there is no ambiguity in DOIC behavior for<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; both upstream and downstream DOIC nodes.<o:p></o:p></pre>
          <pre>&nbsp;<o:p></o:p></pre>
          <pre>Comment: while that is true, in addition problems similar to those <o:p></o:p></pre>
          <pre>identified in the note in section 3.3 may result from making changes.<o:p></o:p></pre>
          <pre>&nbsp;<o:p></o:p></pre>
          <pre>Proposal: Add the note:<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Note: Known issues exist if multiple sources for overload reports<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; which apply to the same Diameter entity exist.&nbsp; Reacting nodes<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; have no way of determining the source and, as such, will treat<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; them as coming from a single source.&nbsp; Variance in sequence numbers<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; between the two sources can then cause incorrect overload<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; abatement treatment to be applied for indeterminate periods of<o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; time.<o:p></o:p></pre>
          <p class="MsoNormal" style="margin-bottom:12.0pt">I don't
            understand how these are related.&nbsp; The change to the
            OC-Supported-Features AVP made by the agent apply only to
            the transaction.&nbsp; In addition, this paragraph doesn't
            mention overload reports.<br>
            <br>
            Regards,<br>
            <br>
            Steve<br>
            <br>
            <br>
            <o:p></o:p></p>
        </blockquote>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------090302070700000800000502--


From nobody Thu Dec 11 06:05:36 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59A321ACE76 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:05:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G6xZrcwSn-5S for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:05:15 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DC921ACE7C for <dime@ietf.org>; Thu, 11 Dec 2014 06:05:14 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58417 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4Mi-000Bi5-Pg; Thu, 11 Dec 2014 06:05:13 -0800
Message-ID: <5489A498.5070203@usdonovans.com>
Date: Thu, 11 Dec 2014 08:05:12 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com>
In-Reply-To: <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/tBgBJhWPs87oYoliqn63K2ZQU1w
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:05:18 -0000

I thought this paragraph was covering unrecognized values for all AVPs.  
Maybe it is better to remove the paragraph entirely and make sure that 
the definition of each AVP addresses what is done with unrecognized values.

Steve

On 12/10/14, 5:26 PM, Ben Campbell wrote:
>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> Actually, the wording you suggested wasn't quite right.  It should be:
>>
>>    When receiving an OC-OLR AVP with unknown values, the overload report
>>    SHOULD be silently discarded by reacting nodes and the event SHOULD
>>    be logged.
>>
>> It's not just about report type values but unknown values for any of the AVPs in the OLR.
>>
>> This seems like a good requirement to include in the specification to ensure common behavior in reacting nodes.  I don't feel strongly about this but I would like to hear other opinions.
> I think this is still not quite complete.
>
> If you receive a sub-AVP that you don't understand, then you should ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a value you don't understand, the behavior should be AVP specific. For Report-Type, that means ignore the whole OLR.
>
> It's not clear to me whether the original text was about arbitrary avps, or Report-Type.
>
>> Steve
>>
>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Hi Steve,
>>>
>>> I think it was pointed out by Ben that we do not specify behaviour of a node for cases where it detects that another node is breaking the rule.
>>> The rule is:
>>>     A reporting node MUST NOT send overload reports of a type that has
>>>     not been advertised as supported by the reacting node.
>>> See section 4.2.3.
>>>
>>> Regards
>>> Ulrich
>>>
>>>    
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change #15
>>>
>>> Ulrich,
>>>
>>> For your suggested change #15:
>>> Section 4.2.1.3, 4th paragraph:
>>> Existing text:
>>>     When receiving an OC-OLR AVPs with unknown values, a reacting node
>>>     SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>     be logged.
>>> Comment: text is confusing. Maybe the intention was to say:
>>>     When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
>>>     SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>     be logged.
>>> But even that is not correct.
>>> Proposal: Remove the paragraph.
>>> The intent was that an OC-OLR that contains unknown values should be discarded.  I agree that the wording needs to be changes as you suggested.  I don't agree with removing the paragraph.  Can you elaborate on why you think it is not correct when changed as you suggested?
>>>
>>> Regards,
>>>
>>> Steve
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 06:07:08 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E354E1A86FF for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:07:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vfbwe5PQhZRs for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:07:05 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D60DC1A1B65 for <dime@ietf.org>; Thu, 11 Dec 2014 06:07:05 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58422 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4OV-00017e-04; Thu, 11 Dec 2014 06:07:05 -0800
Message-ID: <5489A506.1070700@usdonovans.com>
Date: Thu, 11 Dec 2014 08:07:02 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <6A70A6FF-1A7B-4372-BD05-B96C7DE69F9F@nostrum.com>
In-Reply-To: <6A70A6FF-1A7B-4372-BD05-B96C7DE69F9F@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/XWyxF_GmMRmEYMPErU2y05gMrj4
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:07:07 -0000

Ben,

Diversion works for realm-routed requests in response to host reports.

See my proposed wording sent in an early email.

Steve

On 12/10/14, 5:42 PM, Ben Campbell wrote:
>> On Dec 9, 2014, at 8:06 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> For your suggested change #16:
>>
>> Section 4.2.2, 5th and 6th paragraph:
>> Existing text:
>>     If the request is a host-routed request then the reacting node SHOULD
>>     apply throttling abatement treatment to the request.
>>   
>>     If the request is a realm-routed request then the reacting node
>>     SHOULD apply diversion abatement treatment to the request.
>>
>> Comment: I don't think so. If the reacting node selects the server and
>> then detects that the selected server is overloaded and then detects that
>> the request does not survive (i.e. is subject to abatement), then the reacting
>> node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
>> If the reacting node does not select the server (either a. because the server was
>> already selected by a downstream node, or b. because the server will be selected
>> by an upstream node) then there is no point in applying diversion and the reacting
>> node SHOULD apply throttling of requests that do not survive.
>>
>> Proposal: replace the paragraphs with:
>>     If the reacting node does not select the server then it SHOULD apply
>>     throttling abatement to the request.
>>
>>     If the reacting node selects the server then it SHOULD apply diversion
>>     abatement treatment (i.e. select an alternative server if possible) to
>>     the request.
>>
>> Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
> Hmm. Isn't that only true for the proposed Peer-Report type in the Agent draft?
>
>>   
>>
>> Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.  Logic like this is outside the scope of the DOIC specification.
> So how does it work for existing applications? But I agree in principle. I somehow missed that we had 2119 language around this. I think the choice to apply diversion vs throttling should be local policy. We don't need to state it normatively.
>
>> The text is correct based on the definition of diversion.
> I'm not sure we have that definition right.
>
>> Regards,
>>
>> Steve
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 06:13:24 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 777E21A895E for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:13:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level: 
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CRQ_VZkq0srV for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:13:20 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEBF81A6F13 for <dime@ietf.org>; Thu, 11 Dec 2014 06:13:20 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58429 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4UX-0008aZ-HQ; Thu, 11 Dec 2014 06:13:19 -0800
Message-ID: <5489A67C.9060408@usdonovans.com>
Date: Thu, 11 Dec 2014 08:13:16 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  "dime@ietf.org" <dime@ietf.org>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D90006681523562D@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D90006681523562D@DEMUMBX014.nsn-intra.net>
Content-Type: multipart/alternative; boundary="------------020104020607010602050100"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/dxb0-k1ZE0-Sc2xptR5sFG9RoLY
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:13:22 -0000

This is a multi-part message in MIME format.
--------------020104020607010602050100
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ulrich,

There are two report types defined in the document -- host and realm.

There are two types of requests - host-routed and realm-routed.

This leaves four combinations for requests that are selected for 
abatement treatment:

If there is a host report and the request is host-routed then the 
abatement treatment should be to throttle the request.

If there is a host report and the request is realm-routed then the 
abatement treatment should be to divert the request.

If there is a realm report and the request is host-routed then the 
abatement treatment should be to throttle the request.

If there is a realm report and the request is realm-routed then the 
abatement treatment should be to divert the request.

If we agree to the above then we can come up with the proper wording.

Steve


On 12/11/14, 6:40 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>
> Steve,
>
> I find your new proposal more confusing.
>
> I still think my original proposal is preferred. In addition the 
> definition for diversion may need to be updated.
>
> Regards
>
> Ulrich
>
> *From:*ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> *Sent:* Wednesday, December 10, 2014 2:07 PM
> *To:* Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> *Subject:* Re: [Dime] Ulrich's suggested change #16
>
> Ulrich,
>
> I agree with your assumptions below.  For the third one, the only time 
> it is possible, at least from a DOIC perspective, to send to another 
> host is if it is a realm-routed request.  I might also change the "not 
> overloaded" to "less overloaded".
>
> I do think the statements can be improved to differentiate between 
> behavior for host reports and realm reports.
>
> How about the following:
>
>     For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
>     apply throttling abatement treatment to the request.
>   
>     For OLRs of type host, If the request is a realm-routed request then the reacting node
>     SHOULD apply diversion abatement treatment to the request.
>     For OLRs of type realm, the reacting node SHOULD
>     apply throttling abatement treatment to the request, independent of the type (host-routed or
>     realm-routed) of request.
>   
>
> Regards,
>
> Steve
>
> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>
>     Steve,
>
>     yes, then, maybe, the definition of Diversion is not correct?
>
>     What are other people's views?
>
>       
>
>     My assumption was:
>
>     If a host is overloaded, it does not help to direct traffic to that host via a different path.
>
>     If a realm is overloaded, it does not help to direct traffic to that realm via a different path.
>
>     If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.
>
>     If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.
>
>       
>
>     With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.
>
>       
>
>     Regards
>
>     Ulrich
>
>       
>
>     From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>
>     Sent: Tuesday, December 09, 2014 3:06 PM
>
>     To:dime@ietf.org  <mailto:dime@ietf.org>
>
>     Subject: [Dime] Ulrich's suggested change #16
>
>       
>
>     Ulrich,
>
>       
>
>     For your suggested change #16:
>
>     Section 4.2.2, 5th and 6th paragraph:
>
>     Existing text:
>
>         If the request is a host-routed request then the reacting node SHOULD
>
>         apply throttling abatement treatment to the request.
>
>       
>
>         If the request is a realm-routed request then the reacting node
>
>         SHOULD apply diversion abatement treatment to the request.
>
>       
>
>     Comment: I don't think so. If the reacting node selects the server and
>
>     then detects that the selected server is overloaded and then detects that
>
>     the request does not survive (i.e. is subject to abatement), then the reacting
>
>     node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
>
>     If the reacting node does not select the server (either a. because the server was
>
>     already selected by a downstream node, or b. because the server will be selected
>
>     by an upstream node) then there is no point in applying diversion and the reacting
>
>     node SHOULD apply throttling of requests that do not survive.
>
>       
>
>     Proposal: replace the paragraphs with:
>
>         If the reacting node does not select the server then it SHOULD apply
>
>         throttling abatement to the request.
>
>       
>
>         If the reacting node selects the server then it SHOULD apply diversion
>
>         abatement treatment (i.e. select an alternative server if possible) to
>
>         the request.
>
>     Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
>
>       
>
>     Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.  Logic like this is outside the scope of the DOIC specification.
>
>       
>
>     The text is correct based on the definition of diversion.
>
>       
>
>     Regards,
>
>       
>
>     Steve
>
>       
>


--------------020104020607010602050100
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Ulrich,<br>
    <br>
    There are two report types defined in the document -- host and
    realm.<br>
    <br>
    There are two types of requests - host-routed and realm-routed.<br>
    <br>
    This leaves four combinations for requests that are selected for
    abatement treatment:<br>
    <br>
    If there is a host report and the request is host-routed then the
    abatement treatment should be to throttle the request.<br>
    <br>
    If there is a host report and the request is realm-routed then the
    abatement treatment should be to divert the request.<br>
    <br>
    If there is a realm report and the request is host-routed then the
    abatement treatment should be to throttle the request.<br>
    <br>
    If there is a realm report and the request is realm-routed then the
    abatement treatment should be to divert the request.<br>
    <br>
    If we agree to the above then we can come up with the proper
    wording.<br>
    <br>
    Steve<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 12/11/14, 6:40 AM, Wiehe, Ulrich
      (NSN - DE/Munich) wrote:<br>
    </div>
    <blockquote
cite="mid:5BCBA1FC2B7F0B4C9D935572D90006681523562D@DEMUMBX014.nsn-intra.net"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 12 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Steve,<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">I find your new proposal more confusing.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">I still think my original proposal is
            preferred. In addition the definition for diversion may need
            to be updated.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Regards<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US">Ulrich<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"
            lang="EN-US"><o:p>&nbsp;</o:p></span></p>
        <div>
          <div style="border:none;border-top:solid #B5C4DF
            1.0pt;padding:3.0pt 0cm 0cm 0cm">
            <p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                  lang="EN-US">From:</span></b><span
style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"
                lang="EN-US"> ext Steve Donovan
                [<a class="moz-txt-link-freetext" href="mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>]
                <br>
                <b>Sent:</b> Wednesday, December 10, 2014 2:07 PM<br>
                <b>To:</b> Wiehe, Ulrich (NSN - DE/Munich);
                <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a><br>
                <b>Subject:</b> Re: [Dime] Ulrich's suggested change #16<o:p></o:p></span></p>
          </div>
        </div>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
        <p class="MsoNormal">Ulrich,<br>
          <br>
          I agree with your assumptions below.&nbsp; For the third one, the
          only time it is possible, at least from a DOIC perspective, to
          send to another host is if it is a realm-routed request.&nbsp; I
          might also change the "not overloaded" to "less overloaded".<br>
          <br>
          I do think the statements can be improved to differentiate
          between behavior for host reports and realm reports.<br>
          <br>
          How about the following:<o:p></o:p></p>
        <pre>&nbsp;&nbsp; For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; apply throttling abatement treatment to the request.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <pre>&nbsp;&nbsp; For OLRs of type host, If the request is a realm-routed request then the reacting node<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; SHOULD apply diversion abatement treatment to the request.<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; For OLRs of type realm, the reacting node SHOULD<o:p></o:p></pre>
        <pre>&nbsp;&nbsp; apply throttling abatement treatment to the request, independent of the type (host-routed or <o:p></o:p></pre>
        <pre>&nbsp;&nbsp;&nbsp;realm-routed) of request.<o:p></o:p></pre>
        <pre><o:p>&nbsp;</o:p></pre>
        <p class="MsoNormal" style="margin-bottom:12.0pt">Regards,<br>
          <br>
          Steve<o:p></o:p></p>
        <div>
          <p class="MsoNormal">On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN
            - DE/Munich) wrote:<o:p></o:p></p>
        </div>
        <blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
          <pre>Steve,<o:p></o:p></pre>
          <pre>yes, then, maybe, the definition of Diversion is not correct?<o:p></o:p></pre>
          <pre>What are other people's views?<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>My assumption was:<o:p></o:p></pre>
          <pre>If a host is overloaded, it does not help to direct traffic to that host via a different path.<o:p></o:p></pre>
          <pre>If a realm is overloaded, it does not help to direct traffic to that realm via a different path.<o:p></o:p></pre>
          <pre>If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.<o:p></o:p></pre>
          <pre>If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Regards<o:p></o:p></pre>
          <pre>Ulrich<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>From: DiME [<a moz-do-not-send="true" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>] On Behalf Of ext Steve Donovan<o:p></o:p></pre>
          <pre>Sent: Tuesday, December 09, 2014 3:06 PM<o:p></o:p></pre>
          <pre>To: <a moz-do-not-send="true" href="mailto:dime@ietf.org">dime@ietf.org</a><o:p></o:p></pre>
          <pre>Subject: [Dime] Ulrich's suggested change #16<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Ulrich,<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>For your suggested change #16:<o:p></o:p></pre>
          <pre>Section 4.2.2, 5th and 6th paragraph:<o:p></o:p></pre>
          <pre>Existing text:<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; If the request is a host-routed request then the reacting node SHOULD<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; apply throttling abatement treatment to the request.<o:p></o:p></pre>
          <pre> <o:p></o:p></pre>
          <pre>&nbsp;&nbsp;&nbsp;If the request is a realm-routed request then the reacting node<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; SHOULD apply diversion abatement treatment to the request.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Comment: I don't think so. If the reacting node selects the server and <o:p></o:p></pre>
          <pre>then detects that the selected server is overloaded and then detects that <o:p></o:p></pre>
          <pre>the request does not survive (i.e. is subject to abatement), then the reacting <o:p></o:p></pre>
          <pre>node SHOULD apply diversion treatment (i.e. select an alternative server if possible). <o:p></o:p></pre>
          <pre>If the reacting node does not select the server (either a. because the server was <o:p></o:p></pre>
          <pre>already selected by a downstream node, or b. because the server will be selected <o:p></o:p></pre>
          <pre>by an upstream node) then there is no point in applying diversion and the reacting <o:p></o:p></pre>
          <pre>node SHOULD apply throttling of requests that do not survive.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Proposal: replace the paragraphs with:<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; If the reacting node does not select the server then it SHOULD apply<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; throttling abatement to the request.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>&nbsp;&nbsp; If the reacting node selects the server then it SHOULD apply diversion<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; abatement treatment (i.e. select an alternative server if possible) to<o:p></o:p></pre>
          <pre>&nbsp;&nbsp; the request.<o:p></o:p></pre>
          <pre>Diversion is not selecting an alternative node to handle the request.&nbsp; Diversion is selecting an alternative route to the selected node.&nbsp; <o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.&nbsp; Logic like this is outside the scope of the DOIC specification.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>The text is correct based on the definition of diversion.<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Regards,<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
          <pre>Steve<o:p></o:p></pre>
          <pre><o:p>&nbsp;</o:p></pre>
        </blockquote>
        <p class="MsoNormal"><o:p>&nbsp;</o:p></p>
      </div>
    </blockquote>
    <br>
  </body>
</html>

--------------020104020607010602050100--


From nobody Thu Dec 11 06:18:03 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D87D21A1BE9 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:18:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id msSjMpcyJ5wU for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:17:59 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13A891ACECD for <dime@ietf.org>; Thu, 11 Dec 2014 06:17:08 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:58436 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz4Y7-0000Bs-VL; Thu, 11 Dec 2014 06:17:07 -0800
Message-ID: <5489A75B.6020106@usdonovans.com>
Date: Thu, 11 Dec 2014 08:16:59 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  ext Ben Campbell <ben@nostrum.com>
References: <5486F0F1.8000200@usdonovans.com> <ED3019AE-A6DB-443F-AD28-1F058EB81676@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235600@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235600@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/xzOER8XWk3D5vat7zQR_qajRr-s
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggest change number 6
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:18:01 -0000

+1

On 12/11/14, 5:36 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> The proposed simplification is ok for me.
> Ulrich
>
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
> Sent: Wednesday, December 10, 2014 11:02 PM
> To: Steve Donovan
> Cc: dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggest change number 6
>
>
>> On Dec 9, 2014, at 6:54 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> For your suggested change #6:
>>
>> Section 3.3, 12th paragraph:
>> Existing text:
>>     As the conditions that lead to the generation of the overload report
>>     change the reporting node can send new overload reports requesting
>>     greater reduction if the condition gets worse or less reduction if
>>     the condition improves.  The reporting node sends an overload report
>>     with a duration of zero to indicate that the overload condition has
>>     ended and need for use of the abatement algorithm to reduce traffic
>>     sent is no longer needed.
>> Comment: Bad style.
>> Proposal: Remove the words "need for" from the last sentence.
>>
>> I support the suggested change.
> If we are going to change it, I propose a further simplification of the last sentence:
>
> "... and abatement is no longer needed."
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 06:45:38 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 232F61ACEE3 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:45:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.6
X-Spam-Level: 
X-Spam-Status: No, score=-0.6 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ZsFUI7mpw9E for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 06:45:28 -0800 (PST)
Received: from mail-lb0-x231.google.com (mail-lb0-x231.google.com [IPv6:2a00:1450:4010:c04::231]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A4D41ACF00 for <dime@ietf.org>; Thu, 11 Dec 2014 06:45:28 -0800 (PST)
Received: by mail-lb0-f177.google.com with SMTP id b6so4079156lbj.8 for <dime@ietf.org>; Thu, 11 Dec 2014 06:45:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=8SVFgaZjxpkuIJ/F61YVhxE50hbp1iulE3VtQHXQtyE=; b=XfQA2y+TFfV6icc/hgjFRopK2EyjJfvTsXckzTvGN0aKqww0oDHkJyjMU6TD97imO0 sq3eeF0mltwZkGoxlSE5QWyF9FX8bwlaD/3YwLp04yOWWfxgk7nrQVms/lF2dZBBbkS8 LEszrRcnM0p9+mtDY6l8OIoLnq6du8ac7kjpmEAwmrT34huYDQ31WXb7+KvZKOJH4pNI N9I18s3uEXNocyOgms2JI9wBWTj0ycR2TUJacYvYWfF6hkGAaPn5+qdHgWgwo0Odht91 YYRRB2q+9niLxfklo2YhLRdKBzD5IcO97ABgt1ZubGUFIXC0tAEdX8Wpx/Q+cZWYoRcQ YN0w==
X-Received: by 10.152.6.67 with SMTP id y3mr8737189lay.90.1418309126873; Thu, 11 Dec 2014 06:45:26 -0800 (PST)
Received: from [188.117.15.109] ([188.117.15.109]) by mx.google.com with ESMTPSA id v8sm454523lae.6.2014.12.11.06.45.25 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 11 Dec 2014 06:45:25 -0800 (PST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Jouni <jouni.nospam@gmail.com>
In-Reply-To: <4A9D369D-E22C-4E21-A887-C9123C23D017@gmail.com>
Date: Thu, 11 Dec 2014 16:45:24 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <A8D5C637-CBB9-4D3B-AF65-AFCABAC78E85@gmail.com>
References: <4A9D369D-E22C-4E21-A887-C9123C23D017@gmail.com>
To: "dime@ietf.org list" <dime@ietf.org>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/2aBk0c0_iEnjrfOXnlPqA-VmsY8
Subject: Re: [Dime] DIME and adding "load information" to the charter milestones
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 14:45:31 -0000

Folks,

There was no objection, thus we will add the two milestones listed below =
to our charter.

- Jouni & Lionel


> On 03 Dec 2014, at 12:04, Jouni <jouni.nospam@gmail.com> wrote:
>=20
> Folks,
>=20
> As we discussed in Honolulu there is interest to add a new milestone =
for the load information. Recap from the meeting minutes:
>=20
>  Ben - we have a path forward for now. Not working group adoption. We =
don't
>        have a milestone for load. Although it's implied with solving =
RFC7068
>=20
>  Jouni - Who supports adding load to milestones? (7 hands) Against? (0
>          hands).
>=20
>  ACTION: Ask the mailing list about adding load to the milestones.
>=20
> So, we are going to add the following milestones (subject to editing) =
unless
> enough people express their disagreement by 11th Dec EOB (CET+1):
>=20
> Mar 2015 - Submit a document on 'Diameter Load Information' as a =
working group item
> Mar 2016 - Submit I-D 'Diameter Load Information' to the IESG for =
consideration as a Proposed Standard
>=20
>=20
> - Jouni & Lionel


From nobody Thu Dec 11 07:31:02 2014
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 163641A1B1D for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 07:31:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-qFWHbTWx3G for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 07:31:00 -0800 (PST)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E2B31A1B44 for <dime@ietf.org>; Thu, 11 Dec 2014 07:30:59 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
To: dime@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 5.7.4
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141211153059.23934.76924.idtracker@ietfa.amsl.com>
Date: Thu, 11 Dec 2014 07:30:59 -0800
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/lcuBCBwrhYquP4XzNxpVY_o5oVw
Subject: [Dime] Milestones changed for dime WG
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 15:31:01 -0000

URL: http://datatracker.ietf.org/wg/dime/charter/


From nobody Thu Dec 11 10:29:58 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C903F1A8835 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:29:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q0BBI6yCUaTZ for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:29:46 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 223561A879F for <dime@ietf.org>; Thu, 11 Dec 2014 10:29:46 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBITiCu019134 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 12:29:45 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235657@DEMUMBX014.nsn-intra.net>
Date: Thu, 11 Dec 2014 12:29:44 -0600
X-Mao-Original-Outgoing-Id: 440015384.463196-23852e8237cb8cc4e22c9ce46508aae0
Content-Transfer-Encoding: quoted-printable
Message-Id: <FE39589B-F9C5-46C5-9548-7370066B0F91@nostrum.com>
References: <5486F59E.4000908@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235197@DEMUMBX014.nsn-intra.net> <57CA5812-ABE6-4974-8632-1BC40FA84082@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235657@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/MO1mHhALj6MYlpZe7PkaUOATx2k
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #8
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 18:29:49 -0000

> On Dec 11, 2014, at 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> Ben,
> would the following proposed text address your concern:
>=20
>   A reporting node MUST NOT change the selected algorithm during the =
period
>   of time that starts when entering an overload condition and ends =
when it
>   is ensured that any non-expired reacting node's OCS entry created as =
a
>   result of the overload condition in the reporting node is deleted.
>=20

Yes, although I might suggest:

  "A reporting node MUST NOT change the selected algorithm during the =
period
  of time that starts when entering an overload condition and ends when =
the associated=20
  OCS becomes invalid in all reacting nodes."
=20
> In addition, is it so that outside that period the algorithm change =
can occur arbitrarily?
> e.g. is it ok to change the algorithm in every second answer message =
while outside the period?
> Or, is it ok to send rate while outside the period and send loss once =
the overload condition is entered?
> Note that section 3.2. says:
>=20
>   Reacting nodes can use the indicated overload abatement algorithm to
>   prepare for possible overload reports
>=20
> Should we recommend not to change the algorithm too often while =
outside the periode where change is prohibited?

For "loss", it does not matter. But for algorithms that require reacting =
nodes to keep state, it might matter. In my opinion, reporting nodes
should not change the algorithm very often, and not without good reason. =
But I don't think that needs to be a normative requirement.

>=20
> Regards
> Ulrich
>=20
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]=20
> Sent: Wednesday, December 10, 2014 11:58 PM
> To: Wiehe, Ulrich (NSN - DE/Munich)
> Cc: ext Steve Donovan; dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #8
>=20
>=20
>> On Dec 9, 2014, at 9:30 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>>=20
>> Steve,
>>=20
>> please see inline.
>>=20
>> Ulrich
>>=20
>>=20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>> Sent: Tuesday, December 09, 2014 2:14 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich's suggested change #8
>>=20
>> Ulrich,
>>=20
>> For your suggested change number 8:
>> Section 4.1.2, 8th paragraph:
>> Existing text:
>>  For an ongoing overload condition, a reporting node MUST NOT change
>>  the selected algorithm during the period of time that it is in an
>>  overload condition and, as a result, is sending OC-OLR AVPs in =
answer
>>  messages.
>>=20
>> Comment: As a result of an ongoing overload condition the reporting =
node is=20
>> sending OC-OLR AVPs containing no validity duration or a validity =
duration=20
>> different from zero in answer messages.
>>=20
>> Proposal: Replace the paragraph with:
>>  For an ongoing overload condition, a reporting node MUST NOT change
>>  the selected algorithm during the period of time that it is in an
>>  overload condition and, as a result, is sending OC-OLR AVPs
>>  containing no validity duration or a validity duration different
>>  from zero in answer messages.
>> I don't see the need for the change.  The selected algorithm should =
not change for all overload reports relating to an overload condition, =
including overload reports with a validity duration of zero.
>> <Ulrich> Isn't it so that when the overload condition ends (i.e. is =
no longer ongoing), the reporting node starts sending OLRs with validity =
duration of zero (for a long enough period of time)? (see end of section =
4.2.1.4)=20
>> The question now is whether the change of algorithm is allowed during =
this (long enough) period, or only after that period. I don't have a =
strong view. But this was not my point.
>> My point is that the current text seems to suggest that an overload =
condition is ongoing as long as OC-OLR AVPs are sent in answer messages, =
and I think that is not true. </Ulrich>
>>=20
>=20
> I think the proscription should last until the reporting node is (at =
least reasonably) sure that all reacting nodes have removed the OCS. The =
original text comes closer to that than Ulrich's proposal, but I wonder =
if we shouldn't cast this in similar terms as we do for the part about =
resending zero duration OLRs.
>=20


From nobody Thu Dec 11 10:38:45 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E74F31A8934 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:38:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZjNS8w_zUL8f for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:38:34 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A86091A87E2 for <dime@ietf.org>; Thu, 11 Dec 2014 10:38:33 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBIcWAr019983 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 12:38:33 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5489A416.2000403@usdonovans.com>
Date: Thu, 11 Dec 2014 12:38:32 -0600
X-Mao-Original-Outgoing-Id: 440015912.273385-8621adf89bf48d682f364250f12a27e0
Content-Transfer-Encoding: quoted-printable
Message-Id: <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net> <5489A416.2000403@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/XqXb_W1MnmUW5nVrng2WPRjSjwQ
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 18:38:39 -0000

> On Dec 11, 2014, at 8:03 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> I see your concern.  To summarize, if we have the following =
configuration:
>=20
>    ----A1----
>   /          \
>  C            S
>   \          /
>    ----A2----
>=20
> And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 =
indicates rate then there is ambiguity. =20
>=20
> I agree, this warrants a warning statement somewhere in the document.=20=

>=20
> If there is general agreement on this then I'll propose wording and =
location.
>=20

What sort of guidance should we give here? IMO, this is a worse problem =
than for realm reports, or at least having it for both realm and host =
reports makes it considerably worse than before. I think variations on =
this will happen for almost any Diameter network of non-trivial size.

I also think it's reasonable that A1 and A2 might select different =
algorithms towards C. For example, lets say C, A1, and S all support =
rate, but A2 does not. S might select rate towards A1, but loss towards =
A2.

If we can't handle this, I think the entire solution breaks down.

I propose that the best way to handle this is to add source-attribution =
into OLRs, and guidance for what C should do if it gets different =
capabilities for the same host or realm from different paths. This =
_might_ also help solve the "different reports for same realm" problem =
and the "can't tell if an intervening agent supports DOIC" problem.=20


> Steve
>=20
> On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>> =20
>> yes, it=92s about capability announcement, and my concern in with =
announcing the selected algorithm in answer messages (while no OLRs are =
sent). Multiple  agents modifying the selected algorithm in the =
Supported-Features AVPs in answer messages may  result in ambiguity in =
DOIC behaviour for downstream DOIC nodes.
>> =20
>> Ulrich
>> =20
>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
>> Sent: Wednesday, December 10, 2014 1:41 PM
>> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change @12
>> =20
>> Ulrich,
>>=20
>> This paragraph is talking about capability announcement.  We deal =
with the issues related to multiple sources of overload reports already =
elsewhere in the document.
>>=20
>> I still do see the need for a change.
>>=20
>> Steve
>>=20
>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>> I agree, my comment and proposal do not hit the mark.
>> =20
>> The intention was to say that known issues exist if there are =
multiple agents on multiple paths between client and server. The agents =
may not be able to ensure that there is no ambiguity in DOIC behaviour =
for the client. E.g. from the client=92s point of view the answer to a =
first request (which was modified by agent A1) could indicate: DOIC is =
supported, currenty no overload, once in overload loss will be selected; =
and the answer to the next request (which was modified by agent A2) =
could indicate: DOIC is supported, some?? reduction is requested using =
rate. The client, however, may not be prepared for rate.
>> =20
>> Maybe a warning note could be added to say that the agent may not =
always be able to ensure that there is no ambiguity.
>> =20
>> Ulrich
>> =20
>> =20
>> =20
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>> Sent: Tuesday, December 09, 2014 2:45 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich's suggested change @12
>> =20
>> Ulrich,
>>=20
>> For your suggested change #12:
>>=20
>> Section 4.1.3, last paragraph:
>> Existing text:
>>    When making changes to the OC-Supported-Features AVP the Diameter
>>    Agent needs to ensure that there is no ambiguity in DOIC behavior =
for
>>    both upstream and downstream DOIC nodes.
>> =20
>> Comment: while that is true, in addition problems similar to those=20
>> identified in the note in section 3.3 may result from making changes.
>> =20
>> Proposal: Add the note:
>>       Note: Known issues exist if multiple sources for overload =
reports
>>       which apply to the same Diameter entity exist.  Reacting nodes
>>       have no way of determining the source and, as such, will treat
>>       them as coming from a single source.  Variance in sequence =
numbers
>>       between the two sources can then cause incorrect overload
>>       abatement treatment to be applied for indeterminate periods of
>>       time.
>> I don't understand how these are related.  The change to the =
OC-Supported-Features AVP made by the agent apply only to the =
transaction.  In addition, this paragraph doesn't mention overload =
reports.
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>>=20
>>=20
>> =20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 10:45:06 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A2721A1BA0 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:45:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nldrh1T8gV6k for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:45:03 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21D9B1A6FC0 for <dime@ietf.org>; Thu, 11 Dec 2014 10:45:03 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBIj1MR020485 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 12:45:02 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235522@DEMUMBX014.nsn-intra.net>
Date: Thu, 11 Dec 2014 12:45:01 -0600
X-Mao-Original-Outgoing-Id: 440016301.770056-26b7a1a0cb895d3627a117eeb851103f
Content-Transfer-Encoding: quoted-printable
Message-Id: <DEC564CF-6420-4245-A856-EC6E52953B4A@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235522@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/tTMDrb4i6XsmuE8b3QsHKQt2qeY
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 18:45:06 -0000

> On Dec 11, 2014, at 2:32 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> Ben,
> for my clarification:
> you wrote: "If you receive a known sub-AVP, with a value you don't =
understand, the behavior should be AVP specific. For Report-Type, that =
means ignore the whole OLR."
>=20
> I would have thought that "For Report-Type, that means ignore the =
whole set of OLRs".
> At least it should be allowed to do that.
>=20
> The requirement for the reporting node is to not send OLRs with report =
type values that are unknown/unsupported by the reacting node.=20
> The reporting node cannot assume that, when breaking this rule, the =
reacting node will act in a predictable way.

 I think we should allow ignoring the whole set, but not require that. =
Postel's Maxim might suggest that if there are other properly =
constructed OLRs, the reacting node can still reasonably assume that the =
reporting node meant them, but it's up to the implementation.


> It should even be ok for the reporting node to ignore the complete =
answer message.
>=20

Except that. I don't think we _ever_ want a DOIC error to cause the =
enclosing transaction to fail.

> Please let me know your comments.
>=20
> Ulrich
>=20
>=20
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]=20
> Sent: Thursday, December 11, 2014 12:26 AM
> To: Steve Donovan
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
>=20
>>=20
>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>=20
>> Ulrich,
>>=20
>> Actually, the wording you suggested wasn't quite right.  It should =
be:
>>=20
>>  When receiving an OC-OLR AVP with unknown values, the overload =
report
>>  SHOULD be silently discarded by reacting nodes and the event SHOULD
>>  be logged.
>>=20
>> It's not just about report type values but unknown values for any of =
the AVPs in the OLR.
>>=20
>> This seems like a good requirement to include in the specification to =
ensure common behavior in reacting nodes.  I don't feel strongly about =
this but I would like to hear other opinions.
>=20
> I think this is still not quite complete.
>=20
> If you receive a sub-AVP that you don't understand, then you should =
ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the =
unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a =
value you don't understand, the behavior should be AVP specific. For =
Report-Type, that means ignore the whole OLR.
>=20
> It's not clear to me whether the original text was about arbitrary =
avps, or Report-Type.
>=20
>>=20
>> Steve
>>=20
>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Hi Steve,
>>>=20
>>> I think it was pointed out by Ben that we do not specify behaviour =
of a node for cases where it detects that another node is breaking the =
rule.
>>> The rule is:
>>>   A reporting node MUST NOT send overload reports of a type that has
>>>   not been advertised as supported by the reacting node.
>>> See section 4.2.3.
>>>=20
>>> Regards
>>> Ulrich
>>>=20
>>>=20
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change #15
>>>=20
>>> Ulrich,
>>>=20
>>> For your suggested change #15:
>>> Section 4.2.1.3, 4th paragraph:
>>> Existing text:
>>>   When receiving an OC-OLR AVPs with unknown values, a reacting node
>>>   SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>>>   be logged.
>>> Comment: text is confusing. Maybe the intention was to say:
>>>   When receiving an OC-OLR AVPs with an unsupported report type =
value, a reacting node
>>>   SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>   be logged.
>>> But even that is not correct.
>>> Proposal: Remove the paragraph.
>>> The intent was that an OC-OLR that contains unknown values should be =
discarded.  I agree that the wording needs to be changes as you =
suggested.  I don't agree with removing the paragraph.  Can you =
elaborate on why you think it is not correct when changed as you =
suggested?
>>>=20
>>> Regards,
>>>=20
>>> Steve
>>>=20
>>=20
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>=20


From nobody Thu Dec 11 10:51:26 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DAB11A1ADF for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:51:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xbTtBcZz-Vli for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:51:22 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 845241A1BA0 for <dime@ietf.org>; Thu, 11 Dec 2014 10:51:19 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBIpICn021063 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 12:51:19 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5489A498.5070203@usdonovans.com>
Date: Thu, 11 Dec 2014 12:51:18 -0600
X-Mao-Original-Outgoing-Id: 440016678.183841-2090af434d105740dde7229991e2e7f4
Content-Transfer-Encoding: quoted-printable
Message-Id: <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/7Z57Bv2aT-UJMKT8Uiy4JsJH0p4
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 18:51:24 -0000

> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> I thought this paragraph was covering unrecognized values for all =
AVPs.

I agree that's what it covered. But I think we failed to cover the =
unrecognized AVP case. If we don't have anything to say beyond what 6733 =
says, then it might not be strictly necessary, but it might still be =
worth saying that "unrecognized sub-AVPs are treated as per RFC6733".


>  Maybe it is better to remove the paragraph entirely and make sure =
that the definition of each AVP addresses what is done with unrecognized =
values.

Possibly. There are AVPs where there's no such thing as an unrecognized =
value. There may be AVPs where the allowed values vary by algorithm. If =
we do take that route, we probably need language here that says =
unrecognized values are handled as described by the AVP definition or =
the algorithm.

>=20
> Steve
>=20
> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>>> On Dec 10, 2014, at 6:48 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>> Ulrich,
>>>=20
>>> Actually, the wording you suggested wasn't quite right.  It should =
be:
>>>=20
>>>   When receiving an OC-OLR AVP with unknown values, the overload =
report
>>>   SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>>>   be logged.
>>>=20
>>> It's not just about report type values but unknown values for any of =
the AVPs in the OLR.
>>>=20
>>> This seems like a good requirement to include in the specification =
to ensure common behavior in reacting nodes.  I don't feel strongly =
about this but I would like to hear other opinions.
>> I think this is still not quite complete.
>>=20
>> If you receive a sub-AVP that you don't understand, then you should =
ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the =
unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a =
value you don't understand, the behavior should be AVP specific. For =
Report-Type, that means ignore the whole OLR.
>>=20
>> It's not clear to me whether the original text was about arbitrary =
avps, or Report-Type.
>>=20
>>> Steve
>>>=20
>>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Hi Steve,
>>>>=20
>>>> I think it was pointed out by Ben that we do not specify behaviour =
of a node for cases where it detects that another node is breaking the =
rule.
>>>> The rule is:
>>>>    A reporting node MUST NOT send overload reports of a type that =
has
>>>>    not been advertised as supported by the reacting node.
>>>> See section 4.2.3.
>>>>=20
>>>> Regards
>>>> Ulrich
>>>>=20
>>>>   From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>>> To: dime@ietf.org
>>>> Subject: [Dime] Ulrich's suggested change #15
>>>>=20
>>>> Ulrich,
>>>>=20
>>>> For your suggested change #15:
>>>> Section 4.2.1.3, 4th paragraph:
>>>> Existing text:
>>>>    When receiving an OC-OLR AVPs with unknown values, a reacting =
node
>>>>    SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>>>>    be logged.
>>>> Comment: text is confusing. Maybe the intention was to say:
>>>>    When receiving an OC-OLR AVPs with an unsupported report type =
value, a reacting node
>>>>    SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>>    be logged.
>>>> But even that is not correct.
>>>> Proposal: Remove the paragraph.
>>>> The intent was that an OC-OLR that contains unknown values should =
be discarded.  I agree that the wording needs to be changes as you =
suggested.  I don't agree with removing the paragraph.  Can you =
elaborate on why you think it is not correct when changed as you =
suggested?
>>>>=20
>>>> Regards,
>>>>=20
>>>> Steve
>>>>=20
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20


From nobody Thu Dec 11 10:55:21 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A7231A8937 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:55:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CtJzfyQ9uU6p for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 10:55:16 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 12E7C1A876E for <dime@ietf.org>; Thu, 11 Dec 2014 10:55:16 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBItEdM021382 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 12:55:15 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5489A506.1070700@usdonovans.com>
Date: Thu, 11 Dec 2014 12:55:14 -0600
X-Mao-Original-Outgoing-Id: 440016914.76284-90ff8c16389ca9079e937ea6cf13dec4
Content-Transfer-Encoding: quoted-printable
Message-Id: <C3EEDA66-3302-44AB-A774-70E885577122@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <6A70A6FF-1A7B-4372-BD05-B96C7DE69F9F@nostrum.com> <5489A506.1070700@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/fIsiP_O3FND5RxJGVd2aMHlSfnc
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 18:55:20 -0000

> On Dec 11, 2014, at 8:07 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ben,
>=20
> Diversion works for realm-routed requests in response to host reports.

The original language did not discriminate on report-type. But I see =
you've sent a text proposal that does, so I will reply there.

I still take issue with your assertion that diversion is not about =
server selection. I think for the context of this section, it is exactly =
about server selection.

>=20
> See my proposed wording sent in an early email.
>=20
> Steve
>=20
> On 12/10/14, 5:42 PM, Ben Campbell wrote:
>>> On Dec 9, 2014, at 8:06 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>>=20
>>> Ulrich,
>>>=20
>>> For your suggested change #16:
>>>=20
>>> Section 4.2.2, 5th and 6th paragraph:
>>> Existing text:
>>>    If the request is a host-routed request then the reacting node =
SHOULD
>>>    apply throttling abatement treatment to the request.
>>>      If the request is a realm-routed request then the reacting node
>>>    SHOULD apply diversion abatement treatment to the request.
>>>=20
>>> Comment: I don't think so. If the reacting node selects the server =
and
>>> then detects that the selected server is overloaded and then detects =
that
>>> the request does not survive (i.e. is subject to abatement), then =
the reacting
>>> node SHOULD apply diversion treatment (i.e. select an alternative =
server if possible).
>>> If the reacting node does not select the server (either a. because =
the server was
>>> already selected by a downstream node, or b. because the server will =
be selected
>>> by an upstream node) then there is no point in applying diversion =
and the reacting
>>> node SHOULD apply throttling of requests that do not survive.
>>>=20
>>> Proposal: replace the paragraphs with:
>>>    If the reacting node does not select the server then it SHOULD =
apply
>>>    throttling abatement to the request.
>>>=20
>>>    If the reacting node selects the server then it SHOULD apply =
diversion
>>>    abatement treatment (i.e. select an alternative server if =
possible) to
>>>    the request.
>>>=20
>>> Diversion is not selecting an alternative node to handle the =
request.  Diversion is selecting an alternative route to the selected =
node.
>> Hmm. Isn't that only true for the proposed Peer-Report type in the =
Agent draft?
>>=20
>>> =20
>>> Whether it is appropriate to select an alternative node for a =
request is an application decision that probably changes on a per =
command-code basis within the application.  Logic like this is outside =
the scope of the DOIC specification.
>> So how does it work for existing applications? But I agree in =
principle. I somehow missed that we had 2119 language around this. I =
think the choice to apply diversion vs throttling should be local =
policy. We don't need to state it normatively.
>>=20
>>> The text is correct based on the definition of diversion.
>> I'm not sure we have that definition right.
>>=20
>>> Regards,
>>>=20
>>> Steve
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20


From nobody Thu Dec 11 11:03:37 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D49871ACF7F for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:03:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yhFYP3iIkeTK for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:03:33 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FFA71ACF79 for <dime@ietf.org>; Thu, 11 Dec 2014 11:03:32 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBJ3UZn022129 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 13:03:31 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54884556.90108@usdonovans.com>
Date: Thu, 11 Dec 2014 13:03:30 -0600
X-Mao-Original-Outgoing-Id: 440017410.739983-07a15ea4f5fd33f53e6521badc7cf86e
Content-Transfer-Encoding: quoted-printable
Message-Id: <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/f_Cegd0e3Y0jn3C6_VMANvYC86Q
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 19:03:36 -0000

> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ulrich,
>=20
> I agree with your assumptions below.  For the third one, the only time =
it is possible, at least from a DOIC perspective, to send to another =
host is if it is a realm-routed request.  I might also change the "not =
overloaded" to "less overloaded".
>=20
> I do think the statements can be improved to differentiate between =
behavior for host reports and realm reports.
>=20
> How about the following:
>    For OLRs of type host, if the request is a host-routed request then =
the reacting node SHOULD
>    apply throttling abatement treatment to the request.
>=20
>    For OLRs of type host, If the request is a realm-routed request =
then the reacting node
>    SHOULD apply diversion abatement treatment to the request.

Personally, I think that should be non-normative. Or if normative, no =
stronger than MAY. I agree it's a good choice, but I think we can leave =
it to the market to enforce.

I think there when we distinguish request-type, we need to consider =
_when_. For example, an agent may _receive_ a realm routed request but =
_send_ a host-routed request. And for a client, that may be even more =
subtle.

This really does seem like a case of server selection.

>=20
>    For OLRs of type realm, the reacting node SHOULD
>    apply throttling abatement treatment to the request, independent of =
the type (host-routed or=20
>    realm-routed) of request.

Again, I think this should not be normative. In this case this is pretty =
much a statement of fact--you simply cannot reasonably divert given the =
way that Diameter routing works.  I suppose there might be a case where =
a node has some magical knowledge that realm2 can handle anything that =
realm1 can, and could divert to a different realm (which we probably =
still don't want to forbid.)

>=20
>=20
> Regards,
>=20
> Steve
>=20
> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>> yes, then, maybe, the definition of Diversion is not correct?
>> What are other people's views?
>>=20
>> My assumption was:
>> If a host is overloaded, it does not help to direct traffic to that =
host via a different path.
>> If a realm is overloaded, it does not help to direct traffic to that =
realm via a different path.
>> If a host is overloaded, it helps to select an alternative (not =
overloaded) host (if possible) and direct traffic to that host.
>> If a realm is overloaded, there never is an alternative (not =
overloaded) realm to which traffic could be directed.
>>=20
>> With the current definition of Diversion, Diversion is no appropriate =
means to address host overload and is no appropriate means to address =
realm overload. It may be ok for agent overload only.
>>=20
>> Regards
>> Ulrich
>>=20
>> From: DiME [
>> mailto:dime-bounces@ietf.org
>> ] On Behalf Of ext Steve Donovan
>> Sent: Tuesday, December 09, 2014 3:06 PM
>> To:=20
>> dime@ietf.org
>>=20
>> Subject: [Dime] Ulrich's suggested change #16
>>=20
>> Ulrich,
>>=20
>> For your suggested change #16:
>> Section 4.2.2, 5th and 6th paragraph:
>> Existing text:
>>    If the request is a host-routed request then the reacting node =
SHOULD
>>    apply throttling abatement treatment to the request.
>> =20
>>    If the request is a realm-routed request then the reacting node
>>    SHOULD apply diversion abatement treatment to the request.
>>=20
>> Comment: I don't think so. If the reacting node selects the server =
and=20
>> then detects that the selected server is overloaded and then detects =
that=20
>> the request does not survive (i.e. is subject to abatement), then the =
reacting=20
>> node SHOULD apply diversion treatment (i.e. select an alternative =
server if possible).=20
>> If the reacting node does not select the server (either a. because =
the server was=20
>> already selected by a downstream node, or b. because the server will =
be selected=20
>> by an upstream node) then there is no point in applying diversion and =
the reacting=20
>> node SHOULD apply throttling of requests that do not survive.
>>=20
>> Proposal: replace the paragraphs with:
>>    If the reacting node does not select the server then it SHOULD =
apply
>>    throttling abatement to the request.
>>=20
>>    If the reacting node selects the server then it SHOULD apply =
diversion
>>    abatement treatment (i.e. select an alternative server if =
possible) to
>>    the request.
>> Diversion is not selecting an alternative node to handle the request. =
 Diversion is selecting an alternative route to the selected node. =20
>>=20
>> Whether it is appropriate to select an alternative node for a request =
is an application decision that probably changes on a per command-code =
basis within the application.  Logic like this is outside the scope of =
the DOIC specification.
>>=20
>> The text is correct based on the definition of diversion.
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 11:25:48 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 105FC1A8979 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:25:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8QbNLy0DDmQl for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:25:44 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE7D31A6FC6 for <dime@ietf.org>; Thu, 11 Dec 2014 11:25:43 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62692 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz9Ml-0008LD-23; Thu, 11 Dec 2014 11:25:41 -0800
Message-ID: <5489EFAF.8010702@usdonovans.com>
Date: Thu, 11 Dec 2014 13:25:35 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com>
In-Reply-To: <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/AeCUYCEqFvI5BaL-jZeOm0vtgio
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 19:25:45 -0000

On 12/11/14, 12:51 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> I thought this paragraph was covering unrecognized values for all AVPs.
> I agree that's what it covered. But I think we failed to cover the unrecognized AVP case. If we don't have anything to say beyond what 6733 says, then it might not be strictly necessary, but it might still be worth saying that "unrecognized sub-AVPs are treated as per RFC6733".
That is probably worth saying.
>
>>   Maybe it is better to remove the paragraph entirely and make sure that the definition of each AVP addresses what is done with unrecognized values.
> Possibly. There are AVPs where there's no such thing as an unrecognized value. There may be AVPs where the allowed values vary by algorithm. If we do take that route, we probably need language here that says unrecognized values are handled as described by the AVP definition or the algorithm.
Agreed.
>
>> Steve
>>
>> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>>>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>> Ulrich,
>>>>
>>>> Actually, the wording you suggested wasn't quite right.  It should be:
>>>>
>>>>    When receiving an OC-OLR AVP with unknown values, the overload report
>>>>    SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>    be logged.
>>>>
>>>> It's not just about report type values but unknown values for any of the AVPs in the OLR.
>>>>
>>>> This seems like a good requirement to include in the specification to ensure common behavior in reacting nodes.  I don't feel strongly about this but I would like to hear other opinions.
>>> I think this is still not quite complete.
>>>
>>> If you receive a sub-AVP that you don't understand, then you should ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a value you don't understand, the behavior should be AVP specific. For Report-Type, that means ignore the whole OLR.
>>>
>>> It's not clear to me whether the original text was about arbitrary avps, or Report-Type.
>>>
>>>> Steve
>>>>
>>>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>> Hi Steve,
>>>>>
>>>>> I think it was pointed out by Ben that we do not specify behaviour of a node for cases where it detects that another node is breaking the rule.
>>>>> The rule is:
>>>>>     A reporting node MUST NOT send overload reports of a type that has
>>>>>     not been advertised as supported by the reacting node.
>>>>> See section 4.2.3.
>>>>>
>>>>> Regards
>>>>> Ulrich
>>>>>
>>>>>    From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>>>> To: dime@ietf.org
>>>>> Subject: [Dime] Ulrich's suggested change #15
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> For your suggested change #15:
>>>>> Section 4.2.1.3, 4th paragraph:
>>>>> Existing text:
>>>>>     When receiving an OC-OLR AVPs with unknown values, a reacting node
>>>>>     SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>>     be logged.
>>>>> Comment: text is confusing. Maybe the intention was to say:
>>>>>     When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
>>>>>     SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>>>     be logged.
>>>>> But even that is not correct.
>>>>> Proposal: Remove the paragraph.
>>>>> The intent was that an OC-OLR that contains unknown values should be discarded.  I agree that the wording needs to be changes as you suggested.  I don't agree with removing the paragraph.  Can you elaborate on why you think it is not correct when changed as you suggested?
>>>>>
>>>>> Regards,
>>>>>
>>>>> Steve
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 11:27:18 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD78E1A888F for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:27:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j3ONm1yFwCLk for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:27:14 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E6AB1A8727 for <dime@ietf.org>; Thu, 11 Dec 2014 11:27:14 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62695 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz9OK-000AvP-77; Thu, 11 Dec 2014 11:27:13 -0800
Message-ID: <5489F010.3090601@usdonovans.com>
Date: Thu, 11 Dec 2014 13:27:12 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <6A70A6FF-1A7B-4372-BD05-B96C7DE69F9F@nostrum.com> <5489A506.1070700@usdonovans.com> <C3EEDA66-3302-44AB-A774-70E885577122@nostrum.com>
In-Reply-To: <C3EEDA66-3302-44AB-A774-70E885577122@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/h8r5YqJMUbMZOEH8ii8JqZ_S_kE
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 19:27:15 -0000

On 12/11/14, 12:55 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:07 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ben,
>>
>> Diversion works for realm-routed requests in response to host reports.
> The original language did not discriminate on report-type. But I see you've sent a text proposal that does, so I will reply there.
>
> I still take issue with your assertion that diversion is not about server selection. I think for the context of this section, it is exactly about server selection.
Yes, it feeds into server selection.  It does not apply if server 
selection has already been done, either by a previous transaction or by 
a previous Diameter node.
>
>> See my proposed wording sent in an early email.
>>
>> Steve
>>
>> On 12/10/14, 5:42 PM, Ben Campbell wrote:
>>>> On Dec 9, 2014, at 8:06 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>> Ulrich,
>>>>
>>>> For your suggested change #16:
>>>>
>>>> Section 4.2.2, 5th and 6th paragraph:
>>>> Existing text:
>>>>     If the request is a host-routed request then the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request.
>>>>       If the request is a realm-routed request then the reacting node
>>>>     SHOULD apply diversion abatement treatment to the request.
>>>>
>>>> Comment: I don't think so. If the reacting node selects the server and
>>>> then detects that the selected server is overloaded and then detects that
>>>> the request does not survive (i.e. is subject to abatement), then the reacting
>>>> node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
>>>> If the reacting node does not select the server (either a. because the server was
>>>> already selected by a downstream node, or b. because the server will be selected
>>>> by an upstream node) then there is no point in applying diversion and the reacting
>>>> node SHOULD apply throttling of requests that do not survive.
>>>>
>>>> Proposal: replace the paragraphs with:
>>>>     If the reacting node does not select the server then it SHOULD apply
>>>>     throttling abatement to the request.
>>>>
>>>>     If the reacting node selects the server then it SHOULD apply diversion
>>>>     abatement treatment (i.e. select an alternative server if possible) to
>>>>     the request.
>>>>
>>>> Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
>>> Hmm. Isn't that only true for the proposed Peer-Report type in the Agent draft?
>>>
>>>>   
>>>> Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.  Logic like this is outside the scope of the DOIC specification.
>>> So how does it work for existing applications? But I agree in principle. I somehow missed that we had 2119 language around this. I think the choice to apply diversion vs throttling should be local policy. We don't need to state it normatively.
>>>
>>>> The text is correct based on the definition of diversion.
>>> I'm not sure we have that definition right.
>>>
>>>> Regards,
>>>>
>>>> Steve
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 11:36:46 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 007BC1A6F02 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:36:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 66k2qd4mjjcU for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:36:42 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [66.117.4.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 827181A1A9A for <dime@ietf.org>; Thu, 11 Dec 2014 11:36:42 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:62712 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Xz9XS-0009zx-6Q; Thu, 11 Dec 2014 11:36:41 -0800
Message-ID: <5489F246.5040801@usdonovans.com>
Date: Thu, 11 Dec 2014 13:36:38 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com>
In-Reply-To: <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/8aI32VVP4TK7M_R_pyYbaNA5tEg
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 19:36:44 -0000

On 12/11/14, 1:03 PM, Ben Campbell wrote:
>> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> I agree with your assumptions below.  For the third one, the only time it is possible, at least from a DOIC perspective, to send to another host is if it is a realm-routed request.  I might also change the "not overloaded" to "less overloaded".
>>
>> I do think the statements can be improved to differentiate between behavior for host reports and realm reports.
>>
>> How about the following:
>>     For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
>>     apply throttling abatement treatment to the request.
>>
>>     For OLRs of type host, If the request is a realm-routed request then the reacting node
>>     SHOULD apply diversion abatement treatment to the request.
> Personally, I think that should be non-normative. Or if normative, no stronger than MAY. I agree it's a good choice, but I think we can leave it to the market to enforce.
If we make it non normative then we probably need an additional 
statement along the lines of "the reacting node MUST attempt to reduce 
traffic by the amount requested in the OLR" if we don't already have it 
somewhere else in the document.
>
> I think there when we distinguish request-type, we need to consider _when_. For example, an agent may _receive_ a realm routed request but _send_ a host-routed request. And for a client, that may be even more subtle.
>
> This really does seem like a case of server selection.
I don't think it's that subtle.  If server selection hasn't already 
happened for a request and that request is selected for abatement and 
the request would have otherwise been routed to an overloaded host then 
the request should/may be diverted to another server.

Server selection could have happened as a result of a previous 
transaction specifying the host for subsequent transactions or by the 
presence of the Destination-Host in the message when it arrives at an 
agent.  It could have also already happened as a result of configuration.
>
>>     For OLRs of type realm, the reacting node SHOULD
>>     apply throttling abatement treatment to the request, independent of the type (host-routed or
>>     realm-routed) of request.
> Again, I think this should not be normative. In this case this is pretty much a statement of fact--you simply cannot reasonably divert given the way that Diameter routing works.  I suppose there might be a case where a node has some magical knowledge that realm2 can handle anything that realm1 can, and could divert to a different realm (which we probably still don't want to forbid.)
>
>>
>> Regards,
>>
>> Steve
>>
>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>> yes, then, maybe, the definition of Diversion is not correct?
>>> What are other people's views?
>>>
>>> My assumption was:
>>> If a host is overloaded, it does not help to direct traffic to that host via a different path.
>>> If a realm is overloaded, it does not help to direct traffic to that realm via a different path.
>>> If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.
>>> If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.
>>>
>>> With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.
>>>
>>> Regards
>>> Ulrich
>>>
>>> From: DiME [
>>> mailto:dime-bounces@ietf.org
>>> ] On Behalf Of ext Steve Donovan
>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>> To:
>>> dime@ietf.org
>>>
>>> Subject: [Dime] Ulrich's suggested change #16
>>>
>>> Ulrich,
>>>
>>> For your suggested change #16:
>>> Section 4.2.2, 5th and 6th paragraph:
>>> Existing text:
>>>     If the request is a host-routed request then the reacting node SHOULD
>>>     apply throttling abatement treatment to the request.
>>>   
>>>     If the request is a realm-routed request then the reacting node
>>>     SHOULD apply diversion abatement treatment to the request.
>>>
>>> Comment: I don't think so. If the reacting node selects the server and
>>> then detects that the selected server is overloaded and then detects that
>>> the request does not survive (i.e. is subject to abatement), then the reacting
>>> node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
>>> If the reacting node does not select the server (either a. because the server was
>>> already selected by a downstream node, or b. because the server will be selected
>>> by an upstream node) then there is no point in applying diversion and the reacting
>>> node SHOULD apply throttling of requests that do not survive.
>>>
>>> Proposal: replace the paragraphs with:
>>>     If the reacting node does not select the server then it SHOULD apply
>>>     throttling abatement to the request.
>>>
>>>     If the reacting node selects the server then it SHOULD apply diversion
>>>     abatement treatment (i.e. select an alternative server if possible) to
>>>     the request.
>>> Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
>>>
>>> Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application.  Logic like this is outside the scope of the DOIC specification.
>>>
>>> The text is correct based on the definition of diversion.
>>>
>>> Regards,
>>>
>>> Steve
>>>
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 11 11:45:43 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A31911A89F1 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:45:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9NZYuM8zv9wS for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 11:45:38 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D7951A89F9 for <dime@ietf.org>; Thu, 11 Dec 2014 11:45:30 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBBJjSn5025950 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 11 Dec 2014 13:45:29 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5489F246.5040801@usdonovans.com>
Date: Thu, 11 Dec 2014 13:45:28 -0600
X-Mao-Original-Outgoing-Id: 440019928.700097-10fe316aaa98a15fbcc61a54d7940af7
Content-Transfer-Encoding: quoted-printable
Message-Id: <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com> <5489F246.5040801@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/up-_QZ5Rfg7mhdnP2y2K3uCIsfc
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 19:45:41 -0000

> On Dec 11, 2014, at 1:36 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>=20
> On 12/11/14, 1:03 PM, Ben Campbell wrote:
>>> On Dec 10, 2014, at 7:06 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>> Ulrich,
>>>=20
>>> I agree with your assumptions below.  For the third one, the only =
time it is possible, at least from a DOIC perspective, to send to =
another host is if it is a realm-routed request.  I might also change =
the "not overloaded" to "less overloaded".
>>>=20
>>> I do think the statements can be improved to differentiate between =
behavior for host reports and realm reports.
>>>=20
>>> How about the following:
>>>    For OLRs of type host, if the request is a host-routed request =
then the reacting node SHOULD
>>>    apply throttling abatement treatment to the request.
>>>=20
>>>    For OLRs of type host, If the request is a realm-routed request =
then the reacting node
>>>    SHOULD apply diversion abatement treatment to the request.
>> Personally, I think that should be non-normative. Or if normative, no =
stronger than MAY. I agree it's a good choice, but I think we can leave =
it to the market to enforce.
> If we make it non normative then we probably need an additional =
statement along the lines of "the reacting node MUST attempt to reduce =
traffic by the amount requested in the OLR" if we don't already have it =
somewhere else in the document.

Agreed

>>=20
>> I think there when we distinguish request-type, we need to consider =
_when_. For example, an agent may _receive_ a realm routed request but =
_send_ a host-routed request. And for a client, that may be even more =
subtle.
>>=20
>> This really does seem like a case of server selection.
> I don't think it's that subtle.  If server selection hasn't already =
happened for a request and that request is selected for abatement and =
the request would have otherwise been routed to an overloaded host then =
the request should/may be diverted to another server.
>=20
> Server selection could have happened as a result of a previous =
transaction specifying the host for subsequent transactions or by the =
presence of the Destination-Host in the message when it arrives at an =
agent.  It could have also already happened as a result of =
configuration.

In the case of a client, the decision on whether to divert vs just not =
send a request may be heavily influenced by the client application.  =
(Not necessarily the _Diameter_ application.)  In the case of either, a =
node might have local knowledge that a 2nd server can handle everything =
the first server can handle. Even if a downstream node performed server =
selection, a node with such knowledge might override it. We don't =
necessarily need to talk about that sort of thing, but we should avoid =
language that forbids it.


>>=20
>>>    For OLRs of type realm, the reacting node SHOULD
>>>    apply throttling abatement treatment to the request, independent =
of the type (host-routed or
>>>    realm-routed) of request.
>> Again, I think this should not be normative. In this case this is =
pretty much a statement of fact--you simply cannot reasonably divert =
given the way that Diameter routing works. I suppose there might be a =
case where a node has some magical knowledge that realm2 can handle =
anything that realm1 can, and could divert to a different realm (which =
we probably still don't want to forbid.)
>>=20
>>>=20
>>> Regards,
>>>=20
>>> Steve
>>>=20
>>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Steve,
>>>> yes, then, maybe, the definition of Diversion is not correct?
>>>> What are other people's views?
>>>>=20
>>>> My assumption was:
>>>> If a host is overloaded, it does not help to direct traffic to that =
host via a different path.
>>>> If a realm is overloaded, it does not help to direct traffic to =
that realm via a different path.
>>>> If a host is overloaded, it helps to select an alternative (not =
overloaded) host (if possible) and direct traffic to that host.
>>>> If a realm is overloaded, there never is an alternative (not =
overloaded) realm to which traffic could be directed.
>>>>=20
>>>> With the current definition of Diversion, Diversion is no =
appropriate means to address host overload and is no appropriate means =
to address realm overload. It may be ok for agent overload only.
>>>>=20
>>>> Regards
>>>> Ulrich
>>>>=20
>>>> From: DiME [
>>>> mailto:dime-bounces@ietf.org
>>>> ] On Behalf Of ext Steve Donovan
>>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>>> To:
>>>> dime@ietf.org
>>>>=20
>>>> Subject: [Dime] Ulrich's suggested change #16
>>>>=20
>>>> Ulrich,
>>>>=20
>>>> For your suggested change #16:
>>>> Section 4.2.2, 5th and 6th paragraph:
>>>> Existing text:
>>>>    If the request is a host-routed request then the reacting node =
SHOULD
>>>>    apply throttling abatement treatment to the request.
>>>>      If the request is a realm-routed request then the reacting =
node
>>>>    SHOULD apply diversion abatement treatment to the request.
>>>>=20
>>>> Comment: I don't think so. If the reacting node selects the server =
and
>>>> then detects that the selected server is overloaded and then =
detects that
>>>> the request does not survive (i.e. is subject to abatement), then =
the reacting
>>>> node SHOULD apply diversion treatment (i.e. select an alternative =
server if possible).
>>>> If the reacting node does not select the server (either a. because =
the server was
>>>> already selected by a downstream node, or b. because the server =
will be selected
>>>> by an upstream node) then there is no point in applying diversion =
and the reacting
>>>> node SHOULD apply throttling of requests that do not survive.
>>>>=20
>>>> Proposal: replace the paragraphs with:
>>>>    If the reacting node does not select the server then it SHOULD =
apply
>>>>    throttling abatement to the request.
>>>>=20
>>>>    If the reacting node selects the server then it SHOULD apply =
diversion
>>>>    abatement treatment (i.e. select an alternative server if =
possible) to
>>>>    the request.
>>>> Diversion is not selecting an alternative node to handle the =
request.  Diversion is selecting an alternative route to the selected =
node.
>>>>=20
>>>> Whether it is appropriate to select an alternative node for a =
request is an application decision that probably changes on a per =
command-code basis within the application. Logic like this is outside =
the scope of the DOIC specification.
>>>>=20
>>>> The text is correct based on the definition of diversion.
>>>>=20
>>>> Regards,
>>>>=20
>>>> Steve
>>>>=20
>>>>=20
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 11 15:33:33 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F92E1A8A52 for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 15:33:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 66SdiZDxdD-X for <dime@ietfa.amsl.com>; Thu, 11 Dec 2014 15:33:30 -0800 (PST)
Received: from mail-lb0-x231.google.com (mail-lb0-x231.google.com [IPv6:2a00:1450:4010:c04::231]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1EAC1A1A5E for <dime@ietf.org>; Thu, 11 Dec 2014 15:33:29 -0800 (PST)
Received: by mail-lb0-f177.google.com with SMTP id b6so4841858lbj.8 for <dime@ietf.org>; Thu, 11 Dec 2014 15:33:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=from:content-type:content-transfer-encoding:subject:date:message-id :cc:to:mime-version; bh=ejjlSA6StVPsH47v2n3utfQY0/NYODHELMtp5KtWli4=; b=Mt1TmSwhoBY+jzdDTL3Ub/ldM1J69HrQDBT51iTbhil1eyibcfW046Z7su00B8x7eB bWWB4meQXwVLC18gRl/wTyEd4kBo3zLJNxmLW3xXbj+95It36Vwsl5gpPvBi/re2Cms6 hQm0JJ3TPC6+RY9mL8dZ5jA4v/7W4QRbHGzSkkdgY5Goaspp1VLOdXoXUDhHyzHGF3HT E+8aiYltLn5AxleEzhDyHpEm2BiPCrokIaOylu0Zf8UdQfhRWSDvF9WkhcxloOKjUCBN /Y8dKE+QyZaU4kDSbhOQJtME89pDOGUoboZHi2EfEEMFC5UYdkELhwl4aRXcZyfGJcLZ ibLg==
X-Received: by 10.112.205.65 with SMTP id le1mr12482297lbc.54.1418340808085; Thu, 11 Dec 2014 15:33:28 -0800 (PST)
Received: from [188.117.15.109] ([188.117.15.109]) by mx.google.com with ESMTPSA id zc5sm762521lbb.49.2014.12.11.15.33.26 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 11 Dec 2014 15:33:27 -0800 (PST)
From: Jouni <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Fri, 12 Dec 2014 01:33:25 +0200
Message-Id: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
To: "dime@ietf.org list" <dime@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/8nJvJ_D_bI3CxDNogBsuW9iim5g
Subject: [Dime] early IANA assignments for DOIC
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 23:33:31 -0000

Folks,

During the last meeting we had discussion on early IANA assignment of =
AVP codes for the DOIC. The actual process for that is now BCPed in =
RFC7120. So far we have one request, which hardly meets the criteria of =
the "sufficient interest in the community". Are there others (Steve is =
noted in the Honolulu meeting minutes) who would like to see the IANA =
process started already ahead of time before the I-D leaves the WG or =
around that time?.

- Jouni & Lionel=


From nobody Fri Dec 12 00:04:28 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C52E31AC40E for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 00:04:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i8RObzS8_EAv for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 00:04:23 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC9821A6EED for <dime@ietf.org>; Fri, 12 Dec 2014 00:04:22 -0800 (PST)
X-AuditID: c1b4fb25-f791c6d00000617b-a2-548aa184c8b4
Received: from ESESSHC007.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id 9E.52.24955.481AA845; Fri, 12 Dec 2014 09:04:20 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC007.ericsson.se ([153.88.183.39]) with mapi id 14.03.0195.001; Fri, 12 Dec 2014 09:04:20 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updates to DOIC -05
Thread-Index: AQHP96zTVLWd5veGrkqAoFDKpocx+ZxXdZWAgAKB9QCAABTjgIABToGAgABXjYCAAImqAIAAtOqAgAHz+gCAAFg3AIAFNTcAgAARHgCABzpwAIAFs+cAgABIhYCACwbhAIABEZ9ggAATtICAAFSrgIAKq7MggAC/3gCAAi4MMA==
Date: Fri, 12 Dec 2014 08:04:19 +0000
Message-ID: <087A34937E64E74E848732CFF8354B9209880865@ESESSMB101.ericsson.se>
References: <545792B6.8030502@usdonovans.com> <24888_1415758364_5462C21C_24888_19283_1_6c33c20a-bfd3-4a2e-94ea-a49704889510@PEXCVZYH02.corporate.adroot.infra.ftgroup> <5BCBA1FC2B7F0B4C9D935572D900066815228DC9@DEMUMBX014.nsn-intra.net> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com> <547F46D5.7060800@usdonovans.! com> <087A34937E64E74E848732CFF8354B920987F790@ESESSMB101.ericsson.se> <F9D57A16-94F6-4F1E-82B4-46B342D51B1E@nostrum.com>
In-Reply-To: <F9D57A16-94F6-4F1E-82B4-46B342D51B1E@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.17]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupkkeLIzCtJLcpLzFFi42KZGfG3RrdlYVeIQX+7qcX8ztPsFnN7V7BZ bDq/jsXi9vZMiw1NPA6sHq3P9rJ6LFnyk8lj1s4nLB4tz06yeax628cawBrFZZOSmpNZllqk b5fAlbF2x2Hmgr8JFecXfmBsYDzh28XIySEhYCLx7s5OZghbTOLCvfVsXYxcHEICRxglNj86 xAzhLGaU2HV3JStIFZuAncSl0y+YQGwRASWJ581bWUCKmAXuMEo8/HuBDSQhLKAusXznL1aI Ig2JviOrmSHsXYwSr/piuhg5OFgEVCX2zw0DCfMK+Eqcbutmh1j2jUPiUvMXRpAaTgF7iYM7 zUFqGIGu+35qDdheZgFxiVtP5jNBXC0gsWTPeagPRCVePv7HCtIqIaAosbxfDqJcT+LG1Cls ELa2xLKFr5kh1gpKnJz5hGUCo9gsJFNnIWmZhaRlFpKWBYwsqxhFi1OLk3LTjYz1Uosyk4uL 8/P08lJLNjEC4+7glt+qOxgvv3E8xCjAwajEw1swqStEiDWxrLgy9xCjNAeLkjjvwnPzgoUE 0hNLUrNTUwtSi+KLSnNSiw8xMnFwSjUwdgbN37FdgM/M4IiLvu3SmvrPO8UT3TxP5248yx7g keNeFDv/YOuuEk23+u28zRdlXa/aMRSseFBY9aCeffGBDKOgVcpO71XeXTgheVVJ2W+JBRN/ 9voFPsH/ivYUle9YJ5F3egZTHa/yft4EqT+hbrUL7q2U9zp0u3/vDot3tX9ZTrl673NSYinO SDTUYi4qTgQA8uKcHZwCAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/bWl6PHL6TmyhVfVKQoU5_S7gc0c
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 08:04:27 -0000

2119 language is not required in my opinion, as long as the message is tran=
smitted.
Cheers
/MCruz

-----Original Message-----
From: Ben Campbell [mailto:ben@nostrum.com]=20
Sent: jueves, 11 de diciembre de 2014 0:46
To: Maria Cruz Bartolome
Cc: Steve Donovan; TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@oran=
ge.com; dime@ietf.org
Subject: Re: [Dime] Updates to DOIC -05


> On Dec 10, 2014, at 9:09 AM, Maria Cruz Bartolome <maria.cruz.bartolome@e=
ricsson.com> wrote:
>=20
> Dear all,
> =20
> I have the following proposal, for first paragraph
> Now:
> Therefore, before
>    applying local message throttling, a reporting node needs to check if
>    these messages match existing OCS entries,
> =20
> Proposal
> Therefore, before
>    applying local message throttling, a reporting node MAY check if
>    these messages match existing OCS entries,
> =20
> I think the reporting node may or not check whether the received messages=
 match a "delegated" active OCS. This is a processing consuming task that c=
ould be avoided if the reporting node uses different criteria to choose mes=
sages to drop/reject. This is up to  implementation.

I am okay with it being up to the implementation. I think the point of the =
warning is to let implementers know they need to consider this.=20

But I wonder why you want to add 2119 language when it didn't have it befor=
e?


> =20
> Best regards
> /MCruz
> =20
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
> Sent: mi=E9rcoles, 03 de diciembre de 2014 18:22
> To: TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@orange.com;=20
> Ben Campbell
> Cc: dime@ietf.org
> Subject: Re: [Dime] Updates to DOIC -05
> =20
> I have attempted to address both Lionel's and Jean-Jacques' suggestions w=
ith the following text:
>=20
>    When a reporting node sends an OLR, it effectively delegates any
>    necessary throttling to downstream nodes.  If the reporting node also
>    locally throttles the same set of messages, the overall number of
>    throttled requests may be higher than intended.  Therefore, before
>    applying local message throttling, a reporting node needs to check if
>    these messages match existing OCS entries, indicating that these
>    messages have survived throttling applied by downstream nodes that
>    have received the related OLR.
> =20
>    However, even if the set of messages match existing OCS entries, the
>    reporting node can still apply other abatement methods such as
>    diversion.  The reporting node might also need to throttle requests
>    for reasons other than overload.  For example, an agent or server
>    might have a configured rate limit for each client, and throttle
>    requests that exceed that limit, even if such requests had already
>    been candidates for throttling by downstream nodes.  The reporting
>    node also has the option to send new OLRs requesting greater
>    reductions in traffic, reducing the need for local throttling.
>=20
> Steve
>=20
> On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
> Dear all
> =20
> To continue on my remark , I would complement the Steve's text with " can=
 update the reduction of traffic it requires from the reacting nodes(s) by =
sending new overload reports" as hereafter:   =20
> =20
>    Therefore, if a
>    reporting node needs to apply local throttling on a set of messages
>    that match existing OCS entries, it needs to consider
>    the impact of throttling by downstream nodes and can update the reduct=
ion of traffic it requires from the reacting nodes(s) by sending new overlo=
ad reports.=20
> =20
> Best regards
> =20
> JJacques
> =20
> =20
> De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN,=20
> JEAN-JACQUES (JEAN-JACQUES) Envoy=E9 : mercredi 3 d=E9cembre 2014 11:29 =
=C0=20
> : Steve Donovan; lionel.morand@orange.com; Ben Campbell Cc :=20
> dime@ietf.org Objet : Re: [Dime] Updates to DOIC -05
> =20
> Dear all
> =20
> I am not against the new proposed texts from Steve or Ben to clarify this=
 topic.
> =20
> My point is that, when  the reporting node has sent an OLR requiring  a t=
raffic reduction , there is first a reaction time before receiving reduced =
traffic, and second even if the traffic has been reduced, it can still exce=
ed the capacity of the reporting node  that has no other choice than to thr=
ottle the received reduced traffic (if no diversion). This can happen when =
the traffic at the source (reacting node) before throttling is increasing q=
uickly, so the traffic reduced  according to the received OLR may  remain t=
oo high .  Then, if the reporting node has nevertheless to do some throttle=
, it will certainly react by new OLRs requiring a higher traffic reduction =
from the reacting nodes. This is a dynamic process, where the reporting nod=
e adjust the  traffic  reduction it requires according to what it receives =
.
> =20
> As Ben  I also think this is a guidance , and I think it is good to bring=
 some guidance.
> =20
> Best regards
> =20
> JJacques
> =20
> De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan=20
> Envoy=E9 : mardi 2 d=E9cembre 2014 19:50 =C0 : lionel.morand@orange.com; =
Ben=20
> Campbell Cc : dime@ietf.org Objet : Re: [Dime] Updates to DOIC -05
> =20
> Lionel,
>=20
> The two paragraphs together now say the following:
>=20
>    When a reporting node sends an OLR, it effectively delegates any
>    necessary throttling to downstream nodes.  If the reporting node also
>    locally throttles the same set of messages, the overall number of
>    throttled request may be higher than intended.  Therefore, if a
>    reporting node needs to apply local throttling on a set of messages
>    that match or overlap with existing OCS entries, it needs to consider
>    the impact of throttling by downstream nodes.
> =20
>    However, when the reporting node sends an OLR downstream, it might
>    still need to apply other abatement methods such as diversion.  The
>    reporting node might also need to throttle requests for reasons other
>    than overload.  For example, an agent or server might have a
>    configured rate limit for each client, and throttle requests that
>    exceed that limit, even if such requests had already been candidates
>    for throttling by downstream nodes.
> Do you see the need for further clarification?
>=20
> Steve
>=20
> On 11/25/14, 12:26 PM, lionel.morand@orange.com wrote:
> I'm OK with the idea of the text proposed by Ben.
> I would just make clear that throttling is applicable to the fact of send=
ing/forwarding requests (cf. definition). A reporting node may apply local =
throttling if it is an agent. But if it is a server, it can either drop the=
 exceeded number of requests (no response sent to the downstream) or send a=
 specific DIAMETER-TOO-BUSY response. I think that this clarification is so=
mehow missing in the document.
> =20
> Regards,
> =20
> Lionel
> =20
> -----Message d'origine-----
> De : Steve Donovan [mailto:srdonovan@usdonovans.com] Envoy=E9 : mardi 25=
=20
> novembre 2014 15:07 =C0 : Ben Campbell; MORAND Lionel IMT/OLN Cc :=20
> Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org; Maria Cruz Bartolome=20
> Objet : Re: [Dime] Updates to DOIC -05
> =20
> I'm ok with Ben's wording and will make the change unless I hear objectio=
ns on the list.
> =20
> Steve
> =20
> On 11/21/14, 5:01 PM, Ben Campbell wrote:
> On reflection, I think there might be a subtlety here. The resulting offe=
red-load may still exceed the reporting node's current capacity. This can b=
e true even if it's sent an OLR (and thus has related OCS). As mentioned in=
 the surrounding node needs to still be able to protect itself, possibly by=
 throttling. Therefore, I propose the sentence take the form of non-normati=
ve guidance. For example:
> =20
> "When a reporting node sends an OLR, it effectively delegates any necessa=
ry throttling to downstream nodes.  If the reporting node also locally thro=
ttles the same set of messages, the overall number of throttled request may=
 be higher than intended. Therefore, if a reporting node needs to apply loc=
al throttling on a set of messages that match or overlap with existing OCS =
entries, it needs to consider the impact of throttling by downstream nodes.=
"
> =20
>  =20
> On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com wrote:
> =20
> I can live with the text proposed by Ulrich. But what is wrong with:
> =20
> " Therefore, the reporting node SHOULD NOT apply throttling to the set of=
 messages to which an active OCS applies." ?
> =20
> Envoy=E9 depuis mon Sony Xperia SP d'Orange
> =20
> ---- Maria Cruz Bartolome a =E9crit ----
> =20
> =20
> Section 4.2.3, 13th paragraph, 2nd sentence:
> Existing text: Therefore, the reporting node SHOULD NOT apply throttling =
to the set of messages to which the OLR applies.
> Proposed text: Therefore, the reporting node SHOULD NOT apply throttling =
to the set of messages to which the sent OLR applies.
> =20
> [LM] I would say that the reporting node will not remember the previously=
 sent OLR, but will take care that there is an active OCS.
> SRD> I'm ok with Ulrich's change.
> =20
> [LM] and this is incorrect but not fundamental. The reporting node does n=
ot have to "remember" a previously sent OLR. What it will do is to refer to=
 existing OCS to know that throttling should not be applied. An OCS is a co=
nsequence of an sent OLR but it is not an OLR itself. But not fundamental h=
ere.
> =20
> [MCruz] I am ok with Ulrich's change. It does not mean that the reporting=
 node needs to "remember" a previously sent OLR, though. The change only pr=
oposes to "identify" which OLR we refer to.
> =20
> Best regards
> /MCruz
> =20
> =20
> _____________________________________________________________________
> ____________________________________________________
> =20
> Ce message et ses pieces jointes peuvent contenir des informations=20
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,=20
> exploites ou copies sans autorisation. Si vous avez recu ce message=20
> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que =
les pieces jointes. Les messages electroniques etant susceptibles d'alterat=
ion, Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.
> =20
> This message and its attachments may contain confidential or=20
> privileged information that may be protected by law; they should not be d=
istributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and de=
lete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have bee=
n modified, changed or falsified.
> Thank you.
> =20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
> =20
> =20
> =20
> ______________________________________________________________________
> ___________________________________________________
> =20
> Ce message et ses pieces jointes peuvent contenir des informations=20
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,=20
> exploites ou copies sans autorisation. Si vous avez recu ce message=20
> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que =
les pieces jointes. Les messages electroniques etant susceptibles d'alterat=
ion, Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.
> =20
> This message and its attachments may contain confidential or=20
> privileged information that may be protected by law; they should not be d=
istributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and de=
lete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have bee=
n modified, changed or falsified.
> Thank you.
> =20
> =20
> =20
> =20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Fri Dec 12 00:24:27 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B164A1A88CA for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 00:24:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YInZVn5sm8tf for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 00:24:21 -0800 (PST)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2B0B1A0058 for <dime@ietf.org>; Fri, 12 Dec 2014 00:24:20 -0800 (PST)
X-AuditID: c1b4fb2d-f79fc6d000001087-2b-548aa6337799
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.253.124]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id EA.AA.04231.336AA845; Fri, 12 Dec 2014 09:24:19 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.41]) by ESESSHC005.ericsson.se ([153.88.183.33]) with mapi id 14.03.0195.001; Fri, 12 Dec 2014 09:24:18 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Updated DOIC Requirements Analysis
Thread-Index: AQHQCFYt6tScBxBsq0iC3L6bres0LpyIv54AgADMHwCAAihrkA==
Date: Fri, 12 Dec 2014 08:24:17 +0000
Message-ID: <087A34937E64E74E848732CFF8354B92098808EC@ESESSMB101.ericsson.se>
References: <46C8B155-A8B0-41F6-A8A5-6F21D61ADE9E@nostrum.com> <087A34937E64E74E848732CFF8354B920987F783@ESESSMB101.ericsson.se> <767BF9E5-A72B-44B5-A324-A0CF74F70A69@nostrum.com>
In-Reply-To: <767BF9E5-A72B-44B5-A324-A0CF74F70A69@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.17]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrFLMWRmVeSWpSXmKPExsUyM+Jvja7xsq4Qg4s3hC3md55mt5jbu4LN gcljyZKfTB6zdj5hCWCK4rJJSc3JLEst0rdL4MpYMXsac8Evh4ptqxqZGhiX2HcxcnBICJhI TL/I1MXICWSKSVy4t56ti5GLQ0jgCKPE495J7BDOYkaJpsYWdpAqNgE7iUunX4B1iAgoSTxv 3soCYjMLaEhc2tLMCGILC5hJdM3awQZRYy4xdcFmZgjbSWLB0qdgcRYBVYmN+yaBzeQV8JV4 s7iHFcQWEtjOKPHyuSqIzSlgL3F/52mwekag676fWsMEsUtc4taT+VBXC0gs2XOeGcIWlXj5 +B8rxGOKEsv75UBMZgFNifW79CE6FSWmdD+E2ioocXLmE5YJjGKzkAydhdAxC0nHLCQdCxhZ VjGKFqcWF+emGxnrpRZlJhcX5+fp5aWWbGIERs7BLb91dzCufu14iFGAg1GJh7dgUleIEGti WXFl7iFGaQ4WJXHeRefmBQsJpCeWpGanphakFsUXleakFh9iZOLglGpg5Ptf9XjrkzORdy+d 8Z8uffX+3n8ON8u5L6VXnp739CHbEfsf0mHpRWuf6rxIm7pp/nNW3ycqOStrVKdcFo19uPDn DnuNraqTAo5PP5GovCiG76l4xbkvrP5+Wftm5fxRepIR7fN7vWzYH4n7JZtPBK2Y9eu/yQPL jyyNvxnmH5yzv29Gnolwk78SS3FGoqEWc1FxIgAYkMr4fQIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/9Ubzj4t8CqMV09Gshwc-6aMC4Ec
Cc: "dime@ietf.org list" <dime@ietf.org>
Subject: Re: [Dime] Updated DOIC Requirements Analysis
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 08:24:23 -0000
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From nobody Fri Dec 12 02:29:16 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2F971ACC88 for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 02:29:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0jqm3xdQo2MD for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 02:29:07 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias244.francetelecom.com [80.12.204.244]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 165161ACC81 for <dime@ietf.org>; Fri, 12 Dec 2014 02:29:07 -0800 (PST)
Received: from omfeda08.si.francetelecom.fr (unknown [xx.xx.xx.201]) by omfeda12.si.francetelecom.fr (ESMTP service) with ESMTP id 2B5CC3B4677; Fri, 12 Dec 2014 11:29:05 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfeda08.si.francetelecom.fr (ESMTP service) with ESMTP id 0B5FB38413D; Fri, 12 Dec 2014 11:29:05 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Fri, 12 Dec 2014 11:29:04 +0100
From: <lionel.morand@orange.com>
To: "dime@ietf.org" <dime@ietf.org>
Thread-Topic: WGLC for draft-ietf-dime-congestion-flow-attributes-01
Thread-Index: AdAIjxU+v6kXSNpPTf2oD++zGQ1VZwNZvC+A
Date: Fri, 12 Dec 2014 10:29:03 +0000
Message-ID: <2485_1418380145_548AC371_2485_9268_5_6B7134B31289DC4FAF731D844122B36E9F6D15@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <8730_1416906548_54744734_8730_3173_1_6B7134B31289DC4FAF731D844122B36E93E944@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <8730_1416906548_54744734_8730_3173_1_6B7134B31289DC4FAF731D844122B36E93E944@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.6]
Content-Type: multipart/alternative; boundary="_000_6B7134B31289DC4FAF731D844122B36E9F6D15PEXCVZYM13corpora_"
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.12.12.53924
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Oh9bVM11vsRVAffPRL_4azdpd7w
Cc: "dime-ads@tools.ietf.org" <dime-ads@tools.ietf.org>, "dime-chairs@tools.ietf.org" <dime-chairs@tools.ietf.org>
Subject: Re: [Dime] WGLC for draft-ietf-dime-congestion-flow-attributes-01
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 10:29:13 -0000

--_000_6B7134B31289DC4FAF731D844122B36E9F6D15PEXCVZYM13corpora_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Folks,

The WGLC for draft-ietf-dime-congestion-flow-attributes ended last Tuesday =
and no concern was expressed about the proposal to move forward this draft.
This document will be then submitted to IESG for publication.

Regards,

Lionel


De : lionel.morand@orange.com [mailto:lionel.morand@orange.com]
Envoy=E9 : mardi 25 novembre 2014 10:09
=C0 : dime@ietf.org
Cc : dime-chairs@tools.ietf.org; dime-ads@tools.ietf.org
Objet : WGLC for draft-ietf-dime-congestion-flow-attributes-01


Folks,



As discussed at the last IETF meeting, the authors of draft-ietf-dime-conge=
stion-flow-attributes have requested for a WGLC and I think the document is=
 stable enough for it.



This email starts a two weeks WGLC for draft-ietf-dime-congestion-flow-attr=
ibutes-01 (http://tools.ietf.org/html/draft-ietf-dime-congestion-flow-attri=
butes-01)

The WGLC will end Tuesday, December 9, 2014.



Post your comments to the mailing list and if you think something needs to =
be changed, put that also into the Issue Tracker.



- Lionel & Jouni


___________________________________________________________________________=
______________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.



This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and dele=
te this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.

Thank you.

___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


--_000_6B7134B31289DC4FAF731D844122B36E9F6D15PEXCVZYM13corpora_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Texte brut Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
pre
	{mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML Car";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.TextebrutCar
	{mso-style-name:"Texte brut Car";
	mso-style-priority:99;
	mso-style-link:"Texte brut";
	font-family:"Calibri","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.PrformatHTMLCar
	{mso-style-name:"Pr=E9format=E9 HTML Car";
	mso-style-priority:99;
	mso-style-link:"Pr=E9format=E9 HTML";
	font-family:Consolas;
	mso-fareast-language:EN-US;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"FR" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hi Folks,<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">The WGL=
C for draft-ietf-dime-congestion-flow-attributes ended last Tuesday and no =
concern was expressed about the proposal to move forward this draft.<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">This do=
cument will be then submitted to IESG for publication.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Regards=
,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Lionel<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;mso-fareast-language:FR">De&nbsp;:</sp=
an></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot=
;sans-serif&quot;;mso-fareast-language:FR"> lionel.morand@orange.com [mailt=
o:lionel.morand@orange.com]
<br>
<b>Envoy=E9&nbsp;:</b> mardi 25 novembre 2014 10:09<br>
<b>=C0&nbsp;:</b> dime@ietf.org<br>
<b>Cc&nbsp;:</b> dime-chairs@tools.ietf.org; dime-ads@tools.ietf.org<br>
<b>Objet&nbsp;:</b> WGLC for draft-ietf-dime-congestion-flow-attributes-01<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Folks,<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">As discussed at the last IET=
F meeting, the authors of draft-ietf-dime-congestion-flow-attributes have r=
equested for a WGLC and I think the document is stable enough for it.<o:p><=
/o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">This email starts a two week=
s WGLC for draft-ietf-dime-congestion-flow-attributes-01 (<a href=3D"http:/=
/tools.ietf.org/html/draft-ietf-dime-congestion-flow-attributes-01">http://=
tools.ietf.org/html/draft-ietf-dime-congestion-flow-attributes-01</a>)
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">The WGLC will end Tuesday, D=
ecember 9, 2014.<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US">Post your comments to the ma=
iling list and if you think something needs to be changed, put that also in=
to the Issue Tracker.
<o:p></o:p></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoPlainText">- Lionel &amp; Jouni<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<pre>______________________________________________________________________=
___________________________________________________<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ce message et ses pieces jointes peuvent contenir des informations con=
fidentielles ou privilegiees et ne doivent donc<o:p></o:p></pre>
<pre>pas etre diffuses, exploites ou copies sans autorisation. Si vous avez=
 recu ce message par erreur, veuillez le signaler<o:p></o:p></pre>
<pre>a l'expediteur et le detruire ainsi que les pieces jointes. Les messag=
es electroniques etant susceptibles d'alteration,<o:p></o:p></pre>
<pre>Orange decline toute responsabilite si ce message a ete altere, deform=
e ou falsifie. Merci.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This message and its attachments may contain confidential or privilege=
d information that may be protected by law;<o:p></o:p></pre>
<pre>they should not be distributed, used or copied without authorisation.<=
o:p></o:p></pre>
<pre>If you have received this email in error, please notify the sender and=
 delete this message and its attachments.<o:p></o:p></pre>
<pre>As emails may be altered, Orange is not liable for messages that have =
been modified, changed or falsified.<o:p></o:p></pre>
<pre>Thank you.<o:p></o:p></pre>
</div>
<PRE>______________________________________________________________________=
___________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.
</PRE></body>
</html>

--_000_6B7134B31289DC4FAF731D844122B36E9F6D15PEXCVZYM13corpora_--


From nobody Fri Dec 12 02:34:51 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F0B81ACCE1 for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 02:34:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fshQCk9L-WXu for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 02:34:47 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpida-esg-02.alcatel-lucent.com [135.245.210.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 003741ACCE2 for <dime@ietf.org>; Fri, 12 Dec 2014 02:34:46 -0800 (PST)
Received: from fr712usmtp2.zeu.alcatel-lucent.com (unknown [135.239.2.42]) by Websense Email Security Gateway with ESMTPS id A0A4ADFCDBBAF; Fri, 12 Dec 2014 10:34:43 +0000 (GMT)
Received: from FR711WXCHHUB01.zeu.alcatel-lucent.com (fr711wxchhub01.zeu.alcatel-lucent.com [135.239.2.111]) by fr712usmtp2.zeu.alcatel-lucent.com (GMO) with ESMTP id sBCAYiPH014508 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 12 Dec 2014 11:34:45 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR711WXCHHUB01.zeu.alcatel-lucent.com ([135.239.2.111]) with mapi id 14.03.0195.001; Fri, 12 Dec 2014 11:34:45 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: Jouni <jouni.nospam@gmail.com>, "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: [Dime] early IANA assignments for DOIC
Thread-Index: AQHQFZrjiR8LPE0FZUmDu8vFd7hRhJyLwujw
Date: Fri, 12 Dec 2014 10:34:44 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F2826@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
In-Reply-To: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.38]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/cwryKFJHNBH1j6oGFOZlL_qi7n4
Subject: Re: [Dime] early IANA assignments for DOIC
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 10:34:49 -0000

Hi Jouni

I am  also in favor to have an early IANA assignment of AVP codes for the D=
OIC.

Best regards

JJacques=20

-----Message d'origine-----
De=A0: DiME [mailto:dime-bounces@ietf.org] De la part de Jouni
Envoy=E9=A0: vendredi 12 d=E9cembre 2014 00:33
=C0=A0: dime@ietf.org list
Objet=A0: [Dime] early IANA assignments for DOIC

Folks,

During the last meeting we had discussion on early IANA assignment of AVP c=
odes for the DOIC. The actual process for that is now BCPed in RFC7120. So =
far we have one request, which hardly meets the criteria of the "sufficient=
 interest in the community". Are there others (Steve is noted in the Honolu=
lu meeting minutes) who would like to see the IANA process started already =
ahead of time before the I-D leaves the WG or around that time?.

- Jouni & Lionel
_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Fri Dec 12 13:03:33 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71C211A0397 for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 13:03:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hpfvPUz4njxO for <dime@ietfa.amsl.com>; Fri, 12 Dec 2014 13:03:27 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34B041A8979 for <dime@ietf.org>; Fri, 12 Dec 2014 13:03:23 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBCL3IOD073091 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 12 Dec 2014 15:03:20 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
Date: Fri, 12 Dec 2014 15:03:15 -0600
X-Mao-Original-Outgoing-Id: 440110994.94493-63f85dfde022e51eeed13782c74ca66f
Content-Transfer-Encoding: quoted-printable
Message-Id: <4D2F1C75-95C3-4CF8-B9E6-A3E2A4ADA188@nostrum.com>
References: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
To: Jouni <jouni.nospam@gmail.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-FXErHmtifltwJJxnEvKFQHFKxg
Cc: "dime@ietf.org list" <dime@ietf.org>
Subject: Re: [Dime] early IANA assignments for DOIC
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Dec 2014 21:03:29 -0000

I would like to see this done as soon as possible. I am aware of some =
teams that plan to do early DOIC implementation and testing, and would =
like to do so with real AVP codes. Early allocation would facilitate the =
"running code" part of the IETF process.

Thanks!

Ben.

> On Dec 11, 2014, at 5:33 PM, Jouni <jouni.nospam@gmail.com> wrote:
>=20
> Folks,
>=20
> During the last meeting we had discussion on early IANA assignment of =
AVP codes for the DOIC. The actual process for that is now BCPed in =
RFC7120. So far we have one request, which hardly meets the criteria of =
the "sufficient interest in the community". Are there others (Steve is =
noted in the Honolulu meeting minutes) who would like to see the IANA =
process started already ahead of time before the I-D leaves the WG or =
around that time?.
>=20
> - Jouni & Lionel
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 15 08:43:26 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30C391A802F for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 08:43:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.579
X-Spam-Level: *
X-Spam-Status: No, score=1.579 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J0YezNe3S1vb for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 08:43:24 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C4C41A7D85 for <dime@ietf.org>; Mon, 15 Dec 2014 08:43:24 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:59722 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0Yjv-0005Mq-ID; Mon, 15 Dec 2014 08:43:21 -0800
Message-ID: <548F0FA7.70403@usdonovans.com>
Date: Mon, 15 Dec 2014 10:43:19 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>,  "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
References: <5486F59E.4000908@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235197@DEMUMBX014.nsn-intra.net> <57CA5812-ABE6-4974-8632-1BC40FA84082@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235657@DEMUMBX014.nsn-intra.net> <FE39589B-F9C5-46C5-9548-7370066B0F91@nostrum.com>
In-Reply-To: <FE39589B-F9C5-46C5-9548-7370066B0F91@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/mAj5lMhxsJzjyf3i-9a-o0xdNsE
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #8
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Dec 2014 16:43:25 -0000

I agree with Ben's wording and , given that there has been no objections 
raised, will update the document with that wording.  If there are 
objections I can make a followup change based on those objections.

Steve

On 12/11/14, 12:29 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) <ulrich.wiehe@nsn.com> wrote:
>>
>> Ben,
>> would the following proposed text address your concern:
>>
>>    A reporting node MUST NOT change the selected algorithm during the period
>>    of time that starts when entering an overload condition and ends when it
>>    is ensured that any non-expired reacting node's OCS entry created as a
>>    result of the overload condition in the reporting node is deleted.
>>
> Yes, although I might suggest:
>
>    "A reporting node MUST NOT change the selected algorithm during the period
>    of time that starts when entering an overload condition and ends when the associated
>    OCS becomes invalid in all reacting nodes."
>   
>> In addition, is it so that outside that period the algorithm change can occur arbitrarily?
>> e.g. is it ok to change the algorithm in every second answer message while outside the period?
>> Or, is it ok to send rate while outside the period and send loss once the overload condition is entered?
>> Note that section 3.2. says:
>>
>>    Reacting nodes can use the indicated overload abatement algorithm to
>>    prepare for possible overload reports
>>
>> Should we recommend not to change the algorithm too often while outside the periode where change is prohibited?
> For "loss", it does not matter. But for algorithms that require reacting nodes to keep state, it might matter. In my opinion, reporting nodes
> should not change the algorithm very often, and not without good reason. But I don't think that needs to be a normative requirement.
>
>> Regards
>> Ulrich
>>
>> -----Original Message-----
>> From: ext Ben Campbell [mailto:ben@nostrum.com]
>> Sent: Wednesday, December 10, 2014 11:58 PM
>> To: Wiehe, Ulrich (NSN - DE/Munich)
>> Cc: ext Steve Donovan; dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change #8
>>
>>
>>> On Dec 9, 2014, at 9:30 AM, Wiehe, Ulrich (NSN - DE/Munich) <ulrich.wiehe@nsn.com> wrote:
>>>
>>> Steve,
>>>
>>> please see inline.
>>>
>>> Ulrich
>>>
>>>
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>> Sent: Tuesday, December 09, 2014 2:14 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change #8
>>>
>>> Ulrich,
>>>
>>> For your suggested change number 8:
>>> Section 4.1.2, 8th paragraph:
>>> Existing text:
>>>   For an ongoing overload condition, a reporting node MUST NOT change
>>>   the selected algorithm during the period of time that it is in an
>>>   overload condition and, as a result, is sending OC-OLR AVPs in answer
>>>   messages.
>>>
>>> Comment: As a result of an ongoing overload condition the reporting node is
>>> sending OC-OLR AVPs containing no validity duration or a validity duration
>>> different from zero in answer messages.
>>>
>>> Proposal: Replace the paragraph with:
>>>   For an ongoing overload condition, a reporting node MUST NOT change
>>>   the selected algorithm during the period of time that it is in an
>>>   overload condition and, as a result, is sending OC-OLR AVPs
>>>   containing no validity duration or a validity duration different
>>>   from zero in answer messages.
>>> I don't see the need for the change.  The selected algorithm should not change for all overload reports relating to an overload condition, including overload reports with a validity duration of zero.
>>> <Ulrich> Isn't it so that when the overload condition ends (i.e. is no longer ongoing), the reporting node starts sending OLRs with validity duration of zero (for a long enough period of time)? (see end of section 4.2.1.4)
>>> The question now is whether the change of algorithm is allowed during this (long enough) period, or only after that period. I don't have a strong view. But this was not my point.
>>> My point is that the current text seems to suggest that an overload condition is ongoing as long as OC-OLR AVPs are sent in answer messages, and I think that is not true. </Ulrich>
>>>
>> I think the proscription should last until the reporting node is (at least reasonably) sure that all reacting nodes have removed the OCS. The original text comes closer to that than Ulrich's proposal, but I wonder if we shouldn't cast this in similar terms as we do for the part about resending zero duration OLRs.
>>
>


From nobody Mon Dec 15 09:36:19 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E912B1A86EB for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 09:36:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.002
X-Spam-Level: 
X-Spam-Status: No, score=-5.002 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AaE5s00WAU0y for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 09:36:15 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79EC01A86EA for <dime@ietf.org>; Mon, 15 Dec 2014 09:36:15 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBFHaC6e024633 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 15 Dec 2014 17:36:12 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBFHaCPO023287 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 15 Dec 2014 18:36:12 +0100
Received: from DEMUHTC006.nsn-intra.net (10.159.42.37) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Mon, 15 Dec 2014 18:36:11 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC006.nsn-intra.net ([10.159.42.37]) with mapi id 14.03.0195.001; Mon, 15 Dec 2014 18:36:11 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich suggested change number 1
Thread-Index: AQHQEzn9APTOpOEpnEOsWl042ZAFN5yHKxAQgAGHrwCAAL4tAIAApwBQgABDpQCABpYMUA==
Date: Mon, 15 Dec 2014 17:36:11 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152358BD@DEMUMBX014.nsn-intra.net>
References: <54862C38.1000403@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152350CF@DEMUMBX014.nsn-intra.net> <54883CBA.7060503@usdonovans.com> <D7333DA1-093F-449B-B95C-2012C70D4C64@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235563@DEMUMBX014.nsn-intra.net> <5489A118.10506@usdonovans.com>
In-Reply-To: <5489A118.10506@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.110]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 8155
X-purgate-ID: 151667::1418664973-0000658F-5B0DBDF4/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/9SktSyFac8Amdyqv6gUkjTTNY0s
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich suggested change number 1
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Dec 2014 17:36:19 -0000

Steve,

I'm fine with the intention and with the proposed simplification, avoiding =
misinterpretations like
"DOIC nodes sent OLRs only to DOIC nodes that are next to it" and allowing =
DOIC nodes to send OLRs to DOIC nodes that are not next to it.

Ulrich

-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
Sent: Thursday, December 11, 2014 2:50 PM
To: Wiehe, Ulrich (NSN - DE/Munich); ext Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich suggested change number 1

Ulrich,

The paragraph is only trying to state that DOIC works through non=20
supporting Diameter Agents, which is one of the requirements.

Furthermore, adjacent means "next to".  In your example, C and A1 are=20
adjacent DOIC nodes and A1 and S are adjacent DOIC nodes.  C and S are=20
never adjacent DOIC nodes because there is a DOIC node between them.

We could simplify the paragraph by saying "DOIC works through non=20
supporting Diameter Agents that properly pass unknown AVPs unchanges." =20
Maybe that would do away with the confusion about what adjacent means.

Steve


On 12/11/14, 3:55 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Ben, Steve,
>
> the confusion I think comes from the following:
> 1. the paragraph seems to try to define what "adjacent for DOIC purposes"=
 means, but gives only one example and leaves it open whether other example=
s exist.
> e.g.: Are two DOIC nodes adjacent for DOIC purposes when there is a DOIC =
supporting agent (that passes OC-specific AVPs through unchanged) on the pa=
th between them?
> 2. The paragraph says that OLRs are sent to nodes that are "adjacent for =
DOIC purpose". It's not clear whether the intention is to say
> a) OLRs are sent to adjacent DOIC nodes rather than to adjacent Diameter =
nodes, or
> b) OLRs are sent to adjacent DOIC nodes rather than to non-adjacent DOIC =
nodes.
> And it's not clear whether OLRs are also sent to DOIC nodes that are not =
adjacent for DOIC purposes.
>
> In a configuration like this:
>
> C-----A1------A2------S
>
> where C, A1 and S support DOIC and A2 does not support DOIC but passes un=
known AVPs through unchanged we need to distinguish two cases:
> 1)  A1 passes OC-specific AVPs through unchanged
> In this case C and S are adjacent for DOIC purposes, hence S sends OLRs t=
o C.
> 2)  A1 modifies/replaces OC-specific AVPs
> In this case C and A1 are adjacent for DOIC purpose and A1 and S are adja=
cent for DOIC purpose, hence S ends OLRs to A1 and A1 sends OLRs to C.
>
> Regards
> Ulrich
>
>  =20
>
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]
> Sent: Thursday, December 11, 2014 12:50 AM
> To: Steve Donovan
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich suggested change number 1
>
>
>> On Dec 10, 2014, at 6:29 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>
>> Ulrich,
>>
>> I think I see the source of confusion.  It is meant to talk about sendin=
g to adjacent DOIC nodes but it uses the words reacting and reporting nodes=
.  I suggest changing the paragraph to the following, removing the concept =
of reporting and reacting nodes from the description.
>>
>>    While a DOIC node sends OLRs to "adjacent" DOIC nodes, nodes
>>    that are "adjacent" for DOIC purposes may not be adjacent from a
>>    Diameter, or transport, perspective.  For example, one or more
>>    Diameter agents that do not support DOIC may exist between a given
>>    pair of DOIC nodes, as long as those agents pass
>>    unknown AVPs through unchanged.  The report types described in this
>>    document can safely pass through non-supporting agents.  This may not
>>    be true for report types defined in future specifications.
>>
> I like this approach.
>
> I also note that, for a given transaction, the black-box behavior of a su=
pporting-agent that passes OC AVPs unchanged id identical to that of an a n=
on-supporting agent.
>
>
>> Regards,
>>
>
>
>> Steve
>>
>> On 12/9/14, 7:16 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>>
>>> please see inline.
>>>
>>> Ulrich
>>>
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donova=
n
>>> Sent: Monday, December 08, 2014 11:55 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich suggested change number 1
>>>
>>> Ulrich,
>>>
>>> I'll deal with each of your suggestion in a separate email to help ensu=
re that nothing is missed.
>>>
>>> For your first suggestion:
>>> Section 3, last paragraph:
>>> Existing text:
>>>     While a reporting node sends OLRs to "adjacent" reacting nodes, nod=
es
>>>     that are "adjacent" for DOIC purposes may not be adjacent from a
>>>     Diameter, or transport, perspective.  For example, one or more
>>>     Diameter agents that do not support DOIC may exist between a given
>>>     pair of reporting and reacting nodes, as long as those agents pass
>>>     unknown AVPs through unchanged.  The report types described in this
>>>     document can safely pass through non-supporting agents.  This may n=
ot
>>>     be true for report types defined in future specifications.
>>>
>>> Comment: while this is all not wrong, the existing text may convey the =
erring
>>> impression that there cannot be a DOIC supporting agent on the path bet=
ween a
>>> reporting node and an adjacent reacting node.
>>>
>>> Proposal: It is proposed to add the following sentence at the end of th=
e paragraph:
>>>     Another example is where one or more Diameter agents that do suppor=
t
>>>     DOIC may exist between a given pair of reporting and reacting nodes=
,
>>>     as long as those agents pass OC-specific AVPs through unchanged.
>>> I don't agree with the suggested change, as the DOIC supporting agents =
might need to change the OC-specific AVPs.
>>> <Ulrich> I agree that in some cases DOIC supporting agents need to chan=
ge the OC-specific AVPs. However, there are also cases where DOIC supportin=
g agents do not need to change OC-specific AVPs.</Ulrich>
>>>    I also don't understand how the paragraph implies that there cannot =
be DOIC supporting agents in the path of the request.
>>> <Ulrich> It does not imply that. Rather it may convey the erring impres=
sion that there cannot be a DOIC supporting agent on the path between a
>>> reporting node and an adjacent reacting node.</Ulrich>
>>>     It is talking specifically about the case where there agents do not=
 support DOIC are in the path.
>>> <Ulrich> No, my understanding is that the paragraph is talking specific=
ally about what "adjacent for DOIC purposes" means. One valid example is gi=
ven (reporting node and reacting node are "adjacent for DOIC purposes" if o=
ne or more agents that do not support DOIC but pass unsupported AVPs throug=
h unchanged exist between reporting node and reacting node) and I do not pr=
opose to remove that. However, there is another important valid example (re=
porting node and reacting node are "adjacent for DOIC purposes" if one or m=
ore DOIC supporting agents that pass OC-specific AVPs through unchanged exi=
st between reporting node and reacting node), and the proposal is to add te=
xt to cover this example. </Ulrich>
>>> The remainder of the document makes it clear that there can be agents t=
hat do support DOIC in the path of a transaction.
>>> <Ulrich> that is not my point. The point is to clearly state that there=
 can be DOIC supporting agents that pass through OC-specific AVPs unchanged=
 on the path between reporting node and reacting node, and in this case the=
 reporting and reacting nodes are still regarded "adjacent for DOIC purpose=
s".</Ulrich>
>>>
>>> I don't see the need for a change here.
>>> <Ulrich> I'm not proposing a modification but an addition. This additio=
n provides useful clarification and in no way is harmful</Ulrich>
>>>
>>> Regards,
>>>
>>> Steve
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Mon Dec 15 09:56:18 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B7201A710D for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 09:56:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Z15BbUgmqB7 for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 09:56:15 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A65A61A86FC for <dime@ietf.org>; Mon, 15 Dec 2014 09:56:14 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBFHuCad025423 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 15 Dec 2014 17:56:12 GMT
Received: from DEMUHTC002.nsn-intra.net ([10.159.42.33]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBFHuB6T002645 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 15 Dec 2014 18:56:11 +0100
Received: from DEMUHTC008.nsn-intra.net (10.159.42.39) by DEMUHTC002.nsn-intra.net (10.159.42.33) with Microsoft SMTP Server (TLS) id 14.3.195.1; Mon, 15 Dec 2014 18:56:11 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC008.nsn-intra.net ([10.159.42.39]) with mapi id 14.03.0195.001; Mon, 15 Dec 2014 18:56:11 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAL2Z7uAAD8mAIAACZWAgAY/jwA=
Date: Mon, 15 Dec 2014 17:56:10 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com>
In-Reply-To: <5489EFAF.8010702@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.110]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 4660
X-purgate-ID: 151667::1418666172-0000677A-4FC411C8/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ojTKhsBYKrLygILeE78DBfg81ww
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Dec 2014 17:56:17 -0000

Steve, Ben,

I'm fine with deleting the paragraph.
But for my clarification please confirm that ignoring the complete set of O=
LRs is allowed when one of these OLRs contains a report type that was not a=
dvertized, or two of the OLRs contain the same report type.

Regards
Ulrich



-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
Sent: Thursday, December 11, 2014 8:26 PM
To: Ben Campbell
Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #15


On 12/11/14, 12:51 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>
>> I thought this paragraph was covering unrecognized values for all AVPs.
> I agree that's what it covered. But I think we failed to cover the unreco=
gnized AVP case. If we don't have anything to say beyond what 6733 says, th=
en it might not be strictly necessary, but it might still be worth saying t=
hat "unrecognized sub-AVPs are treated as per RFC6733".
That is probably worth saying.
>
>>   Maybe it is better to remove the paragraph entirely and make sure that=
 the definition of each AVP addresses what is done with unrecognized values=
.
> Possibly. There are AVPs where there's no such thing as an unrecognized v=
alue. There may be AVPs where the allowed values vary by algorithm. If we d=
o take that route, we probably need language here that says unrecognized va=
lues are handled as described by the AVP definition or the algorithm.
Agreed.
>
>> Steve
>>
>> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>>>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>>>
>>>> Ulrich,
>>>>
>>>> Actually, the wording you suggested wasn't quite right.  It should be:
>>>>
>>>>    When receiving an OC-OLR AVP with unknown values, the overload repo=
rt
>>>>    SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>    be logged.
>>>>
>>>> It's not just about report type values but unknown values for any of t=
he AVPs in the OLR.
>>>>
>>>> This seems like a good requirement to include in the specification to =
ensure common behavior in reacting nodes.  I don't feel strongly about this=
 but I would like to hear other opinions.
>>> I think this is still not quite complete.
>>>
>>> If you receive a sub-AVP that you don't understand, then you should ign=
ore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown =
AVP has the m-bit set.) If you receive a known sub-AVP, with a value you do=
n't understand, the behavior should be AVP specific. For Report-Type, that =
means ignore the whole OLR.
>>>
>>> It's not clear to me whether the original text was about arbitrary avps=
, or Report-Type.
>>>
>>>> Steve
>>>>
>>>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>> Hi Steve,
>>>>>
>>>>> I think it was pointed out by Ben that we do not specify behaviour of=
 a node for cases where it detects that another node is breaking the rule.
>>>>> The rule is:
>>>>>     A reporting node MUST NOT send overload reports of a type that ha=
s
>>>>>     not been advertised as supported by the reacting node.
>>>>> See section 4.2.3.
>>>>>
>>>>> Regards
>>>>> Ulrich
>>>>>
>>>>>    From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve D=
onovan
>>>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>>>> To: dime@ietf.org
>>>>> Subject: [Dime] Ulrich's suggested change #15
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> For your suggested change #15:
>>>>> Section 4.2.1.3, 4th paragraph:
>>>>> Existing text:
>>>>>     When receiving an OC-OLR AVPs with unknown values, a reacting nod=
e
>>>>>     SHOULD be silently discarded by reacting nodes and the event SHOU=
LD
>>>>>     be logged.
>>>>> Comment: text is confusing. Maybe the intention was to say:
>>>>>     When receiving an OC-OLR AVPs with an unsupported report type val=
ue, a reacting node
>>>>>     SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>>>     be logged.
>>>>> But even that is not correct.
>>>>> Proposal: Remove the paragraph.
>>>>> The intent was that an OC-OLR that contains unknown values should be =
discarded.  I agree that the wording needs to be changes as you suggested. =
 I don't agree with removing the paragraph.  Can you elaborate on why you t=
hink it is not correct when changed as you suggested?
>>>>>
>>>>> Regards,
>>>>>
>>>>> Steve
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Mon Dec 15 12:35:26 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E2DB1A86EF for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 08:59:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.59
X-Spam-Level: *
X-Spam-Status: No, score=1.59 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779, T_HTML_ATTACH=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LCyVq9LdTGFR for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 08:59:44 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E8681A86E5 for <dime@ietf.org>; Mon, 15 Dec 2014 08:59:41 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:59799 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0Yzj-0001Az-5i for dime@ietf.org; Mon, 15 Dec 2014 08:59:40 -0800
Message-ID: <548F137A.4070903@usdonovans.com>
Date: Mon, 15 Dec 2014 10:59:38 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime >> \"dime@ietf.org\"" <dime@ietf.org>
Content-Type: multipart/mixed; boundary="------------050403030105000509030106"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/jM3ZH_uqYMZDd3FRJ-p3kEp9vFU
X-Mailman-Approved-At: Mon, 15 Dec 2014 12:35:23 -0800
Subject: [Dime] Updates made in initial DOIC -06
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Dec 2014 16:59:52 -0000

This is a multi-part message in MIME format.
--------------050403030105000509030106
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

All,

I've made the following changes to the DOIC draft.  They are in the new 
-06 draft in github.

Ulrich's suggestions by number:

2, 3, 4, 5, 6, 7, 8, 11, 13, 14, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26

Issue 88.

The following of Ulrich's suggested changes are still open:

1, 9, 10, 12, 15, 16

I've attached a diff of the changes made so far.

Regards,

Steve



--------------050403030105000509030106
Content-Type: text/html; charset=ISO-8859-1;
 name="Diff_ draft-ietf-dime-ovli-05.txt - draft-ietf-dime-ovli-06.txt.html"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
 filename*0="Diff_ draft-ietf-dime-ovli-05.txt - draft-ietf-dime-ovli-06.";
 filename*1="txt.html"


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 
<!-- Generated by rfcdiff 1.41: rfcdiff tmp/1/draft-ietf-dime-ovli-05.txt tmp/2/draft-ietf-dime-ovli-06.txt --> 
<!-- System: Linux gamay 2.6.39-2-686-pae #1 SMP Tue Jul 5 03:48:49 UTC 2011 i686 GNU/Linux --> 
<!-- Using awk: /usr/bin/gawk: GNU Awk 4.0.1 --> 
<!-- Using diff: /usr/bin/diff: diff (GNU diffutils) 3.3 --> 
<!-- Using wdiff: /usr/bin/wdiff: wdiff (GNU wdiff) 1.2.1 --> 
<html> 
<head> 
  <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> 
  <meta http-equiv="Content-Style-Type" content="text/css" /> 
  <title>Diff: draft-ietf-dime-ovli-05.txt - draft-ietf-dime-ovli-06.txt</title> 
  <style type="text/css"> 
    body    { margin: 0.4ex; margin-right: auto; } 
    tr      { } 
    td      { white-space: pre; font-family: monospace; vertical-align: top; font-size: 0.86em;} 
    th      { font-size: 0.86em; } 
    .small  { font-size: 0.6em; font-style: italic; font-family: Verdana, Helvetica, sans-serif; } 
    .left   { background-color: #EEE; } 
    .right  { background-color: #FFF; } 
    .diff   { background-color: #CCF; } 
    .lblock { background-color: #BFB; } 
    .rblock { background-color: #FF8; } 
    .insert { background-color: #8FF; } 
    .delete { background-color: #ACF; } 
    .void   { background-color: #FFB; } 
    .cont   { background-color: #EEE; } 
    .linebr { background-color: #AAA; } 
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; text-align: right; padding: 0 2px; } 
    .elipsis{ background-color: #AAA; } 
    .left .cont { background-color: #DDD; } 
    .right .cont { background-color: #EEE; } 
    .lblock .cont { background-color: #9D9; } 
    .rblock .cont { background-color: #DD6; } 
    .insert .cont { background-color: #0DD; } 
    .delete .cont { background-color: #8AD; } 
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px 0; } 
  </style> 
</head> 
<body > 
  <table border="0" cellpadding="0" cellspacing="0"> 
  <tr bgcolor="orange"><th></th><th><a href="/rfcdiff?url2=draft-ietf-dime-ovli-05.txt" style="color:#008; text-decoration:none;">&lt;</a>&nbsp;<a href="/html/draft-ietf-dime-ovli-05.txt" style="color:#008">draft-ietf-dime-ovli-05.txt</a>&nbsp;</th><th> </th><th>&nbsp;<a href="/html/draft-ietf-dime-ovli-06.txt" style="color:#008">draft-ietf-dime-ovli-06.txt</a>&nbsp;<a href="/rfcdiff?url1=draft-ietf-dime-ovli-06.txt" style="color:#008; text-decoration:none;">&gt;</a></th><th></th></tr> 
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Diameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.</td><td> </td><td class="right">Diameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Internet-Draft                                                  Broadcom</td><td> </td><td class="right">Internet-Draft                                                  Broadcom</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Intended status: Standards Track                         S. Donovan, Ed.</td><td> </td><td class="right">Intended status: Standards Track                         S. Donovan, Ed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0001" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">Expires: June <span class="delete">6, 2015 </span>                                       B. Campbell</td><td> </td><td class="rblock">Expires: June <span class="insert">18, 2015</span>                                       B. Campbell</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                                  Oracle</td><td> </td><td class="right">                                                                  Oracle</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                               L. Morand</td><td> </td><td class="right">                                                               L. Morand</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                             Orange Labs</td><td> </td><td class="right">                                                             Orange Labs</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0002" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                       <span class="delete"> December 3</span>, 2014</td><td> </td><td class="rblock">                                                       <span class="insert">December 15</span>, 2014</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                Diameter Overload Indication Conveyance</td><td> </td><td class="right">                Diameter Overload Indication Conveyance</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0003" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                      draft-ietf-dime-ovli-0<span class="delete">5</span>.txt</td><td> </td><td class="rblock">                      draft-ietf-dime-ovli-0<span class="insert">6</span>.txt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Abstract</td><td> </td><td class="right">Abstract</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification defines a base solution for Diameter overload</td><td> </td><td class="right">   This specification defines a base solution for Diameter overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   control, referred to as Diameter Overload Indication Conveyance</td><td> </td><td class="right">   control, referred to as Diameter Overload Indication Conveyance</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (DOIC).</td><td> </td><td class="right">   (DOIC).</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Requirements</td><td> </td><td class="right">Requirements</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td> </td><td class="right">   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l2" /><small>skipping to change at</small><em> page 1, line 42</em></th><th> </th><th><a name="part-r2" /><small>skipping to change at</small><em> page 1, line 42</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are working documents of the Internet Engineering</td><td> </td><td class="right">   Internet-Drafts are working documents of the Internet Engineering</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Task Force (IETF).  Note that other groups may also distribute</td><td> </td><td class="right">   Task Force (IETF).  Note that other groups may also distribute</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   working documents as Internet-Drafts.  The list of current Internet-</td><td> </td><td class="right">   working documents as Internet-Drafts.  The list of current Internet-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td> </td><td class="right">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are draft documents valid for a maximum of six months</td><td> </td><td class="right">   Internet-Drafts are draft documents valid for a maximum of six months</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and may be updated, replaced, or obsoleted by other documents at any</td><td> </td><td class="right">   and may be updated, replaced, or obsoleted by other documents at any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   time.  It is inappropriate to use Internet-Drafts as reference</td><td> </td><td class="right">   time.  It is inappropriate to use Internet-Drafts as reference</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   material or to cite them other than as "work in progress."</td><td> </td><td class="right">   material or to cite them other than as "work in progress."</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0004" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   This Internet-Draft will expire on June <span class="delete">6</span>, 2015.</td><td> </td><td class="rblock">   This Internet-Draft will expire on June <span class="insert">18</span>, 2015.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Copyright Notice</td><td> </td><td class="right">Copyright Notice</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Copyright (c) 2014 IETF Trust and the persons identified as the</td><td> </td><td class="right">   Copyright (c) 2014 IETF Trust and the persons identified as the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   document authors.  All rights reserved.</td><td> </td><td class="right">   document authors.  All rights reserved.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td class="right">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Provisions Relating to IETF Documents</td><td> </td><td class="right">   Provisions Relating to IETF Documents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td> </td><td class="right">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   publication of this document.  Please review these documents</td><td> </td><td class="right">   publication of this document.  Please review these documents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l3" /><small>skipping to change at</small><em> page 2, line 25</em></th><th> </th><th><a name="part-r3" /><small>skipping to change at</small><em> page 2, line 25</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Table of Contents</td><td> </td><td class="right">Table of Contents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td> </td><td class="right">   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4</td><td> </td><td class="right">   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   3.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5</td><td> </td><td class="right">   3.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     3.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7</td><td> </td><td class="right">     3.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     3.2.  DOIC Capability Announcement  . . . . . . . . . . . . . .   8</td><td> </td><td class="right">     3.2.  DOIC Capability Announcement  . . . . . . . . . . . . . .   8</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     3.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9</td><td> </td><td class="right">     3.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     3.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11</td><td> </td><td class="right">     3.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     3.5.  Simplified Example Architecture . . . . . . . . . . . . .  12</td><td> </td><td class="right">     3.5.  Simplified Example Architecture . . . . . . . . . . . . .  12</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0005" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   4.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  <span class="delete">12</span></td><td> </td><td class="rblock">   4.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  <span class="insert">13</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     4.1.  Capability Announcement . . . . . . . . . . . . . . . . .  <span class="delete">12</span></td><td> </td><td class="rblock">     4.1.  Capability Announcement . . . . . . . . . . . . . . . . .  <span class="insert">13</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       4.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  13</td><td> </td><td class="right">       4.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  13</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       4.1.2.  Reporting Node Behavior . . . . . . . . . . . . . . .  13</td><td> </td><td class="right">       4.1.2.  Reporting Node Behavior . . . . . . . . . . . . . . .  13</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       4.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14</td><td> </td><td class="right">       4.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     4.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15</td><td> </td><td class="right">     4.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       4.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15</td><td> </td><td class="right">       4.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       4.2.2.  Reacting Node Behavior  . . . . . . . . . . . . . . .  19</td><td> </td><td class="right">       4.2.2.  Reacting Node Behavior  . . . . . . . . . . . . . . .  19</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       4.2.3.  Reporting Node Behavior . . . . . . . . . . . . . . .  20</td><td> </td><td class="right">       4.2.3.  Reporting Node Behavior . . . . . . . . . . . . . . .  20</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0006" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     4.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . .  2<span class="delete">1</span></td><td> </td><td class="rblock">     4.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . .  2<span class="insert">2</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   5.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22</td><td> </td><td class="right">   5.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0007" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     5.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  2<span class="delete">2</span></td><td> </td><td class="rblock">     5.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  2<span class="insert">3</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     5.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23</td><td> </td><td class="right">     5.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     5.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  24</td><td> </td><td class="right">     5.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  24</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   6.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  25</td><td> </td><td class="right">   6.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  25</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  25</td><td> </td><td class="right">     6.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  25</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25</td><td> </td><td class="right">     6.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  26</td><td> </td><td class="right">     6.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  26</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26</td><td> </td><td class="right">     6.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  27</td><td> </td><td class="right">     6.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  27</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  27</td><td> </td><td class="right">     6.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  27</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     6.7.  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  27</td><td> </td><td class="right">     6.7.  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  27</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0008" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     6.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  2<span class="delete">7</span></td><td> </td><td class="rblock">     6.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  2<span class="insert">8</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   7.  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  28</td><td> </td><td class="right">   7.  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  28</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  29</td><td> </td><td class="right">   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  29</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     8.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  29</td><td> </td><td class="right">     8.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  29</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     8.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  29</td><td> </td><td class="right">     8.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  29</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   9.  Security Considerations . . . . . . . . . . . . . . . . . . .  30</td><td> </td><td class="right">   9.  Security Considerations . . . . . . . . . . . . . . . . . . .  30</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     9.1.  Potential Threat Modes  . . . . . . . . . . . . . . . . .  30</td><td> </td><td class="right">     9.1.  Potential Threat Modes  . . . . . . . . . . . . . . . . .  30</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     9.2.  Denial of Service Attacks . . . . . . . . . . . . . . . .  31</td><td> </td><td class="right">     9.2.  Denial of Service Attacks . . . . . . . . . . . . . . . .  31</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     9.3.  Non-Compliant Nodes . . . . . . . . . . . . . . . . . . .  32</td><td> </td><td class="right">     9.3.  Non-Compliant Nodes . . . . . . . . . . . . . . . . . . .  32</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     9.4.  End-to End-Security Issues  . . . . . . . . . . . . . . .  32</td><td> </td><td class="right">     9.4.  End-to End-Security Issues  . . . . . . . . . . . . . . .  32</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   10. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  33</td><td> </td><td class="right">   10. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  33</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l4" /><small>skipping to change at</small><em> page 8, line 36</em></th><th> </th><th><a name="part-r4" /><small>skipping to change at</small><em> page 8, line 36</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      nodes.  In this case the DOIC agent will insert the OC-Supported-</td><td> </td><td class="right">      nodes.  In this case the DOIC agent will insert the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Features AVP in requests that do not already contain one, telling</td><td> </td><td class="right">      Features AVP in requests that do not already contain one, telling</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the reporting node that there is a DOIC node that will handle</td><td> </td><td class="right">      the reporting node that there is a DOIC node that will handle</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      overload abatement.  For transactions where there was an OC-</td><td> </td><td class="right">      overload abatement.  For transactions where there was an OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Supporting-Features AVP in the request, the agent will insert the</td><td> </td><td class="right">      Supporting-Features AVP in the request, the agent will insert the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OC-Supported-Features AVP in answers, telling the reacting node</td><td> </td><td class="right">      OC-Supported-Features AVP in answers, telling the reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      that there is a reporting node.</td><td> </td><td class="right">      that there is a reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-Feature-Vector AVP will contain an indication of support for</td><td> </td><td class="right">   The OC-Feature-Vector AVP will contain an indication of support for</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the loss overload abatement algorithm defined in this specification</td><td> </td><td class="right">   the loss overload abatement algorithm defined in this specification</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0009" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   (see Section 5).  This ensures that <span class="delete">there is</span> at least one <span class="delete">commonly</span></td><td> </td><td class="rblock">   (see Section 5).  This ensures that <span class="insert">a reporting node always supports</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   supported overload abatement algorithm between the reporting node and</span></td><td> </td><td class="rblock">   at least one of the <span class="insert">advertized abatement algorithms received in a</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the reacting node(s) in the path</span> of the <span class="delete">request.</span></td><td> </td><td class="rblock"><span class="insert">   request messages.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reporting node inserts the OC-Supported-Features AVP in all</td><td> </td><td class="right">   The reporting node inserts the OC-Supported-Features AVP in all</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   answer messages to requests that contained the OC-Supported-Features</td><td> </td><td class="right">   answer messages to requests that contained the OC-Supported-Features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   AVP.  The contents of the reporting node's OC-Supported-Features AVP</td><td> </td><td class="right">   AVP.  The contents of the reporting node's OC-Supported-Features AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicate the set of Diameter overload features supported by the</td><td> </td><td class="right">   indicate the set of Diameter overload features supported by the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reporting node.  This specification defines one exception - the</td><td> </td><td class="right">   reporting node.  This specification defines one exception - the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reporting node only includes an indication of support for one</td><td> </td><td class="right">   reporting node only includes an indication of support for one</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload abatement algorithm, independent of the number of overload</td><td> </td><td class="right">   overload abatement algorithm, independent of the number of overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement algorithms actually supported by the reacting node.  The</td><td> </td><td class="right">   abatement algorithms actually supported by the reacting node.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload abatement algorithm indicated is the algorithm that the</td><td> </td><td class="right">   overload abatement algorithm indicated is the algorithm that the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l5" /><small>skipping to change at</small><em> page 9, line 29</em></th><th> </th><th><a name="part-r5" /><small>skipping to change at</small><em> page 9, line 29</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement algorithm while the reporting node is in an overload</td><td> </td><td class="right">   abatement algorithm while the reporting node is in an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   condition.</td><td> </td><td class="right">   condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The individual features supported by the DOIC nodes are indicated in</td><td> </td><td class="right">   The individual features supported by the DOIC nodes are indicated in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the OC-Feature-Vector AVP.  Any semantics associated with the</td><td> </td><td class="right">   the OC-Feature-Vector AVP.  Any semantics associated with the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   features will be defined in extension specifications that introduce</td><td> </td><td class="right">   features will be defined in extension specifications that introduce</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the features.</td><td> </td><td class="right">   the features.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DCA mechanism must also allow the scenario where the set of</td><td> </td><td class="right">   The DCA mechanism must also allow the scenario where the set of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   features supported by the sender of a request and by agents in the</td><td> </td><td class="right">   features supported by the sender of a request and by agents in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0010" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   path of a request differ.  In this case, the agent <span class="delete">updates</span> the OC-</td><td> </td><td class="rblock">   path of a request differ.  In this case, the agent <span class="insert">can update</span> the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP to reflect the mixture of the two sets of</td><td> </td><td class="right">   Supported-Features AVP to reflect the mixture of the two sets of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supported features.</td><td> </td><td class="right">   supported features.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0011" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      Note: The logic to determine the content of the <span class="delete">modified OC-</span></td><td> </td><td class="rblock">      Note: The logic to determine <span class="insert">if</span> the content of the <span class="insert">OC-Supported-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      Supported-Features</span> AVP is out-of-scope for this <span class="delete">specification and</span></td><td> </td><td class="rblock"><span class="insert">      Features</span> AVP <span class="insert">should be changed</span> is out-of-scope for this <span class="insert">document,</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      is left to implementation decisions.  Care must be taken not to</td><td> </td><td class="rblock"><span class="insert">      as</span> is <span class="insert">the logic to determine the content of a modified OC-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      introduce interoperability issues for downstream or upstream DOIC</td><td> </td><td class="rblock"><span class="insert">      Supported-Features AVP.  These are</span> left to implementation</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      nodes.</td><td> </td><td class="rblock">      decisions.  Care must be taken not to introduce interoperability</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">      issues for downstream or upstream DOIC nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">3.3.  DOIC Overload Condition Reporting</td><td> </td><td class="right">3.3.  DOIC Overload Condition Reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As with DOIC capability announcement, overload condition reporting</td><td> </td><td class="right">   As with DOIC capability announcement, overload condition reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   uses new AVPs (Section 6.3) to indicate an overload condition.</td><td> </td><td class="right">   uses new AVPs (Section 6.3) to indicate an overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP</td><td> </td><td class="right">   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   includes the type of report, a sequence number, the length of time</td><td> </td><td class="right">   includes the type of report, a sequence number, the length of time</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that the report is valid and abatement algorithm specific AVPs.</td><td> </td><td class="right">   that the report is valid and abatement algorithm specific AVPs.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l6" /><small>skipping to change at</small><em> page 10, line 14</em></th><th> </th><th><a name="part-r6" /><small>skipping to change at</small><em> page 10, line 14</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A report of type "HOST_REPORT" is sent to indicate the overload of a</td><td> </td><td class="right">   A report of type "HOST_REPORT" is sent to indicate the overload of a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   specific Diameter node for the application-id indicated in the</td><td> </td><td class="right">   specific Diameter node for the application-id indicated in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   transaction.  When receiving an OLR of type host, a reacting node</td><td> </td><td class="right">   transaction.  When receiving an OLR of type host, a reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   applies overload abatement to what is referred to in this document as</td><td> </td><td class="right">   applies overload abatement to what is referred to in this document as</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   host-routed requests.  The reacting node applies overload abatement</td><td> </td><td class="right">   host-routed requests.  The reacting node applies overload abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   on those host-routed requests which the reacting node knows will be</td><td> </td><td class="right">   on those host-routed requests which the reacting node knows will be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   served by the server that matches the Origin-Host AVP of the received</td><td> </td><td class="right">   served by the server that matches the Origin-Host AVP of the received</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message that contained the received OLR of type host.</td><td> </td><td class="right">   message that contained the received OLR of type host.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0012" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   A report of type "REALM_REPORT" <span class="delete">applies</span> to <span class="delete">realm-routed requests for</span></td><td> </td><td class="rblock">   A report of type "REALM_REPORT" <span class="insert">is sent</span> to <span class="insert">indicate the overload of</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   a <span class="delete">specific</span> realm <span class="delete">as</span> indicated in the Destination-Realm <span class="delete">AVP.</span></td><td> </td><td class="rblock"><span class="insert">   all Diameter nodes within</span> a realm <span class="insert">for the application-id</span> indicated in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   the <span class="insert">transaction.  When receiving an OLR of type realm, a reacting</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   node applies overload abatement to what is referred to in this</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   document as realm-routed requests.  The reacting node applies</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   overload abatement on those realm-routed requests which contain a</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   Destination-Realm <span class="insert">AVP that matches the Origin-Realm AVP of the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   received message that contained the received OLR of type realm.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This document assumes that there is a single source for realm-reports</td><td> </td><td class="right">   This document assumes that there is a single source for realm-reports</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   for a given realm, or that if multiple nodes can send realm reports,</td><td> </td><td class="right">   for a given realm, or that if multiple nodes can send realm reports,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that each such node has full knowledge of the overload state of the</td><td> </td><td class="right">   that each such node has full knowledge of the overload state of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   entire realm.  A reacting node cannot distinguish between receiving</td><td> </td><td class="right">   entire realm.  A reacting node cannot distinguish between receiving</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   realm-reports from a single node, or from multiple nodes.</td><td> </td><td class="right">   realm-reports from a single node, or from multiple nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: Known issues exist if multiple sources for overload reports</td><td> </td><td class="right">      Note: Known issues exist if multiple sources for overload reports</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      which apply to the same Diameter entity exist.  Reacting nodes</td><td> </td><td class="right">      which apply to the same Diameter entity exist.  Reacting nodes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      have no way of determining the source and, as such, will treat</td><td> </td><td class="right">      have no way of determining the source and, as such, will treat</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l7" /><small>skipping to change at</small><em> page 10, line 38</em></th><th> </th><th><a name="part-r7" /><small>skipping to change at</small><em> page 10, line 44</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      abatement treatment to be applied for indeterminate periods of</td><td> </td><td class="right">      abatement treatment to be applied for indeterminate periods of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      time.</td><td> </td><td class="right">      time.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reporting nodes are responsible for determining the need for a</td><td> </td><td class="right">   Reporting nodes are responsible for determining the need for a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reduction of traffic.  The method for making this determination is</td><td> </td><td class="right">   reduction of traffic.  The method for making this determination is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   implementation specific and depend on the type of overload report</td><td> </td><td class="right">   implementation specific and depend on the type of overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   being generated.  A host-report, for instance, will generally be</td><td> </td><td class="right">   being generated.  A host-report, for instance, will generally be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   generated by tracking utilization of resources required by the host</td><td> </td><td class="right">   generated by tracking utilization of resources required by the host</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to handle transactions for the Diameter application.  A realm-report</td><td> </td><td class="right">   to handle transactions for the Diameter application.  A realm-report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   generally impacts the traffic sent to multiple hosts and, as such,</td><td> </td><td class="right">   generally impacts the traffic sent to multiple hosts and, as such,</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0013" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   requires tracking the capacity all servers <span class="delete">for realm-routed</span> requests</td><td> </td><td class="rblock">   requires tracking the capacity <span class="insert">of</span> all servers <span class="insert">able to handle realm-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   for the application and realm.</td><td> </td><td class="rblock"><span class="insert">   routed</span> requests for the application and realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Once a reporting node determines the need for a reduction in traffic,</td><td> </td><td class="right">   Once a reporting node determines the need for a reduction in traffic,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   it uses the DOIC defined AVPs to report on the condition.  These AVPs</td><td> </td><td class="right">   it uses the DOIC defined AVPs to report on the condition.  These AVPs</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   are included in answer messages sent or relayed by the reporting</td><td> </td><td class="right">   are included in answer messages sent or relayed by the reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node.  The reporting node indicates the overload abatement algorithm</td><td> </td><td class="right">   node.  The reporting node indicates the overload abatement algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that is to be used to handle the traffic reduction in the OC-</td><td> </td><td class="right">   that is to be used to handle the traffic reduction in the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP.  The OC-OLR AVP is used to communicate</td><td> </td><td class="right">   Supported-Features AVP.  The OC-OLR AVP is used to communicate</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information about the requested reduction.</td><td> </td><td class="right">   information about the requested reduction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reacting nodes, upon receipt of an overload report, are responsible</td><td> </td><td class="right">   Reacting nodes, upon receipt of an overload report, are responsible</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l8" /><small>skipping to change at</small><em> page 11, line 17</em></th><th> </th><th><a name="part-r8" /><small>skipping to change at</small><em> page 11, line 24</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Two types of overload abatement treatment are defined, diversion and</td><td> </td><td class="right">   Two types of overload abatement treatment are defined, diversion and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   throttling.  Reacting nodes are responsible for determining which</td><td> </td><td class="right">   throttling.  Reacting nodes are responsible for determining which</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   treatment is appropriate for individual requests.</td><td> </td><td class="right">   treatment is appropriate for individual requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As the conditions that lead to the generation of the overload report</td><td> </td><td class="right">   As the conditions that lead to the generation of the overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   change the reporting node can send new overload reports requesting</td><td> </td><td class="right">   change the reporting node can send new overload reports requesting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   greater reduction if the condition gets worse or less reduction if</td><td> </td><td class="right">   greater reduction if the condition gets worse or less reduction if</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the condition improves.  The reporting node sends an overload report</td><td> </td><td class="right">   the condition improves.  The reporting node sends an overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   with a duration of zero to indicate that the overload condition has</td><td> </td><td class="right">   with a duration of zero to indicate that the overload condition has</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0014" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   ended and <span class="delete">need for use of the</span> abatement <span class="delete">algorithm to reduce traffic</span></td><td> </td><td class="rblock">   ended and abatement is no longer needed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   sent</span> is no longer needed.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reacting node also determines when the overload report expires</td><td> </td><td class="right">   The reacting node also determines when the overload report expires</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   based on the OC-Validity-Duration AVP in the overload report and</td><td> </td><td class="right">   based on the OC-Validity-Duration AVP in the overload report and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   stops applying the abatement algorithm when the report expires.</td><td> </td><td class="right">   stops applying the abatement algorithm when the report expires.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">3.4.  DOIC Extensibility</td><td> </td><td class="right">3.4.  DOIC Extensibility</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DOIC solution is designed to be extensible.  This extensibility</td><td> </td><td class="right">   The DOIC solution is designed to be extensible.  This extensibility</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is based on existing Diameter based extensibility mechanisms, along</td><td> </td><td class="right">   is based on existing Diameter based extensibility mechanisms, along</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   with the DOIC capability announcement mechanism.</td><td> </td><td class="right">   with the DOIC capability announcement mechanism.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l9" /><small>skipping to change at</small><em> page 13, line 42</em></th><th> </th><th><a name="part-r9" /><small>skipping to change at</small><em> page 13, line 50</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   answer message for that transaction.</td><td> </td><td class="right">   answer message for that transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-</td><td> </td><td class="right">   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OLR AVP or any other overload control AVPs defined in extension</td><td> </td><td class="right">   OLR AVP or any other overload control AVPs defined in extension</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   drafts in response messages for transactions where the request</td><td> </td><td class="right">   drafts in response messages for transactions where the request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message does not include the OC-Supported-Features AVP.  Lack of the</td><td> </td><td class="right">   message does not include the OC-Supported-Features AVP.  Lack of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-Supported-Features AVP in the request message indicates that there</td><td> </td><td class="right">   OC-Supported-Features AVP in the request message indicates that there</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is no reacting node for the transaction.</td><td> </td><td class="right">   is no reacting node for the transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node knows what overload control functionality is</td><td> </td><td class="right">   A reporting node knows what overload control functionality is</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0015" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   supported by the reacting node based on the content of the <span class="delete">OC-</span></td><td> </td><td class="rblock">   supported by the reacting node based on the content <span class="insert">or absence</span> of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Feature-Vector</span> AVP in the request message.</td><td> </td><td class="rblock">   <span class="insert">OC-Feature-Vector AVP within the OC-Supported-Features</span> AVP in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   request message.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST indicate support for one and only one abatement</td><td> </td><td class="right">   A reporting node MUST indicate support for one and only one abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm</td><td> </td><td class="right">   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   selected MUST indicate the abatement algorithm the reporting node</td><td> </td><td class="right">   selected MUST indicate the abatement algorithm the reporting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   wants the reacting node to use when the reporting node enters an</td><td> </td><td class="right">   wants the reacting node to use when the reporting node enters an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload condition.</td><td> </td><td class="right">   overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The abatement algorithm selected MUST be from the set of abatement</td><td> </td><td class="right">   The abatement algorithm selected MUST be from the set of abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithms contained in the request message's OC-Feature-Vector AVP.</td><td> </td><td class="right">   algorithms contained in the request message's OC-Feature-Vector AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node that selects the loss algorithm may do so by</td><td> </td><td class="right">   A reporting node that selects the loss algorithm may do so by</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   including the OC-Feature-Vector AVP with an explicit indication of</td><td> </td><td class="right">   including the OC-Feature-Vector AVP with an explicit indication of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects</td><td> </td><td class="right">   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   a different algorithm, it MUST include the OC-Feature-Vector AVP with</td><td> </td><td class="right">   a different algorithm, it MUST include the OC-Feature-Vector AVP with</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   an explicit indication of the selected algorithm.</td><td> </td><td class="right">   an explicit indication of the selected algorithm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0016" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">For an ongoing overload condition, a</span> reporting node MUST NOT change</td><td> </td><td class="rblock">   <span class="insert">A</span> reporting node MUST NOT change the selected algorithm during the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the selected algorithm during the period of time that <span class="delete">it is in</span> an</td><td> </td><td class="rblock">   period of time that <span class="insert">starts when entering</span> an overload condition <span class="insert">and</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   overload condition <span class="delete">and, as a result, is sending OC-OLR AVPs</span> in <span class="delete">answer</span></td><td> </td><td class="rblock"><span class="insert">   ends when the associated OCS becomes invalid</span> in <span class="insert">all reacting nodes.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   messages.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reporting node MAY change the overload abatement algorithm</td><td> </td><td class="right">   The reporting node MAY change the overload abatement algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicated in the OC-Supported-Features AVP at any time as long as no</td><td> </td><td class="right">   indicated in the OC-Supported-Features AVP at any time as long as no</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   previously sent OLRs may be active.</td><td> </td><td class="right">   previously sent OLRs may be active.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reporting node SHOULD indicate support for other DOIC features</td><td> </td><td class="right">   The reporting node SHOULD indicate support for other DOIC features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   defined in extension drafts that it supports and that apply to the</td><td> </td><td class="right">   defined in extension drafts that it supports and that apply to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   transaction.</td><td> </td><td class="right">   transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: Not all DOIC features will apply to all Diameter</td><td> </td><td class="right">      Note: Not all DOIC features will apply to all Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l10" /><small>skipping to change at</small><em> page 15, line 11</em></th><th> </th><th><a name="part-r10" /><small>skipping to change at</small><em> page 15, line 18</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   behavior when there is no OC-Supported-Features AVP in an answer</td><td> </td><td class="right">   behavior when there is no OC-Supported-Features AVP in an answer</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message for a transaction that contained the OC-Supported-Features</td><td> </td><td class="right">   message for a transaction that contained the OC-Supported-Features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   AVP in the request message.</td><td> </td><td class="right">   AVP in the request message.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For a Diameter Agent to take on reporting node behavior for a non</td><td> </td><td class="right">   For a Diameter Agent to take on reporting node behavior for a non</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supporting Diameter endpoint the Diameter Agent MUST include the OC-</td><td> </td><td class="right">   supporting Diameter endpoint the Diameter Agent MUST include the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP in answer messages it receives that do not</td><td> </td><td class="right">   Supported-Features AVP in answer messages it receives that do not</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contain the OC-Supported-Features AVP.</td><td> </td><td class="right">   contain the OC-Supported-Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As with a Diameter endpoint taking on reporting node behavior, a</td><td> </td><td class="right">   As with a Diameter endpoint taking on reporting node behavior, a</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0017" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Diameter Agent MUST <span class="delete">only</span> include the OC-Supported-Features AVP in</td><td> </td><td class="rblock">   Diameter Agent MUST <span class="insert">NOT</span> include the OC-Supported-Features AVP in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   answer messages for transactions where the request message received</td><td> </td><td class="right">   answer messages for transactions where the request message received</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0018" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   by the Diameter Agent had <span class="delete">an</span> OC-Supported-Features AVP.</td><td> </td><td class="rblock">   by the Diameter Agent had <span class="insert">no</span> OC-Supported-Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If a request message already has the OC-Supported-Features AVP then a</td><td> </td><td class="right">   If a request message already has the OC-Supported-Features AVP then a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter Agent MAY leave it unchanged in the relayed message or MAY</td><td> </td><td class="right">   Diameter Agent MAY leave it unchanged in the relayed message or MAY</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   modify it to reflect the features appropriate for the transaction.</td><td> </td><td class="right">   modify it to reflect the features appropriate for the transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      For instance, if the agent supports a superset of the features</td><td> </td><td class="right">      For instance, if the agent supports a superset of the features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reported by the reacting node then the agent might choose, based</td><td> </td><td class="right">      reported by the reacting node then the agent might choose, based</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      on local policy, to advertise that superset of features to the</td><td> </td><td class="right">      on local policy, to advertise that superset of features to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reporting node.</td><td> </td><td class="right">      reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l11" /><small>skipping to change at</small><em> page 16, line 8</em></th><th> </th><th><a name="part-r11" /><small>skipping to change at</small><em> page 16, line 19</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  A host-type OCS entry for each Destination-Host to which it sends</td><td> </td><td class="right">   o  A host-type OCS entry for each Destination-Host to which it sends</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      host-type requests and</td><td> </td><td class="right">      host-type requests and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  A realm-type OCS entry for each Destination-Realm to which it</td><td> </td><td class="right">   o  A realm-type OCS entry for each Destination-Realm to which it</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      sends realm-type requests.</td><td> </td><td class="right">      sends realm-type requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A host-type OCS entry is identified by the pair of application-id and</td><td> </td><td class="right">   A host-type OCS entry is identified by the pair of application-id and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the node's DiameterIdentity.</td><td> </td><td class="right">   the node's DiameterIdentity.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0019" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   A realm-type OCS entry is identified by the pair of <span class="delete">application-d</span> and</td><td> </td><td class="rblock">   A realm-type OCS entry is identified by the pair of <span class="insert">application-id</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   realm.</td><td> </td><td class="rblock">   and realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The host-type and realm-type OCS entries MAY include the following</td><td> </td><td class="right">   The host-type and realm-type OCS entries MAY include the following</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information (the actual information stored is an implementation</td><td> </td><td class="right">   information (the actual information stored is an implementation</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   decision):</td><td> </td><td class="right">   decision):</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Sequence number (as received in OC-OLR)</td><td> </td><td class="right">   o  Sequence number (as received in OC-OLR)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Time of expiry (derived from OC-Validity-Duration AVP received in</td><td> </td><td class="right">   o  Time of expiry (derived from OC-Validity-Duration AVP received in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the OC-OLR AVP and time of reception of the message carrying OC-</td><td> </td><td class="right">      the OC-OLR AVP and time of reception of the message carrying OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OLR AVP)</td><td> </td><td class="right">      OLR AVP)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l12" /><small>skipping to change at</small><em> page 17, line 10</em></th><th> </th><th><a name="part-r12" /><small>skipping to change at</small><em> page 17, line 19</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">4.2.1.3.  Reacting Node Maintenance of Overload Control State</td><td> </td><td class="right">4.2.1.3.  Reacting Node Maintenance of Overload Control State</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a reacting node receives an OC-OLR AVP, it MUST determine if it</td><td> </td><td class="right">   When a reacting node receives an OC-OLR AVP, it MUST determine if it</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is for an existing or new overload condition.</td><td> </td><td class="right">   is for an existing or new overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: For the remainder of this section the term OLR refers to the</td><td> </td><td class="right">      Note: For the remainder of this section the term OLR refers to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      combination of the contents of the received OC-OLR AVP and the</td><td> </td><td class="right">      combination of the contents of the received OC-OLR AVP and the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      abatement algorithm indicated in the received OC-Supported-</td><td> </td><td class="right">      abatement algorithm indicated in the received OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Features AVP.</td><td> </td><td class="right">      Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0020" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   When receiving an answer message with multiple OLRs <span class="delete">or</span> different</td><td> </td><td class="rblock">   When receiving an answer message with multiple OLRs <span class="insert">of</span> different</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   types, a reporting node MUST process each received OLR.</td><td> </td><td class="rblock">   <span class="insert">supported report</span> types, a reporting node MUST process each received</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   OLR.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When receiving an OC-OLR AVPs with unknown values, a reacting node</td><td> </td><td class="right">   When receiving an OC-OLR AVPs with unknown values, a reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   SHOULD be silently discarded by reacting nodes and the event SHOULD</td><td> </td><td class="right">   SHOULD be silently discarded by reacting nodes and the event SHOULD</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   be logged.</td><td> </td><td class="right">   be logged.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OLR is for an existing overload condition if a reacting node has</td><td> </td><td class="right">   The OLR is for an existing overload condition if a reacting node has</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   an OCS that matches the received OLR.</td><td> </td><td class="right">   an OCS that matches the received OLR.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For a host-report this means it matches the application-id and the</td><td> </td><td class="right">   For a host-report this means it matches the application-id and the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   host's DiameterIdentity in an existing host OCS entry.</td><td> </td><td class="right">   host's DiameterIdentity in an existing host OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l13" /><small>skipping to change at</small><em> page 20, line 14</em></th><th> </th><th><a name="part-r13" /><small>skipping to change at</small><em> page 20, line 28</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the overload abatement treatment results in throttling of the</td><td> </td><td class="right">   If the overload abatement treatment results in throttling of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   request and if the reacting node is an agent then the agent MUST send</td><td> </td><td class="right">   request and if the reacting node is an agent then the agent MUST send</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   an appropriate error as defined in Section 7.</td><td> </td><td class="right">   an appropriate error as defined in Section 7.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The behavior of reacting nodes that are Diameter endpoints when</td><td> </td><td class="right">   The behavior of reacting nodes that are Diameter endpoints when</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   throttling requests depends on the application and is outside the</td><td> </td><td class="right">   throttling requests depends on the application and is outside the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   scope of this specification.</td><td> </td><td class="right">   scope of this specification.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   In the case that the OCS entry indicated no traffic was to be sent to</td><td> </td><td class="right">   In the case that the OCS entry indicated no traffic was to be sent to</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0021" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the overloaded entity and the validity duration expires <span class="delete">or has a</span></td><td> </td><td class="rblock">   the overloaded entity and the validity duration expires then overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   validity duration of zero ("0"), meaning that the reporting node has</span></td><td> </td><td class="rblock">   abatement associated with the overload <span class="insert">report</span> MUST be ended in a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   explicitly signaled the end of the overload condition</span> then overload</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   abatement associated with the overload <span class="delete">abatement</span> MUST be ended in a</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   controlled fashion.</td><td> </td><td class="right">   controlled fashion.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">4.2.3.  Reporting Node Behavior</td><td> </td><td class="right">4.2.3.  Reporting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If there is an active OCS entry then a reporting node SHOULD include</td><td> </td><td class="right">   If there is an active OCS entry then a reporting node SHOULD include</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the OC-OLR AVP in all answer messages to requests that contain the</td><td> </td><td class="right">   the OC-OLR AVP in all answer messages to requests that contain the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-Supported-Features AVP and that match the active OCS entry.</td><td> </td><td class="right">   OC-Supported-Features AVP and that match the active OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: A request matches if the application-id in the request</td><td> </td><td class="right">      Note: A request matches if the application-id in the request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      matches the application-id in any active OCS entry and if the</td><td> </td><td class="right">      matches the application-id in any active OCS entry and if the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l14" /><small>skipping to change at</small><em> page 22, line 4</em></th><th> </th><th><a name="part-r14" /><small>skipping to change at</small><em> page 22, line 18</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   include new traffic abatement algorithms, new report types or other</td><td> </td><td class="right">   include new traffic abatement algorithms, new report types or other</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   new functionality.</td><td> </td><td class="right">   new functionality.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When defining a new extension that requires new normative behavior,</td><td> </td><td class="right">   When defining a new extension that requires new normative behavior,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the specification MUST define a new feature for the OC-Feature-</td><td> </td><td class="right">   the specification MUST define a new feature for the OC-Feature-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Vector.  This feature bit is used to communicate support for the new</td><td> </td><td class="right">   Vector.  This feature bit is used to communicate support for the new</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   feature.</td><td> </td><td class="right">   feature.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The extension MAY define new AVPs for use in DOIC Capability</td><td> </td><td class="right">   The extension MAY define new AVPs for use in DOIC Capability</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Announcement and for use in DOIC Overload reporting.  These new AVPs</td><td> </td><td class="right">   Announcement and for use in DOIC Overload reporting.  These new AVPs</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0022" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   SHOULD be defined to be extensions to the OC-Supported-Features <span class="delete">and</span></td><td> </td><td class="rblock">   SHOULD be defined to be extensions to the OC-Supported-Features <span class="insert">or</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-OLR AVPs defined in this document.</td><td> </td><td class="right">   OC-OLR AVPs defined in this document.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC6733] defined Grouped AVP extension mechanisms apply.  This</td><td> </td><td class="right">   [RFC6733] defined Grouped AVP extension mechanisms apply.  This</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   allows, for example, defining a new feature that is mandatory to be</td><td> </td><td class="right">   allows, for example, defining a new feature that is mandatory to be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   understood even when piggybacked on an existing application.</td><td> </td><td class="right">   understood even when piggybacked on an existing application.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The handling of feature bits in the OC-Feature-Vector AVP that are</td><td> </td><td class="right">   The handling of feature bits in the OC-Feature-Vector AVP that are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   not associated with overload abatement algorithms MUST be specified</td><td> </td><td class="right">   not associated with overload abatement algorithms MUST be specified</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   by the extensions that define the features.</td><td> </td><td class="right">   by the extensions that define the features.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l15" /><small>skipping to change at</small><em> page 23, line 28</em></th><th> </th><th><a name="part-r15" /><small>skipping to change at</small><em> page 23, line 42</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   2.  A new Diameter request is generated by the application running on</td><td> </td><td class="right">   2.  A new Diameter request is generated by the application running on</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       the reacting node.</td><td> </td><td class="right">       the reacting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   3.  The reacting node determines that an active overload report</td><td> </td><td class="right">   3.  The reacting node determines that an active overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       applies to the request, as indicated by the corresponding OCS</td><td> </td><td class="right">       applies to the request, as indicated by the corresponding OCS</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       entry.</td><td> </td><td class="right">       entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   4.  The reacting node determines if overload abatement treatment</td><td> </td><td class="right">   4.  The reacting node determines if overload abatement treatment</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       should be applied to the request.  One approach that could be</td><td> </td><td class="right">       should be applied to the request.  One approach that could be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       taken for each request is to select a random number between 1 and</td><td> </td><td class="right">       taken for each request is to select a random number between 1 and</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0023" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       100.  If the random number is less than the indicated reduction</td><td> </td><td class="rblock">       100.  If the random number is less than <span class="insert">or equal to</span> the indicated</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       percentage then the request is given abatement treatment,</td><td> </td><td class="rblock">       reduction percentage then the request is given abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       otherwise the request is given normal routing treatment.</td><td> </td><td class="rblock">       treatment, otherwise the request is given normal routing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">       treatment.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">5.2.  Reporting Node Behavior</td><td> </td><td class="right">5.2.  Reporting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The method a reporting node uses to determine the amount of traffic</td><td> </td><td class="right">   The method a reporting node uses to determine the amount of traffic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reduction required to address an overload condition is an</td><td> </td><td class="right">   reduction required to address an overload condition is an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   implementation decision.</td><td> </td><td class="right">   implementation decision.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a reporting node that has selected the loss abatement algorithm</td><td> </td><td class="right">   When a reporting node that has selected the loss abatement algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   determines the need to request a reduction in traffic, it includes an</td><td> </td><td class="right">   determines the need to request a reduction in traffic, it includes an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-OLR AVP in response messages as described in Section 4.2.3.</td><td> </td><td class="right">   OC-OLR AVP in response messages as described in Section 4.2.3.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l16" /><small>skipping to change at</small><em> page 24, line 21</em></th><th> </th><th><a name="part-r16" /><small>skipping to change at</small><em> page 24, line 32</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicated in the OC-Supported-Features AVP is the loss algorithm, the</td><td> </td><td class="right">   indicated in the OC-Supported-Features AVP is the loss algorithm, the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reacting node MUST apply abatement treatment to the requested</td><td> </td><td class="right">   reacting node MUST apply abatement treatment to the requested</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   percentage of request messages sent.</td><td> </td><td class="right">   percentage of request messages sent.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: The loss algorithm is a stateless algorithm.  As a result,</td><td> </td><td class="right">      Note: The loss algorithm is a stateless algorithm.  As a result,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the reacting node does not guarantee that there will be an</td><td> </td><td class="right">      the reacting node does not guarantee that there will be an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      absolute reduction in traffic sent.  Rather, it guarantees that</td><td> </td><td class="right">      absolute reduction in traffic sent.  Rather, it guarantees that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the requested percentage of new requests will be given abatement</td><td> </td><td class="right">      the requested percentage of new requests will be given abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      treatment.</td><td> </td><td class="right">      treatment.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0024" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   When applying overload abatement treatment for the lo<span class="delete">ad</span> abatement</td><td> </td><td class="rblock">   When applying overload abatement treatment for the lo<span class="insert">ss</span> abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm, the reacting node MUST abate the requested percentage of</td><td> </td><td class="right">   algorithm, the reacting node MUST abate the requested percentage of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requests that would have otherwise been sent to the reporting host or</td><td> </td><td class="right">   requests that would have otherwise been sent to the reporting host or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   realm.</td><td> </td><td class="right">   realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If reacting node comes out of the 100 percent traffic reduction as a</td><td> </td><td class="right">   If reacting node comes out of the 100 percent traffic reduction as a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   result of the overload report timing out, the following concerns are</td><td> </td><td class="right">   result of the overload report timing out, the following concerns are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   RECOMMENDED to be applied.  The reacting node sending the traffic</td><td> </td><td class="right">   RECOMMENDED to be applied.  The reacting node sending the traffic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   should be conservative and, for example, first send "probe" messages</td><td> </td><td class="right">   should be conservative and, for example, first send "probe" messages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to learn the overload condition of the overloaded node before</td><td> </td><td class="right">   to learn the overload condition of the overloaded node before</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   converging to any traffic amount/rate decided by the sender.  Similar</td><td> </td><td class="right">   converging to any traffic amount/rate decided by the sender.  Similar</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   concerns apply in all cases when the overload report times out unless</td><td> </td><td class="right">   concerns apply in all cases when the overload report times out unless</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the previous overload report stated 0 percent reduction.</td><td> </td><td class="right">   the previous overload report stated 0 percent reduction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0025" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   If the reacting node does not receive an OLR in messages sent to the</td><td> </td><td class="rblock">   If the reacting node does not receive an OLR in <span class="insert">response to</span> messages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   formerly overloaded node then the reacting node SHOULD slowly</td><td> </td><td class="rblock">   sent to the formerly overloaded node then the reacting node SHOULD</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   increase the rate of traffic sent to the overloaded node.</td><td> </td><td class="rblock">   slowly increase the rate of traffic sent to the overloaded node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When an active overload report expires, it is suggested that the</td><td> </td><td class="right">   When an active overload report expires, it is suggested that the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reacting node progressively decrease the amount of traffic given</td><td> </td><td class="right">   reacting node progressively decrease the amount of traffic given</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement treatment, until the reduction is completely removed and no</td><td> </td><td class="right">   abatement treatment, until the reduction is completely removed and no</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   traffic is given abatement treatment.</td><td> </td><td class="right">   traffic is given abatement treatment.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      The goal of this behavior is to reduce the probability of overload</td><td> </td><td class="right">      The goal of this behavior is to reduce the probability of overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      condition thrashing where an immediate transition from 100%</td><td> </td><td class="right">      condition thrashing where an immediate transition from 100%</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reduction to 0% reduction results in the reporting node moving</td><td> </td><td class="right">      reduction to 0% reduction results in the reporting node moving</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      quickly back into an overload condition.</td><td> </td><td class="right">      quickly back into an overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l17" /><small>skipping to change at</small><em> page 25, line 31</em></th><th> </th><th><a name="part-r17" /><small>skipping to change at</small><em> page 25, line 38</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   serves two purposes.  First, it announces a node's support for the</td><td> </td><td class="right">   serves two purposes.  First, it announces a node's support for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC solution in general.  Second, it contains the description of the</td><td> </td><td class="right">   DOIC solution in general.  Second, it contains the description of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supported DOIC features of the sending node.  The OC-Supported-</td><td> </td><td class="right">   supported DOIC features of the sending node.  The OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Features AVP MUST be included in every Diameter request message a</td><td> </td><td class="right">   Features AVP MUST be included in every Diameter request message a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC supporting node sends.</td><td> </td><td class="right">   DOIC supporting node sends.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OC-Supported-Features ::= &lt; AVP Header: TBD1 &gt;</td><td> </td><td class="right">      OC-Supported-Features ::= &lt; AVP Header: TBD1 &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                [ OC-Feature-Vector ]</td><td> </td><td class="right">                                [ OC-Feature-Vector ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                              * [ AVP ]</td><td> </td><td class="right">                              * [ AVP ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0026" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The OC-Feature-Vector sub-AVP is used to announce the DOIC features</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   supported by the DOIC node, in the form of a flag-bits field in which</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   each bit announces one feature or capability supported by the node</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (see Section 6.2).  The absence of the OC-Feature-Vector AVP</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   indicates that only the default traffic abatement algorithm described</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   in this specification is supported.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">6.2.  OC-Feature-Vector AVP</td><td> </td><td class="right">6.2.  OC-Feature-Vector AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-Feature-Vector AVP (AVP code TBD6) is of type Unsigned64 and</td><td> </td><td class="right">   The OC-Feature-Vector AVP (AVP code TBD6) is of type Unsigned64 and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contains a 64 bit flags field of announced capabilities of a DOIC</td><td> </td><td class="right">   contains a 64 bit flags field of announced capabilities of a DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node.  The value of zero (0) is reserved.</td><td> </td><td class="right">   node.  The value of zero (0) is reserved.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-Feature-Vector sub-AVP is used to announce the DOIC features</td><td> </td><td class="right">   The OC-Feature-Vector sub-AVP is used to announce the DOIC features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supported by the DOIC node, in the form of a flag-bits field in which</td><td> </td><td class="right">   supported by the DOIC node, in the form of a flag-bits field in which</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0027" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   each bit announces one feature or capability supported by the <span class="delete">node</span></td><td> </td><td class="rblock">   each bit announces one feature or capability supported by the <span class="insert">node.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   (see Section 6.2).</span>  The absence of the OC-Feature-Vector AVP</td><td> </td><td class="rblock">   The absence of the OC-Feature-Vector AVP <span class="insert">in request messages</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicates that only the default traffic abatement algorithm described</td><td> </td><td class="right">   indicates that only the default traffic abatement algorithm described</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0028" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   in this specification is supported.</td><td> </td><td class="rblock">   in this specification is supported.  <span class="insert">The absence of the OC- Feature-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   Vector AVP in answer messages indicates that the default traffic</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   abatement algorithm described in this specification is selected</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   (while other traffic abatement algorithms may be supported), and no</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   features other than abatement algorithms are supported.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The following capabilities are defined in this document:</td><td> </td><td class="right">   The following capabilities are defined in this document:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OLR_DEFAULT_ALGO (0x0000000000000001)</td><td> </td><td class="right">   OLR_DEFAULT_ALGO (0x0000000000000001)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      When this flag is set by the a DOIC reacting node it means that</td><td> </td><td class="right">      When this flag is set by the a DOIC reacting node it means that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the default traffic abatement (loss) algorithm is supported.  When</td><td> </td><td class="right">      the default traffic abatement (loss) algorithm is supported.  When</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      this flag is set by a DOIC reporting node it means that the loss</td><td> </td><td class="right">      this flag is set by a DOIC reporting node it means that the loss</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      algorithm will be used for requested overload abatement.</td><td> </td><td class="right">      algorithm will be used for requested overload abatement.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">6.3.  OC-OLR AVP</td><td> </td><td class="right">6.3.  OC-OLR AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the</td><td> </td><td class="right">   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information necessary to convey an overload report on an overload</td><td> </td><td class="right">   information necessary to convey an overload report on an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   condition at the reporting node.  The OC-OLR AVP does not explicitly</td><td> </td><td class="right">   condition at the reporting node.  The OC-OLR AVP does not explicitly</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contain all information needed by the reacting node to decide whether</td><td> </td><td class="right">   contain all information needed by the reacting node to decide whether</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0029" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   a subsequent request must undergo abatement using the <span class="delete">received</span></td><td> </td><td class="rblock">   a subsequent request must undergo abatement using the <span class="insert">selected</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   reduction percentage.</span>  The value of the OC-Report-Type AVP within the</td><td> </td><td class="rblock"><span class="insert">   abatement algorithm.</span>  The value of the OC-Report-Type AVP within the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-OLR AVP indicates which implicit information is relevant for this</td><td> </td><td class="right">   OC-OLR AVP indicates which implicit information is relevant for this</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   decision (see Section 6.6).  The application the OC-OLR AVP applies</td><td> </td><td class="right">   decision (see Section 6.6).  The application the OC-OLR AVP applies</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to is the same as the Application-Id found in the Diameter message</td><td> </td><td class="right">   to is the same as the Application-Id found in the Diameter message</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   header.  The host or realm the OC-OLR AVP concerns is determined from</td><td> </td><td class="right">   header.  The host or realm the OC-OLR AVP concerns is determined from</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the Origin-Host AVP and/or Origin-Realm AVP found in the</td><td> </td><td class="right">   the Origin-Host AVP and/or Origin-Realm AVP found in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   encapsulating Diameter command.  The OC-OLR AVP is intended to be</td><td> </td><td class="right">   encapsulating Diameter command.  The OC-OLR AVP is intended to be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   sent only by a reporting node.</td><td> </td><td class="right">   sent only by a reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OC-OLR ::= &lt; AVP Header: TBD2 &gt;</td><td> </td><td class="right">      OC-OLR ::= &lt; AVP Header: TBD2 &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                 &lt; OC-Sequence-Number &gt;</td><td> </td><td class="right">                 &lt; OC-Sequence-Number &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l18" /><small>skipping to change at</small><em> page 28, line 28</em></th><th> </th><th><a name="part-r18" /><small>skipping to change at</small><em> page 28, line 31</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |OC-Report-Type         TBD5  6.6      Enumerated  |    | V  |</td><td> </td><td class="right">      |OC-Report-Type         TBD5  6.6      Enumerated  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |OC-Reduction                                      |    |    |</td><td> </td><td class="right">      |OC-Reduction                                      |    |    |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |  -Percentage          TBD8  6.7      Unsigned32  |    | V  |</td><td> </td><td class="right">      |  -Percentage          TBD8  6.7      Unsigned32  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |OC-Feature-Vector      TBD6  6.2      Unsigned64  |    | V  |</td><td> </td><td class="right">      |OC-Feature-Vector      TBD6  6.2      Unsigned64  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As described in the Diameter base protocol [RFC6733], the M-bit usage</td><td> </td><td class="right">   As described in the Diameter base protocol [RFC6733], the M-bit usage</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0030" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   for a given AVP in a given command may be defined by the</td><td> </td><td class="rblock">   for a given AVP in a given command may be defined by the <span class="insert">application.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">application..</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">7.  Error Response Codes</td><td> </td><td class="right">7.  Error Response Codes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a DOIC node rejects a Diameter request due to overload, the DOIC</td><td> </td><td class="right">   When a DOIC node rejects a Diameter request due to overload, the DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node MUST select an appropriate error response code.  This</td><td> </td><td class="right">   node MUST select an appropriate error response code.  This</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   determination is made based on the probability of the request</td><td> </td><td class="right">   determination is made based on the probability of the request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   succeeding if retried on a different path.</td><td> </td><td class="right">   succeeding if retried on a different path.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node rejecting a Diameter request due to an overload</td><td> </td><td class="right">   A reporting node rejecting a Diameter request due to an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0031" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   condition SHOULD send a DIAMETER<span class="delete">-TOO-</span>BUSY error response, if it can</td><td> </td><td class="rblock">   condition SHOULD send a DIAMETER<span class="insert">_TOO_</span>BUSY error response, if it can</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   assume that the same request may succeed on a different path.</td><td> </td><td class="right">   assume that the same request may succeed on a different path.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If a reporting node knows or assumes that the same request will not</td><td> </td><td class="right">   If a reporting node knows or assumes that the same request will not</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response</td><td> </td><td class="right">   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   SHOULD be used.  Retrying would consume valuable resources during an</td><td> </td><td class="right">   SHOULD be used.  Retrying would consume valuable resources during an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   occurrence of overload.</td><td> </td><td class="right">   occurrence of overload.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      For instance, if the request arrived at the reporting node without</td><td> </td><td class="right">      For instance, if the request arrived at the reporting node without</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      a Destination-Host AVP then the reporting node might determine</td><td> </td><td class="right">      a Destination-Host AVP then the reporting node might determine</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      that there is an alternative Diameter node that could successfully</td><td> </td><td class="right">      that there is an alternative Diameter node that could successfully</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l19" /><small>skipping to change at</small><em> page 30, line 5</em></th><th> </th><th><a name="part-r19" /><small>skipping to change at</small><em> page 30, line 5</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   values can be added into the registry using the Specification</td><td> </td><td class="right">   values can be added into the registry using the Specification</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Required policy.  [RFC5226].</td><td> </td><td class="right">   Required policy.  [RFC5226].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A new "Overload Report Type" registry is required.  The registry must</td><td> </td><td class="right">   A new "Overload Report Type" registry is required.  The registry must</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contain the following:</td><td> </td><td class="right">   contain the following:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Report Type Value</td><td> </td><td class="right">      Report Type Value</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Specification - the specification that defines the new value.</td><td> </td><td class="right">      Specification - the specification that defines the new value.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0032" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   See Section 6.<span class="delete">2</span> for the initial assignment in the registry.  New</td><td> </td><td class="rblock">   See Section 6.<span class="insert">6</span> for the initial assignment in the registry.  New</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   types can be added using the Specification Required policy [RFC5226].</td><td> </td><td class="right">   types can be added using the Specification Required policy [RFC5226].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">9.  Security Considerations</td><td> </td><td class="right">9.  Security Considerations</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC gives Diameter nodes the ability to request that downstream</td><td> </td><td class="right">   DOIC gives Diameter nodes the ability to request that downstream</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   nodes send fewer Diameter requests.  Nodes do this by exchanging</td><td> </td><td class="right">   nodes send fewer Diameter requests.  Nodes do this by exchanging</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload reports that directly effect this reduction.  This exchange</td><td> </td><td class="right">   overload reports that directly effect this reduction.  This exchange</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is potentially subject to multiple methods of attack, and has the</td><td> </td><td class="right">   is potentially subject to multiple methods of attack, and has the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   potential to be used as a Denial-of-Service (DoS) attack vector.</td><td> </td><td class="right">   potential to be used as a Denial-of-Service (DoS) attack vector.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>

     <tr><td></td><td class="left"></td><td> </td><td class="right"></td><td></td></tr>
     <tr bgcolor="gray"><th colspan="5" align="center"><a name="end">&nbsp;End of changes. 32 change blocks.&nbsp;</a></th></tr>
     <tr class="stats"><td></td><th><i>64 lines changed or deleted</i></th><th><i> </i></th><th><i>66 lines changed or added</i></th><td></td></tr>
     <tr><td colspan="5" align="center" class="small"><br/>This html diff was produced by rfcdiff 1.41. The latest version is available from <a href="http://www.tools.ietf.org/tools/rfcdiff/" >http://tools.ietf.org/tools/rfcdiff/</a> </td></tr>
   </table>
   </body>
   </html>
X-Generator: pyht 0.35

<!-- args: {'--oldcolour': 'red', '--width': '', 'difftype': '--html', 'filename2': '\n\n\n\nDiameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.\nInternet-Draft                                                  Broadcom\nIntended status: Standards Track                         S. Donovan, Ed.\nExpires: June 18, 2015                                       B. Campbell\n                                                                  Oracle\n                                                               L. Morand\n                                                             Orange Labs\n                                                       December 15, 2014\n\n\n                Diameter Overload Indication Conveyance\n                      draft-ietf-dime-ovli-06.txt\n\nAbstract\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC).\n\nRequirements\n\n   The key words "MU
 ST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",\n   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this\n   document are to be interpreted as described in RFC 2119 [RFC2119].\n\nStatus of This Memo\n\n   This Internet-Draft is submitted in full conformance with the\n   provisions of BCP 78 and BCP 79.\n\n   Internet-Drafts are working documents of the Internet Engineering\n   Task Force (IETF).  Note that other groups may also distribute\n   working documents as Internet-Drafts.  The list of current Internet-\n   Drafts is at http://datatracker.ietf.org/drafts/current/.\n\n   Internet-Drafts are draft documents valid for a maximum of six months\n   and may be updated, replaced, or obsoleted by other documents at any\n   time.  It is inappropriate to use Internet-Drafts as reference\n   material or to cite them other than as "work in progress."\n\n   This Internet-Draft will expire on June 18, 2015.\n\nCopyright Notice\n\n   Copyright (c) 2014 IETF Trust and the p
 ersons identified as the\n   document authors.  All rights reserved.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 1]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   This document is subject to BCP 78 and the IETF Trust\'s Legal\n   Provisions Relating to IETF Documents\n   (http://trustee.ietf.org/license-info) in effect on the date of\n   publication of this document.  Please review these documents\n   carefully, as they describe your rights and restrictions with respect\n   to this document.  Code Components extracted from this document must\n   include Simplified BSD License text as described in Section 4.e of\n   the Trust Legal Provisions and are provided without warranty as\n   described in the Simplified BSD License.\n\nTable of Contents\n\n   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3\n   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4\n   3.  Solution Ov
 erview . . . . . . . . . . . . . . . . . . . . . .   5\n     3.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7\n     3.2.  DOIC Capability Announcement  . . . . . . . . . . . . . .   8\n     3.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9\n     3.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11\n     3.5.  Simplified Example Architecture . . . . . . . . . . . . .  12\n   4.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  13\n     4.1.  Capability Announcement . . . . . . . . . . . . . . . . .  13\n       4.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  13\n       4.1.2.  Reporting Node Behavior . . . . . . . . . . . . . . .  13\n       4.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14\n     4.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15\n       4.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15\n       4.2.2.  Reacting Node Behavior  . . . . . . . 
 . . . . . . . .  19\n       4.2.3.  Reporting Node Behavior . . . . . . . . . . . . . . .  20\n     4.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . .  22\n   5.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22\n     5.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  23\n     5.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23\n     5.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  24\n   6.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  25\n     6.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  25\n     6.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25\n     6.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  26\n     6.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26\n     6.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  27\n     6.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  27\n     6.7.  OC-
 Reduction-Percentage AVP . . . . . . . . . . . . . . .  27\n     6.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  28\n   7.  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  28\n   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  29\n     8.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  29\n     8.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  29\n   9.  Security Considerations . . . . . . . . . . . . . . . . . . .  30\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 2]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n     9.1.  Potential Threat Modes  . . . . . . . . . . . . . . . . .  30\n     9.2.  Denial of Service Attacks . . . . . . . . . . . . . . . .  31\n     9.3.  Non-Compliant Nodes . . . . . . . . . . . . . . . . . . .  32\n     9.4.  End-to End-Security Issues  . . . . . . . . . . . . . . .  32\n   10. Contributors  . . . . . . . .
  . . . . . . . . . . . . . . . .  33\n   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .  34\n     11.1.  Normative References . . . . . . . . . . . . . . . . . .  34\n     11.2.  Informative References . . . . . . . . . . . . . . . . .  34\n   Appendix A.  Issues left for future specifications  . . . . . . .  34\n     A.1.  Additional traffic abatement algorithms . . . . . . . . .  35\n     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  35\n     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  35\n   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  35\n   Appendix C.  Requirements Conformance Analysis  . . . . . . . . .  35\n     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  36\n     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  36\n     C.3.  Implicit Application Indication . . . . . . . . . . . . .  36\n     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  3
 7\n     C.5.  No New Vulnerabilities  . . . . . . . . . . . . . . . . .  37\n     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  37\n       C.6.1.  General . . . . . . . . . . . . . . . . . . . . . . .  37\n       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  39\n       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  41\n       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  43\n       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  43\n       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  44\n       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  45\n   Appendix D.  Considerations for Applications Integrating the DOIC\n                Solution . . . . . . . . . . . . . . . . . . . . . .  46\n     D.1.  Application Classification  . . . . . . . . . . . . . . .  47\n     D.2.  Application Type Overload Implications  . . . . . . . . .  48\n     D.3.  Request Transaction Class
 ification  . . . . . . . . . . .  49\n     D.4.  Request Type Overload Implications  . . . . . . . . . . .  50\n   Authors\' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  51\n\n1.  Introduction\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC), based on the requirements identified in [RFC7068].\n\n   This specification addresses Diameter overload control between\n   Diameter nodes that support the DOIC solution.  The solution, which\n   is designed to apply to existing and future Diameter applications,\n   requires no changes to the Diameter base protocol [RFC6733] and is\n   deployable in environments where some Diameter nodes do not implement\n   the Diameter overload control solution defined in this specification.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 3]\n_\nInternet-Draft                    DOIC                     December 2014
 \n\n\n   Note that the overload control solution defined in this specification\n   does not address all the requirements listed in [RFC7068].  A number\n   of overload control related features are left for future\n   specifications.  See Appendix A for a list of extensions that are\n   currently being considered.  See Appendix C for an analysis of\n   conformance to the requirements specified in [RFC7068].\n\n2.  Terminology and Abbreviations\n\n   Abatement\n\n      Reaction to receipt of an overload report resulting in a reduction\n      in traffic sent to the reporting node.  Abatement actions include\n      diversion and throttling.\n\n   Abatement Algorithm\n\n      A mechanism requested by reporting nodes and used by reacting\n      nodes to reduce the amount of traffic sent during an occurrence of\n      overload control.\n\n   Diversion\n\n      A mechanism used for overload abatement by selecting a different\n      path for requests.\n\n   Host-Routed Requests\n\n      Requ
 ests that a reacting node knows will be served by a particular\n      host, either due to the presence of a Destination-Host AVP, or by\n      some other local knowledge on the part of the reacting node.\n\n   Overload Control State (OCS)\n\n      Reporting and reacting node internally maintained state describing\n      occurrences of overload control.\n\n   Overload Report (OLR)\n\n      Overload control information for a particular overload occurrence\n      sent by a reporting node.\n\n   Reacting Node\n\n      A Diameter node that acts upon an overload report.\n\n   Realm-Routed Requests\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 4]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Requests that a reacting node does not know the host that will\n      service the request.\n\n   Reporting Node\n\n      A Diameter node that generates an overload report.  (This may or\n      may not be the overloaded node.)\n\
 n   Throttling\n\n      A mechanism for overload abatement that limits the number of\n      requests sent by the DIOC reacting node.  Throttling can include a\n      Diameter Client not sending requests, or a Diameter Agent or\n      Server rejecting requests with appropriate error responses.  In\n      both cases the result of the throttling is a permanent rejection\n      of the transaction.\n\n\n\n3.  Solution Overview\n\n   The Diameter Overload Information Conveyance (DOIC) solution allows\n   Diameter nodes to request other Diameter nodes to perform overload\n   abatement actions, that is, actions to reduce the load offered to the\n   overloaded node or realm.\n\n   A Diameter node that supports DOIC is known as a "DOIC node".  Any\n   Diameter node can act as a DOIC node, including Diameter Clients,\n   Diameter Servers, and Diameter Agents.  DOIC nodes are further\n   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting\n   node requests overload abatement by se
 nding Overload Reports (OLR).\n\n   A reacting node acts upon OLRs, and performs whatever actions are\n   needed to fulfill the abatement requests included in the OLRs.  A\n   Reporting node may report overload on its own behalf, or on behalf of\n   other nodes.  Likewise, a reacting node may perform overload\n   abatement on its own behalf, or on behalf of other nodes.\n\n   A Diameter node\'s role as a DOIC node is independent of its Diameter\n   role.  For example, Diameter Agents may act as DOIC nodes, even\n   though they are not endpoints in the Diameter sense.  Since Diameter\n   enables bi-directional applications, where Diameter Servers can send\n   requests towards Diameter Clients, a given Diameter node can\n   simultaneously act as both a reporting node and a reacting node.\n\n   Likewise, a Diameter Agent may act as a reacting node from the\n   perspective of upstream nodes, and a reporting node from the\n   perspective of downstream nodes.\n\n\n\nKorhonen, et al.      
     Expires June 18, 2015                 [Page 5]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   DOIC nodes do not generate new messages to carry DOIC related\n   information.  Rather, they "piggyback" DOIC information over existing\n   Diameter messages by inserting new AVPs into existing Diameter\n   requests and responses.  Nodes indicate support for DOIC, and any\n   needed DOIC parameters, by inserting an OC-Supported-Features AVP\n   (Section 6.2) into existing requests and responses.  Reporting nodes\n   send OLRs by inserting OC-OLR AVPs (Section 6.3).\n\n   A given OLR applies to the Diameter realm and application of the\n   Diameter message that carries it.  If a reporting node supports more\n   than one realm and/or application, it reports independently for each\n   combination of realm and application.  Similarly, the OC-Supported-\n   Features AVP applies to the realm and application of the enclosing\n   message.  This implies that
  a node may support DOIC for one\n   application and/or realm, but not another, and may indicate different\n   DOIC parameters for each application and realm for which it supports\n   DOIC.\n\n   Reacting nodes perform overload abatement according to an agreed-upon\n   abatement algorithm.  An abatement algorithm defines the meaning of\n   some of the parameters of an OLR and the procedures required for\n   overload abatement.  An overload abatement algorithm separates\n   Diameter requests into two sets.  The first set contains the requests\n   that are to undergo overload abatement treatment of either throttling\n   or diversion.  The second set contains the requests that are to be\n   given normal routing treatment.  This document specifies a single\n   must-support algorithm, namely the "loss" algorithm (Section 5).\n   Future specifications may introduce new algorithms.\n\n   Overload conditions may vary in scope.  For example, a single\n   Diameter node may be overloaded, in w
 hich case reacting nodes may\n   attempt to send requests to other destinations.  On the other hand,\n   an entire Diameter realm may be overloaded, in which case such\n   attempts would do harm.  DOIC OLRs have a concept of "report type"\n   (Section 6.6), where the type defines such behaviors.  Report types\n   are extensible.  This document defines report types for overload of a\n   specific host, and for overload of an entire realm.\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific host, identified by the Origin-Host AVP of the message\n   containing the OLR, for the application-id indicated in the\n   transaction.  When receiving an OLR of type "HOST_REPORT", a reacting\n   node applies overload abatement treatment to the host-routed requests\n   identified by the overload abatement algorithm (see definition in\n   Section 2) sent for this application to the overloaded host.\n\n   A report of type "REALM_REPORT" is sent to indicate the over
 load of a\n   realm for the application-id indicated in the transaction.  The\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 6]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   overloaded realm is identified by the Destination-Realm AVP of the\n   message containing the OLR.  When receiving an OLR of type\n   "REALM_REPORT", a reacting node applies overload abatement treatment\n   to realm-routed requests identified by the overload abatement\n   algorithm (see definition in Section 2) sent for this application to\n   the overloaded realm.\n\n   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes\n   that are "adjacent" for DOIC purposes may not be adjacent from a\n   Diameter, or transport, perspective.  For example, one or more\n   Diameter agents that do not support DOIC may exist between a given\n   pair of reporting and reacting nodes, as long as those agents pass\n   unknown AVPs through unchang
 ed.  The report types described in this\n   document can safely pass through non-supporting agents.  This may not\n   be true for report types defined in future specifications.\n\n3.1.  Piggybacking\n\n   There is no new Diameter application defined to carry overload\n   related AVPs.  The overload control AVPs defined in this\n   specification have been designed to be piggybacked on top of existing\n   application messages.  This is made possible by adding overload\n   control AVPs, the OC-OLR AVP and the OC-Supported-Features AVP, as\n   optional AVPs into existing commands when the corresponding Command\n   Code Format (CCF) specification allows adding new optional AVPs (see\n   Section 1.3.4 of [RFC6733]).\n\n   Reacting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all request messages originated or relayed\n   by the reacting node.\n\n   Reporting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all answer 
 messages originated or relayed\n   by the reporting node that are in response to a request that\n   contained the OC-Supported-Features AVP.  Reporting nodes also\n   include overload reports using the OC-OLR AVP in answer messages.\n\n   Note that the overload control solution does not have fixed server\n   and client roles.  The DOIC node role is determined based on the\n   message type: whether the message is a request (i.e. sent by a\n   "reacting node") or an answer (i.e. send by a "reporting node").\n   Therefore, in a typical "client-server" deployment, the Diameter\n   Client MAY report its overload condition to the Diameter Server for\n   any Diameter Server initiated message exchange.  An example of such\n   is the Diameter Server requesting a re-authentication from a Diameter\n   Client.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 7]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n3.2.  DOIC Capability
  Announcement\n\n   The DOIC solution supports the ability for Diameter nodes to\n   determine if other nodes in the path of a request support the\n   solution.  This capability is referred to as DOIC Capability\n   Announcement (DCA) and is separate from Diameter Capability Exchange.\n\n   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the\n   Diameter overload features supported.\n\n   The first node in the path of a Diameter request that supports the\n   DOIC solution inserts the OC-Supported-Features AVP in the request\n   message.\n\n      Note: As discussed elsewhere in the document, agents in the path\n      of the request can modify the OC-Supported-Features AVP.\n\n      Note: The DOIC solution must support deployments where Diameter\n      Clients and/or Diameter Servers do not support the DOIC solution.\n      In this scenario, Diameter Agents that support the DOIC solution\n      may handle overload abatement for the non supporting Diameter\n      node
 s.  In this case the DOIC agent will insert the OC-Supported-\n      Features AVP in requests that do not already contain one, telling\n      the reporting node that there is a DOIC node that will handle\n      overload abatement.  For transactions where there was an OC-\n      Supporting-Features AVP in the request, the agent will insert the\n      OC-Supported-Features AVP in answers, telling the reacting node\n      that there is a reporting node.\n\n   The OC-Feature-Vector AVP will contain an indication of support for\n   the loss overload abatement algorithm defined in this specification\n   (see Section 5).  This ensures that a reporting node always supports\n   at least one of the advertized abatement algorithms received in a\n   request messages.\n\n   The reporting node inserts the OC-Supported-Features AVP in all\n   answer messages to requests that contained the OC-Supported-Features\n   AVP.  The contents of the reporting node\'s OC-Supported-Features AVP\n   indicate t
 he set of Diameter overload features supported by the\n   reporting node.  This specification defines one exception - the\n   reporting node only includes an indication of support for one\n   overload abatement algorithm, independent of the number of overload\n   abatement algorithms actually supported by the reacting node.  The\n   overload abatement algorithm indicated is the algorithm that the\n   reporting node intends to use should it enter an overload condition.\n   Reacting nodes can use the indicated overload abatement algorithm to\n   prepare for possible overload reports and must use the indicated\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 8]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   overload abatement algorithm if traffic reduction is actually\n   requested.\n\n      Note that the loss algorithm defined in this document is a\n      stateless abatement algorithm.  As a result it does not require
 \n      any actions by reacting nodes prior to the receipt of an overload\n      report.  Stateful abatement algorithms that base the abatement\n      logic on a history of request messages sent might require reacting\n      nodes to maintain state in advance of receiving an overload report\n      to ensure that the overload reports can be properly handled.\n\n   Reporting nodes are allowed to change the overload abatement\n   algorithm indicated in the OC-Feature-Vector AVP if the reporting\n   node is not currently in an overload condition and sending overload\n   reports.  The reporting node is not allowed to change the overload\n   abatement algorithm while the reporting node is in an overload\n   condition.\n\n   The individual features supported by the DOIC nodes are indicated in\n   the OC-Feature-Vector AVP.  Any semantics associated with the\n   features will be defined in extension specifications that introduce\n   the features.\n\n   The DCA mechanism must also allow the 
 scenario where the set of\n   features supported by the sender of a request and by agents in the\n   path of a request differ.  In this case, the agent can update the OC-\n   Supported-Features AVP to reflect the mixture of the two sets of\n   supported features.\n\n      Note: The logic to determine if the content of the OC-Supported-\n      Features AVP should be changed is out-of-scope for this document,\n      as is the logic to determine the content of a modified OC-\n      Supported-Features AVP.  These are left to implementation\n      decisions.  Care must be taken not to introduce interoperability\n      issues for downstream or upstream DOIC nodes.\n\n3.3.  DOIC Overload Condition Reporting\n\n   As with DOIC capability announcement, overload condition reporting\n   uses new AVPs (Section 6.3) to indicate an overload condition.\n\n   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP\n   includes the type of report, a sequence number, the length of time\n
    that the report is valid and abatement algorithm specific AVPs.\n\n   Two types of overload reports are defined in this document, host\n   reports and realm reports.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 9]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific Diameter node for the application-id indicated in the\n   transaction.  When receiving an OLR of type host, a reacting node\n   applies overload abatement to what is referred to in this document as\n   host-routed requests.  The reacting node applies overload abatement\n   on those host-routed requests which the reacting node knows will be\n   served by the server that matches the Origin-Host AVP of the received\n   message that contained the received OLR of type host.\n\n   A report of type "REALM_REPORT" is sent to indicate the overload of\n   all Diameter nodes within a
  realm for the application-id indicated in\n   the transaction.  When receiving an OLR of type realm, a reacting\n   node applies overload abatement to what is referred to in this\n   document as realm-routed requests.  The reacting node applies\n   overload abatement on those realm-routed requests which contain a\n   Destination-Realm AVP that matches the Origin-Realm AVP of the\n   received message that contained the received OLR of type realm.\n\n   This document assumes that there is a single source for realm-reports\n   for a given realm, or that if multiple nodes can send realm reports,\n   that each such node has full knowledge of the overload state of the\n   entire realm.  A reacting node cannot distinguish between receiving\n   realm-reports from a single node, or from multiple nodes.\n\n      Note: Known issues exist if multiple sources for overload reports\n      which apply to the same Diameter entity exist.  Reacting nodes\n      have no way of determining the source a
 nd, as such, will treat\n      them as coming from a single source.  Variance in sequence numbers\n      between the two sources can then cause incorrect overload\n      abatement treatment to be applied for indeterminate periods of\n      time.\n\n   Reporting nodes are responsible for determining the need for a\n   reduction of traffic.  The method for making this determination is\n   implementation specific and depend on the type of overload report\n   being generated.  A host-report, for instance, will generally be\n   generated by tracking utilization of resources required by the host\n   to handle transactions for the Diameter application.  A realm-report\n   generally impacts the traffic sent to multiple hosts and, as such,\n   requires tracking the capacity of all servers able to handle realm-\n   routed requests for the application and realm.\n\n   Once a reporting node determines the need for a reduction in traffic,\n   it uses the DOIC defined AVPs to report on the condit
 ion.  These AVPs\n   are included in answer messages sent or relayed by the reporting\n   node.  The reporting node indicates the overload abatement algorithm\n   that is to be used to handle the traffic reduction in the OC-\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 10]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Supported-Features AVP.  The OC-OLR AVP is used to communicate\n   information about the requested reduction.\n\n   Reacting nodes, upon receipt of an overload report, are responsible\n   for applying the overload abatement algorithm to traffic impacted by\n   the overload report.  The method used to determine the requests that\n   are to receive overload abatement treatment is dependent on the\n   abatement algorithm.  The loss abatement algorithm is defined in this\n   document (Section 5).  Other abatement algorithms can be defined in\n   extensions to the DOIC solutions.\n\n   Two types of over
 load abatement treatment are defined, diversion and\n   throttling.  Reacting nodes are responsible for determining which\n   treatment is appropriate for individual requests.\n\n   As the conditions that lead to the generation of the overload report\n   change the reporting node can send new overload reports requesting\n   greater reduction if the condition gets worse or less reduction if\n   the condition improves.  The reporting node sends an overload report\n   with a duration of zero to indicate that the overload condition has\n   ended and abatement is no longer needed.\n\n   The reacting node also determines when the overload report expires\n   based on the OC-Validity-Duration AVP in the overload report and\n   stops applying the abatement algorithm when the report expires.\n\n3.4.  DOIC Extensibility\n\n   The DOIC solution is designed to be extensible.  This extensibility\n   is based on existing Diameter based extensibility mechanisms, along\n   with the DOIC capability a
 nnouncement mechanism.\n\n   There are multiple categories of extensions that are expected.  This\n   includes the definition of new overload abatement algorithms, the\n   definition of new report types and the definition of new scopes of\n   messages impacted by an overload report.\n\n   The DOIC solution uses the OC-Supported-Features AVP for DOIC nodes\n   to communicate supported features.  The specific features supported\n   by the DOIC node are indicated in the OC-Feature-Vector AVP.  DOIC\n   extensions that require new normative behavior define new values for\n   the OC-Feature-Vector AVP.  DOIC extensions also have the ability to\n   add new AVPs to the OC-Supported-Features AVP, if additional\n   information about the new feature is required.\n\n   Reporting nodes use the OC-OLR AVP to communicate overload\n   occurrences.  This AVP can also be extended to add new AVPs allowing\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 11]\n_\nInternet-D
 raft                    DOIC                     December 2014\n\n\n   reporting nodes to communicate additional information about handling\n   an overload condition.\n\n   If necessary, new extensions can also define new AVPs that are not\n   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,\n   however, recommended that DOIC extensions use the OC-Supported-\n   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.\n\n3.5.  Simplified Example Architecture\n\n   Figure 1 illustrates the simplified architecture for Diameter\n   overload information conveyance.\n\n\n    Realm X                                  Same or other Realms\n   _--------------------------------------_ _----------------------_\n\n\n      +--^-----+                 : (optional) :\n      _Diameter_                 :            :\n      _Server A_--+     .--.     : +---^----+ :     .--.\n      +--------+  _   _(    _.   : _Diameter_ :   _(    _.   +---^----+\n                  +--(        )--:-
 _  Agent _-:--(        )--_Diameter_\n      +--------+  _ ( _  .  )  ) : +-----^--+ : ( _  .  )  ) _ Client _\n      _Diameter_--+  _--(___.-\'  :            :  _--(___.-\'  +-----^--+\n      _Server B_                 :            :\n      +---^----+                 :            :\n\n                          End-to-end Overload Indication\n             1)  _-----------------------------------------------_\n                             Diameter Application Y\n\n                  Overload Indication A    Overload Indication A\'\n             2)  _----------------------_ _----------------------_\n                 Diameter Application Y   Diameter Application Y\n\n\n\n     Figure 1: Simplified architecture choices for overload indication\n                                 delivery\n\n   In Figure 1, the Diameter overload indication can be conveyed (1)\n   end-to-end between servers and clients or (2) between servers and\n   Diameter agent inside the realm and then between the Diameter 
 agent\n   and the clients.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 12]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.  Solution Procedures\n\n   This section outlines the normative behavior for the DOIC solution.\n\n4.1.  Capability Announcement\n\n   This section defines DOIC Capability Announcement (DCA) behavior.\n\n4.1.1.  Reacting Node Behavior\n\n   A reacting node MUST include the OC-Supported-Features AVP in all\n   requests.  It MAY include the OC-Feature-Vector AVP.  If it does so,\n   it MUST indicate support for the "loss" algorithm.  If the reacting\n   node is configured to support features (including other algorithms)\n   in addition to the loss algorithm, it MUST indicate such support in\n   an OC-Feature-Vector AVP.\n\n   An OC-Supported-Features AVP in answer messages indicates there is a\n   reporting node for the transaction.  The reacting node MAY take\n   action, for example creatin
 g state for some stateful abatement\n   algorithm, based on the features indicated in the OC-Feature-Vector\n   AVP.\n\n      Note: The loss abatement algorithm does not require stateful\n      behavior when there is no active overload report.  This behavior\n      is described in Section 4.2 and Section 5.\n\n4.1.2.  Reporting Node Behavior\n\n   Upon receipt of a request message, a reporting node determines if\n   there is a reacting node for the transaction based on the presence of\n   the OC-Supported-Features AVP in the request message.\n\n   If the request message contains an OC-Supported-Features AVP then a\n   reporting node MUST include the OC-Supported-Features AVP in the\n   answer message for that transaction.\n\n   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-\n   OLR AVP or any other overload control AVPs defined in extension\n   drafts in response messages for transactions where the request\n   message does not include the OC-Supported-Features 
 AVP.  Lack of the\n   OC-Supported-Features AVP in the request message indicates that there\n   is no reacting node for the transaction.\n\n   A reporting node knows what overload control functionality is\n   supported by the reacting node based on the content or absence of the\n   OC-Feature-Vector AVP within the OC-Supported-Features AVP in the\n   request message.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 13]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node MUST indicate support for one and only one abatement\n   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm\n   selected MUST indicate the abatement algorithm the reporting node\n   wants the reacting node to use when the reporting node enters an\n   overload condition.\n\n   The abatement algorithm selected MUST be from the set of abatement\n   algorithms contained in the request message\'s OC-Feature-Vector AVP.\n\n   A repor
 ting node that selects the loss algorithm may do so by\n   including the OC-Feature-Vector AVP with an explicit indication of\n   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects\n   a different algorithm, it MUST include the OC-Feature-Vector AVP with\n   an explicit indication of the selected algorithm.\n\n   A reporting node MUST NOT change the selected algorithm during the\n   period of time that starts when entering an overload condition and\n   ends when the associated OCS becomes invalid in all reacting nodes.\n\n   The reporting node MAY change the overload abatement algorithm\n   indicated in the OC-Supported-Features AVP at any time as long as no\n   previously sent OLRs may be active.\n\n   The reporting node SHOULD indicate support for other DOIC features\n   defined in extension drafts that it supports and that apply to the\n   transaction.\n\n      Note: Not all DOIC features will apply to all Diameter\n      applications or deployment scenarios.  T
 he features included in\n      the OC-Feature-Vector AVP are based on local reporting node\n      policy.\n\n4.1.3.  Agent Behavior\n\n   Diameter Agents that support DOIC SHOULD ensure that all messages\n   relayed by the agent contain the OC-Supported-Features AVP.\n\n   A Diameter Agent SHOULD take on reacting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reacting node\n   behavior when there is no OC-Supported-Features AVP in a request\n   message.\n\n   For a Diameter Agent to be a reacting node for a non supporting\n   Diameter endpoint, the Diameter Agent MUST include the OC-Supported-\n   Features AVP in request messages it receives that do not contain the\n   OC-Supported-Features AVP.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 14]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A Diameter Agen
 t SHOULD take on reporting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reporting node\n   behavior when there is no OC-Supported-Features AVP in an answer\n   message for a transaction that contained the OC-Supported-Features\n   AVP in the request message.\n\n   For a Diameter Agent to take on reporting node behavior for a non\n   supporting Diameter endpoint the Diameter Agent MUST include the OC-\n   Supported-Features AVP in answer messages it receives that do not\n   contain the OC-Supported-Features AVP.\n\n   As with a Diameter endpoint taking on reporting node behavior, a\n   Diameter Agent MUST NOT include the OC-Supported-Features AVP in\n   answer messages for transactions where the request message received\n   by the Diameter Agent had no OC-Supported-Features AVP.\n\n   If a request message already has the OC-Supported-Features AVP then a\n   Diameter Agent M
 AY leave it unchanged in the relayed message or MAY\n   modify it to reflect the features appropriate for the transaction.\n\n      For instance, if the agent supports a superset of the features\n      reported by the reacting node then the agent might choose, based\n      on local policy, to advertise that superset of features to the\n      reporting node.\n\n   If the Diameter Agent changes the OC-Supported-Features AVP in a\n   request message then it is likely it will also need to modify the OC-\n   Supported-Features AVP in the answer message for the transaction.  As\n   such, a Diameter Agent MAY modify the OC-Supported-Features AVP\n   carried in answer messages.\n\n   When making changes to the OC-Supported-Features AVP the Diameter\n   Agent needs to ensure that there is no ambiguity in DOIC behavior for\n   both upstream and downstream DOIC nodes.\n\n4.2.  Overload Report Processing\n\n4.2.1.  Overload Control State\n\n   Both reacting and reporting nodes maintain Overload
  Control State\n   (OCS) for active overload conditions.  The following sections define\n   behavior associated with that OCS.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 15]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.2.1.1.  Overload Control State for Reacting Nodes\n\n   A reacting node SHOULD maintain the following OCS per supported\n   Diameter application:\n\n   o  A host-type OCS entry for each Destination-Host to which it sends\n      host-type requests and\n\n   o  A realm-type OCS entry for each Destination-Realm to which it\n      sends realm-type requests.\n\n   A host-type OCS entry is identified by the pair of application-id and\n   the node\'s DiameterIdentity.\n\n   A realm-type OCS entry is identified by the pair of application-id\n   and realm.\n\n   The host-type and realm-type OCS entries MAY include the following\n   information (the actual information stored is an implementation\n
    decision):\n\n   o  Sequence number (as received in OC-OLR)\n\n   o  Time of expiry (derived from OC-Validity-Duration AVP received in\n      the OC-OLR AVP and time of reception of the message carrying OC-\n      OLR AVP)\n\n   o  Selected Abatement Algorithm (as received in the OC-Supported-\n      Features AVP)\n\n   o  Abatement Algorithm specific input data (as received in the OC-OLR\n      AVP, for example, OC-Reduction-Percentage for the Loss abatement\n      algorithm)\n\n4.2.1.2.  Overload Control State for Reporting Nodes\n\n   A reporting node SHOULD maintain OCS entries per supported Diameter\n   application, per supported (and eventually selected) Abatement\n   Algorithm and per report-type.\n\n   An OCS entry is identified by the tuple of Application-Id, Report-\n   Type and Abatement Algorithm and MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number\n\n   o  Validity Duration\n\n\n\nKo
 rhonen, et al.          Expires June 18, 2015                [Page 16]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   o  Expiration Time\n\n   o  Algorithm specific input data (for example, the Reduction\n      Percentage for the Loss Abatement Algorithm)\n\n4.2.1.3.  Reacting Node Maintenance of Overload Control State\n\n   When a reacting node receives an OC-OLR AVP, it MUST determine if it\n   is for an existing or new overload condition.\n\n      Note: For the remainder of this section the term OLR refers to the\n      combination of the contents of the received OC-OLR AVP and the\n      abatement algorithm indicated in the received OC-Supported-\n      Features AVP.\n\n   When receiving an answer message with multiple OLRs of different\n   supported report types, a reporting node MUST process each received\n   OLR.\n\n   When receiving an OC-OLR AVPs with unknown values, a reacting node\n   SHOULD be silently discarded by reacting nodes and
  the event SHOULD\n   be logged.\n\n   The OLR is for an existing overload condition if a reacting node has\n   an OCS that matches the received OLR.\n\n   For a host-report this means it matches the application-id and the\n   host\'s DiameterIdentity in an existing host OCS entry.\n\n   For a realm-report this means it matches the application-id and the\n   realm in an existing realm OCS entry.\n\n   If the OLR is for an existing overload condition then a reacting node\n   MUST determine if the OLR is a retransmission or an update to the\n   existing OLR.\n\n   If the sequence number for the received OLR is greater than the\n   sequence number stored in the matching OCS entry then a reacting node\n   MUST update the matching OCS entry.\n\n   If the sequence number for the received OLR is less than or equal to\n   the sequence number in the matching OCS entry then a reacting node\n   MUST silently ignore the received OLR.  The matching OCS MUST NOT be\n   updated in this case.\n\n  
  If the received OLR is for a new overload condition then a reacting\n   node MUST generate a new OCS entry for the overload condition.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 17]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   For a host-report this means a reacting node creates on OCS entry\n   with the application-id in the received message and DiameterIdentity\n   of the Origin-Host in the received message.\n\n      Note: This solution assumes that the Origin-Host AVP in the answer\n      message included by the reporting node is not changed along the\n      path to the reacting node.\n\n   For a realm-report this means a reacting node creates on OCS entry\n   with the application-id in the received message and realm of the\n   Origin-Realm in the received message.\n\n   If the received OLR contains a validity duration of zero ("0") then a\n   reacting node MUST update the OCS entry as being expired.\n\n 
      Note: It is not necessarily appropriate to delete the OCS entry,\n      as there is recommended behavior that the reacting node slowly\n      returns to full traffic when ending an overload abatement period.\n\n   The reacting node does not delete an OCS when receiving an answer\n   message that does not contain an OC-OLR AVP (i.e. absence of OLR\n   means "no change").\n\n4.2.1.4.  Reporting Node Maintenance of Overload Control State\n\n   A reporting node SHOULD create a new OCS entry when entering an\n   overload condition.\n\n      Note: If a reporting node knows through absence of the OC-\n      Supported-Features AVP in received messages that there are no\n      reacting nodes supporting DOIC then the reporting node can choose\n      to not create OCS entries.\n\n   When generating a new OCS entry the sequence number SHOULD be set to\n   zero ("0").\n\n   When generating sequence numbers for new overload conditions, the new\n   sequence number MUST be greater than any seq
 uence number in an active\n   (unexpired) overload report for the same application and report-type\n   previously sent by the reporting node.  This property MUST hold over\n   a reboot of the reporting node.\n\n      Note: One way of addressing this over a reboot of a reporting node\n      is to use a time stamp for the first overload condition that\n      occurs after the report and to start using sequence numbers of\n      zero for subsequent overload conditions.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 18]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node MUST update an OCS entry when it needs to adjust the\n   validity duration of the overload condition at reacting nodes.\n\n      For instance, if a reporting node wishes to instruct reacting\n      nodes to continue overload abatement for a longer period of time\n      than originally communicated.  This also applies if the reporting\n    
   node wishes to shorten the period of time that overload abatement\n      is to continue.\n\n   A reporting node MUST NOT update the abatement algorithm in an active\n   OCS entry.\n\n   A reporting node MUST update an OCS entry when it wishes to adjust\n   any abatement algorithm specific parameters, including the reduction\n   percentage used for the Loss abatement algorithm.\n\n      For instance, if a reporting node wishes to change the reduction\n      percentage either higher, if the overload condition has worsened,\n      or lower, if the overload condition has improved, then the\n      reporting node would update the appropriate OCS entry.\n\n   A reporting node MUST update the sequence number associated with the\n   OCS entry anytime the contents of the OCS entry are changed.  This\n   will result in a new sequence number being sent to reacting nodes,\n   instructing reacting nodes to process the OC-OLR AVP.\n\n   A reporting node SHOULD update an OCS entry with a validity
  duration\n   of zero ("0") when the overload condition ends.\n\n      Note: If a reporting node knows that the OCS entries in the\n      reacting nodes are near expiration then the reporting node might\n      decide not to send an OLR with a validity duration of zero.\n\n   A reporting node MUST keep an OCS entry with a validity duration of\n   zero ("0") for a period of time long enough to ensure that any non-\n   expired reacting node\'s OCS entry created as a result of the overload\n   condition in the reporting node is deleted.\n\n4.2.2.  Reacting Node Behavior\n\n   When a reacting node sends a request it MUST determine if that\n   request matches an active OCS.\n\n   If the request matches an active OCS then the reacting node MUST use\n   the overload abatement algorithm indicated in the OCS to determine if\n   the request is to receive overload abatement treatment.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 19]\n_\nInternet-Draft         
            DOIC                     December 2014\n\n\n   For the Loss abatement algorithm defined in this specification, see\n   Section 5 for the overload abatement algorithm logic applied.\n\n   If the overload abatement algorithm selects the request for overload\n   abatement treatment then the reacting node MUST apply overload\n   abatement treatment on the request.  The abatement treatment applied\n   depends on the context of the request.\n\n   If the request is a host-routed request then the reacting node SHOULD\n   apply throttling abatement treatment to the request.\n\n   If the request is a realm-routed request then the reacting node\n   SHOULD apply diversion abatement treatment to the request.\n\n   If the overload abatement treatment results in throttling of the\n   request and if the reacting node is an agent then the agent MUST send\n   an appropriate error as defined in Section 7.\n\n   The behavior of reacting nodes that are Diameter endpoints when\n   throttling r
 equests depends on the application and is outside the\n   scope of this specification.\n\n   In the case that the OCS entry indicated no traffic was to be sent to\n   the overloaded entity and the validity duration expires then overload\n   abatement associated with the overload report MUST be ended in a\n   controlled fashion.\n\n4.2.3.  Reporting Node Behavior\n\n   If there is an active OCS entry then a reporting node SHOULD include\n   the OC-OLR AVP in all answer messages to requests that contain the\n   OC-Supported-Features AVP and that match the active OCS entry.\n\n      Note: A request matches if the application-id in the request\n      matches the application-id in any active OCS entry and if the\n      report-type in the OCS entry matches a report-type supported by\n      the reporting node as indicated in the OC-Supported-Features AVP.\n\n   The contents of the OC-OLR AVP depend on the selected algorithm.\n\n   A reporting node MAY choose to not resend an overload repor
 t to a\n   reacting node if it can guarantee that this overload report is\n   already active in the reacting node.\n\n      Note: In some cases (e.g. when there are one or more agents in the\n      path between reporting and reacting nodes, or when overload\n      reports are discarded by reacting nodes) a reporting node may not\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 20]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      be able to guarantee that the reacting node has received the\n      report.\n\n   A reporting node MUST NOT send overload reports of a type that has\n   not been advertised as supported by the reacting node.\n\n      Note: A reacting node implicitly advertises support for the host\n      and realm report types by including the OC-Supported-Features AVP\n      in the request.  Support for other report types will be explicitly\n      indicated by new feature bits in the OC-Feature-Vector AVP.\
 n\n   A reporting node MAY rely on the OC-Validity-Duration AVP values for\n   the implicit overload control state cleanup on the reacting node.\n\n   A reporting node SHOULD explicitly indicate the end of an overload\n   occurrence by sending a new OLR with OC-Validity-Duration set to a\n   value of zero ("0").  The reporting node SHOULD ensure that all\n   reacting nodes receive the updated overload report.\n\n      Note: All OLRs sent have an expiration time calculated by adding\n      the validity-duration contained in the OLR to the time the message\n      was sent.  Transit time for the OLR can be safely ignored.  The\n      reporting node can ensure that all reacting nodes have received\n      the OLR by continuing to send it in answer messages until the\n      expiration time for all OLRs sent for that overload condition have\n      expired.\n\n   When a reporting node sends an OLR, it effectively delegates any\n   necessary throttling to downstream nodes.  If the reporting 
 node also\n   locally throttles the same set of messages, the overall number of\n   throttled requests may be higher than intended.  Therefore, before\n   applying local message throttling, a reporting node needs to check if\n   these messages match existing OCS entries, indicating that these\n   messages have survived throttling applied by downstream nodes that\n   have received the related OLR.\n\n   However, even if the set of messages match existing OCS entries, the\n   reporting node can still apply other abatement methods such as\n   diversion.  The reporting node might also need to throttle requests\n   for reasons other than overload.  For example, an agent or server\n   might have a configured rate limit for each client, and throttle\n   requests that exceed that limit, even if such requests had already\n   been candidates for throttling by downstream nodes.  The reporting\n   node also has the option to send new OLRs requesting greater\n   reductions in traffic, reducing t
 he need for local throttling.\n\n   A reporting node SHOULD decrease requested overload abatement\n   treatment in a controlled fashion to avoid oscillations in traffic.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 21]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.3.  Protocol Extensibility\n\n   The DOIC solution can be extended.  Types of potential extensions\n   include new traffic abatement algorithms, new report types or other\n   new functionality.\n\n   When defining a new extension that requires new normative behavior,\n   the specification MUST define a new feature for the OC-Feature-\n   Vector.  This feature bit is used to communicate support for the new\n   feature.\n\n   The extension MAY define new AVPs for use in DOIC Capability\n   Announcement and for use in DOIC Overload reporting.  These new AVPs\n   SHOULD be defined to be extensions to the OC-Supported-Features or\n   OC-OLR AVPs defined in thi
 s document.\n\n   [RFC6733] defined Grouped AVP extension mechanisms apply.  This\n   allows, for example, defining a new feature that is mandatory to be\n   understood even when piggybacked on an existing application.\n\n   The handling of feature bits in the OC-Feature-Vector AVP that are\n   not associated with overload abatement algorithms MUST be specified\n   by the extensions that define the features.\n\n   When defining new report type values, the corresponding specification\n   MUST define the semantics of the new report types and how they affect\n   the OC-OLR AVP handling.  The specification MUST also reserve a\n   corresponding new feature bit in the OC-Feature-Vector AVP.\n\n   The OC-OLR AVP can be expanded with optional sub-AVPs only if a\n   legacy DOIC implementation can safely ignore them without breaking\n   backward compatibility for the given OC-Report-Type AVP value.  If\n   the new sub-AVPs imply new semantics for handling the indicated\n   report type, then a
  new OC-Report-Type AVP value MUST be defined.\n\n   Documents that introduce new report types MUST describe any\n   limitations on their use across non-supporting agents.\n\n   New features (feature bits in the OC-Feature-Vector AVP) and report\n   types (in the OC-Report-Type AVP) MUST be registered with IANA.  As\n   with any Diameter specification, RFC6733 requires all new AVPs to be\n   registered with IANA.  See Section 8 for the required procedures.\n\n5.  Loss Algorithm\n\n   This section documents the Diameter overload loss abatement\n   algorithm.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 22]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n5.1.  Overview\n\n   The DOIC specification supports the ability for multiple overload\n   abatement algorithms to be specified.  The abatement algorithm used\n   for any instance of overload is determined by the Diameter Overload\n   Capability Announcement process do
 cumented in Section 4.1.\n\n   The loss algorithm described in this section is the default algorithm\n   that must be supported by all Diameter nodes that support DOIC.\n\n   The loss algorithm is designed to be a straightforward and stateless\n   overload abatement algorithm.  It is used by reporting nodes to\n   request a percentage reduction in the amount of traffic sent.  The\n   traffic impacted by the requested reduction depends on the type of\n   overload report.\n\n   Reporting nodes use a strategy of applying abatement logic to the\n   requested percentage of request messages sent (or handled in the case\n   of agents) by the reacting node that are impacted by the overload\n   report.\n\n   From a conceptual level, the logic at the reacting node could be\n   outlined as follows.\n\n   1.  An overload report is received and the associated OCS is either\n       saved or updated (if required) by the reacting node.\n\n   2.  A new Diameter request is generated by the applicatio
 n running on\n       the reacting node.\n\n   3.  The reacting node determines that an active overload report\n       applies to the request, as indicated by the corresponding OCS\n       entry.\n\n   4.  The reacting node determines if overload abatement treatment\n       should be applied to the request.  One approach that could be\n       taken for each request is to select a random number between 1 and\n       100.  If the random number is less than or equal to the indicated\n       reduction percentage then the request is given abatement\n       treatment, otherwise the request is given normal routing\n       treatment.\n\n5.2.  Reporting Node Behavior\n\n   The method a reporting node uses to determine the amount of traffic\n   reduction required to address an overload condition is an\n   implementation decision.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 23]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n  
  When a reporting node that has selected the loss abatement algorithm\n   determines the need to request a reduction in traffic, it includes an\n   OC-OLR AVP in response messages as described in Section 4.2.3.\n\n   When sending the OC-OLR AVP, the reporting node MUST indicate a\n   percentage reduction in the OC-Reduction-Percentage AVP.\n\n   The reporting node MAY change the reduction percentage in subsequent\n   overload reports.  When doing so the reporting node must conform to\n   overload report handing specified in Section 4.2.3.\n\n5.3.  Reacting Node Behavior\n\n   The method a reacting node uses to determine which request messages\n   are given abatement treatment is an implementation decision.\n\n   When receiving an OC-OLR in an answer message where the algorithm\n   indicated in the OC-Supported-Features AVP is the loss algorithm, the\n   reacting node MUST apply abatement treatment to the requested\n   percentage of request messages sent.\n\n      Note: The loss algo
 rithm is a stateless algorithm.  As a result,\n      the reacting node does not guarantee that there will be an\n      absolute reduction in traffic sent.  Rather, it guarantees that\n      the requested percentage of new requests will be given abatement\n      treatment.\n\n   When applying overload abatement treatment for the loss abatement\n   algorithm, the reacting node MUST abate the requested percentage of\n   requests that would have otherwise been sent to the reporting host or\n   realm.\n\n   If reacting node comes out of the 100 percent traffic reduction as a\n   result of the overload report timing out, the following concerns are\n   RECOMMENDED to be applied.  The reacting node sending the traffic\n   should be conservative and, for example, first send "probe" messages\n   to learn the overload condition of the overloaded node before\n   converging to any traffic amount/rate decided by the sender.  Similar\n   concerns apply in all cases when the overload report times o
 ut unless\n   the previous overload report stated 0 percent reduction.\n\n   If the reacting node does not receive an OLR in response to messages\n   sent to the formerly overloaded node then the reacting node SHOULD\n   slowly increase the rate of traffic sent to the overloaded node.\n\n   When an active overload report expires, it is suggested that the\n   reacting node progressively decrease the amount of traffic given\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 24]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   abatement treatment, until the reduction is completely removed and no\n   traffic is given abatement treatment.\n\n      The goal of this behavior is to reduce the probability of overload\n      condition thrashing where an immediate transition from 100_\n      reduction to 0_ reduction results in the reporting node moving\n      quickly back into an overload condition.\n\n6.  Attribute Value Pairs\n\
 n   This section describes the encoding and semantics of the Diameter\n   Overload Indication Attribute Value Pairs (AVPs) defined in this\n   document.\n\n   A new application specification can incorporate the overload control\n   mechanism specified in this document by making it mandatory to\n   implement for the application and referencing this specification\n   normatively.  It is the responsibility of the Diameter application\n   designers to define how overload control mechanisms works on that\n   application.\n\n6.1.  OC-Supported-Features AVP\n\n   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and\n   serves two purposes.  First, it announces a node\'s support for the\n   DOIC solution in general.  Second, it contains the description of the\n   supported DOIC features of the sending node.  The OC-Supported-\n   Features AVP MUST be included in every Diameter request message a\n   DOIC supporting node sends.\n\n      OC-Supported-Features ::= _ AVP Header: 
 TBD1 _\n                                [ OC-Feature-Vector ]\n                              * [ AVP ]\n\n\n6.2.  OC-Feature-Vector AVP\n\n   The OC-Feature-Vector AVP (AVP code TBD6) is of type Unsigned64 and\n   contains a 64 bit flags field of announced capabilities of a DOIC\n   node.  The value of zero (0) is reserved.\n\n   The OC-Feature-Vector sub-AVP is used to announce the DOIC features\n   supported by the DOIC node, in the form of a flag-bits field in which\n   each bit announces one feature or capability supported by the node.\n   The absence of the OC-Feature-Vector AVP in request messages\n   indicates that only the default traffic abatement algorithm described\n   in this specification is supported.  The absence of the OC- Feature-\n   Vector AVP in answer messages indicates that the default traffic\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 25]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   abate
 ment algorithm described in this specification is selected\n   (while other traffic abatement algorithms may be supported), and no\n   features other than abatement algorithms are supported.\n\n   The following capabilities are defined in this document:\n\n   OLR_DEFAULT_ALGO (0x0000000000000001)\n\n      When this flag is set by the a DOIC reacting node it means that\n      the default traffic abatement (loss) algorithm is supported.  When\n      this flag is set by a DOIC reporting node it means that the loss\n      algorithm will be used for requested overload abatement.\n\n6.3.  OC-OLR AVP\n\n   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the\n   information necessary to convey an overload report on an overload\n   condition at the reporting node.  The OC-OLR AVP does not explicitly\n   contain all information needed by the reacting node to decide whether\n   a subsequent request must undergo abatement using the selected\n   abatement algorithm.  The value of 
 the OC-Report-Type AVP within the\n   OC-OLR AVP indicates which implicit information is relevant for this\n   decision (see Section 6.6).  The application the OC-OLR AVP applies\n   to is the same as the Application-Id found in the Diameter message\n   header.  The host or realm the OC-OLR AVP concerns is determined from\n   the Origin-Host AVP and/or Origin-Realm AVP found in the\n   encapsulating Diameter command.  The OC-OLR AVP is intended to be\n   sent only by a reporting node.\n\n      OC-OLR ::= _ AVP Header: TBD2 _\n                 _ OC-Sequence-Number _\n                 _ OC-Report-Type _\n                 [ OC-Reduction-Percentage ]\n                 [ OC-Validity-Duration ]\n               * [ AVP ]\n\n\n6.4.  OC-Sequence-Number AVP\n\n   The OC-Sequence-Number AVP (AVP code TBD3) is of type Unsigned64.\n   Its usage in the context of overload control is described in\n   Section 4.2.\n\n   From the functionality point of view, the OC-Sequence-Number AVP is\n   used as
  a non-volatile increasing counter for a sequence of overload\n   reports between two DOIC nodes for the same overload occurrence.  The\n   sequence number is only required to be unique between two DOIC nodes.\n   Sequence numbers are treated in a uni-directional manner, i.e. two\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 26]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   sequence numbers on each direction between two DOIC nodes are not\n   related or correlated.\n\n6.5.  OC-Validity-Duration AVP\n\n   The OC-Validity-Duration AVP (AVP code TBD4) is of type Unsigned32\n   and indicates in milliseconds the validity time of the overload\n   report.  The number of milliseconds is measured after reception of\n   the first OC-OLR AVP with a given value of OC-Sequence-Number AVP.\n   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30\n   seconds).  When the OC-Validity-Duration AVP is not present in 
 the\n   OC-OLR AVP, the default value applies.\n\n6.6.  OC-Report-Type AVP\n\n   The OC-Report-Type AVP (AVP code TBD5) is of type Enumerated.  The\n   value of the AVP describes what the overload report concerns.  The\n   following values are initially defined:\n\n   HOST_REPORT 0  The overload report is for a host.  Overload abatement\n      treatment applies to host-routed requests.\n\n   REALM_REPORT 1  The overload report is for a realm.  Overload\n      abatement treatment applies to realm-routed requests.\n\n6.7.  OC-Reduction-Percentage AVP\n\n   The OC-Reduction-Percentage AVP (AVP code TBD8) is of type Unsigned32\n   and describes the percentage of the traffic that the sender is\n   requested to reduce, compared to what it otherwise would send.  The\n   OC-Reduction-Percentage AVP applies to the default (loss) algorithm\n   specified in this specification.  However, the AVP can be reused for\n   future abatement algorithms, if its semantics fit into the new\n   algorithm.\
 n\n   The value of the Reduction-Percentage AVP is between zero (0) and one\n   hundred (100).  Values greater than 100 are ignored.  The value of\n   100 means that all traffic is to be throttled, i.e. the reporting\n   node is under a severe load and ceases to process any new messages.\n   The value of 0 means that the reporting node is in a stable state and\n   has no need for the reacting node to apply any traffic abatement.\n   The default value of the OC-Reduction-Percentage AVP is 0.  When the\n   OC-Reduction-Percentage AVP is not present in the overload report,\n   the default value applies.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 27]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n6.8.  Attribute Value Pair flag rules\n\n                                                         +---------+\n                                                         _AVP flag _\n                                      
                    _rules    _\n                                                         +----+----+\n                              AVP   Section              _    _MUST_\n       Attribute Name         Code  Defined  Value Type  _MUST_ NOT_\n      +--------------------------------------------------+----+----+\n      _OC-Supported-Features  TBD1  6.1      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-OLR                 TBD2  6.3      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Sequence-Number     TBD3  6.4      Unsigned64  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Validity-Duration   TBD4  6.5      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Report-Type         TBD5  6.6      Enumerated  _    _ V  _\n      +------------------------------------------------
 --+----+----+\n      _OC-Reduction                                      _    _    _\n      _  -Percentage          TBD8  6.7      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Feature-Vector      TBD6  6.2      Unsigned64  _    _ V  _\n      +--------------------------------------------------+----+----+\n\n\n   As described in the Diameter base protocol [RFC6733], the M-bit usage\n   for a given AVP in a given command may be defined by the application.\n\n7.  Error Response Codes\n\n   When a DOIC node rejects a Diameter request due to overload, the DOIC\n   node MUST select an appropriate error response code.  This\n   determination is made based on the probability of the request\n   succeeding if retried on a different path.\n\n   A reporting node rejecting a Diameter request due to an overload\n   condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can\n   assume that the same request may succeed on a differen
 t path.\n\n   If a reporting node knows or assumes that the same request will not\n   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response\n   SHOULD be used.  Retrying would consume valuable resources during an\n   occurrence of overload.\n\n      For instance, if the request arrived at the reporting node without\n      a Destination-Host AVP then the reporting node might determine\n      that there is an alternative Diameter node that could successfully\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 28]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      process the request and that retrying the transaction would not\n      negatively impact the reporting node.  DIAMETER_TOO_BUSY would be\n      sent in this case.\n\n      If the request arrived at the reporting node with a Destination-\n      Host AVP populated with its own Diameter identity then the\n      reporting node can assume that retrying th
 e request would result\n      in it coming to the same reporting node.\n      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.\n\n      A second example is when an agent that supports the DOIC solution\n      is performing the role of a reacting node for a non supporting\n      client.  Requests that are rejected as a result of DOIC throttling\n      by the agent in this scenario would generally be rejected with a\n      DIAMETER_UNABLE_TO_COMPLY response code.\n\n8.  IANA Considerations\n\n8.1.  AVP codes\n\n   New AVPs defined by this specification are listed in Section 6.  All\n   AVP codes are allocated from the \'Authentication, Authorization, and\n   Accounting (AAA) Parameters\' AVP Codes registry.\n\n8.2.  New registries\n\n   Two new registries are needed under the \'Authentication,\n   Authorization, and Accounting (AAA) Parameters\' registry.\n\n   A new "Overload Control Feature Vector" registry is required.  The\n   registry must contain the following:\n\n      Fea
 ture Vector Value\n\n      Specification - the specification that defines the new value.\n\n   See Section 6.2 for the initial Feature Vector Value in the registry.\n   This specification is the specification defining the value.  New\n   values can be added into the registry using the Specification\n   Required policy.  [RFC5226].\n\n   A new "Overload Report Type" registry is required.  The registry must\n   contain the following:\n\n      Report Type Value\n\n      Specification - the specification that defines the new value.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 29]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   See Section 6.6 for the initial assignment in the registry.  New\n   types can be added using the Specification Required policy [RFC5226].\n\n9.  Security Considerations\n\n   DOIC gives Diameter nodes the ability to request that downstream\n   nodes send fewer Diameter requests.  Nodes do this 
 by exchanging\n   overload reports that directly effect this reduction.  This exchange\n   is potentially subject to multiple methods of attack, and has the\n   potential to be used as a Denial-of-Service (DoS) attack vector.\n\n   Overload reports may contain information about the topology and\n   current status of a Diameter network.  This information is\n   potentially sensitive.  Network operators may wish to control\n   disclosure of overload reports to unauthorized parties to avoid its\n   use for competitive intelligence or to target attacks.\n\n   Diameter does not include features to provide end-to-end\n   authentication, integrity protection, or confidentiality.  This may\n   cause complications when sending overload reports between non-\n   adjacent nodes.\n\n9.1.  Potential Threat Modes\n\n   The Diameter protocol involves transactions in the form of requests\n   and answers exchanged between clients and servers.  These clients and\n   servers may be peers, that is, they
  may share a direct transport\n   (e.g.  TCP or SCTP) connection, or the messages may traverse one or\n   more intermediaries, known as Diameter Agents.  Diameter nodes use\n   TLS, DTLS, or IPsec to authenticate peers, and to provide\n   confidentiality and integrity protection of traffic between peers.\n   Nodes can make authorization decisions based on the peer identities\n   authenticated at the transport layer.\n\n   When agents are involved, this presents an effectively transitive\n   trust model.  That is, a Diameter client or server can authorize an\n   agent for certain actions, but it must trust that agent to make\n   appropriate authorization decisions about its peers, and so on.\n   Since confidentiality and integrity protection occurs at the\n   transport layer, agents can read, and perhaps modify, any part of a\n   Diameter message, including an overload report.\n\n   There are several ways an attacker might attempt to exploit the\n   overload control mechanism.  An un
 authorized third party might inject\n   an overload report into the network.  If this third party is upstream\n   of an agent, and that agent fails to apply proper authorization\n   policies, downstream nodes may mistakenly trust the report.  This\n   attack is at least partially mitigated by the assumption that nodes\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 30]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   include overload reports in Diameter answers but not in requests.\n   This requires an attacker to have knowledge of the original request\n   in order to construct an answer.  Such an answer would also need to\n   arrive at a Diameter node via a protected transport connection.\n   Therefore, implementations MUST validate that an answer containing an\n   overload report is a properly constructed response to a pending\n   request prior to acting on the overload report, and that the answer\n   was received via
  an appropriate transport connection.\n\n   A similar attack involves a compromised but otherwise authorized node\n   that sends an inappropriate overload report.  For example, a server\n   for the realm "example.com" might send an overload report indicating\n   that a competitor\'s realm "example.net" is overloaded.  If other\n   nodes act on the report, they may falsely believe that "example.net"\n   is overloaded, effectively reducing that realm\'s capacity.\n   Therefore, it\'s critical that nodes validate that an overload report\n   received from a peer actually falls within that peer\'s responsibility\n   before acting on the report or forwarding the report to other peers.\n   For example, an overload report from a peer that applies to a realm\n   not handled by that peer is suspect.\n\n      This attack is partially mitigated by the fact that the\n      application, as well as host and realm, for a given OLR is\n      determined implicitly by respective AVPs in the enclosing 
 answer.\n      If a reporting node modifies any of those AVPs, the enclosing\n      transaction will also be affected.\n\n9.2.  Denial of Service Attacks\n\n   Diameter overload reports, especially realm-reports, can cause a node\n   to cease sending some or all Diameter requests for an extended\n   period.  This makes them a tempting vector for DoS attacks.\n   Furthermore, since Diameter is almost always used in support of other\n   protocols, a DoS attack on Diameter is likely to impact those\n   protocols as well.  Therefore, Diameter nodes MUST NOT honor or\n   forward OLRs received from peers that are not trusted to send them.\n\n   An attacker might use the information in an OLR to assist in DoS\n   attacks.  For example, an attacker could use information about\n   current overload conditions to time an attack for maximum effect, or\n   use subsequent overload reports as a feedback mechanism to learn the\n   results of a previous or ongoing attack.  Operators need the ability
 \n   to ensure that OLRs are not leaked to untrusted parties.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 31]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n9.3.  Non-Compliant Nodes\n\n   In the absence of an overload control mechanism, Diameter nodes need\n   to implement strategies to protect themselves from floods of\n   requests, and to make sure that a disproportionate load from one\n   source does not prevent other sources from receiving service.  For\n   example, a Diameter server might throttle a certain percentage of\n   requests from sources that exceed certain limits.  Overload control\n   can be thought of as an optimization for such strategies, where\n   downstream nodes never send the excess requests in the first place.\n   However, the presence of an overload control mechanism does not\n   remove the need for these other protection strategies.\n\n   When a Diameter node sends an overload rep
 ort, it cannot assume that\n   all nodes will comply, even if they indicate support for DOIC.  A\n   non-compliant node might continue to send requests with no reduction\n   in load.  Such non-compliance could be done accidentally, or\n   maliciously to gain an unfair advantage over compliant nodes.\n   Requirement 28 [RFC7068] indicates that the overload control solution\n   cannot assume that all Diameter nodes in a network are trusted, and\n   that malicious nodes not be allowed to take advantage of the overload\n   control mechanism to get more than their fair share of service.\n\n9.4.  End-to End-Security Issues\n\n   The lack of end-to-end integrity features makes it difficult to\n   establish trust in overload reports received from non-adjacent nodes.\n   Any agents in the message path may insert or modify overload reports.\n   Nodes must trust that their adjacent peers perform proper checks on\n   overload reports from their peers, and so on, creating a transitive-\n   trust
  requirement extending for potentially long chains of nodes.\n   Network operators must determine if this transitive trust requirement\n   is acceptable for their deployments.  Nodes supporting Diameter\n   overload control MUST give operators the ability to select which\n   peers are trusted to deliver overload reports, and whether they are\n   trusted to forward overload reports from non-adjacent nodes.  DOIC\n   nodes MUST strip DOIC AVPs from messages received from peers that are\n   not trusted for DOIC purposes.\n\n   The lack of end-to-end confidentiality protection means that any\n   Diameter agent in the path of an overload report can view the\n   contents of that report.  In addition to the requirement to select\n   which peers are trusted to send overload reports, operators MUST be\n   able to select which peers are authorized to receive reports.  A node\n   MUST not send an overload report to a peer not authorized to receive\n   it.  Furthermore, an agent MUST remove any
  overload reports that\n   might have been inserted by other nodes before forwarding a Diameter\n   message to a peer that is not authorized to receive overload reports.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 32]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      A DOIC node cannot always automatically detect that a peer also\n      supports DOIC.  For example, a node might have a peer that is a\n      non-supporting agent.  If nodes on the other side of that agent\n      send OC-Supported-Features AVPs, the agent is likely to forward\n      them as unknown AVPs.  Messages received across the non-supporting\n      agent may be indistinguishable from messages received across a\n      DOIC supporting agent, giving the false impression that the non-\n      supporting agent actually supports DOIC.  This complicates the\n      transitive-trust nature of DOIC.  Operators need to be careful to\n      avoid situations
  where a non-supporting agent is mistakenly\n      trusted to enforce DOIC related authorization policies.\n\n   At the time of this writing, the DIME working group is studying\n   requirements for adding end-to-end security features\n   [I-D.ietf-dime-e2e-sec-req] to Diameter.  These features, when they\n   become available, might make it easier to establish trust in non-\n   adjacent nodes for overload control purposes.  Readers should be\n   reminded, however, that the overload control mechanism encourages\n   Diameter agents to modify AVPs in, or insert additional AVPs into,\n   existing messages that are originated by other nodes.  If end-to-end\n   security is enabled, there is a risk that such modification could\n   violate integrity protection.  The details of using any future\n   Diameter end-to-end security mechanism with overload control will\n   require careful consideration, and are beyond the scope of this\n   document.\n\n10.  Contributors\n\n   The following people c
 ontributed substantial ideas, feedback, and\n   discussion to this document:\n\n   o  Eric McMurry\n\n   o  Hannes Tschofenig\n\n   o  Ulrich Wiehe\n\n   o  Jean-Jacques Trottin\n\n   o  Maria Cruz Bartolome\n\n   o  Martin Dolly\n\n   o  Nirav Salot\n\n   o  Susan Shishufeng\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 33]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n11.  References\n\n11.1.  Normative References\n\n   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate\n              Requirement Levels", BCP 14, RFC 2119, March 1997.\n\n   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an\n              IANA Considerations Section in RFCs", BCP 26, RFC 5226,\n              May 2008.\n\n   [RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network\n              Time Protocol Version 4: Protocol and Algorithms\n              Specification", RFC 5905, June 2010.\n\n   [RFC
 6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,\n              "Diameter Base Protocol", RFC 6733, October 2012.\n\n11.2.  Informative References\n\n   [Cx]       3GPP, , "ETSI TS 129 229 V11.4.0", August 2013.\n\n   [I-D.ietf-dime-e2e-sec-req]\n              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,\n              "Diameter AVP Level Security: Scenarios and Requirements",\n              draft-ietf-dime-e2e-sec-req-00 (work in progress),\n              September 2013.\n\n   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.\n\n   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.\n              Loughney, "Diameter Credit-Control Application", RFC 4006,\n              August 2005.\n\n   [RFC5729]  Korhonen, J., Jones, M., Morand, L., and T. Tsou,\n              "Clarifications on the Routing of Diameter Requests Based\n              on the Username and the Realm", RFC 5729, December 2009.\n\n   [RFC7068]  McMurry, E. and B. Campbel
 l, "Diameter Overload Control\n              Requirements", RFC 7068, November 2013.\n\n   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.\n\nAppendix A.  Issues left for future specifications\n\n   The base solution for the overload control does not cover all\n   possible use cases.  A number of solution aspects were intentionally\n   left for future specification and protocol work.  The following sub-\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 34]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   sections define some of the potential extensions to the DOIC\n   solution.\n\nA.1.  Additional traffic abatement algorithms\n\n   This specification describes only means for a simple loss based\n   algorithm.  Future algorithms can be added using the designed\n   solution extension mechanism.  The new algorithms need to be\n   registered with IANA.  See Sections 6.1 and 8 for the required IANA\n   steps.\n\nA
 .2.  Agent Overload\n\n   This specification focuses on Diameter endpoint (server or client)\n   overload.  A separate extension will be required to outline the\n   handling of the case of agent overload.\n\nA.3.  New Error Diagnostic AVP\n\n   This specification indicates the use of existing error messages when\n   nodes reject requests due to overload.  The DIME working group is\n   considering defining additional error codes or AVPs to indicate that\n   overload was the reason for the rejection of the message.\n\nAppendix B.  Deployment Considerations\n\n   Non Supporting Agents\n\n      Due to the way that realm-routed requests are handled in Diameter\n      networks with the server selection for the request done by an\n      agent, network operators should enable DOIC at agents that perform\n      server selection first.\n\n   Topology Hiding Interactions\n\n      There exist proxies that implement what is referred to as Topology\n      Hiding.  This can include cases where the
  agent modifies the\n      Origin-Host in answer messages.  The behavior of the DOIC solution\n      is not well understood when this happens.  As such, the DOIC\n      solution does not address this scenario.\n\nAppendix C.  Requirements Conformance Analysis\n\n   This section contains the result of an analysis of the DOIC solutions\n   conformance to the requirements defined in [RFC7068].\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 35]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.1.  Deferred Requirements\n\n   The 3GPP has adopted an early version of this document as normative\n   references in various Diameter related specifications to support the\n   overload control mechanism in their release 12 framework.  The DIME\n   working group has therefore decided to defer certain requirements in\n   order to complete the design of an extensible, generic solution\n   before the deadline scheduled by the 3GPP f
 or the completion of the\n   release 12 protocol work by the end of 2014.  The deferred work\n   includes the following:\n\n   o  Agent Overload - The ability for an agent to report an overload\n      condition of the agent itself.\n\n   o  Load Information - The ability for a node to report its load level\n      when not overloaded.\n\n   At the time of this writing, DIME has begun separate work efforts for\n   these requirements.\n\nC.2.  Detection of non-supporting Intermediaries\n\n   The DOIC mechanism as currently defined does not allow supporting\n   nodes to automatically determine whether OC-Supported-Features or OC-\n   OLR AVPs are originated by a peer node, or by a non-peer node and\n   sent across a non-supporting peer.  This makes it impossible to\n   detect the presence of non-supporting nodes between supporting nodes,\n   except by configuration.  The working group determined that such a\n   configuration requirement is acceptable.\n\n   This limits full compliance w
 ith certain requirements related to the\n   limitation of new configuration, deployment in environments with\n   mixed support, operating across non-supporting agents, and\n   authorization.\n\nC.3.  Implicit Application Indication\n\n   The working group elected to determine the application for an\n   overload report from that of the enclosing message.  This prevents\n   sending an OLR for an application when there are no transactions for\n   that application.\n\n   As a consequence, DOIC does not comply with the requirement to be\n   able to report overload information across quiescent connections.\n   DOIC does not fully comply with requirements to operate on up-to-date\n   information, since if an OLR causes all transactions to stop for an\n   application, the only way traffic will resume is for the OLR to\n   expire.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 36]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC
 .4.  Stateless Operation\n\n   RFC7068 explicitly discourages the sending of OLRs in every answer\n   message, as part of the requirement to avoid additional work for\n   overloaded nodes.  DOIC recommends exactly that behavior during\n   active overload conditions.  The working group determined that doing\n   otherwise would reduce reliability and increase statefulness.  (Note\n   that DOIC does allow nodes to avoid sending OLRs in every answer if\n   they have some other method of ensuring that OLRs get to all relevant\n   reacting nodes.)\n\nC.5.  No New Vulnerabilities\n\n   The working group believes that DOIC is compliant with the\n   requirement to avoid introducing new vulnerabilities.  However, this\n   requirement may warrant an early security expert review.\n\nC.6.  Detailed Requirements\n\n   [RFC Editor: Please remove this section and subsections prior to\n   publication as an RFC.]\n\nC.6.1.  General\n\n   REQ 1:  The solution MUST provide a communication method for Di
 ameter\n           nodes to exchange load and overload information.\n\n           *Partially Compliant*. The mechanism uses new AVPs\n           piggybacked on existing Diameter messages to exchange\n           overload information.  It does not currently support "load"\n           information or the ability to report overload of an agent.\n           These have been left for future extensions.\n\n\n\n   REQ 2:  The solution MUST allow Diameter nodes to support overload\n           control regardless of which Diameter applications they\n           support.  Diameter clients and agents must be able to use the\n           received load and overload information to support graceful\n           behavior during an overload condition.  Graceful behavior\n           under overload conditions is best described by REQ 3.\n\n           *Partially Compliant*. The DOIC AVPs can be used in any\n           application that allows the extension of AVPs.  However,\n           "load" information is n
 ot currently supported.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 37]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 3:  The solution MUST limit the impact of overload on the overall\n           useful throughput of a Diameter server, even when the\n           incoming load on the network is far in excess of its\n           capacity.  The overall useful throughput under load is the\n           ultimate measure of the value of a solution.\n\n           *Compliant*. DOIC provides information that nodes can use to\n           reduce the impact of overload.\n\n\n\n   REQ 4:  Diameter allows requests to be sent from either side of a\n           connection, and either side of a connection may have need to\n           provide its overload status.  The solution MUST allow each\n           side of a connection to independently inform the other of its\n           overload status.\n\n           *Compliant*. DOIC 
 AVPs can be included regardless of\n           transaction "direction"\n\n\n\n   REQ 5:  Diameter allows nodes to determine their peers via dynamic\n           discovery or manual configuration.  The solution MUST work\n           consistently without regard to how peers are determined.\n\n           *Compliant*. DOIC contains no assumptions about how peers are\n           discovered.\n\n\n\n   REQ 6:  The solution designers SHOULD seek to minimize the amount of\n           new configuration required in order to work.  For example, it\n           is better to allow peers to advertise or negotiate support\n           for the solution, rather than to require that this knowledge\n           to be configured at each node.\n\n           *Partially Compliant*. Most DOIC parameters are advertised\n           using the DOIC capability announcement mechanism.  However,\n           there are some situations where configuration is required.\n           For example, a DOIC node detect the fact 
 that a peer may not\n           support DOIC when nodes on the other side of the non-\n           supporting node do support DOIC without configuration.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 38]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.6.2.  Performance\n\n   REQ 7:  The solution and any associated default algorithm(s) MUST\n           ensure that the system remains stable.  At some point after\n           an overload condition has ended, the solution MUST enable\n           capacity to stabilize and become equal to what it would be in\n           the absence of an overload condition.  Note that this also\n           requires that the solution MUST allow nodes to shed load\n           without introducing non-converging oscillations during or\n           after an overload condition.\n\n           *Compliant*. The specification offers guidance that\n           implementations should apply hyster
 esis when recovering from\n           overload, and avoid sudden ramp ups in offered load when\n           recovering.\n\n\n\n   REQ 8:  Supporting nodes MUST be able to distinguish current overload\n           information from stale information.\n\n           *Partially Compliant*. DOIC overload reports are "soft\n           state", that is they expire after an indicated period.  DOIC\n           nodes may also send reports that end existing overload\n           conditions.  DOIC requires reporting nodes to ensure that all\n           relevant reacting nodes receive overload reports.\n\n           However, since DOIC does not allow reporting nodes to send\n           OLRs in watchdog messages, if an overload condition results\n           in zero offered load, the reporting node cannot update the\n           condition until the expiration of the original OLR.\n\n\n\n   REQ 9:  The solution MUST function across fully loaded as well as\n           quiescent transport connections.  Thi
 s is partially derived\n           from the requirement for stability in REQ 7.\n\n           *Not Compliant*. DOIC does not allow OLRs to be sent over\n           quiescent transport connections.  This is due to the fact\n           that OLRs cannot be sent outside of the application to which\n           they apply.\n\n\n\n   REQ 10: Consumers of overload information MUST be able to determine\n           when the overload condition improves or ends.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 39]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. (See response to previous two\n           requirements.)\n\n\n\n   REQ 11: The solution MUST be able to operate in networks of different\n           sizes.\n\n           *Compliant*. DOIC makes no assumptions about the size of the\n           network.  DOIC can operate purely between clients and\n           servers, or across agents.\n\n\n\n 
   REQ 12: When a single network node fails, goes into overload, or\n           suffers from reduced processing capacity, the solution MUST\n           make it possible to limit the impact of the affected node on\n           other nodes in the network.  This helps to prevent a small-\n           scale failure from becoming a widespread outage.\n\n           *Partially Compliant*. DOIC allows overload reports for an\n           entire realm, where abated traffic will not be redirected\n           towards another server.  But in situations where nodes choose\n           to divert traffic to other nodes, DOIC offers no way of\n           knowing whether the new recipients can handle the traffic if\n           they have not already indicated overload.  This may be\n           mitigated with the use of a future "load" extension, or with\n           the use of proprietary dynamic load-balancing mechanisms.\n\n\n\n   REQ 13: The solution MUST NOT introduce substantial additional work\n     
       for a node in an overloaded state.  For example, a\n           requirement for an overloaded node to send overload\n           information every time it received a new request would\n           introduce substantial work.\n\n           *Not Compliant*. DOIC does in fact encourage an overloaded\n           node to send an OLR in every response.  The working group\n           that other mechanisms to ensure that every relevant node\n           receives an OLR would create even more work.  [Note: This\n           needs discussion.]\n\n\n\n   REQ 14: Some scenarios that result in overload involve a rapid\n           increase of traffic with little time between normal levels\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 40]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           and levels that induce overload.  The solution SHOULD provide\n           for rapid feedback when traffic levels increase.\n\n           
 *Compliant*. The piggyback mechanism allows OLRs to be sent\n           at the same rate as application traffic.\n\n\n\n   REQ 15: The solution MUST NOT interfere with the congestion control\n           mechanisms of underlying transport protocols.  For example, a\n           solution that opened additional TCP connections when the\n           network is congested would reduce the effectiveness of the\n           underlying congestion control mechanisms.\n\n           *Compliant*. DOIC does not require or recommend changes in\n           the handling of transport protocols or connections.\n\n\n\nC.6.3.  Heterogeneous Support for Solution\n\n   REQ 16: The solution is likely to be deployed incrementally.  The\n           solution MUST support a mixed environment where some, but not\n           all, nodes implement it.\n\n           *Partially Compliant*. DOIC works with most mixed-deployment\n           scenarios.  However, it cannot work across a non-supporting\n           proxy tha
 t modifies Origin-Host AVPs in answer messages.\n           DOIC will have limited impact in networks where the nodes\n           that perform server selections do not support the mechanism.\n\n\n\n   REQ 17: In a mixed environment with nodes that support the solution\n           and nodes that do not, the solution MUST NOT result in\n           materially less useful throughput during overload as would\n           have resulted if the solution were not present.  It SHOULD\n           result in less severe overload in this environment.\n\n           *Compliant*. In most mixed-support deployment, DOIC will\n           offer at least some value, and will not make things worse.\n\n\n\n   REQ 18: In a mixed environment of nodes that support the solution and\n           nodes that do not, the solution MUST NOT preclude elements\n           that support overload control from treating elements that do\n           not support overload control in an equitable fashion relative\n\n\n\nKorhonen
 , et al.          Expires June 18, 2015                [Page 41]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           to those that do.  Users and operators of nodes that do not\n           support the solution MUST NOT unfairly benefit from the\n           solution.  The solution specification SHOULD provide guidance\n           to implementers for dealing with elements not supporting\n           overload control.\n\n           *Compliant*. DOIC provides mechanisms to abate load from non-\n           supporting sources.  Furthermore, it recommends that\n           reporting nodes will still need to be able to apply whatever\n           protections they would ordinarily apply if DOIC were not in\n           use.\n\n\n\n   REQ 19: It MUST be possible to use the solution between nodes in\n           different realms and in different administrative domains.\n\n           *Partially Compliant*. DOIC allows sending OLRs across\n           administr
 ative domains, and potentially to nodes in other\n           realms.  However, an OLR cannot indicate overload for realms\n           other than the one in the Origin-Realm AVP of the containing\n           answer.\n\n\n\n   REQ 20: Any explicit overload indication MUST be clearly\n           distinguishable from other errors reported via Diameter.\n\n           *Compliant*. DOIC sends explicit overload indication in\n           overload reports.  It does not depend on error result codes.\n\n\n\n   REQ 21: In cases where a network node fails, is so overloaded that it\n           cannot process messages, or cannot communicate due to a\n           network failure, it may not be able to provide explicit\n           indications of the nature of the failure or its levels of\n           overload.  The solution MUST result in at least as much\n           useful throughput as would have resulted if the solution were\n           not in place.\n\n           *Compliant*. DOIC overload reports 
 have the primary effect of\n           suppressing message retries in overload conditions.  DOIC\n           recommends that messages never be silently dropped if at all\n           possible.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 42]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.6.4.  Granular Control\n\n   REQ 22: The solution MUST provide a way for a node to throttle the\n           amount of traffic it receives from a peer node.  This\n           throttling SHOULD be graded so that it can be applied\n           gradually as offered load increases.  Overload is not a\n           binary state; there may be degrees of overload.\n\n           *Compliant*. The "loss" algorithm expresses a percentage\n           reduction.\n\n\n\n   REQ 23: The solution MUST provide sufficient information to enable a\n           load-balancing node to divert messages that are rejected or\n           otherwise throttled by
  an overloaded upstream node to other\n           upstream nodes that are the most likely to have sufficient\n           capacity to process them.\n\n           *Not Compliant*. DOIC provides no built in mechanism to\n           determine the best place to divert messages that would\n           otherwise be throttled.  This can be accomplished with a\n           future "load" extension, or with proprietary load balancing\n           mechanisms.\n\n\n\n   REQ 24: The solution MUST provide a mechanism for indicating load\n           levels, even when not in an overload condition, to assist\n           nodes in making decisions to prevent overload conditions from\n           occurring.\n\n           *Not Compliant*. "Load" information has been left for a\n           future extension.\n\n\n\nC.6.5.  Priority and Policy\n\n   REQ 25: The base specification for the solution SHOULD offer general\n           guidance on which message types might be desirable to send or\n           process o
 ver others during times of overload, based on\n           application-specific considerations.  For example, it may be\n           more beneficial to process messages for existing sessions\n           ahead of new sessions.  Some networks may have a requirement\n           to give priority to requests associated with emergency\n           sessions.  Any normative or otherwise detailed definition of\n           the relative priorities of message types during an overload\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 43]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           condition will be the responsibility of the application\n           specification.\n\n           *Compliant*. The specification offers guidance on how\n           requests might be prioritized for different types of\n           applications.\n\n\n\n   REQ 26: The solution MUST NOT prevent a node from prioritizing\n           requests based on any l
 ocal policy, so that certain requests\n           are given preferential treatment, given additional\n           retransmission, not throttled, or processed ahead of others.\n\n           *Compliant*. Nothing in the specification prevents\n           application-specific, implementation-specific, or local\n           policies.\n\n\n\nC.6.6.  Security\n\n   REQ 27: The solution MUST NOT provide new vulnerabilities to\n           malicious attack or increase the severity of any existing\n           vulnerabilities.  This includes vulnerabilities to DoS and\n           DDoS attacks as well as replay and man-in-the-middle attacks.\n           Note that the Diameter base specification [RFC6733] lacks\n           end-to-end security and this must be considered (see the\n           Security Considerations in [RFC7068]).  Note that this\n           requirement was expressed at a high level so as to not\n           preclude any particular solution.  It is expected that the\n           soluti
 on will address this in more detail.\n\n           *Compliant*. The working group is not aware of any such\n           vulnerabilities.  [This may need further analysis.]\n\n\n\n   REQ 28: The solution MUST NOT depend on being deployed in\n           environments where all Diameter nodes are completely trusted.\n           It SHOULD operate as effectively as possible in environments\n           where other nodes are malicious; this includes preventing\n           malicious nodes from obtaining more than a fair share of\n           service.  Note that this does not imply any responsibility on\n           the solution to detect, or take countermeasures against,\n           malicious nodes.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 44]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. Since all Diameter security is\n           currently at the transport layer, nodes must trust immedi
 ate\n           peers to enforce trust policies.  However, there are\n           situations where a DOIC node cannot determine if an immediate\n           peer supports DOIC.  The authors recommend an expert security\n           review.\n\n\n\n   REQ 29: It MUST be possible for a supporting node to make\n           authorization decisions about what information will be sent\n           to peer nodes based on the identity of those nodes.  This\n           allows a domain administrator who considers the load of their\n           nodes to be sensitive information to restrict access to that\n           information.  Of course, in such cases, there is no\n           expectation that the solution itself will help prevent\n           overload from that peer node.\n\n           *Partially Compliant*. (See response to previous\n           requirement.)\n\n\n\n   REQ 30: The solution MUST NOT interfere with any Diameter-compliant\n           method that a node may use to protect itself from o
 verload\n           from non-supporting nodes or from denial-of-service attacks.\n\n           *Compliant*. The specification recommends that any such\n           protection mechanism needed without DOIC should continue to\n           be employed with DOIC.\n\n\n\nC.6.7.  Flexibility and Extensibility\n\n   REQ 31: There are multiple situations where a Diameter node may be\n           overloaded for some purposes but not others.  For example,\n           this can happen to an agent or server that supports multiple\n           applications, or when a server depends on multiple external\n           resources, some of which may become overloaded while others\n           are fully available.  The solution MUST allow Diameter nodes\n           to indicate overload with sufficient granularity to allow\n           clients to take action based on the overloaded resources\n           without unreasonably forcing available capacity to go unused.\n           The solution MUST support specifica
 tion of overload\n           information with granularities of at least "Diameter node",\n           "realm", and "Diameter application" and MUST allow\n           extensibility for others to be added in the future.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 45]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. All DOIC overload reports are scoped\n           to the specific application and realm.  Inside that scope,\n           overload can be reported at the specific server or whole\n           realm scope.  As currently specified, DOIC cannot indicate\n           local overload for an agent.  At the time of this writing,\n           the DIME working group has plans to work on an agent-overload\n           extension.\n\n           DOIC allows new "scopes" through the use of extended report\n           types.\n\n\n\n   REQ 32: The solution MUST provide a method for extending the\n    
        information communicated and the algorithms used for overload\n           control.\n\n           *Compliant*. DOIC allows new report types and abatement\n           algorithms to be created.  These may be indicated using the\n           OC-Supported-Features AVP.\n\n\n\n   REQ 33: The solution MUST provide a default algorithm that is\n           mandatory to implement.\n\n           *Compliant*. The "loss" algorithm is mandatory to implement.\n\n\n\n   REQ 34: The solution SHOULD provide a method for exchanging overload\n           and load information between elements that are connected by\n           intermediaries that do not support the solution.\n\n           *Partially Compliant*. DOIC information can traverse non-\n           supporting agents, as long as those agents do not modify\n           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a\n           way for supporting nodes to detect such modification.\n\n\n\nAppendix D.  Considerations for Applications 
 Integrating the DOIC\n             Solution\n\n   This section outlines considerations to be taken into account when\n   integrating the DOIC solution into Diameter applications.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 46]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nD.1.  Application Classification\n\n   The following is a classification of Diameter applications and\n   request types.  This discussion is meant to document factors that\n   play into decisions made by the Diameter identity responsible for\n   handling overload reports.\n\n   Section 8.1 of [RFC6733] defines two state machines that imply two\n   types of applications, session-less and session-based applications.\n   The primary difference between these types of applications is the\n   lifetime of Session-Ids.\n\n   For session-based applications, the Session-Id is used to tie\n   multiple requests into a single session.\n\n   The Credit-Contr
 ol application defined in [RFC4006] is an example of\n   a Diameter session-based application.\n\n   In session-less applications, the lifetime of the Session-Id is a\n   single Diameter transaction, i.e. the session is implicitly\n   terminated after a single Diameter transaction and a new Session-Id\n   is generated for each Diameter request.\n\n   For the purposes of this discussion, session-less applications are\n   further divided into two types of applications:\n\n   Stateless Applications:\n\n      Requests within a stateless application have no relationship to\n      each other.  The 3GPP defined S13 application is an example of a\n      stateless application [S13], where only a Diameter command is\n      defined between a client and a server and no state is maintained\n      between two consecutive transactions.\n\n   Pseudo-Session Applications:\n\n      Applications that do not rely on the Session-Id AVP for\n      correlation of application messages related to the same s
 ession\n      but use other session-related information in the Diameter requests\n      for this purpose.  The 3GPP defined Cx application [Cx] is an\n      example of a pseudo-session application.\n\n   The handling of overload reports must take the type of application\n   into consideration, as discussed in Appendix D.2.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 47]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nD.2.  Application Type Overload Implications\n\n   This section discusses considerations for mitigating overload\n   reported by a Diameter entity.  This discussion focuses on the type\n   of application.  Appendix D.3 discusses considerations for handling\n   various request types when the target server is known to be in an\n   overloaded state.\n\n   These discussions assume that the strategy for mitigating the\n   reported overload is to reduce the overall workload sent to the\n   overloaded en
 tity.  The concept of applying overload treatment to\n   requests targeted for an overloaded Diameter entity is inherent to\n   this discussion.  The method used to reduce offered load is not\n   specified here but could include routing requests to another Diameter\n   entity known to be able to handle them, or it could mean rejecting\n   certain requests.  For a Diameter agent, rejecting requests will\n   usually mean generating appropriate Diameter error responses.  For a\n   Diameter client, rejecting requests will depend upon the application.\n   For example, it could mean giving an indication to the entity\n   requesting the Diameter service that the network is busy and to try\n   again later.\n\n   Stateless Applications:\n\n      By definition there is no relationship between individual requests\n      in a stateless application.  As a result, when a request is sent\n      or relayed to an overloaded Diameter entity - either a Diameter\n      Server or a Diameter Agent - the 
 sending or relaying entity can\n      choose to apply the overload treatment to any request targeted for\n      the overloaded entity.\n\n   Pseudo-Session Applications:\n\n      For pseudo-session applications, there is an implied ordering of\n      requests.  As a result, decisions about which requests towards an\n      overloaded entity to reject could take the command code of the\n      request into consideration.  This generally means that\n      transactions later in the sequence of transactions should be given\n      more favorable treatment than messages earlier in the sequence.\n      This is because more work has already been done by the Diameter\n      network for those transactions that occur later in the sequence.\n      Rejecting them could result in increasing the load on the network\n      as the transactions earlier in the sequence might also need to be\n      repeated.\n\n   Session-Based Applications:\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015     
            [Page 48]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Overload handling for session-based applications must take into\n      consideration the work load associated with setting up and\n      maintaining a session.  As such, the entity sending requests\n      towards an overloaded Diameter entity for a session-based\n      application might tend to reject new session requests prior to\n      rejecting intra-session requests.  In addition, session ending\n      requests might be given a lower probability of being rejected as\n      rejecting session ending requests could result in session status\n      being out of sync between the Diameter clients and servers.\n      Application designers that would decide to reject mid-session\n      requests will need to consider whether the rejection invalidates\n      the session and any resulting session cleanup procedures.\n\nD.3.  Request Transaction Classification\n\n   Independent Reques
 t:\n\n      An independent request is not correlated to any other requests\n      and, as such, the lifetime of the session-id is constrained to an\n      individual transaction.\n\n   Session-Initiating Request:\n\n      A session-initiating request is the initial message that\n      establishes a Diameter session.  The ACR message defined in\n      [RFC6733] is an example of a session-initiating request.\n\n   Correlated Session-Initiating Request:\n\n      There are cases when multiple session-initiated requests must be\n      correlated and managed by the same Diameter server.  It is notably\n      the case in the 3GPP PCC architecture [PCC], where multiple\n      apparently independent Diameter application sessions are actually\n      correlated and must be handled by the same Diameter server.\n\n   Intra-Session Request:\n\n      An intra-session request is a request that uses the same Session-\n      Id than the one used in a previous request.  An intra-session\n      request
  generally needs to be delivered to the server that handled\n      the session creating request for the session.  The STR message\n      defined in [RFC6733] is an example of an intra-session request.\n\n   Pseudo-Session Requests:\n\n      Pseudo-session requests are independent requests and do not use\n      the same Session-Id but are correlated by other session-related\n      information contained in the request.  There exists Diameter\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 49]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      applications that define an expected ordering of transactions.\n      This sequencing of independent transactions results in a pseudo\n      session.  The AIR, MAR and SAR requests in the 3GPP defined Cx\n      [Cx] application are examples of pseudo-session requests.\n\nD.4.  Request Type Overload Implications\n\n   The request classes identified in Appendix D.3 have implications o
 n\n   decisions about which requests should be throttled first.  The\n   following list of request treatment regarding throttling is provided\n   as guidelines for application designers when implementing the\n   Diameter overload control mechanism described in this document.  The\n   exact behavior regarding throttling is a matter of local policy,\n   unless specifically defined for the application.\n\n   Independent Requests:\n\n      Independent requests can generally be given equal treatment when\n      making throttling decisions, unless otherwise indicated by\n      application requirements or local policy.\n\n   Session-Initiating Requests:\n\n      Session-initiating requests often represent more work than\n      independent or intra-session requests.  Moreover, session-\n      initiating requests are typically followed by other session-\n      related requests.  Since the main objective of the overload\n      control is to reduce the total number of requests sent to the\n   
    overloaded entity, throttling decisions might favor allowing\n      intra-session requests over session-initiating requests.  In the\n      absence of local policies or application specific requirements to\n      the contrary, Individual session-initiating requests can be given\n      equal treatment when making throttling decisions.\n\n   Correlated Session-Initiating Requests:\n\n      A Request that results in a new binding, where the binding is used\n      for routing of subsequent session-initiating requests to the same\n      server, represents more work load than other requests.  As such,\n      these requests might be throttled more frequently than other\n      request types.\n\n   Pseudo-Session Requests:\n\n      Throttling decisions for pseudo-session requests can take into\n      consideration where individual requests fit into the overall\n      sequence of requests within the pseudo session.  Requests that are\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015
                 [Page 50]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      earlier in the sequence might be throttled more aggressively than\n      requests that occur later in the sequence.\n\n   Intra-Session Requests:\n\n      There are two types of intra-sessions requests, requests that\n      terminate a session and the remainder of intra-session requests.\n      Implementers and operators may choose to throttle session-\n      terminating requests less aggressively in order to gracefully\n      terminate sessions, allow cleanup of the related resources (e.g.\n      session state) and avoid the need for additional intra-session\n      requests.  Favoring session-termination requests may reduce the\n      session management impact on the overloaded entity.  The default\n      handling of other intra-session requests might be to treat them\n      equally when making throttling decisions.  There might also be\n      application level consider
 ations whether some request types are\n      favored over others.\n\nAuthors\' Addresses\n\n   Jouni Korhonen (editor)\n   Broadcom\n   Porkkalankatu 24\n   Helsinki  FIN-00180\n   Finland\n\n   Email: jouni.nospam@gmail.com\n\n\n   Steve Donovan (editor)\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: srdonovan@usdonovans.com\n\n\n   Ben Campbell\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: ben@nostrum.com\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 51]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Lionel Morand\n   Orange Labs\n   38/40 rue du General Leclerc\n   Issy-Les-Moulineaux Cedex 9  92794\n   France\n\n   Phone: +33145296257\n   Email: lionel.morand@orange.com\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [
 Page 52]\n', 'filename1': '\n\n\n\nDiameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.\nInternet-Draft                                                  Broadcom\nIntended status: Standards Track                         S. Donovan, Ed.\nExpires: June 6, 2015                                        B. Campbell\n                                                                  Oracle\n                                                               L. Morand\n                                                             Orange Labs\n                                                        December 3, 2014\n\n\n                Diameter Overload Indication Conveyance\n                      draft-ietf-dime-ovli-05.txt\n\nAbstract\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC).\n\nRequirements\n\n   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",\n   "S
 HOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this\n   document are to be interpreted as described in RFC 2119 [RFC2119].\n\nStatus of This Memo\n\n   This Internet-Draft is submitted in full conformance with the\n   provisions of BCP 78 and BCP 79.\n\n   Internet-Drafts are working documents of the Internet Engineering\n   Task Force (IETF).  Note that other groups may also distribute\n   working documents as Internet-Drafts.  The list of current Internet-\n   Drafts is at http://datatracker.ietf.org/drafts/current/.\n\n   Internet-Drafts are draft documents valid for a maximum of six months\n   and may be updated, replaced, or obsoleted by other documents at any\n   time.  It is inappropriate to use Internet-Drafts as reference\n   material or to cite them other than as "work in progress."\n\n   This Internet-Draft will expire on June 6, 2015.\n\nCopyright Notice\n\n   Copyright (c) 2014 IETF Trust and the persons identified as the\n   document authors.  All rights
  reserved.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 1]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   This document is subject to BCP 78 and the IETF Trust\'s Legal\n   Provisions Relating to IETF Documents\n   (http://trustee.ietf.org/license-info) in effect on the date of\n   publication of this document.  Please review these documents\n   carefully, as they describe your rights and restrictions with respect\n   to this document.  Code Components extracted from this document must\n   include Simplified BSD License text as described in Section 4.e of\n   the Trust Legal Provisions and are provided without warranty as\n   described in the Simplified BSD License.\n\nTable of Contents\n\n   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3\n   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4\n   3.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5\n  
    3.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7\n     3.2.  DOIC Capability Announcement  . . . . . . . . . . . . . .   8\n     3.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9\n     3.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11\n     3.5.  Simplified Example Architecture . . . . . . . . . . . . .  12\n   4.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  12\n     4.1.  Capability Announcement . . . . . . . . . . . . . . . . .  12\n       4.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  13\n       4.1.2.  Reporting Node Behavior . . . . . . . . . . . . . . .  13\n       4.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14\n     4.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15\n       4.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15\n       4.2.2.  Reacting Node Behavior  . . . . . . . . . . . . . . .  19\n       4.2.3.  Reporting Node Behavio
 r . . . . . . . . . . . . . . .  20\n     4.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . .  21\n   5.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22\n     5.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  22\n     5.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23\n     5.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  24\n   6.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  25\n     6.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  25\n     6.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25\n     6.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  26\n     6.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26\n     6.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  27\n     6.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  27\n     6.7.  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  27
 \n     6.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  27\n   7.  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  28\n   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  29\n     8.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  29\n     8.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  29\n   9.  Security Considerations . . . . . . . . . . . . . . . . . . .  30\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 2]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n     9.1.  Potential Threat Modes  . . . . . . . . . . . . . . . . .  30\n     9.2.  Denial of Service Attacks . . . . . . . . . . . . . . . .  31\n     9.3.  Non-Compliant Nodes . . . . . . . . . . . . . . . . . . .  32\n     9.4.  End-to End-Security Issues  . . . . . . . . . . . . . . .  32\n   10. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  33\n   11. References  .
  . . . . . . . . . . . . . . . . . . . . . . . .  34\n     11.1.  Normative References . . . . . . . . . . . . . . . . . .  34\n     11.2.  Informative References . . . . . . . . . . . . . . . . .  34\n   Appendix A.  Issues left for future specifications  . . . . . . .  34\n     A.1.  Additional traffic abatement algorithms . . . . . . . . .  35\n     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  35\n     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  35\n   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  35\n   Appendix C.  Requirements Conformance Analysis  . . . . . . . . .  35\n     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  36\n     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  36\n     C.3.  Implicit Application Indication . . . . . . . . . . . . .  36\n     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  37\n     C.5.  No New Vulnerabilities  . . . . . . . . . . 
 . . . . . . .  37\n     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  37\n       C.6.1.  General . . . . . . . . . . . . . . . . . . . . . . .  37\n       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  39\n       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  41\n       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  43\n       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  43\n       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  44\n       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  45\n   Appendix D.  Considerations for Applications Integrating the DOIC\n                Solution . . . . . . . . . . . . . . . . . . . . . .  46\n     D.1.  Application Classification  . . . . . . . . . . . . . . .  47\n     D.2.  Application Type Overload Implications  . . . . . . . . .  48\n     D.3.  Request Transaction Classification  . . . . . . . . . . .  49\n     D.4.  Request T
 ype Overload Implications  . . . . . . . . . . .  50\n   Authors\' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  51\n\n1.  Introduction\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC), based on the requirements identified in [RFC7068].\n\n   This specification addresses Diameter overload control between\n   Diameter nodes that support the DOIC solution.  The solution, which\n   is designed to apply to existing and future Diameter applications,\n   requires no changes to the Diameter base protocol [RFC6733] and is\n   deployable in environments where some Diameter nodes do not implement\n   the Diameter overload control solution defined in this specification.\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 3]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Note that the overload control solution defined i
 n this specification\n   does not address all the requirements listed in [RFC7068].  A number\n   of overload control related features are left for future\n   specifications.  See Appendix A for a list of extensions that are\n   currently being considered.  See Appendix C for an analysis of\n   conformance to the requirements specified in [RFC7068].\n\n2.  Terminology and Abbreviations\n\n   Abatement\n\n      Reaction to receipt of an overload report resulting in a reduction\n      in traffic sent to the reporting node.  Abatement actions include\n      diversion and throttling.\n\n   Abatement Algorithm\n\n      A mechanism requested by reporting nodes and used by reacting\n      nodes to reduce the amount of traffic sent during an occurrence of\n      overload control.\n\n   Diversion\n\n      A mechanism used for overload abatement by selecting a different\n      path for requests.\n\n   Host-Routed Requests\n\n      Requests that a reacting node knows will be served by a partic
 ular\n      host, either due to the presence of a Destination-Host AVP, or by\n      some other local knowledge on the part of the reacting node.\n\n   Overload Control State (OCS)\n\n      Reporting and reacting node internally maintained state describing\n      occurrences of overload control.\n\n   Overload Report (OLR)\n\n      Overload control information for a particular overload occurrence\n      sent by a reporting node.\n\n   Reacting Node\n\n      A Diameter node that acts upon an overload report.\n\n   Realm-Routed Requests\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 4]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Requests that a reacting node does not know the host that will\n      service the request.\n\n   Reporting Node\n\n      A Diameter node that generates an overload report.  (This may or\n      may not be the overloaded node.)\n\n   Throttling\n\n      A mechanism for overload abatement
  that limits the number of\n      requests sent by the DIOC reacting node.  Throttling can include a\n      Diameter Client not sending requests, or a Diameter Agent or\n      Server rejecting requests with appropriate error responses.  In\n      both cases the result of the throttling is a permanent rejection\n      of the transaction.\n\n\n\n3.  Solution Overview\n\n   The Diameter Overload Information Conveyance (DOIC) solution allows\n   Diameter nodes to request other Diameter nodes to perform overload\n   abatement actions, that is, actions to reduce the load offered to the\n   overloaded node or realm.\n\n   A Diameter node that supports DOIC is known as a "DOIC node".  Any\n   Diameter node can act as a DOIC node, including Diameter Clients,\n   Diameter Servers, and Diameter Agents.  DOIC nodes are further\n   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting\n   node requests overload abatement by sending Overload Reports (OLR).\n\n   A reacting node acts u
 pon OLRs, and performs whatever actions are\n   needed to fulfill the abatement requests included in the OLRs.  A\n   Reporting node may report overload on its own behalf, or on behalf of\n   other nodes.  Likewise, a reacting node may perform overload\n   abatement on its own behalf, or on behalf of other nodes.\n\n   A Diameter node\'s role as a DOIC node is independent of its Diameter\n   role.  For example, Diameter Agents may act as DOIC nodes, even\n   though they are not endpoints in the Diameter sense.  Since Diameter\n   enables bi-directional applications, where Diameter Servers can send\n   requests towards Diameter Clients, a given Diameter node can\n   simultaneously act as both a reporting node and a reacting node.\n\n   Likewise, a Diameter Agent may act as a reacting node from the\n   perspective of upstream nodes, and a reporting node from the\n   perspective of downstream nodes.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 5]\n_\nInt
 ernet-Draft                    DOIC                     December 2014\n\n\n   DOIC nodes do not generate new messages to carry DOIC related\n   information.  Rather, they "piggyback" DOIC information over existing\n   Diameter messages by inserting new AVPs into existing Diameter\n   requests and responses.  Nodes indicate support for DOIC, and any\n   needed DOIC parameters, by inserting an OC-Supported-Features AVP\n   (Section 6.2) into existing requests and responses.  Reporting nodes\n   send OLRs by inserting OC-OLR AVPs (Section 6.3).\n\n   A given OLR applies to the Diameter realm and application of the\n   Diameter message that carries it.  If a reporting node supports more\n   than one realm and/or application, it reports independently for each\n   combination of realm and application.  Similarly, the OC-Supported-\n   Features AVP applies to the realm and application of the enclosing\n   message.  This implies that a node may support DOIC for one\n   application and/or re
 alm, but not another, and may indicate different\n   DOIC parameters for each application and realm for which it supports\n   DOIC.\n\n   Reacting nodes perform overload abatement according to an agreed-upon\n   abatement algorithm.  An abatement algorithm defines the meaning of\n   some of the parameters of an OLR and the procedures required for\n   overload abatement.  An overload abatement algorithm separates\n   Diameter requests into two sets.  The first set contains the requests\n   that are to undergo overload abatement treatment of either throttling\n   or diversion.  The second set contains the requests that are to be\n   given normal routing treatment.  This document specifies a single\n   must-support algorithm, namely the "loss" algorithm (Section 5).\n   Future specifications may introduce new algorithms.\n\n   Overload conditions may vary in scope.  For example, a single\n   Diameter node may be overloaded, in which case reacting nodes may\n   attempt to send requests 
 to other destinations.  On the other hand,\n   an entire Diameter realm may be overloaded, in which case such\n   attempts would do harm.  DOIC OLRs have a concept of "report type"\n   (Section 6.6), where the type defines such behaviors.  Report types\n   are extensible.  This document defines report types for overload of a\n   specific host, and for overload of an entire realm.\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific host, identified by the Origin-Host AVP of the message\n   containing the OLR, for the application-id indicated in the\n   transaction.  When receiving an OLR of type "HOST_REPORT", a reacting\n   node applies overload abatement treatment to the host-routed requests\n   identified by the overload abatement algorithm (see definition in\n   Section 2) sent for this application to the overloaded host.\n\n   A report of type "REALM_REPORT" is sent to indicate the overload of a\n   realm for the application-id indicated in th
 e transaction.  The\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 6]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   overloaded realm is identified by the Destination-Realm AVP of the\n   message containing the OLR.  When receiving an OLR of type\n   "REALM_REPORT", a reacting node applies overload abatement treatment\n   to realm-routed requests identified by the overload abatement\n   algorithm (see definition in Section 2) sent for this application to\n   the overloaded realm.\n\n   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes\n   that are "adjacent" for DOIC purposes may not be adjacent from a\n   Diameter, or transport, perspective.  For example, one or more\n   Diameter agents that do not support DOIC may exist between a given\n   pair of reporting and reacting nodes, as long as those agents pass\n   unknown AVPs through unchanged.  The report types described in this\n   document can s
 afely pass through non-supporting agents.  This may not\n   be true for report types defined in future specifications.\n\n3.1.  Piggybacking\n\n   There is no new Diameter application defined to carry overload\n   related AVPs.  The overload control AVPs defined in this\n   specification have been designed to be piggybacked on top of existing\n   application messages.  This is made possible by adding overload\n   control AVPs, the OC-OLR AVP and the OC-Supported-Features AVP, as\n   optional AVPs into existing commands when the corresponding Command\n   Code Format (CCF) specification allows adding new optional AVPs (see\n   Section 1.3.4 of [RFC6733]).\n\n   Reacting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all request messages originated or relayed\n   by the reacting node.\n\n   Reporting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all answer messages originated or relayed\n   by the reporting node t
 hat are in response to a request that\n   contained the OC-Supported-Features AVP.  Reporting nodes also\n   include overload reports using the OC-OLR AVP in answer messages.\n\n   Note that the overload control solution does not have fixed server\n   and client roles.  The DOIC node role is determined based on the\n   message type: whether the message is a request (i.e. sent by a\n   "reacting node") or an answer (i.e. send by a "reporting node").\n   Therefore, in a typical "client-server" deployment, the Diameter\n   Client MAY report its overload condition to the Diameter Server for\n   any Diameter Server initiated message exchange.  An example of such\n   is the Diameter Server requesting a re-authentication from a Diameter\n   Client.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 7]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n3.2.  DOIC Capability Announcement\n\n   The DOIC solution supports the ability
  for Diameter nodes to\n   determine if other nodes in the path of a request support the\n   solution.  This capability is referred to as DOIC Capability\n   Announcement (DCA) and is separate from Diameter Capability Exchange.\n\n   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the\n   Diameter overload features supported.\n\n   The first node in the path of a Diameter request that supports the\n   DOIC solution inserts the OC-Supported-Features AVP in the request\n   message.\n\n      Note: As discussed elsewhere in the document, agents in the path\n      of the request can modify the OC-Supported-Features AVP.\n\n      Note: The DOIC solution must support deployments where Diameter\n      Clients and/or Diameter Servers do not support the DOIC solution.\n      In this scenario, Diameter Agents that support the DOIC solution\n      may handle overload abatement for the non supporting Diameter\n      nodes.  In this case the DOIC agent will insert the OC-Support
 ed-\n      Features AVP in requests that do not already contain one, telling\n      the reporting node that there is a DOIC node that will handle\n      overload abatement.  For transactions where there was an OC-\n      Supporting-Features AVP in the request, the agent will insert the\n      OC-Supported-Features AVP in answers, telling the reacting node\n      that there is a reporting node.\n\n   The OC-Feature-Vector AVP will contain an indication of support for\n   the loss overload abatement algorithm defined in this specification\n   (see Section 5).  This ensures that there is at least one commonly\n   supported overload abatement algorithm between the reporting node and\n   the reacting node(s) in the path of the request.\n\n   The reporting node inserts the OC-Supported-Features AVP in all\n   answer messages to requests that contained the OC-Supported-Features\n   AVP.  The contents of the reporting node\'s OC-Supported-Features AVP\n   indicate the set of Diameter overlo
 ad features supported by the\n   reporting node.  This specification defines one exception - the\n   reporting node only includes an indication of support for one\n   overload abatement algorithm, independent of the number of overload\n   abatement algorithms actually supported by the reacting node.  The\n   overload abatement algorithm indicated is the algorithm that the\n   reporting node intends to use should it enter an overload condition.\n   Reacting nodes can use the indicated overload abatement algorithm to\n   prepare for possible overload reports and must use the indicated\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 8]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   overload abatement algorithm if traffic reduction is actually\n   requested.\n\n      Note that the loss algorithm defined in this document is a\n      stateless abatement algorithm.  As a result it does not require\n      any actions by re
 acting nodes prior to the receipt of an overload\n      report.  Stateful abatement algorithms that base the abatement\n      logic on a history of request messages sent might require reacting\n      nodes to maintain state in advance of receiving an overload report\n      to ensure that the overload reports can be properly handled.\n\n   Reporting nodes are allowed to change the overload abatement\n   algorithm indicated in the OC-Feature-Vector AVP if the reporting\n   node is not currently in an overload condition and sending overload\n   reports.  The reporting node is not allowed to change the overload\n   abatement algorithm while the reporting node is in an overload\n   condition.\n\n   The individual features supported by the DOIC nodes are indicated in\n   the OC-Feature-Vector AVP.  Any semantics associated with the\n   features will be defined in extension specifications that introduce\n   the features.\n\n   The DCA mechanism must also allow the scenario where the set of
 \n   features supported by the sender of a request and by agents in the\n   path of a request differ.  In this case, the agent updates the OC-\n   Supported-Features AVP to reflect the mixture of the two sets of\n   supported features.\n\n      Note: The logic to determine the content of the modified OC-\n      Supported-Features AVP is out-of-scope for this specification and\n      is left to implementation decisions.  Care must be taken not to\n      introduce interoperability issues for downstream or upstream DOIC\n      nodes.\n\n3.3.  DOIC Overload Condition Reporting\n\n   As with DOIC capability announcement, overload condition reporting\n   uses new AVPs (Section 6.3) to indicate an overload condition.\n\n   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP\n   includes the type of report, a sequence number, the length of time\n   that the report is valid and abatement algorithm specific AVPs.\n\n   Two types of overload reports are defined in this documen
 t, host\n   reports and realm reports.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                  [Page 9]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific Diameter node for the application-id indicated in the\n   transaction.  When receiving an OLR of type host, a reacting node\n   applies overload abatement to what is referred to in this document as\n   host-routed requests.  The reacting node applies overload abatement\n   on those host-routed requests which the reacting node knows will be\n   served by the server that matches the Origin-Host AVP of the received\n   message that contained the received OLR of type host.\n\n   A report of type "REALM_REPORT" applies to realm-routed requests for\n   a specific realm as indicated in the Destination-Realm AVP.\n\n   This document assumes that there is a single source for realm-reports\n   for a given re
 alm, or that if multiple nodes can send realm reports,\n   that each such node has full knowledge of the overload state of the\n   entire realm.  A reacting node cannot distinguish between receiving\n   realm-reports from a single node, or from multiple nodes.\n\n      Note: Known issues exist if multiple sources for overload reports\n      which apply to the same Diameter entity exist.  Reacting nodes\n      have no way of determining the source and, as such, will treat\n      them as coming from a single source.  Variance in sequence numbers\n      between the two sources can then cause incorrect overload\n      abatement treatment to be applied for indeterminate periods of\n      time.\n\n   Reporting nodes are responsible for determining the need for a\n   reduction of traffic.  The method for making this determination is\n   implementation specific and depend on the type of overload report\n   being generated.  A host-report, for instance, will generally be\n   generated by tra
 cking utilization of resources required by the host\n   to handle transactions for the Diameter application.  A realm-report\n   generally impacts the traffic sent to multiple hosts and, as such,\n   requires tracking the capacity all servers for realm-routed requests\n   for the application and realm.\n\n   Once a reporting node determines the need for a reduction in traffic,\n   it uses the DOIC defined AVPs to report on the condition.  These AVPs\n   are included in answer messages sent or relayed by the reporting\n   node.  The reporting node indicates the overload abatement algorithm\n   that is to be used to handle the traffic reduction in the OC-\n   Supported-Features AVP.  The OC-OLR AVP is used to communicate\n   information about the requested reduction.\n\n   Reacting nodes, upon receipt of an overload report, are responsible\n   for applying the overload abatement algorithm to traffic impacted by\n   the overload report.  The method used to determine the requests that\n
    are to receive overload abatement treatment is dependent on the\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 10]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   abatement algorithm.  The loss abatement algorithm is defined in this\n   document (Section 5).  Other abatement algorithms can be defined in\n   extensions to the DOIC solutions.\n\n   Two types of overload abatement treatment are defined, diversion and\n   throttling.  Reacting nodes are responsible for determining which\n   treatment is appropriate for individual requests.\n\n   As the conditions that lead to the generation of the overload report\n   change the reporting node can send new overload reports requesting\n   greater reduction if the condition gets worse or less reduction if\n   the condition improves.  The reporting node sends an overload report\n   with a duration of zero to indicate that the overload condition has\n   ended and need for u
 se of the abatement algorithm to reduce traffic\n   sent is no longer needed.\n\n   The reacting node also determines when the overload report expires\n   based on the OC-Validity-Duration AVP in the overload report and\n   stops applying the abatement algorithm when the report expires.\n\n3.4.  DOIC Extensibility\n\n   The DOIC solution is designed to be extensible.  This extensibility\n   is based on existing Diameter based extensibility mechanisms, along\n   with the DOIC capability announcement mechanism.\n\n   There are multiple categories of extensions that are expected.  This\n   includes the definition of new overload abatement algorithms, the\n   definition of new report types and the definition of new scopes of\n   messages impacted by an overload report.\n\n   The DOIC solution uses the OC-Supported-Features AVP for DOIC nodes\n   to communicate supported features.  The specific features supported\n   by the DOIC node are indicated in the OC-Feature-Vector AVP.  DOIC\n   
 extensions that require new normative behavior define new values for\n   the OC-Feature-Vector AVP.  DOIC extensions also have the ability to\n   add new AVPs to the OC-Supported-Features AVP, if additional\n   information about the new feature is required.\n\n   Reporting nodes use the OC-OLR AVP to communicate overload\n   occurrences.  This AVP can also be extended to add new AVPs allowing\n   reporting nodes to communicate additional information about handling\n   an overload condition.\n\n   If necessary, new extensions can also define new AVPs that are not\n   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,\n   however, recommended that DOIC extensions use the OC-Supported-\n   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 11]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n3.5.  Simplified Example Architecture\n\n   Figure 1 illustrates 
 the simplified architecture for Diameter\n   overload information conveyance.\n\n\n    Realm X                                  Same or other Realms\n   _--------------------------------------_ _----------------------_\n\n\n      +--^-----+                 : (optional) :\n      _Diameter_                 :            :\n      _Server A_--+     .--.     : +---^----+ :     .--.\n      +--------+  _   _(    _.   : _Diameter_ :   _(    _.   +---^----+\n                  +--(        )--:-_  Agent _-:--(        )--_Diameter_\n      +--------+  _ ( _  .  )  ) : +-----^--+ : ( _  .  )  ) _ Client _\n      _Diameter_--+  _--(___.-\'  :            :  _--(___.-\'  +-----^--+\n      _Server B_                 :            :\n      +---^----+                 :            :\n\n                          End-to-end Overload Indication\n             1)  _-----------------------------------------------_\n                             Diameter Application Y\n\n                  Overload Indication A   
  Overload Indication A\'\n             2)  _----------------------_ _----------------------_\n                 Diameter Application Y   Diameter Application Y\n\n\n\n     Figure 1: Simplified architecture choices for overload indication\n                                 delivery\n\n   In Figure 1, the Diameter overload indication can be conveyed (1)\n   end-to-end between servers and clients or (2) between servers and\n   Diameter agent inside the realm and then between the Diameter agent\n   and the clients.\n\n4.  Solution Procedures\n\n   This section outlines the normative behavior for the DOIC solution.\n\n4.1.  Capability Announcement\n\n   This section defines DOIC Capability Announcement (DCA) behavior.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 12]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.1.1.  Reacting Node Behavior\n\n   A reacting node MUST include the OC-Supported-Features AVP in all\n   r
 equests.  It MAY include the OC-Feature-Vector AVP.  If it does so,\n   it MUST indicate support for the "loss" algorithm.  If the reacting\n   node is configured to support features (including other algorithms)\n   in addition to the loss algorithm, it MUST indicate such support in\n   an OC-Feature-Vector AVP.\n\n   An OC-Supported-Features AVP in answer messages indicates there is a\n   reporting node for the transaction.  The reacting node MAY take\n   action, for example creating state for some stateful abatement\n   algorithm, based on the features indicated in the OC-Feature-Vector\n   AVP.\n\n      Note: The loss abatement algorithm does not require stateful\n      behavior when there is no active overload report.  This behavior\n      is described in Section 4.2 and Section 5.\n\n4.1.2.  Reporting Node Behavior\n\n   Upon receipt of a request message, a reporting node determines if\n   there is a reacting node for the transaction based on the presence of\n   the OC-Supporte
 d-Features AVP in the request message.\n\n   If the request message contains an OC-Supported-Features AVP then a\n   reporting node MUST include the OC-Supported-Features AVP in the\n   answer message for that transaction.\n\n   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-\n   OLR AVP or any other overload control AVPs defined in extension\n   drafts in response messages for transactions where the request\n   message does not include the OC-Supported-Features AVP.  Lack of the\n   OC-Supported-Features AVP in the request message indicates that there\n   is no reacting node for the transaction.\n\n   A reporting node knows what overload control functionality is\n   supported by the reacting node based on the content of the OC-\n   Feature-Vector AVP in the request message.\n\n   A reporting node MUST indicate support for one and only one abatement\n   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm\n   selected MUST indicate the abatement algo
 rithm the reporting node\n   wants the reacting node to use when the reporting node enters an\n   overload condition.\n\n   The abatement algorithm selected MUST be from the set of abatement\n   algorithms contained in the request message\'s OC-Feature-Vector AVP.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 13]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node that selects the loss algorithm may do so by\n   including the OC-Feature-Vector AVP with an explicit indication of\n   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects\n   a different algorithm, it MUST include the OC-Feature-Vector AVP with\n   an explicit indication of the selected algorithm.\n\n   For an ongoing overload condition, a reporting node MUST NOT change\n   the selected algorithm during the period of time that it is in an\n   overload condition and, as a result, is sending OC-OLR AVPs in answer\n   messages.\n
 \n   The reporting node MAY change the overload abatement algorithm\n   indicated in the OC-Supported-Features AVP at any time as long as no\n   previously sent OLRs may be active.\n\n   The reporting node SHOULD indicate support for other DOIC features\n   defined in extension drafts that it supports and that apply to the\n   transaction.\n\n      Note: Not all DOIC features will apply to all Diameter\n      applications or deployment scenarios.  The features included in\n      the OC-Feature-Vector AVP are based on local reporting node\n      policy.\n\n4.1.3.  Agent Behavior\n\n   Diameter Agents that support DOIC SHOULD ensure that all messages\n   relayed by the agent contain the OC-Supported-Features AVP.\n\n   A Diameter Agent SHOULD take on reacting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reacting node\n   behavior when there is no OC-Supported-Features AVP in
  a request\n   message.\n\n   For a Diameter Agent to be a reacting node for a non supporting\n   Diameter endpoint, the Diameter Agent MUST include the OC-Supported-\n   Features AVP in request messages it receives that do not contain the\n   OC-Supported-Features AVP.\n\n   A Diameter Agent SHOULD take on reporting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reporting node\n   behavior when there is no OC-Supported-Features AVP in an answer\n   message for a transaction that contained the OC-Supported-Features\n   AVP in the request message.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 14]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   For a Diameter Agent to take on reporting node behavior for a non\n   supporting Diameter endpoint the Diameter Agent MUST include the OC-\n   Supported-Features AVP
  in answer messages it receives that do not\n   contain the OC-Supported-Features AVP.\n\n   As with a Diameter endpoint taking on reporting node behavior, a\n   Diameter Agent MUST only include the OC-Supported-Features AVP in\n   answer messages for transactions where the request message received\n   by the Diameter Agent had an OC-Supported-Features AVP.\n\n   If a request message already has the OC-Supported-Features AVP then a\n   Diameter Agent MAY leave it unchanged in the relayed message or MAY\n   modify it to reflect the features appropriate for the transaction.\n\n      For instance, if the agent supports a superset of the features\n      reported by the reacting node then the agent might choose, based\n      on local policy, to advertise that superset of features to the\n      reporting node.\n\n   If the Diameter Agent changes the OC-Supported-Features AVP in a\n   request message then it is likely it will also need to modify the OC-\n   Supported-Features AVP in the an
 swer message for the transaction.  As\n   such, a Diameter Agent MAY modify the OC-Supported-Features AVP\n   carried in answer messages.\n\n   When making changes to the OC-Supported-Features AVP the Diameter\n   Agent needs to ensure that there is no ambiguity in DOIC behavior for\n   both upstream and downstream DOIC nodes.\n\n4.2.  Overload Report Processing\n\n4.2.1.  Overload Control State\n\n   Both reacting and reporting nodes maintain Overload Control State\n   (OCS) for active overload conditions.  The following sections define\n   behavior associated with that OCS.\n\n4.2.1.1.  Overload Control State for Reacting Nodes\n\n   A reacting node SHOULD maintain the following OCS per supported\n   Diameter application:\n\n   o  A host-type OCS entry for each Destination-Host to which it sends\n      host-type requests and\n\n   o  A realm-type OCS entry for each Destination-Realm to which it\n      sends realm-type requests.\n\n\n\n\nKorhonen, et al.          Expires June 6, 20
 15                 [Page 15]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A host-type OCS entry is identified by the pair of application-id and\n   the node\'s DiameterIdentity.\n\n   A realm-type OCS entry is identified by the pair of application-d and\n   realm.\n\n   The host-type and realm-type OCS entries MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number (as received in OC-OLR)\n\n   o  Time of expiry (derived from OC-Validity-Duration AVP received in\n      the OC-OLR AVP and time of reception of the message carrying OC-\n      OLR AVP)\n\n   o  Selected Abatement Algorithm (as received in the OC-Supported-\n      Features AVP)\n\n   o  Abatement Algorithm specific input data (as received in the OC-OLR\n      AVP, for example, OC-Reduction-Percentage for the Loss abatement\n      algorithm)\n\n4.2.1.2.  Overload Control State for Reporting Nodes\n\n   A r
 eporting node SHOULD maintain OCS entries per supported Diameter\n   application, per supported (and eventually selected) Abatement\n   Algorithm and per report-type.\n\n   An OCS entry is identified by the tuple of Application-Id, Report-\n   Type and Abatement Algorithm and MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number\n\n   o  Validity Duration\n\n   o  Expiration Time\n\n   o  Algorithm specific input data (for example, the Reduction\n      Percentage for the Loss Abatement Algorithm)\n\n4.2.1.3.  Reacting Node Maintenance of Overload Control State\n\n   When a reacting node receives an OC-OLR AVP, it MUST determine if it\n   is for an existing or new overload condition.\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 16]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Note: For the remainder of this section the term OLR re
 fers to the\n      combination of the contents of the received OC-OLR AVP and the\n      abatement algorithm indicated in the received OC-Supported-\n      Features AVP.\n\n   When receiving an answer message with multiple OLRs or different\n   types, a reporting node MUST process each received OLR.\n\n   When receiving an OC-OLR AVPs with unknown values, a reacting node\n   SHOULD be silently discarded by reacting nodes and the event SHOULD\n   be logged.\n\n   The OLR is for an existing overload condition if a reacting node has\n   an OCS that matches the received OLR.\n\n   For a host-report this means it matches the application-id and the\n   host\'s DiameterIdentity in an existing host OCS entry.\n\n   For a realm-report this means it matches the application-id and the\n   realm in an existing realm OCS entry.\n\n   If the OLR is for an existing overload condition then a reacting node\n   MUST determine if the OLR is a retransmission or an update to the\n   existing OLR.\n\n   
 If the sequence number for the received OLR is greater than the\n   sequence number stored in the matching OCS entry then a reacting node\n   MUST update the matching OCS entry.\n\n   If the sequence number for the received OLR is less than or equal to\n   the sequence number in the matching OCS entry then a reacting node\n   MUST silently ignore the received OLR.  The matching OCS MUST NOT be\n   updated in this case.\n\n   If the received OLR is for a new overload condition then a reacting\n   node MUST generate a new OCS entry for the overload condition.\n\n   For a host-report this means a reacting node creates on OCS entry\n   with the application-id in the received message and DiameterIdentity\n   of the Origin-Host in the received message.\n\n      Note: This solution assumes that the Origin-Host AVP in the answer\n      message included by the reporting node is not changed along the\n      path to the reacting node.\n\n   For a realm-report this means a reacting node creates
  on OCS entry\n   with the application-id in the received message and realm of the\n   Origin-Realm in the received message.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 17]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   If the received OLR contains a validity duration of zero ("0") then a\n   reacting node MUST update the OCS entry as being expired.\n\n      Note: It is not necessarily appropriate to delete the OCS entry,\n      as there is recommended behavior that the reacting node slowly\n      returns to full traffic when ending an overload abatement period.\n\n   The reacting node does not delete an OCS when receiving an answer\n   message that does not contain an OC-OLR AVP (i.e. absence of OLR\n   means "no change").\n\n4.2.1.4.  Reporting Node Maintenance of Overload Control State\n\n   A reporting node SHOULD create a new OCS entry when entering an\n   overload condition.\n\n      Note: If a reporting nod
 e knows through absence of the OC-\n      Supported-Features AVP in received messages that there are no\n      reacting nodes supporting DOIC then the reporting node can choose\n      to not create OCS entries.\n\n   When generating a new OCS entry the sequence number SHOULD be set to\n   zero ("0").\n\n   When generating sequence numbers for new overload conditions, the new\n   sequence number MUST be greater than any sequence number in an active\n   (unexpired) overload report for the same application and report-type\n   previously sent by the reporting node.  This property MUST hold over\n   a reboot of the reporting node.\n\n      Note: One way of addressing this over a reboot of a reporting node\n      is to use a time stamp for the first overload condition that\n      occurs after the report and to start using sequence numbers of\n      zero for subsequent overload conditions.\n\n   A reporting node MUST update an OCS entry when it needs to adjust the\n   validity duration of 
 the overload condition at reacting nodes.\n\n      For instance, if a reporting node wishes to instruct reacting\n      nodes to continue overload abatement for a longer period of time\n      than originally communicated.  This also applies if the reporting\n      node wishes to shorten the period of time that overload abatement\n      is to continue.\n\n   A reporting node MUST NOT update the abatement algorithm in an active\n   OCS entry.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 18]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node MUST update an OCS entry when it wishes to adjust\n   any abatement algorithm specific parameters, including the reduction\n   percentage used for the Loss abatement algorithm.\n\n      For instance, if a reporting node wishes to change the reduction\n      percentage either higher, if the overload condition has worsened,\n      or lower, if the overload condition
  has improved, then the\n      reporting node would update the appropriate OCS entry.\n\n   A reporting node MUST update the sequence number associated with the\n   OCS entry anytime the contents of the OCS entry are changed.  This\n   will result in a new sequence number being sent to reacting nodes,\n   instructing reacting nodes to process the OC-OLR AVP.\n\n   A reporting node SHOULD update an OCS entry with a validity duration\n   of zero ("0") when the overload condition ends.\n\n      Note: If a reporting node knows that the OCS entries in the\n      reacting nodes are near expiration then the reporting node might\n      decide not to send an OLR with a validity duration of zero.\n\n   A reporting node MUST keep an OCS entry with a validity duration of\n   zero ("0") for a period of time long enough to ensure that any non-\n   expired reacting node\'s OCS entry created as a result of the overload\n   condition in the reporting node is deleted.\n\n4.2.2.  Reacting Node Behavio
 r\n\n   When a reacting node sends a request it MUST determine if that\n   request matches an active OCS.\n\n   If the request matches an active OCS then the reacting node MUST use\n   the overload abatement algorithm indicated in the OCS to determine if\n   the request is to receive overload abatement treatment.\n\n   For the Loss abatement algorithm defined in this specification, see\n   Section 5 for the overload abatement algorithm logic applied.\n\n   If the overload abatement algorithm selects the request for overload\n   abatement treatment then the reacting node MUST apply overload\n   abatement treatment on the request.  The abatement treatment applied\n   depends on the context of the request.\n\n   If the request is a host-routed request then the reacting node SHOULD\n   apply throttling abatement treatment to the request.\n\n   If the request is a realm-routed request then the reacting node\n   SHOULD apply diversion abatement treatment to the request.\n\n\n\nKorhonen, e
 t al.          Expires June 6, 2015                 [Page 19]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   If the overload abatement treatment results in throttling of the\n   request and if the reacting node is an agent then the agent MUST send\n   an appropriate error as defined in Section 7.\n\n   The behavior of reacting nodes that are Diameter endpoints when\n   throttling requests depends on the application and is outside the\n   scope of this specification.\n\n   In the case that the OCS entry indicated no traffic was to be sent to\n   the overloaded entity and the validity duration expires or has a\n   validity duration of zero ("0"), meaning that the reporting node has\n   explicitly signaled the end of the overload condition then overload\n   abatement associated with the overload abatement MUST be ended in a\n   controlled fashion.\n\n4.2.3.  Reporting Node Behavior\n\n   If there is an active OCS entry then a reporting node SHOULD 
 include\n   the OC-OLR AVP in all answer messages to requests that contain the\n   OC-Supported-Features AVP and that match the active OCS entry.\n\n      Note: A request matches if the application-id in the request\n      matches the application-id in any active OCS entry and if the\n      report-type in the OCS entry matches a report-type supported by\n      the reporting node as indicated in the OC-Supported-Features AVP.\n\n   The contents of the OC-OLR AVP depend on the selected algorithm.\n\n   A reporting node MAY choose to not resend an overload report to a\n   reacting node if it can guarantee that this overload report is\n   already active in the reacting node.\n\n      Note: In some cases (e.g. when there are one or more agents in the\n      path between reporting and reacting nodes, or when overload\n      reports are discarded by reacting nodes) a reporting node may not\n      be able to guarantee that the reacting node has received the\n      report.\n\n   A reporting 
 node MUST NOT send overload reports of a type that has\n   not been advertised as supported by the reacting node.\n\n      Note: A reacting node implicitly advertises support for the host\n      and realm report types by including the OC-Supported-Features AVP\n      in the request.  Support for other report types will be explicitly\n      indicated by new feature bits in the OC-Feature-Vector AVP.\n\n   A reporting node MAY rely on the OC-Validity-Duration AVP values for\n   the implicit overload control state cleanup on the reacting node.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 20]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node SHOULD explicitly indicate the end of an overload\n   occurrence by sending a new OLR with OC-Validity-Duration set to a\n   value of zero ("0").  The reporting node SHOULD ensure that all\n   reacting nodes receive the updated overload report.\n\n      Note: All OLRs
  sent have an expiration time calculated by adding\n      the validity-duration contained in the OLR to the time the message\n      was sent.  Transit time for the OLR can be safely ignored.  The\n      reporting node can ensure that all reacting nodes have received\n      the OLR by continuing to send it in answer messages until the\n      expiration time for all OLRs sent for that overload condition have\n      expired.\n\n   When a reporting node sends an OLR, it effectively delegates any\n   necessary throttling to downstream nodes.  If the reporting node also\n   locally throttles the same set of messages, the overall number of\n   throttled requests may be higher than intended.  Therefore, before\n   applying local message throttling, a reporting node needs to check if\n   these messages match existing OCS entries, indicating that these\n   messages have survived throttling applied by downstream nodes that\n   have received the related OLR.\n\n   However, even if the set of me
 ssages match existing OCS entries, the\n   reporting node can still apply other abatement methods such as\n   diversion.  The reporting node might also need to throttle requests\n   for reasons other than overload.  For example, an agent or server\n   might have a configured rate limit for each client, and throttle\n   requests that exceed that limit, even if such requests had already\n   been candidates for throttling by downstream nodes.  The reporting\n   node also has the option to send new OLRs requesting greater\n   reductions in traffic, reducing the need for local throttling.\n\n   A reporting node SHOULD decrease requested overload abatement\n   treatment in a controlled fashion to avoid oscillations in traffic.\n\n4.3.  Protocol Extensibility\n\n   The DOIC solution can be extended.  Types of potential extensions\n   include new traffic abatement algorithms, new report types or other\n   new functionality.\n\n   When defining a new extension that requires new normative beh
 avior,\n   the specification MUST define a new feature for the OC-Feature-\n   Vector.  This feature bit is used to communicate support for the new\n   feature.\n\n   The extension MAY define new AVPs for use in DOIC Capability\n   Announcement and for use in DOIC Overload reporting.  These new AVPs\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 21]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   SHOULD be defined to be extensions to the OC-Supported-Features and\n   OC-OLR AVPs defined in this document.\n\n   [RFC6733] defined Grouped AVP extension mechanisms apply.  This\n   allows, for example, defining a new feature that is mandatory to be\n   understood even when piggybacked on an existing application.\n\n   The handling of feature bits in the OC-Feature-Vector AVP that are\n   not associated with overload abatement algorithms MUST be specified\n   by the extensions that define the features.\n\n   When defining n
 ew report type values, the corresponding specification\n   MUST define the semantics of the new report types and how they affect\n   the OC-OLR AVP handling.  The specification MUST also reserve a\n   corresponding new feature bit in the OC-Feature-Vector AVP.\n\n   The OC-OLR AVP can be expanded with optional sub-AVPs only if a\n   legacy DOIC implementation can safely ignore them without breaking\n   backward compatibility for the given OC-Report-Type AVP value.  If\n   the new sub-AVPs imply new semantics for handling the indicated\n   report type, then a new OC-Report-Type AVP value MUST be defined.\n\n   Documents that introduce new report types MUST describe any\n   limitations on their use across non-supporting agents.\n\n   New features (feature bits in the OC-Feature-Vector AVP) and report\n   types (in the OC-Report-Type AVP) MUST be registered with IANA.  As\n   with any Diameter specification, RFC6733 requires all new AVPs to be\n   registered with IANA.  See Section 8 f
 or the required procedures.\n\n5.  Loss Algorithm\n\n   This section documents the Diameter overload loss abatement\n   algorithm.\n\n5.1.  Overview\n\n   The DOIC specification supports the ability for multiple overload\n   abatement algorithms to be specified.  The abatement algorithm used\n   for any instance of overload is determined by the Diameter Overload\n   Capability Announcement process documented in Section 4.1.\n\n   The loss algorithm described in this section is the default algorithm\n   that must be supported by all Diameter nodes that support DOIC.\n\n   The loss algorithm is designed to be a straightforward and stateless\n   overload abatement algorithm.  It is used by reporting nodes to\n   request a percentage reduction in the amount of traffic sent.  The\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 22]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   traffic impacted by the requested reduction de
 pends on the type of\n   overload report.\n\n   Reporting nodes use a strategy of applying abatement logic to the\n   requested percentage of request messages sent (or handled in the case\n   of agents) by the reacting node that are impacted by the overload\n   report.\n\n   From a conceptual level, the logic at the reacting node could be\n   outlined as follows.\n\n   1.  An overload report is received and the associated OCS is either\n       saved or updated (if required) by the reacting node.\n\n   2.  A new Diameter request is generated by the application running on\n       the reacting node.\n\n   3.  The reacting node determines that an active overload report\n       applies to the request, as indicated by the corresponding OCS\n       entry.\n\n   4.  The reacting node determines if overload abatement treatment\n       should be applied to the request.  One approach that could be\n       taken for each request is to select a random number between 1 and\n       100.  If the ra
 ndom number is less than the indicated reduction\n       percentage then the request is given abatement treatment,\n       otherwise the request is given normal routing treatment.\n\n5.2.  Reporting Node Behavior\n\n   The method a reporting node uses to determine the amount of traffic\n   reduction required to address an overload condition is an\n   implementation decision.\n\n   When a reporting node that has selected the loss abatement algorithm\n   determines the need to request a reduction in traffic, it includes an\n   OC-OLR AVP in response messages as described in Section 4.2.3.\n\n   When sending the OC-OLR AVP, the reporting node MUST indicate a\n   percentage reduction in the OC-Reduction-Percentage AVP.\n\n   The reporting node MAY change the reduction percentage in subsequent\n   overload reports.  When doing so the reporting node must conform to\n   overload report handing specified in Section 4.2.3.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015        
          [Page 23]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n5.3.  Reacting Node Behavior\n\n   The method a reacting node uses to determine which request messages\n   are given abatement treatment is an implementation decision.\n\n   When receiving an OC-OLR in an answer message where the algorithm\n   indicated in the OC-Supported-Features AVP is the loss algorithm, the\n   reacting node MUST apply abatement treatment to the requested\n   percentage of request messages sent.\n\n      Note: The loss algorithm is a stateless algorithm.  As a result,\n      the reacting node does not guarantee that there will be an\n      absolute reduction in traffic sent.  Rather, it guarantees that\n      the requested percentage of new requests will be given abatement\n      treatment.\n\n   When applying overload abatement treatment for the load abatement\n   algorithm, the reacting node MUST abate the requested percentage of\n   requests that would have o
 therwise been sent to the reporting host or\n   realm.\n\n   If reacting node comes out of the 100 percent traffic reduction as a\n   result of the overload report timing out, the following concerns are\n   RECOMMENDED to be applied.  The reacting node sending the traffic\n   should be conservative and, for example, first send "probe" messages\n   to learn the overload condition of the overloaded node before\n   converging to any traffic amount/rate decided by the sender.  Similar\n   concerns apply in all cases when the overload report times out unless\n   the previous overload report stated 0 percent reduction.\n\n   If the reacting node does not receive an OLR in messages sent to the\n   formerly overloaded node then the reacting node SHOULD slowly\n   increase the rate of traffic sent to the overloaded node.\n\n   When an active overload report expires, it is suggested that the\n   reacting node progressively decrease the amount of traffic given\n   abatement treatment, until th
 e reduction is completely removed and no\n   traffic is given abatement treatment.\n\n      The goal of this behavior is to reduce the probability of overload\n      condition thrashing where an immediate transition from 100_\n      reduction to 0_ reduction results in the reporting node moving\n      quickly back into an overload condition.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 24]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n6.  Attribute Value Pairs\n\n   This section describes the encoding and semantics of the Diameter\n   Overload Indication Attribute Value Pairs (AVPs) defined in this\n   document.\n\n   A new application specification can incorporate the overload control\n   mechanism specified in this document by making it mandatory to\n   implement for the application and referencing this specification\n   normatively.  It is the responsibility of the Diameter application\n   designers to d
 efine how overload control mechanisms works on that\n   application.\n\n6.1.  OC-Supported-Features AVP\n\n   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and\n   serves two purposes.  First, it announces a node\'s support for the\n   DOIC solution in general.  Second, it contains the description of the\n   supported DOIC features of the sending node.  The OC-Supported-\n   Features AVP MUST be included in every Diameter request message a\n   DOIC supporting node sends.\n\n      OC-Supported-Features ::= _ AVP Header: TBD1 _\n                                [ OC-Feature-Vector ]\n                              * [ AVP ]\n\n\n   The OC-Feature-Vector sub-AVP is used to announce the DOIC features\n   supported by the DOIC node, in the form of a flag-bits field in which\n   each bit announces one feature or capability supported by the node\n   (see Section 6.2).  The absence of the OC-Feature-Vector AVP\n   indicates that only the default traffic abatement algorithm 
 described\n   in this specification is supported.\n\n6.2.  OC-Feature-Vector AVP\n\n   The OC-Feature-Vector AVP (AVP code TBD6) is of type Unsigned64 and\n   contains a 64 bit flags field of announced capabilities of a DOIC\n   node.  The value of zero (0) is reserved.\n\n   The OC-Feature-Vector sub-AVP is used to announce the DOIC features\n   supported by the DOIC node, in the form of a flag-bits field in which\n   each bit announces one feature or capability supported by the node\n   (see Section 6.2).  The absence of the OC-Feature-Vector AVP\n   indicates that only the default traffic abatement algorithm described\n   in this specification is supported.\n\n   The following capabilities are defined in this document:\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 25]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   OLR_DEFAULT_ALGO (0x0000000000000001)\n\n      When this flag is set by the a DOIC reacting node it 
 means that\n      the default traffic abatement (loss) algorithm is supported.  When\n      this flag is set by a DOIC reporting node it means that the loss\n      algorithm will be used for requested overload abatement.\n\n6.3.  OC-OLR AVP\n\n   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the\n   information necessary to convey an overload report on an overload\n   condition at the reporting node.  The OC-OLR AVP does not explicitly\n   contain all information needed by the reacting node to decide whether\n   a subsequent request must undergo abatement using the received\n   reduction percentage.  The value of the OC-Report-Type AVP within the\n   OC-OLR AVP indicates which implicit information is relevant for this\n   decision (see Section 6.6).  The application the OC-OLR AVP applies\n   to is the same as the Application-Id found in the Diameter message\n   header.  The host or realm the OC-OLR AVP concerns is determined from\n   the Origin-Host AVP and/or Orig
 in-Realm AVP found in the\n   encapsulating Diameter command.  The OC-OLR AVP is intended to be\n   sent only by a reporting node.\n\n      OC-OLR ::= _ AVP Header: TBD2 _\n                 _ OC-Sequence-Number _\n                 _ OC-Report-Type _\n                 [ OC-Reduction-Percentage ]\n                 [ OC-Validity-Duration ]\n               * [ AVP ]\n\n\n6.4.  OC-Sequence-Number AVP\n\n   The OC-Sequence-Number AVP (AVP code TBD3) is of type Unsigned64.\n   Its usage in the context of overload control is described in\n   Section 4.2.\n\n   From the functionality point of view, the OC-Sequence-Number AVP is\n   used as a non-volatile increasing counter for a sequence of overload\n   reports between two DOIC nodes for the same overload occurrence.  The\n   sequence number is only required to be unique between two DOIC nodes.\n   Sequence numbers are treated in a uni-directional manner, i.e. two\n   sequence numbers on each direction between two DOIC nodes are not\n   rela
 ted or correlated.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 26]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n6.5.  OC-Validity-Duration AVP\n\n   The OC-Validity-Duration AVP (AVP code TBD4) is of type Unsigned32\n   and indicates in milliseconds the validity time of the overload\n   report.  The number of milliseconds is measured after reception of\n   the first OC-OLR AVP with a given value of OC-Sequence-Number AVP.\n   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30\n   seconds).  When the OC-Validity-Duration AVP is not present in the\n   OC-OLR AVP, the default value applies.\n\n6.6.  OC-Report-Type AVP\n\n   The OC-Report-Type AVP (AVP code TBD5) is of type Enumerated.  The\n   value of the AVP describes what the overload report concerns.  The\n   following values are initially defined:\n\n   HOST_REPORT 0  The overload report is for a host.  Overload abatement\n      treatme
 nt applies to host-routed requests.\n\n   REALM_REPORT 1  The overload report is for a realm.  Overload\n      abatement treatment applies to realm-routed requests.\n\n6.7.  OC-Reduction-Percentage AVP\n\n   The OC-Reduction-Percentage AVP (AVP code TBD8) is of type Unsigned32\n   and describes the percentage of the traffic that the sender is\n   requested to reduce, compared to what it otherwise would send.  The\n   OC-Reduction-Percentage AVP applies to the default (loss) algorithm\n   specified in this specification.  However, the AVP can be reused for\n   future abatement algorithms, if its semantics fit into the new\n   algorithm.\n\n   The value of the Reduction-Percentage AVP is between zero (0) and one\n   hundred (100).  Values greater than 100 are ignored.  The value of\n   100 means that all traffic is to be throttled, i.e. the reporting\n   node is under a severe load and ceases to process any new messages.\n   The value of 0 means that the reporting node is in a stable 
 state and\n   has no need for the reacting node to apply any traffic abatement.\n   The default value of the OC-Reduction-Percentage AVP is 0.  When the\n   OC-Reduction-Percentage AVP is not present in the overload report,\n   the default value applies.\n\n6.8.  Attribute Value Pair flag rules\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 27]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n                                                         +---------+\n                                                         _AVP flag _\n                                                         _rules    _\n                                                         +----+----+\n                              AVP   Section              _    _MUST_\n       Attribute Name         Code  Defined  Value Type  _MUST_ NOT_\n      +--------------------------------------------------+----+----+\n      _OC-Supported-Features  TBD1  6.1
       Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-OLR                 TBD2  6.3      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Sequence-Number     TBD3  6.4      Unsigned64  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Validity-Duration   TBD4  6.5      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Report-Type         TBD5  6.6      Enumerated  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Reduction                                      _    _    _\n      _  -Percentage          TBD8  6.7      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Feature-Vector      TBD6  6.2      Unsigned64  _    _ V  _\n      +-------------------------------------------------
 -+----+----+\n\n\n   As described in the Diameter base protocol [RFC6733], the M-bit usage\n   for a given AVP in a given command may be defined by the\n   application..\n\n7.  Error Response Codes\n\n   When a DOIC node rejects a Diameter request due to overload, the DOIC\n   node MUST select an appropriate error response code.  This\n   determination is made based on the probability of the request\n   succeeding if retried on a different path.\n\n   A reporting node rejecting a Diameter request due to an overload\n   condition SHOULD send a DIAMETER-TOO-BUSY error response, if it can\n   assume that the same request may succeed on a different path.\n\n   If a reporting node knows or assumes that the same request will not\n   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response\n   SHOULD be used.  Retrying would consume valuable resources during an\n   occurrence of overload.\n\n      For instance, if the request arrived at the reporting node without\n      a Dest
 ination-Host AVP then the reporting node might determine\n      that there is an alternative Diameter node that could successfully\n      process the request and that retrying the transaction would not\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 28]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      negatively impact the reporting node.  DIAMETER_TOO_BUSY would be\n      sent in this case.\n\n      If the request arrived at the reporting node with a Destination-\n      Host AVP populated with its own Diameter identity then the\n      reporting node can assume that retrying the request would result\n      in it coming to the same reporting node.\n      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.\n\n      A second example is when an agent that supports the DOIC solution\n      is performing the role of a reacting node for a non supporting\n      client.  Requests that are rejected as a result of DOIC thrott
 ling\n      by the agent in this scenario would generally be rejected with a\n      DIAMETER_UNABLE_TO_COMPLY response code.\n\n8.  IANA Considerations\n\n8.1.  AVP codes\n\n   New AVPs defined by this specification are listed in Section 6.  All\n   AVP codes are allocated from the \'Authentication, Authorization, and\n   Accounting (AAA) Parameters\' AVP Codes registry.\n\n8.2.  New registries\n\n   Two new registries are needed under the \'Authentication,\n   Authorization, and Accounting (AAA) Parameters\' registry.\n\n   A new "Overload Control Feature Vector" registry is required.  The\n   registry must contain the following:\n\n      Feature Vector Value\n\n      Specification - the specification that defines the new value.\n\n   See Section 6.2 for the initial Feature Vector Value in the registry.\n   This specification is the specification defining the value.  New\n   values can be added into the registry using the Specification\n   Required policy.  [RFC5226].\n\n   A new "
 Overload Report Type" registry is required.  The registry must\n   contain the following:\n\n      Report Type Value\n\n      Specification - the specification that defines the new value.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 29]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   See Section 6.2 for the initial assignment in the registry.  New\n   types can be added using the Specification Required policy [RFC5226].\n\n9.  Security Considerations\n\n   DOIC gives Diameter nodes the ability to request that downstream\n   nodes send fewer Diameter requests.  Nodes do this by exchanging\n   overload reports that directly effect this reduction.  This exchange\n   is potentially subject to multiple methods of attack, and has the\n   potential to be used as a Denial-of-Service (DoS) attack vector.\n\n   Overload reports may contain information about the topology and\n   current status of a Diameter network.  This 
 information is\n   potentially sensitive.  Network operators may wish to control\n   disclosure of overload reports to unauthorized parties to avoid its\n   use for competitive intelligence or to target attacks.\n\n   Diameter does not include features to provide end-to-end\n   authentication, integrity protection, or confidentiality.  This may\n   cause complications when sending overload reports between non-\n   adjacent nodes.\n\n9.1.  Potential Threat Modes\n\n   The Diameter protocol involves transactions in the form of requests\n   and answers exchanged between clients and servers.  These clients and\n   servers may be peers, that is, they may share a direct transport\n   (e.g.  TCP or SCTP) connection, or the messages may traverse one or\n   more intermediaries, known as Diameter Agents.  Diameter nodes use\n   TLS, DTLS, or IPsec to authenticate peers, and to provide\n   confidentiality and integrity protection of traffic between peers.\n   Nodes can make authorization decis
 ions based on the peer identities\n   authenticated at the transport layer.\n\n   When agents are involved, this presents an effectively transitive\n   trust model.  That is, a Diameter client or server can authorize an\n   agent for certain actions, but it must trust that agent to make\n   appropriate authorization decisions about its peers, and so on.\n   Since confidentiality and integrity protection occurs at the\n   transport layer, agents can read, and perhaps modify, any part of a\n   Diameter message, including an overload report.\n\n   There are several ways an attacker might attempt to exploit the\n   overload control mechanism.  An unauthorized third party might inject\n   an overload report into the network.  If this third party is upstream\n   of an agent, and that agent fails to apply proper authorization\n   policies, downstream nodes may mistakenly trust the report.  This\n   attack is at least partially mitigated by the assumption that nodes\n\n\n\nKorhonen, et al. 
          Expires June 6, 2015                 [Page 30]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   include overload reports in Diameter answers but not in requests.\n   This requires an attacker to have knowledge of the original request\n   in order to construct an answer.  Such an answer would also need to\n   arrive at a Diameter node via a protected transport connection.\n   Therefore, implementations MUST validate that an answer containing an\n   overload report is a properly constructed response to a pending\n   request prior to acting on the overload report, and that the answer\n   was received via an appropriate transport connection.\n\n   A similar attack involves a compromised but otherwise authorized node\n   that sends an inappropriate overload report.  For example, a server\n   for the realm "example.com" might send an overload report indicating\n   that a competitor\'s realm "example.net" is overloaded.  If other\n   nodes act o
 n the report, they may falsely believe that "example.net"\n   is overloaded, effectively reducing that realm\'s capacity.\n   Therefore, it\'s critical that nodes validate that an overload report\n   received from a peer actually falls within that peer\'s responsibility\n   before acting on the report or forwarding the report to other peers.\n   For example, an overload report from a peer that applies to a realm\n   not handled by that peer is suspect.\n\n      This attack is partially mitigated by the fact that the\n      application, as well as host and realm, for a given OLR is\n      determined implicitly by respective AVPs in the enclosing answer.\n      If a reporting node modifies any of those AVPs, the enclosing\n      transaction will also be affected.\n\n9.2.  Denial of Service Attacks\n\n   Diameter overload reports, especially realm-reports, can cause a node\n   to cease sending some or all Diameter requests for an extended\n   period.  This makes them a tempting vector 
 for DoS attacks.\n   Furthermore, since Diameter is almost always used in support of other\n   protocols, a DoS attack on Diameter is likely to impact those\n   protocols as well.  Therefore, Diameter nodes MUST NOT honor or\n   forward OLRs received from peers that are not trusted to send them.\n\n   An attacker might use the information in an OLR to assist in DoS\n   attacks.  For example, an attacker could use information about\n   current overload conditions to time an attack for maximum effect, or\n   use subsequent overload reports as a feedback mechanism to learn the\n   results of a previous or ongoing attack.  Operators need the ability\n   to ensure that OLRs are not leaked to untrusted parties.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 31]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n9.3.  Non-Compliant Nodes\n\n   In the absence of an overload control mechanism, Diameter nodes need\n   to im
 plement strategies to protect themselves from floods of\n   requests, and to make sure that a disproportionate load from one\n   source does not prevent other sources from receiving service.  For\n   example, a Diameter server might throttle a certain percentage of\n   requests from sources that exceed certain limits.  Overload control\n   can be thought of as an optimization for such strategies, where\n   downstream nodes never send the excess requests in the first place.\n   However, the presence of an overload control mechanism does not\n   remove the need for these other protection strategies.\n\n   When a Diameter node sends an overload report, it cannot assume that\n   all nodes will comply, even if they indicate support for DOIC.  A\n   non-compliant node might continue to send requests with no reduction\n   in load.  Such non-compliance could be done accidentally, or\n   maliciously to gain an unfair advantage over compliant nodes.\n   Requirement 28 [RFC7068] indicates that
  the overload control solution\n   cannot assume that all Diameter nodes in a network are trusted, and\n   that malicious nodes not be allowed to take advantage of the overload\n   control mechanism to get more than their fair share of service.\n\n9.4.  End-to End-Security Issues\n\n   The lack of end-to-end integrity features makes it difficult to\n   establish trust in overload reports received from non-adjacent nodes.\n   Any agents in the message path may insert or modify overload reports.\n   Nodes must trust that their adjacent peers perform proper checks on\n   overload reports from their peers, and so on, creating a transitive-\n   trust requirement extending for potentially long chains of nodes.\n   Network operators must determine if this transitive trust requirement\n   is acceptable for their deployments.  Nodes supporting Diameter\n   overload control MUST give operators the ability to select which\n   peers are trusted to deliver overload reports, and whether they are\
 n   trusted to forward overload reports from non-adjacent nodes.  DOIC\n   nodes MUST strip DOIC AVPs from messages received from peers that are\n   not trusted for DOIC purposes.\n\n   The lack of end-to-end confidentiality protection means that any\n   Diameter agent in the path of an overload report can view the\n   contents of that report.  In addition to the requirement to select\n   which peers are trusted to send overload reports, operators MUST be\n   able to select which peers are authorized to receive reports.  A node\n   MUST not send an overload report to a peer not authorized to receive\n   it.  Furthermore, an agent MUST remove any overload reports that\n   might have been inserted by other nodes before forwarding a Diameter\n   message to a peer that is not authorized to receive overload reports.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 32]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      A DOIC
  node cannot always automatically detect that a peer also\n      supports DOIC.  For example, a node might have a peer that is a\n      non-supporting agent.  If nodes on the other side of that agent\n      send OC-Supported-Features AVPs, the agent is likely to forward\n      them as unknown AVPs.  Messages received across the non-supporting\n      agent may be indistinguishable from messages received across a\n      DOIC supporting agent, giving the false impression that the non-\n      supporting agent actually supports DOIC.  This complicates the\n      transitive-trust nature of DOIC.  Operators need to be careful to\n      avoid situations where a non-supporting agent is mistakenly\n      trusted to enforce DOIC related authorization policies.\n\n   At the time of this writing, the DIME working group is studying\n   requirements for adding end-to-end security features\n   [I-D.ietf-dime-e2e-sec-req] to Diameter.  These features, when they\n   become available, might make it ea
 sier to establish trust in non-\n   adjacent nodes for overload control purposes.  Readers should be\n   reminded, however, that the overload control mechanism encourages\n   Diameter agents to modify AVPs in, or insert additional AVPs into,\n   existing messages that are originated by other nodes.  If end-to-end\n   security is enabled, there is a risk that such modification could\n   violate integrity protection.  The details of using any future\n   Diameter end-to-end security mechanism with overload control will\n   require careful consideration, and are beyond the scope of this\n   document.\n\n10.  Contributors\n\n   The following people contributed substantial ideas, feedback, and\n   discussion to this document:\n\n   o  Eric McMurry\n\n   o  Hannes Tschofenig\n\n   o  Ulrich Wiehe\n\n   o  Jean-Jacques Trottin\n\n   o  Maria Cruz Bartolome\n\n   o  Martin Dolly\n\n   o  Nirav Salot\n\n   o  Susan Shishufeng\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015          
        [Page 33]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n11.  References\n\n11.1.  Normative References\n\n   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate\n              Requirement Levels", BCP 14, RFC 2119, March 1997.\n\n   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an\n              IANA Considerations Section in RFCs", BCP 26, RFC 5226,\n              May 2008.\n\n   [RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network\n              Time Protocol Version 4: Protocol and Algorithms\n              Specification", RFC 5905, June 2010.\n\n   [RFC6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,\n              "Diameter Base Protocol", RFC 6733, October 2012.\n\n11.2.  Informative References\n\n   [Cx]       3GPP, , "ETSI TS 129 229 V11.4.0", August 2013.\n\n   [I-D.ietf-dime-e2e-sec-req]\n              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,\n              "Dia
 meter AVP Level Security: Scenarios and Requirements",\n              draft-ietf-dime-e2e-sec-req-00 (work in progress),\n              September 2013.\n\n   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.\n\n   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.\n              Loughney, "Diameter Credit-Control Application", RFC 4006,\n              August 2005.\n\n   [RFC5729]  Korhonen, J., Jones, M., Morand, L., and T. Tsou,\n              "Clarifications on the Routing of Diameter Requests Based\n              on the Username and the Realm", RFC 5729, December 2009.\n\n   [RFC7068]  McMurry, E. and B. Campbell, "Diameter Overload Control\n              Requirements", RFC 7068, November 2013.\n\n   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.\n\nAppendix A.  Issues left for future specifications\n\n   The base solution for the overload control does not cover all\n   possible use cases.  A number of solution aspects were intentional
 ly\n   left for future specification and protocol work.  The following sub-\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 34]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   sections define some of the potential extensions to the DOIC\n   solution.\n\nA.1.  Additional traffic abatement algorithms\n\n   This specification describes only means for a simple loss based\n   algorithm.  Future algorithms can be added using the designed\n   solution extension mechanism.  The new algorithms need to be\n   registered with IANA.  See Sections 6.1 and 8 for the required IANA\n   steps.\n\nA.2.  Agent Overload\n\n   This specification focuses on Diameter endpoint (server or client)\n   overload.  A separate extension will be required to outline the\n   handling of the case of agent overload.\n\nA.3.  New Error Diagnostic AVP\n\n   This specification indicates the use of existing error messages when\n   nodes reject requests due 
 to overload.  The DIME working group is\n   considering defining additional error codes or AVPs to indicate that\n   overload was the reason for the rejection of the message.\n\nAppendix B.  Deployment Considerations\n\n   Non Supporting Agents\n\n      Due to the way that realm-routed requests are handled in Diameter\n      networks with the server selection for the request done by an\n      agent, network operators should enable DOIC at agents that perform\n      server selection first.\n\n   Topology Hiding Interactions\n\n      There exist proxies that implement what is referred to as Topology\n      Hiding.  This can include cases where the agent modifies the\n      Origin-Host in answer messages.  The behavior of the DOIC solution\n      is not well understood when this happens.  As such, the DOIC\n      solution does not address this scenario.\n\nAppendix C.  Requirements Conformance Analysis\n\n   This section contains the result of an analysis of the DOIC solutions\n   conf
 ormance to the requirements defined in [RFC7068].\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 35]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.1.  Deferred Requirements\n\n   The 3GPP has adopted an early version of this document as normative\n   references in various Diameter related specifications to support the\n   overload control mechanism in their release 12 framework.  The DIME\n   working group has therefore decided to defer certain requirements in\n   order to complete the design of an extensible, generic solution\n   before the deadline scheduled by the 3GPP for the completion of the\n   release 12 protocol work by the end of 2014.  The deferred work\n   includes the following:\n\n   o  Agent Overload - The ability for an agent to report an overload\n      condition of the agent itself.\n\n   o  Load Information - The ability for a node to report its load level\n      when not overloaded.\n\n   At
  the time of this writing, DIME has begun separate work efforts for\n   these requirements.\n\nC.2.  Detection of non-supporting Intermediaries\n\n   The DOIC mechanism as currently defined does not allow supporting\n   nodes to automatically determine whether OC-Supported-Features or OC-\n   OLR AVPs are originated by a peer node, or by a non-peer node and\n   sent across a non-supporting peer.  This makes it impossible to\n   detect the presence of non-supporting nodes between supporting nodes,\n   except by configuration.  The working group determined that such a\n   configuration requirement is acceptable.\n\n   This limits full compliance with certain requirements related to the\n   limitation of new configuration, deployment in environments with\n   mixed support, operating across non-supporting agents, and\n   authorization.\n\nC.3.  Implicit Application Indication\n\n   The working group elected to determine the application for an\n   overload report from that of the enclosi
 ng message.  This prevents\n   sending an OLR for an application when there are no transactions for\n   that application.\n\n   As a consequence, DOIC does not comply with the requirement to be\n   able to report overload information across quiescent connections.\n   DOIC does not fully comply with requirements to operate on up-to-date\n   information, since if an OLR causes all transactions to stop for an\n   application, the only way traffic will resume is for the OLR to\n   expire.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 36]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.4.  Stateless Operation\n\n   RFC7068 explicitly discourages the sending of OLRs in every answer\n   message, as part of the requirement to avoid additional work for\n   overloaded nodes.  DOIC recommends exactly that behavior during\n   active overload conditions.  The working group determined that doing\n   otherwise would reduce reliabili
 ty and increase statefulness.  (Note\n   that DOIC does allow nodes to avoid sending OLRs in every answer if\n   they have some other method of ensuring that OLRs get to all relevant\n   reacting nodes.)\n\nC.5.  No New Vulnerabilities\n\n   The working group believes that DOIC is compliant with the\n   requirement to avoid introducing new vulnerabilities.  However, this\n   requirement may warrant an early security expert review.\n\nC.6.  Detailed Requirements\n\n   [RFC Editor: Please remove this section and subsections prior to\n   publication as an RFC.]\n\nC.6.1.  General\n\n   REQ 1:  The solution MUST provide a communication method for Diameter\n           nodes to exchange load and overload information.\n\n           *Partially Compliant*. The mechanism uses new AVPs\n           piggybacked on existing Diameter messages to exchange\n           overload information.  It does not currently support "load"\n           information or the ability to report overload of an agent.\n 
           These have been left for future extensions.\n\n\n\n   REQ 2:  The solution MUST allow Diameter nodes to support overload\n           control regardless of which Diameter applications they\n           support.  Diameter clients and agents must be able to use the\n           received load and overload information to support graceful\n           behavior during an overload condition.  Graceful behavior\n           under overload conditions is best described by REQ 3.\n\n           *Partially Compliant*. The DOIC AVPs can be used in any\n           application that allows the extension of AVPs.  However,\n           "load" information is not currently supported.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 37]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 3:  The solution MUST limit the impact of overload on the overall\n           useful throughput of a Diameter server, even when the\n           i
 ncoming load on the network is far in excess of its\n           capacity.  The overall useful throughput under load is the\n           ultimate measure of the value of a solution.\n\n           *Compliant*. DOIC provides information that nodes can use to\n           reduce the impact of overload.\n\n\n\n   REQ 4:  Diameter allows requests to be sent from either side of a\n           connection, and either side of a connection may have need to\n           provide its overload status.  The solution MUST allow each\n           side of a connection to independently inform the other of its\n           overload status.\n\n           *Compliant*. DOIC AVPs can be included regardless of\n           transaction "direction"\n\n\n\n   REQ 5:  Diameter allows nodes to determine their peers via dynamic\n           discovery or manual configuration.  The solution MUST work\n           consistently without regard to how peers are determined.\n\n           *Compliant*. DOIC contains no assumptions 
 about how peers are\n           discovered.\n\n\n\n   REQ 6:  The solution designers SHOULD seek to minimize the amount of\n           new configuration required in order to work.  For example, it\n           is better to allow peers to advertise or negotiate support\n           for the solution, rather than to require that this knowledge\n           to be configured at each node.\n\n           *Partially Compliant*. Most DOIC parameters are advertised\n           using the DOIC capability announcement mechanism.  However,\n           there are some situations where configuration is required.\n           For example, a DOIC node detect the fact that a peer may not\n           support DOIC when nodes on the other side of the non-\n           supporting node do support DOIC without configuration.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 38]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.6.2.  Performance
 \n\n   REQ 7:  The solution and any associated default algorithm(s) MUST\n           ensure that the system remains stable.  At some point after\n           an overload condition has ended, the solution MUST enable\n           capacity to stabilize and become equal to what it would be in\n           the absence of an overload condition.  Note that this also\n           requires that the solution MUST allow nodes to shed load\n           without introducing non-converging oscillations during or\n           after an overload condition.\n\n           *Compliant*. The specification offers guidance that\n           implementations should apply hysteresis when recovering from\n           overload, and avoid sudden ramp ups in offered load when\n           recovering.\n\n\n\n   REQ 8:  Supporting nodes MUST be able to distinguish current overload\n           information from stale information.\n\n           *Partially Compliant*. DOIC overload reports are "soft\n           state", that is 
 they expire after an indicated period.  DOIC\n           nodes may also send reports that end existing overload\n           conditions.  DOIC requires reporting nodes to ensure that all\n           relevant reacting nodes receive overload reports.\n\n           However, since DOIC does not allow reporting nodes to send\n           OLRs in watchdog messages, if an overload condition results\n           in zero offered load, the reporting node cannot update the\n           condition until the expiration of the original OLR.\n\n\n\n   REQ 9:  The solution MUST function across fully loaded as well as\n           quiescent transport connections.  This is partially derived\n           from the requirement for stability in REQ 7.\n\n           *Not Compliant*. DOIC does not allow OLRs to be sent over\n           quiescent transport connections.  This is due to the fact\n           that OLRs cannot be sent outside of the application to which\n           they apply.\n\n\n\n   REQ 10: Consume
 rs of overload information MUST be able to determine\n           when the overload condition improves or ends.\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 39]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. (See response to previous two\n           requirements.)\n\n\n\n   REQ 11: The solution MUST be able to operate in networks of different\n           sizes.\n\n           *Compliant*. DOIC makes no assumptions about the size of the\n           network.  DOIC can operate purely between clients and\n           servers, or across agents.\n\n\n\n   REQ 12: When a single network node fails, goes into overload, or\n           suffers from reduced processing capacity, the solution MUST\n           make it possible to limit the impact of the affected node on\n           other nodes in the network.  This helps to prevent a small-\n           scale failure from becoming a widespread outage.
 \n\n           *Partially Compliant*. DOIC allows overload reports for an\n           entire realm, where abated traffic will not be redirected\n           towards another server.  But in situations where nodes choose\n           to divert traffic to other nodes, DOIC offers no way of\n           knowing whether the new recipients can handle the traffic if\n           they have not already indicated overload.  This may be\n           mitigated with the use of a future "load" extension, or with\n           the use of proprietary dynamic load-balancing mechanisms.\n\n\n\n   REQ 13: The solution MUST NOT introduce substantial additional work\n           for a node in an overloaded state.  For example, a\n           requirement for an overloaded node to send overload\n           information every time it received a new request would\n           introduce substantial work.\n\n           *Not Compliant*. DOIC does in fact encourage an overloaded\n           node to send an OLR in every re
 sponse.  The working group\n           that other mechanisms to ensure that every relevant node\n           receives an OLR would create even more work.  [Note: This\n           needs discussion.]\n\n\n\n   REQ 14: Some scenarios that result in overload involve a rapid\n           increase of traffic with little time between normal levels\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 40]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           and levels that induce overload.  The solution SHOULD provide\n           for rapid feedback when traffic levels increase.\n\n           *Compliant*. The piggyback mechanism allows OLRs to be sent\n           at the same rate as application traffic.\n\n\n\n   REQ 15: The solution MUST NOT interfere with the congestion control\n           mechanisms of underlying transport protocols.  For example, a\n           solution that opened additional TCP connections when the\n         
   network is congested would reduce the effectiveness of the\n           underlying congestion control mechanisms.\n\n           *Compliant*. DOIC does not require or recommend changes in\n           the handling of transport protocols or connections.\n\n\n\nC.6.3.  Heterogeneous Support for Solution\n\n   REQ 16: The solution is likely to be deployed incrementally.  The\n           solution MUST support a mixed environment where some, but not\n           all, nodes implement it.\n\n           *Partially Compliant*. DOIC works with most mixed-deployment\n           scenarios.  However, it cannot work across a non-supporting\n           proxy that modifies Origin-Host AVPs in answer messages.\n           DOIC will have limited impact in networks where the nodes\n           that perform server selections do not support the mechanism.\n\n\n\n   REQ 17: In a mixed environment with nodes that support the solution\n           and nodes that do not, the solution MUST NOT result in\n       
     materially less useful throughput during overload as would\n           have resulted if the solution were not present.  It SHOULD\n           result in less severe overload in this environment.\n\n           *Compliant*. In most mixed-support deployment, DOIC will\n           offer at least some value, and will not make things worse.\n\n\n\n   REQ 18: In a mixed environment of nodes that support the solution and\n           nodes that do not, the solution MUST NOT preclude elements\n           that support overload control from treating elements that do\n           not support overload control in an equitable fashion relative\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 41]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           to those that do.  Users and operators of nodes that do not\n           support the solution MUST NOT unfairly benefit from the\n           solution.  The solution specification SHOULD p
 rovide guidance\n           to implementers for dealing with elements not supporting\n           overload control.\n\n           *Compliant*. DOIC provides mechanisms to abate load from non-\n           supporting sources.  Furthermore, it recommends that\n           reporting nodes will still need to be able to apply whatever\n           protections they would ordinarily apply if DOIC were not in\n           use.\n\n\n\n   REQ 19: It MUST be possible to use the solution between nodes in\n           different realms and in different administrative domains.\n\n           *Partially Compliant*. DOIC allows sending OLRs across\n           administrative domains, and potentially to nodes in other\n           realms.  However, an OLR cannot indicate overload for realms\n           other than the one in the Origin-Realm AVP of the containing\n           answer.\n\n\n\n   REQ 20: Any explicit overload indication MUST be clearly\n           distinguishable from other errors reported via Dia
 meter.\n\n           *Compliant*. DOIC sends explicit overload indication in\n           overload reports.  It does not depend on error result codes.\n\n\n\n   REQ 21: In cases where a network node fails, is so overloaded that it\n           cannot process messages, or cannot communicate due to a\n           network failure, it may not be able to provide explicit\n           indications of the nature of the failure or its levels of\n           overload.  The solution MUST result in at least as much\n           useful throughput as would have resulted if the solution were\n           not in place.\n\n           *Compliant*. DOIC overload reports have the primary effect of\n           suppressing message retries in overload conditions.  DOIC\n           recommends that messages never be silently dropped if at all\n           possible.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 42]\n_\nInternet-Draft                    DOIC                     Dec
 ember 2014\n\n\nC.6.4.  Granular Control\n\n   REQ 22: The solution MUST provide a way for a node to throttle the\n           amount of traffic it receives from a peer node.  This\n           throttling SHOULD be graded so that it can be applied\n           gradually as offered load increases.  Overload is not a\n           binary state; there may be degrees of overload.\n\n           *Compliant*. The "loss" algorithm expresses a percentage\n           reduction.\n\n\n\n   REQ 23: The solution MUST provide sufficient information to enable a\n           load-balancing node to divert messages that are rejected or\n           otherwise throttled by an overloaded upstream node to other\n           upstream nodes that are the most likely to have sufficient\n           capacity to process them.\n\n           *Not Compliant*. DOIC provides no built in mechanism to\n           determine the best place to divert messages that would\n           otherwise be throttled.  This can be accomplishe
 d with a\n           future "load" extension, or with proprietary load balancing\n           mechanisms.\n\n\n\n   REQ 24: The solution MUST provide a mechanism for indicating load\n           levels, even when not in an overload condition, to assist\n           nodes in making decisions to prevent overload conditions from\n           occurring.\n\n           *Not Compliant*. "Load" information has been left for a\n           future extension.\n\n\n\nC.6.5.  Priority and Policy\n\n   REQ 25: The base specification for the solution SHOULD offer general\n           guidance on which message types might be desirable to send or\n           process over others during times of overload, based on\n           application-specific considerations.  For example, it may be\n           more beneficial to process messages for existing sessions\n           ahead of new sessions.  Some networks may have a requirement\n           to give priority to requests associated with emergency\n           ses
 sions.  Any normative or otherwise detailed definition of\n           the relative priorities of message types during an overload\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 43]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           condition will be the responsibility of the application\n           specification.\n\n           *Compliant*. The specification offers guidance on how\n           requests might be prioritized for different types of\n           applications.\n\n\n\n   REQ 26: The solution MUST NOT prevent a node from prioritizing\n           requests based on any local policy, so that certain requests\n           are given preferential treatment, given additional\n           retransmission, not throttled, or processed ahead of others.\n\n           *Compliant*. Nothing in the specification prevents\n           application-specific, implementation-specific, or local\n           policies.\n\n\n\nC.6.6.  
 Security\n\n   REQ 27: The solution MUST NOT provide new vulnerabilities to\n           malicious attack or increase the severity of any existing\n           vulnerabilities.  This includes vulnerabilities to DoS and\n           DDoS attacks as well as replay and man-in-the-middle attacks.\n           Note that the Diameter base specification [RFC6733] lacks\n           end-to-end security and this must be considered (see the\n           Security Considerations in [RFC7068]).  Note that this\n           requirement was expressed at a high level so as to not\n           preclude any particular solution.  It is expected that the\n           solution will address this in more detail.\n\n           *Compliant*. The working group is not aware of any such\n           vulnerabilities.  [This may need further analysis.]\n\n\n\n   REQ 28: The solution MUST NOT depend on being deployed in\n           environments where all Diameter nodes are completely trusted.\n           It SHOULD operate a
 s effectively as possible in environments\n           where other nodes are malicious; this includes preventing\n           malicious nodes from obtaining more than a fair share of\n           service.  Note that this does not imply any responsibility on\n           the solution to detect, or take countermeasures against,\n           malicious nodes.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 44]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. Since all Diameter security is\n           currently at the transport layer, nodes must trust immediate\n           peers to enforce trust policies.  However, there are\n           situations where a DOIC node cannot determine if an immediate\n           peer supports DOIC.  The authors recommend an expert security\n           review.\n\n\n\n   REQ 29: It MUST be possible for a supporting node to make\n           authorization decisions abo
 ut what information will be sent\n           to peer nodes based on the identity of those nodes.  This\n           allows a domain administrator who considers the load of their\n           nodes to be sensitive information to restrict access to that\n           information.  Of course, in such cases, there is no\n           expectation that the solution itself will help prevent\n           overload from that peer node.\n\n           *Partially Compliant*. (See response to previous\n           requirement.)\n\n\n\n   REQ 30: The solution MUST NOT interfere with any Diameter-compliant\n           method that a node may use to protect itself from overload\n           from non-supporting nodes or from denial-of-service attacks.\n\n           *Compliant*. The specification recommends that any such\n           protection mechanism needed without DOIC should continue to\n           be employed with DOIC.\n\n\n\nC.6.7.  Flexibility and Extensibility\n\n   REQ 31: There are multiple situatio
 ns where a Diameter node may be\n           overloaded for some purposes but not others.  For example,\n           this can happen to an agent or server that supports multiple\n           applications, or when a server depends on multiple external\n           resources, some of which may become overloaded while others\n           are fully available.  The solution MUST allow Diameter nodes\n           to indicate overload with sufficient granularity to allow\n           clients to take action based on the overloaded resources\n           without unreasonably forcing available capacity to go unused.\n           The solution MUST support specification of overload\n           information with granularities of at least "Diameter node",\n           "realm", and "Diameter application" and MUST allow\n           extensibility for others to be added in the future.\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 45]\n_\nInternet-Draft                    DOIC      
                December 2014\n\n\n           *Partially Compliant*. All DOIC overload reports are scoped\n           to the specific application and realm.  Inside that scope,\n           overload can be reported at the specific server or whole\n           realm scope.  As currently specified, DOIC cannot indicate\n           local overload for an agent.  At the time of this writing,\n           the DIME working group has plans to work on an agent-overload\n           extension.\n\n           DOIC allows new "scopes" through the use of extended report\n           types.\n\n\n\n   REQ 32: The solution MUST provide a method for extending the\n           information communicated and the algorithms used for overload\n           control.\n\n           *Compliant*. DOIC allows new report types and abatement\n           algorithms to be created.  These may be indicated using the\n           OC-Supported-Features AVP.\n\n\n\n   REQ 33: The solution MUST provide a default algorithm that is\n
            mandatory to implement.\n\n           *Compliant*. The "loss" algorithm is mandatory to implement.\n\n\n\n   REQ 34: The solution SHOULD provide a method for exchanging overload\n           and load information between elements that are connected by\n           intermediaries that do not support the solution.\n\n           *Partially Compliant*. DOIC information can traverse non-\n           supporting agents, as long as those agents do not modify\n           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a\n           way for supporting nodes to detect such modification.\n\n\n\nAppendix D.  Considerations for Applications Integrating the DOIC\n             Solution\n\n   This section outlines considerations to be taken into account when\n   integrating the DOIC solution into Diameter applications.\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 46]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\
 nD.1.  Application Classification\n\n   The following is a classification of Diameter applications and\n   request types.  This discussion is meant to document factors that\n   play into decisions made by the Diameter identity responsible for\n   handling overload reports.\n\n   Section 8.1 of [RFC6733] defines two state machines that imply two\n   types of applications, session-less and session-based applications.\n   The primary difference between these types of applications is the\n   lifetime of Session-Ids.\n\n   For session-based applications, the Session-Id is used to tie\n   multiple requests into a single session.\n\n   The Credit-Control application defined in [RFC4006] is an example of\n   a Diameter session-based application.\n\n   In session-less applications, the lifetime of the Session-Id is a\n   single Diameter transaction, i.e. the session is implicitly\n   terminated after a single Diameter transaction and a new Session-Id\n   is generated for each Diameter reques
 t.\n\n   For the purposes of this discussion, session-less applications are\n   further divided into two types of applications:\n\n   Stateless Applications:\n\n      Requests within a stateless application have no relationship to\n      each other.  The 3GPP defined S13 application is an example of a\n      stateless application [S13], where only a Diameter command is\n      defined between a client and a server and no state is maintained\n      between two consecutive transactions.\n\n   Pseudo-Session Applications:\n\n      Applications that do not rely on the Session-Id AVP for\n      correlation of application messages related to the same session\n      but use other session-related information in the Diameter requests\n      for this purpose.  The 3GPP defined Cx application [Cx] is an\n      example of a pseudo-session application.\n\n   The handling of overload reports must take the type of application\n   into consideration, as discussed in Appendix D.2.\n\n\n\n\n\n\n\nKorh
 onen, et al.          Expires June 6, 2015                 [Page 47]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nD.2.  Application Type Overload Implications\n\n   This section discusses considerations for mitigating overload\n   reported by a Diameter entity.  This discussion focuses on the type\n   of application.  Appendix D.3 discusses considerations for handling\n   various request types when the target server is known to be in an\n   overloaded state.\n\n   These discussions assume that the strategy for mitigating the\n   reported overload is to reduce the overall workload sent to the\n   overloaded entity.  The concept of applying overload treatment to\n   requests targeted for an overloaded Diameter entity is inherent to\n   this discussion.  The method used to reduce offered load is not\n   specified here but could include routing requests to another Diameter\n   entity known to be able to handle them, or it could mean rejecting\n   cer
 tain requests.  For a Diameter agent, rejecting requests will\n   usually mean generating appropriate Diameter error responses.  For a\n   Diameter client, rejecting requests will depend upon the application.\n   For example, it could mean giving an indication to the entity\n   requesting the Diameter service that the network is busy and to try\n   again later.\n\n   Stateless Applications:\n\n      By definition there is no relationship between individual requests\n      in a stateless application.  As a result, when a request is sent\n      or relayed to an overloaded Diameter entity - either a Diameter\n      Server or a Diameter Agent - the sending or relaying entity can\n      choose to apply the overload treatment to any request targeted for\n      the overloaded entity.\n\n   Pseudo-Session Applications:\n\n      For pseudo-session applications, there is an implied ordering of\n      requests.  As a result, decisions about which requests towards an\n      overloaded entity to
  reject could take the command code of the\n      request into consideration.  This generally means that\n      transactions later in the sequence of transactions should be given\n      more favorable treatment than messages earlier in the sequence.\n      This is because more work has already been done by the Diameter\n      network for those transactions that occur later in the sequence.\n      Rejecting them could result in increasing the load on the network\n      as the transactions earlier in the sequence might also need to be\n      repeated.\n\n   Session-Based Applications:\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 48]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Overload handling for session-based applications must take into\n      consideration the work load associated with setting up and\n      maintaining a session.  As such, the entity sending requests\n      towards an overloaded Diameter
  entity for a session-based\n      application might tend to reject new session requests prior to\n      rejecting intra-session requests.  In addition, session ending\n      requests might be given a lower probability of being rejected as\n      rejecting session ending requests could result in session status\n      being out of sync between the Diameter clients and servers.\n      Application designers that would decide to reject mid-session\n      requests will need to consider whether the rejection invalidates\n      the session and any resulting session cleanup procedures.\n\nD.3.  Request Transaction Classification\n\n   Independent Request:\n\n      An independent request is not correlated to any other requests\n      and, as such, the lifetime of the session-id is constrained to an\n      individual transaction.\n\n   Session-Initiating Request:\n\n      A session-initiating request is the initial message that\n      establishes a Diameter session.  The ACR message defined i
 n\n      [RFC6733] is an example of a session-initiating request.\n\n   Correlated Session-Initiating Request:\n\n      There are cases when multiple session-initiated requests must be\n      correlated and managed by the same Diameter server.  It is notably\n      the case in the 3GPP PCC architecture [PCC], where multiple\n      apparently independent Diameter application sessions are actually\n      correlated and must be handled by the same Diameter server.\n\n   Intra-Session Request:\n\n      An intra-session request is a request that uses the same Session-\n      Id than the one used in a previous request.  An intra-session\n      request generally needs to be delivered to the server that handled\n      the session creating request for the session.  The STR message\n      defined in [RFC6733] is an example of an intra-session request.\n\n   Pseudo-Session Requests:\n\n      Pseudo-session requests are independent requests and do not use\n      the same Session-Id but are corr
 elated by other session-related\n      information contained in the request.  There exists Diameter\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 49]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      applications that define an expected ordering of transactions.\n      This sequencing of independent transactions results in a pseudo\n      session.  The AIR, MAR and SAR requests in the 3GPP defined Cx\n      [Cx] application are examples of pseudo-session requests.\n\nD.4.  Request Type Overload Implications\n\n   The request classes identified in Appendix D.3 have implications on\n   decisions about which requests should be throttled first.  The\n   following list of request treatment regarding throttling is provided\n   as guidelines for application designers when implementing the\n   Diameter overload control mechanism described in this document.  The\n   exact behavior regarding throttling is a matter of local po
 licy,\n   unless specifically defined for the application.\n\n   Independent Requests:\n\n      Independent requests can generally be given equal treatment when\n      making throttling decisions, unless otherwise indicated by\n      application requirements or local policy.\n\n   Session-Initiating Requests:\n\n      Session-initiating requests often represent more work than\n      independent or intra-session requests.  Moreover, session-\n      initiating requests are typically followed by other session-\n      related requests.  Since the main objective of the overload\n      control is to reduce the total number of requests sent to the\n      overloaded entity, throttling decisions might favor allowing\n      intra-session requests over session-initiating requests.  In the\n      absence of local policies or application specific requirements to\n      the contrary, Individual session-initiating requests can be given\n      equal treatment when making throttling decisions.\n\n  
  Correlated Session-Initiating Requests:\n\n      A Request that results in a new binding, where the binding is used\n      for routing of subsequent session-initiating requests to the same\n      server, represents more work load than other requests.  As such,\n      these requests might be throttled more frequently than other\n      request types.\n\n   Pseudo-Session Requests:\n\n      Throttling decisions for pseudo-session requests can take into\n      consideration where individual requests fit into the overall\n      sequence of requests within the pseudo session.  Requests that are\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 50]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      earlier in the sequence might be throttled more aggressively than\n      requests that occur later in the sequence.\n\n   Intra-Session Requests:\n\n      There are two types of intra-sessions requests, requests that\n      termin
 ate a session and the remainder of intra-session requests.\n      Implementers and operators may choose to throttle session-\n      terminating requests less aggressively in order to gracefully\n      terminate sessions, allow cleanup of the related resources (e.g.\n      session state) and avoid the need for additional intra-session\n      requests.  Favoring session-termination requests may reduce the\n      session management impact on the overloaded entity.  The default\n      handling of other intra-session requests might be to treat them\n      equally when making throttling decisions.  There might also be\n      application level considerations whether some request types are\n      favored over others.\n\nAuthors\' Addresses\n\n   Jouni Korhonen (editor)\n   Broadcom\n   Porkkalankatu 24\n   Helsinki  FIN-00180\n   Finland\n\n   Email: jouni.nospam@gmail.com\n\n\n   Steve Donovan (editor)\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Emai
 l: srdonovan@usdonovans.com\n\n\n   Ben Campbell\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: ben@nostrum.com\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 51]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Lionel Morand\n   Orange Labs\n   38/40 rue du General Leclerc\n   Issy-Les-Moulineaux Cedex 9  92794\n   France\n\n   Phone: +33145296257\n   Email: lionel.morand@orange.com\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 6, 2015                 [Page 52]\n', 'url1': '', 'submit': 'Generate diff', 'url2': '', '--newcolour': 'green'} -->
--------------050403030105000509030106--


From nobody Mon Dec 15 12:42:50 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1727F1A8985 for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 12:42:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZN7W65xbxQgc for <dime@ietfa.amsl.com>; Mon, 15 Dec 2014 12:42:42 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC3F61A88B1 for <dime@ietf.org>; Mon, 15 Dec 2014 12:42:41 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBFKgcs2016272 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 15 Dec 2014 20:42:39 GMT
Received: from DEMUHTC002.nsn-intra.net ([10.159.42.33]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBFKgYQR012348 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 15 Dec 2014 21:42:35 +0100
Received: from DEMUHTC005.nsn-intra.net (10.159.42.36) by DEMUHTC002.nsn-intra.net (10.159.42.33) with Microsoft SMTP Server (TLS) id 14.3.195.1; Mon, 15 Dec 2014 21:42:34 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC005.nsn-intra.net ([10.159.42.36]) with mapi id 14.03.0195.001; Mon, 15 Dec 2014 21:42:34 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Ulrich's suggested change #16
Thread-Index: AQHQE7lXyc+G3J0M1EW8kbPFxFEQNZyHfq1QgANENfD///h3AIAAAngAgAZo/cA=
Date: Mon, 15 Dec 2014 20:42:33 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D9000668152359A7@DEMUMBX014.nsn-intra.net>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com> <5489F246.5040801@usdonovans.com> <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com>
In-Reply-To: <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.110]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 7238
X-purgate-ID: 151667::1418676159-0000658F-254AF523/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/NWPFo0smoKE01S2ti6_nt0H2HXI
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Dec 2014 20:42:47 -0000

Steve,
can you please summarize the status of #16. I'm getting lost.

Regards
Ulrich

-----Original Message-----
From: ext Ben Campbell [mailto:ben@nostrum.com]=20
Sent: Thursday, December 11, 2014 8:45 PM
To: Steve Donovan
Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #16


> On Dec 11, 2014, at 1:36 PM, Steve Donovan <srdonovan@usdonovans.com> wro=
te:
>=20
>=20
> On 12/11/14, 1:03 PM, Ben Campbell wrote:
>>> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> w=
rote:
>>>=20
>>> Ulrich,
>>>=20
>>> I agree with your assumptions below.  For the third one, the only time =
it is possible, at least from a DOIC perspective, to send to another host i=
s if it is a realm-routed request.  I might also change the "not overloaded=
" to "less overloaded".
>>>=20
>>> I do think the statements can be improved to differentiate between beha=
vior for host reports and realm reports.
>>>=20
>>> How about the following:
>>>    For OLRs of type host, if the request is a host-routed request then =
the reacting node SHOULD
>>>    apply throttling abatement treatment to the request.
>>>=20
>>>    For OLRs of type host, If the request is a realm-routed request then=
 the reacting node
>>>    SHOULD apply diversion abatement treatment to the request.
>> Personally, I think that should be non-normative. Or if normative, no st=
ronger than MAY. I agree it's a good choice, but I think we can leave it to=
 the market to enforce.
> If we make it non normative then we probably need an additional statement=
 along the lines of "the reacting node MUST attempt to reduce traffic by th=
e amount requested in the OLR" if we don't already have it somewhere else i=
n the document.

Agreed

>>=20
>> I think there when we distinguish request-type, we need to consider _whe=
n_. For example, an agent may _receive_ a realm routed request but _send_ a=
 host-routed request. And for a client, that may be even more subtle.
>>=20
>> This really does seem like a case of server selection.
> I don't think it's that subtle.  If server selection hasn't already happe=
ned for a request and that request is selected for abatement and the reques=
t would have otherwise been routed to an overloaded host then the request s=
hould/may be diverted to another server.
>=20
> Server selection could have happened as a result of a previous transactio=
n specifying the host for subsequent transactions or by the presence of the=
 Destination-Host in the message when it arrives at an agent.  It could hav=
e also already happened as a result of configuration.

In the case of a client, the decision on whether to divert vs just not send=
 a request may be heavily influenced by the client application.  (Not neces=
sarily the _Diameter_ application.)  In the case of either, a node might ha=
ve local knowledge that a 2nd server can handle everything the first server=
 can handle. Even if a downstream node performed server selection, a node w=
ith such knowledge might override it. We don't necessarily need to talk abo=
ut that sort of thing, but we should avoid language that forbids it.


>>=20
>>>    For OLRs of type realm, the reacting node SHOULD
>>>    apply throttling abatement treatment to the request, independent of =
the type (host-routed or
>>>    realm-routed) of request.
>> Again, I think this should not be normative. In this case this is pretty=
 much a statement of fact--you simply cannot reasonably divert given the wa=
y that Diameter routing works. I suppose there might be a case where a node=
 has some magical knowledge that realm2 can handle anything that realm1 can=
, and could divert to a different realm (which we probably still don't want=
 to forbid.)
>>=20
>>>=20
>>> Regards,
>>>=20
>>> Steve
>>>=20
>>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Steve,
>>>> yes, then, maybe, the definition of Diversion is not correct?
>>>> What are other people's views?
>>>>=20
>>>> My assumption was:
>>>> If a host is overloaded, it does not help to direct traffic to that ho=
st via a different path.
>>>> If a realm is overloaded, it does not help to direct traffic to that r=
ealm via a different path.
>>>> If a host is overloaded, it helps to select an alternative (not overlo=
aded) host (if possible) and direct traffic to that host.
>>>> If a realm is overloaded, there never is an alternative (not overloade=
d) realm to which traffic could be directed.
>>>>=20
>>>> With the current definition of Diversion, Diversion is no appropriate =
means to address host overload and is no appropriate means to address realm=
 overload. It may be ok for agent overload only.
>>>>=20
>>>> Regards
>>>> Ulrich
>>>>=20
>>>> From: DiME [
>>>> mailto:dime-bounces@ietf.org
>>>> ] On Behalf Of ext Steve Donovan
>>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>>> To:
>>>> dime@ietf.org
>>>>=20
>>>> Subject: [Dime] Ulrich's suggested change #16
>>>>=20
>>>> Ulrich,
>>>>=20
>>>> For your suggested change #16:
>>>> Section 4.2.2, 5th and 6th paragraph:
>>>> Existing text:
>>>>    If the request is a host-routed request then the reacting node SHOU=
LD
>>>>    apply throttling abatement treatment to the request.
>>>>      If the request is a realm-routed request then the reacting node
>>>>    SHOULD apply diversion abatement treatment to the request.
>>>>=20
>>>> Comment: I don't think so. If the reacting node selects the server and
>>>> then detects that the selected server is overloaded and then detects t=
hat
>>>> the request does not survive (i.e. is subject to abatement), then the =
reacting
>>>> node SHOULD apply diversion treatment (i.e. select an alternative serv=
er if possible).
>>>> If the reacting node does not select the server (either a. because the=
 server was
>>>> already selected by a downstream node, or b. because the server will b=
e selected
>>>> by an upstream node) then there is no point in applying diversion and =
the reacting
>>>> node SHOULD apply throttling of requests that do not survive.
>>>>=20
>>>> Proposal: replace the paragraphs with:
>>>>    If the reacting node does not select the server then it SHOULD appl=
y
>>>>    throttling abatement to the request.
>>>>=20
>>>>    If the reacting node selects the server then it SHOULD apply divers=
ion
>>>>    abatement treatment (i.e. select an alternative server if possible)=
 to
>>>>    the request.
>>>> Diversion is not selecting an alternative node to handle the request. =
 Diversion is selecting an alternative route to the selected node.
>>>>=20
>>>> Whether it is appropriate to select an alternative node for a request =
is an application decision that probably changes on a per command-code basi=
s within the application. Logic like this is outside the scope of the DOIC =
specification.
>>>>=20
>>>> The text is correct based on the definition of diversion.
>>>>=20
>>>> Regards,
>>>>=20
>>>> Steve
>>>>=20
>>>>=20
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime


From nobody Tue Dec 16 06:12:40 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 153DF1A1B5F for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 06:12:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XeGx7m5-_nZK for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 06:12:35 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B17A71A1B26 for <dime@ietf.org>; Tue, 16 Dec 2014 06:12:35 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63202 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0srX-0000iP-SI; Tue, 16 Dec 2014 06:12:34 -0800
Message-ID: <54903DCF.2090402@usdonovans.com>
Date: Tue, 16 Dec 2014 08:12:31 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>,  Ben Campbell <ben@nostrum.com>
References: <545792B6.8030502@usdonovans.com> <5464FD42.8080709@usdonovans.com> <9939_1415923523_54654743_9939_948_1_6B7134B31289DC4FAF731D844122B36E8DB63C@PEXCVZYM13.corporate.adroot.infra.ftgroup> <, > <087A34937E64E74E848732CFF8354B9209863A54@ESESSMB101.ericsson.se> <24987_1416213505_5469B401_24987_4151_1_judb1lo2cnj5m4v6mdt5aec1.1416213483721@email.android.com> <CEAD047C-4EA2-4823-BC54-5603ABDC64D9@nostrum.com> <54748CEA.3020705@usdonovans.com> <19072_1416939968_5474C9C0_19072_1519_1_6B7134B31289DC4FAF731D844122B36E941639@PEXCVZYM13.corporate.adroot.infra.ftgroup> <547E09C0.5080305@usdonovans.com> <E194C2E18676714DACA9C3A2516265D2026F0FAF@FR712WXCHMBA12.zeu.alcatel-lucent.com> <E194C2E18676714DACA9C3A2516265D2026F1036@FR712WXCHMBA12.zeu.alcatel-lucent.com> <547F46D5.7060800@usdonovans.! com> <087A34937E64E74E848732CFF8354B920987F790@ESESSMB101.ericsson.se> <F9D57A16-94F6-4F1E-82B4-46B342D51B1E@nostrum.com> <087A34937E64E74E848732CFF8354B9209880865@ESESSMB101.ericsson.se>
In-Reply-To: <087A34937E64E74E848732CFF8354B9209880865@ESESSMB101.ericsson.se>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/orvDfLJoKrbcgfJCuLp_NrhH-_g
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Updates to DOIC -05
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 14:12:38 -0000

How about the following:

Therefore, before
    applying local message throttling, a reporting node needs to check if
    these messages are covered by an active overload occurrence,


Regards,

Steve

On 12/12/14, 2:04 AM, Maria Cruz Bartolome wrote:
> 2119 language is not required in my opinion, as long as the message is transmitted.
> Cheers
> /MCruz
>
> -----Original Message-----
> From: Ben Campbell [mailto:ben@nostrum.com]
> Sent: jueves, 11 de diciembre de 2014 0:46
> To: Maria Cruz Bartolome
> Cc: Steve Donovan; TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@orange.com; dime@ietf.org
> Subject: Re: [Dime] Updates to DOIC -05
>
>
>> On Dec 10, 2014, at 9:09 AM, Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com> wrote:
>>
>> Dear all,
>>   
>> I have the following proposal, for first paragraph
>> Now:
>> Therefore, before
>>     applying local message throttling, a reporting node needs to check if
>>     these messages match existing OCS entries,
>>   
>> Proposal
>> Therefore, before
>>     applying local message throttling, a reporting node MAY check if
>>     these messages match existing OCS entries,
>>   
>> I think the reporting node may or not check whether the received messages match a "delegated" active OCS. This is a processing consuming task that could be avoided if the reporting node uses different criteria to choose messages to drop/reject. This is up to  implementation.
> I am okay with it being up to the implementation. I think the point of the warning is to let implementers know they need to consider this.
>
> But I wonder why you want to add 2119 language when it didn't have it before?
>
>
>>   
>> Best regards
>> /MCruz
>>   
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Steve Donovan
>> Sent: miércoles, 03 de diciembre de 2014 18:22
>> To: TROTTIN, JEAN-JACQUES (JEAN-JACQUES); lionel.morand@orange.com;
>> Ben Campbell
>> Cc: dime@ietf.org
>> Subject: Re: [Dime] Updates to DOIC -05
>>   
>> I have attempted to address both Lionel's and Jean-Jacques' suggestions with the following text:
>>
>>     When a reporting node sends an OLR, it effectively delegates any
>>     necessary throttling to downstream nodes.  If the reporting node also
>>     locally throttles the same set of messages, the overall number of
>>     throttled requests may be higher than intended.  Therefore, before
>>     applying local message throttling, a reporting node needs to check if
>>     these messages match existing OCS entries, indicating that these
>>     messages have survived throttling applied by downstream nodes that
>>     have received the related OLR.
>>   
>>     However, even if the set of messages match existing OCS entries, the
>>     reporting node can still apply other abatement methods such as
>>     diversion.  The reporting node might also need to throttle requests
>>     for reasons other than overload.  For example, an agent or server
>>     might have a configured rate limit for each client, and throttle
>>     requests that exceed that limit, even if such requests had already
>>     been candidates for throttling by downstream nodes.  The reporting
>>     node also has the option to send new OLRs requesting greater
>>     reductions in traffic, reducing the need for local throttling.
>>
>> Steve
>>
>> On 12/3/14, 6:19 AM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
>> Dear all
>>   
>> To continue on my remark , I would complement the Steve's text with " can update the reduction of traffic it requires from the reacting nodes(s) by sending new overload reports" as hereafter:
>>   
>>     Therefore, if a
>>     reporting node needs to apply local throttling on a set of messages
>>     that match existing OCS entries, it needs to consider
>>     the impact of throttling by downstream nodes and can update the reduction of traffic it requires from the reacting nodes(s) by sending new overload reports.
>>   
>> Best regards
>>   
>> JJacques
>>   
>>   
>> De : DiME [mailto:dime-bounces@ietf.org] De la part de TROTTIN,
>> JEAN-JACQUES (JEAN-JACQUES) Envoyé : mercredi 3 décembre 2014 11:29 À
>> : Steve Donovan; lionel.morand@orange.com; Ben Campbell Cc :
>> dime@ietf.org Objet : Re: [Dime] Updates to DOIC -05
>>   
>> Dear all
>>   
>> I am not against the new proposed texts from Steve or Ben to clarify this topic.
>>   
>> My point is that, when  the reporting node has sent an OLR requiring  a traffic reduction , there is first a reaction time before receiving reduced traffic, and second even if the traffic has been reduced, it can still exceed the capacity of the reporting node  that has no other choice than to throttle the received reduced traffic (if no diversion). This can happen when the traffic at the source (reacting node) before throttling is increasing quickly, so the traffic reduced  according to the received OLR may  remain too high .  Then, if the reporting node has nevertheless to do some throttle, it will certainly react by new OLRs requiring a higher traffic reduction from the reacting nodes. This is a dynamic process, where the reporting node adjust the  traffic  reduction it requires according to what it receives .
>>   
>> As Ben  I also think this is a guidance , and I think it is good to bring some guidance.
>>   
>> Best regards
>>   
>> JJacques
>>   
>> De : DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
>> Envoyé : mardi 2 décembre 2014 19:50 À : lionel.morand@orange.com; Ben
>> Campbell Cc : dime@ietf.org Objet : Re: [Dime] Updates to DOIC -05
>>   
>> Lionel,
>>
>> The two paragraphs together now say the following:
>>
>>     When a reporting node sends an OLR, it effectively delegates any
>>     necessary throttling to downstream nodes.  If the reporting node also
>>     locally throttles the same set of messages, the overall number of
>>     throttled request may be higher than intended.  Therefore, if a
>>     reporting node needs to apply local throttling on a set of messages
>>     that match or overlap with existing OCS entries, it needs to consider
>>     the impact of throttling by downstream nodes.
>>   
>>     However, when the reporting node sends an OLR downstream, it might
>>     still need to apply other abatement methods such as diversion.  The
>>     reporting node might also need to throttle requests for reasons other
>>     than overload.  For example, an agent or server might have a
>>     configured rate limit for each client, and throttle requests that
>>     exceed that limit, even if such requests had already been candidates
>>     for throttling by downstream nodes.
>> Do you see the need for further clarification?
>>
>> Steve
>>
>> On 11/25/14, 12:26 PM, lionel.morand@orange.com wrote:
>> I'm OK with the idea of the text proposed by Ben.
>> I would just make clear that throttling is applicable to the fact of sending/forwarding requests (cf. definition). A reporting node may apply local throttling if it is an agent. But if it is a server, it can either drop the exceeded number of requests (no response sent to the downstream) or send a specific DIAMETER-TOO-BUSY response. I think that this clarification is somehow missing in the document.
>>   
>> Regards,
>>   
>> Lionel
>>   
>> -----Message d'origine-----
>> De : Steve Donovan [mailto:srdonovan@usdonovans.com] Envoyé : mardi 25
>> novembre 2014 15:07 À : Ben Campbell; MORAND Lionel IMT/OLN Cc :
>> Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org; Maria Cruz Bartolome
>> Objet : Re: [Dime] Updates to DOIC -05
>>   
>> I'm ok with Ben's wording and will make the change unless I hear objections on the list.
>>   
>> Steve
>>   
>> On 11/21/14, 5:01 PM, Ben Campbell wrote:
>> On reflection, I think there might be a subtlety here. The resulting offered-load may still exceed the reporting node's current capacity. This can be true even if it's sent an OLR (and thus has related OCS). As mentioned in the surrounding node needs to still be able to protect itself, possibly by throttling. Therefore, I propose the sentence take the form of non-normative guidance. For example:
>>   
>> "When a reporting node sends an OLR, it effectively delegates any necessary throttling to downstream nodes.  If the reporting node also locally throttles the same set of messages, the overall number of throttled request may be higher than intended. Therefore, if a reporting node needs to apply local throttling on a set of messages that match or overlap with existing OCS entries, it needs to consider the impact of throttling by downstream nodes."
>>   
>>    
>> On Nov 17, 2014, at 2:38 AM, lionel.morand@orange.com wrote:
>>   
>> I can live with the text proposed by Ulrich. But what is wrong with:
>>   
>> " Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which an active OCS applies." ?
>>   
>> Envoyé depuis mon Sony Xperia SP d'Orange
>>   
>> ---- Maria Cruz Bartolome a écrit ----
>>   
>>   
>> Section 4.2.3, 13th paragraph, 2nd sentence:
>> Existing text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the OLR applies.
>> Proposed text: Therefore, the reporting node SHOULD NOT apply throttling to the set of messages to which the sent OLR applies.
>>   
>> [LM] I would say that the reporting node will not remember the previously sent OLR, but will take care that there is an active OCS.
>> SRD> I'm ok with Ulrich's change.
>>   
>> [LM] and this is incorrect but not fundamental. The reporting node does not have to "remember" a previously sent OLR. What it will do is to refer to existing OCS to know that throttling should not be applied. An OCS is a consequence of an sent OLR but it is not an OLR itself. But not fundamental here.
>>   
>> [MCruz] I am ok with Ulrich's change. It does not mean that the reporting node needs to "remember" a previously sent OLR, though. The change only proposes to "identify" which OLR we refer to.
>>   
>> Best regards
>> /MCruz
>>   
>>   
>> _____________________________________________________________________
>> ____________________________________________________
>>   
>> Ce message et ses pieces jointes peuvent contenir des informations
>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>> exploites ou copies sans autorisation. Si vous avez recu ce message
>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>   
>> This message and its attachments may contain confidential or
>> privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>   
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>   
>>   
>>   
>> ______________________________________________________________________
>> ___________________________________________________
>>   
>> Ce message et ses pieces jointes peuvent contenir des informations
>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>> exploites ou copies sans autorisation. Si vous avez recu ce message
>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>   
>> This message and its attachments may contain confidential or
>> privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>   
>>   
>>   
>>   
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Tue Dec 16 06:51:08 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F2D91A1B22 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 06:51:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b9BnmJXKmpO2 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 06:51:05 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA5B31A1B0C for <dime@ietf.org>; Tue, 16 Dec 2014 06:51:04 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63247 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0tSm-0001XP-2G; Tue, 16 Dec 2014 06:51:03 -0800
Message-ID: <549046D3.3090104@usdonovans.com>
Date: Tue, 16 Dec 2014 08:50:59 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  Ben Campbell <ben@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/jJfp7QtXu8B6RnV2VdHA_EAY7bU
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 14:51:06 -0000

I'll delete the paragraph.

Do we need explicit statements for the two conditions below?

Steve


On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve, Ben,
>
> I'm fine with deleting the paragraph.
> But for my clarification please confirm that ignoring the complete set of OLRs is allowed when one of these OLRs contains a report type that was not advertized, or two of the OLRs contain the same report type.
>
> Regards
> Ulrich
>
>
>
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Thursday, December 11, 2014 8:26 PM
> To: Ben Campbell
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
>
>
> On 12/11/14, 12:51 PM, Ben Campbell wrote:
>>> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>
>>> I thought this paragraph was covering unrecognized values for all AVPs.
>> I agree that's what it covered. But I think we failed to cover the unrecognized AVP case. If we don't have anything to say beyond what 6733 says, then it might not be strictly necessary, but it might still be worth saying that "unrecognized sub-AVPs are treated as per RFC6733".
> That is probably worth saying.
>>>    Maybe it is better to remove the paragraph entirely and make sure that the definition of each AVP addresses what is done with unrecognized values.
>> Possibly. There are AVPs where there's no such thing as an unrecognized value. There may be AVPs where the allowed values vary by algorithm. If we do take that route, we probably need language here that says unrecognized values are handled as described by the AVP definition or the algorithm.
> Agreed.
>>> Steve
>>>
>>> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>>>>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> Actually, the wording you suggested wasn't quite right.  It should be:
>>>>>
>>>>>     When receiving an OC-OLR AVP with unknown values, the overload report
>>>>>     SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>>     be logged.
>>>>>
>>>>> It's not just about report type values but unknown values for any of the AVPs in the OLR.
>>>>>
>>>>> This seems like a good requirement to include in the specification to ensure common behavior in reacting nodes.  I don't feel strongly about this but I would like to hear other opinions.
>>>> I think this is still not quite complete.
>>>>
>>>> If you receive a sub-AVP that you don't understand, then you should ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a value you don't understand, the behavior should be AVP specific. For Report-Type, that means ignore the whole OLR.
>>>>
>>>> It's not clear to me whether the original text was about arbitrary avps, or Report-Type.
>>>>
>>>>> Steve
>>>>>
>>>>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>>> Hi Steve,
>>>>>>
>>>>>> I think it was pointed out by Ben that we do not specify behaviour of a node for cases where it detects that another node is breaking the rule.
>>>>>> The rule is:
>>>>>>      A reporting node MUST NOT send overload reports of a type that has
>>>>>>      not been advertised as supported by the reacting node.
>>>>>> See section 4.2.3.
>>>>>>
>>>>>> Regards
>>>>>> Ulrich
>>>>>>
>>>>>>     From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>>>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>>>>> To: dime@ietf.org
>>>>>> Subject: [Dime] Ulrich's suggested change #15
>>>>>>
>>>>>> Ulrich,
>>>>>>
>>>>>> For your suggested change #15:
>>>>>> Section 4.2.1.3, 4th paragraph:
>>>>>> Existing text:
>>>>>>      When receiving an OC-OLR AVPs with unknown values, a reacting node
>>>>>>      SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>>>      be logged.
>>>>>> Comment: text is confusing. Maybe the intention was to say:
>>>>>>      When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
>>>>>>      SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>>>>      be logged.
>>>>>> But even that is not correct.
>>>>>> Proposal: Remove the paragraph.
>>>>>> The intent was that an OC-OLR that contains unknown values should be discarded.  I agree that the wording needs to be changes as you suggested.  I don't agree with removing the paragraph.  Can you elaborate on why you think it is not correct when changed as you suggested?
>>>>>>
>>>>>> Regards,
>>>>>>
>>>>>> Steve
>>>>>>
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Tue Dec 16 06:54:31 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 566C11A1B4E for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 06:54:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cmJnCPVtNlgv for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 06:54:27 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE4E71A1B0C for <dime@ietf.org>; Tue, 16 Dec 2014 06:54:27 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63248 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0tW4-0005yx-CX; Tue, 16 Dec 2014 06:54:26 -0800
Message-ID: <549047A0.4060503@usdonovans.com>
Date: Tue, 16 Dec 2014 08:54:24 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  ext Ben Campbell <ben@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com> <5489F246.5040801@usdonovans.com> <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D9000668152359A7@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D9000668152359A7@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ipH6FDwz_wrTzMgo4Tv2cTUnc2I
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 14:54:29 -0000

Ulrich,

I still think the following statements are sufficient:

    For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
    apply throttling abatement treatment to the request.

    For OLRs of type host, if the request is a realm-routed request then the reacting node
    SHOULD apply diversion abatement treatment to the request.

    For OLRs of type realm, the reacting node SHOULD
    apply throttling abatement treatment to the request, independent of the type (host-routed or
    realm-routed) of request.

Regards,

Steve

On 12/15/14, 2:42 PM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
> can you please summarize the status of #16. I'm getting lost.
>
> Regards
> Ulrich
>
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]
> Sent: Thursday, December 11, 2014 8:45 PM
> To: Steve Donovan
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #16
>
>
>> On Dec 11, 2014, at 1:36 PM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>>
>> On 12/11/14, 1:03 PM, Ben Campbell wrote:
>>>> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>> Ulrich,
>>>>
>>>> I agree with your assumptions below.  For the third one, the only time it is possible, at least from a DOIC perspective, to send to another host is if it is a realm-routed request.  I might also change the "not overloaded" to "less overloaded".
>>>>
>>>> I do think the statements can be improved to differentiate between behavior for host reports and realm reports.
>>>>
>>>> How about the following:
>>>>     For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request.
>>>>
>>>>     For OLRs of type host, If the request is a realm-routed request then the reacting node
>>>>     SHOULD apply diversion abatement treatment to the request.
>>> Personally, I think that should be non-normative. Or if normative, no stronger than MAY. I agree it's a good choice, but I think we can leave it to the market to enforce.
>> If we make it non normative then we probably need an additional statement along the lines of "the reacting node MUST attempt to reduce traffic by the amount requested in the OLR" if we don't already have it somewhere else in the document.
> Agreed
>
>>> I think there when we distinguish request-type, we need to consider _when_. For example, an agent may _receive_ a realm routed request but _send_ a host-routed request. And for a client, that may be even more subtle.
>>>
>>> This really does seem like a case of server selection.
>> I don't think it's that subtle.  If server selection hasn't already happened for a request and that request is selected for abatement and the request would have otherwise been routed to an overloaded host then the request should/may be diverted to another server.
>>
>> Server selection could have happened as a result of a previous transaction specifying the host for subsequent transactions or by the presence of the Destination-Host in the message when it arrives at an agent.  It could have also already happened as a result of configuration.
> In the case of a client, the decision on whether to divert vs just not send a request may be heavily influenced by the client application.  (Not necessarily the _Diameter_ application.)  In the case of either, a node might have local knowledge that a 2nd server can handle everything the first server can handle. Even if a downstream node performed server selection, a node with such knowledge might override it. We don't necessarily need to talk about that sort of thing, but we should avoid language that forbids it.
>
>
>>>>     For OLRs of type realm, the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request, independent of the type (host-routed or
>>>>     realm-routed) of request.
>>> Again, I think this should not be normative. In this case this is pretty much a statement of fact--you simply cannot reasonably divert given the way that Diameter routing works. I suppose there might be a case where a node has some magical knowledge that realm2 can handle anything that realm1 can, and could divert to a different realm (which we probably still don't want to forbid.)
>>>
>>>> Regards,
>>>>
>>>> Steve
>>>>
>>>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>> Steve,
>>>>> yes, then, maybe, the definition of Diversion is not correct?
>>>>> What are other people's views?
>>>>>
>>>>> My assumption was:
>>>>> If a host is overloaded, it does not help to direct traffic to that host via a different path.
>>>>> If a realm is overloaded, it does not help to direct traffic to that realm via a different path.
>>>>> If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.
>>>>> If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.
>>>>>
>>>>> With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.
>>>>>
>>>>> Regards
>>>>> Ulrich
>>>>>
>>>>> From: DiME [
>>>>> mailto:dime-bounces@ietf.org
>>>>> ] On Behalf Of ext Steve Donovan
>>>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>>>> To:
>>>>> dime@ietf.org
>>>>>
>>>>> Subject: [Dime] Ulrich's suggested change #16
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> For your suggested change #16:
>>>>> Section 4.2.2, 5th and 6th paragraph:
>>>>> Existing text:
>>>>>     If the request is a host-routed request then the reacting node SHOULD
>>>>>     apply throttling abatement treatment to the request.
>>>>>       If the request is a realm-routed request then the reacting node
>>>>>     SHOULD apply diversion abatement treatment to the request.
>>>>>
>>>>> Comment: I don't think so. If the reacting node selects the server and
>>>>> then detects that the selected server is overloaded and then detects that
>>>>> the request does not survive (i.e. is subject to abatement), then the reacting
>>>>> node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
>>>>> If the reacting node does not select the server (either a. because the server was
>>>>> already selected by a downstream node, or b. because the server will be selected
>>>>> by an upstream node) then there is no point in applying diversion and the reacting
>>>>> node SHOULD apply throttling of requests that do not survive.
>>>>>
>>>>> Proposal: replace the paragraphs with:
>>>>>     If the reacting node does not select the server then it SHOULD apply
>>>>>     throttling abatement to the request.
>>>>>
>>>>>     If the reacting node selects the server then it SHOULD apply diversion
>>>>>     abatement treatment (i.e. select an alternative server if possible) to
>>>>>     the request.
>>>>> Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
>>>>>
>>>>> Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application. Logic like this is outside the scope of the DOIC specification.
>>>>>
>>>>> The text is correct based on the definition of diversion.
>>>>>
>>>>> Regards,
>>>>>
>>>>> Steve
>>>>>
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Tue Dec 16 07:02:42 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DD911A1B4E for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:02:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.778
X-Spam-Level: 
X-Spam-Status: No, score=0.778 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mqjEPocezEJC for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:02:33 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 649711A1B59 for <dime@ietf.org>; Tue, 16 Dec 2014 07:02:33 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63255 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0tds-0003r9-HX; Tue, 16 Dec 2014 07:02:32 -0800
Message-ID: <54904984.9080802@usdonovans.com>
Date: Tue, 16 Dec 2014 09:02:28 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <5486FA8B.6040503@usdonovans.com> <BA5AEFCE-D814-44F8-939B-5BC5CDDA69B2@nostrum.com>
In-Reply-To: <BA5AEFCE-D814-44F8-939B-5BC5CDDA69B2@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/j53o-oO5mJNygKSdb2pN5XYhSRE
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested changes #9 and #10
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 15:02:40 -0000

Ben,

See inline.

Steve

On 12/10/14, 5:06 PM, Ben Campbell wrote:
>> On Dec 9, 2014, at 7:35 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> Suggested changes 9 and 10 are linked so I'll deal with them in a single email:
>>
>> Section 4.1.3, 1st paragraph:
>> Existing text:
>>     Diameter Agents that support DOIC SHOULD ensure that all messages
>>     relayed by the agent contain the OC-Supported-Features AVP.
>> Comment: The SHOULD in the first line is not correct based on my next comment.
>> Proposal: Delete the first paragraph.
>>
>> Section 4.1.3, 4th paragraph:
>> Existing text:
>>     A Diameter Agent SHOULD take on reporting node behavior for Diameter
>>     endpoints that do not support the DOIC solution.  A Diameter Agent
>>     detects that a Diameter endpoint does not support DOIC reporting node
>>     behavior when there is no OC-Supported-Features AVP in an answer
>>     message for a transaction that contained the OC-Supported-Features
>>     AVP in the request message.
>> Comment: The first sentence can reasonably only apply to Diameter agents that are immediate peers to the non-supporting Diameter endpoint. We cannot expect a far-away-agent to take on reporting node behavior when all upstream agents and the server do not support DOIC. Furthermore: When the non-supporting server has two DOIC supporting immediate peer agents which both take on reporting node behavior we end up in problems similar to those identified in the note in section 3.3.
>> Proposal:Replace the paragaph with:
>>     A Diameter Agent that is an immediate peer to the Diameter endpoint
>>     that does not support DOIC SHOULD take on reporting node behavior for
>>     Diameter endpoints that do not support the DOIC solution.  A Diameter
>>     Agent detects that a Diameter endpoint does not support DOIC reporting
>>     node behavior when there is no OC-Supported-Features AVP in an answer
>>     message for a transaction that contained the OC-Supported-Features
>>     AVP in the request message.
>>        Note: Known issues exist if multiple sources for overload reports
>>        which apply to the same Diameter entity exist.  Reacting nodes
>>        have no way of determining the source and, as such, will treat
>>        them as coming from a single source.  Variance in sequence numbers
>>        between the two sources can then cause incorrect overload
>>        abatement treatment to be applied for indeterminate periods of
>>        time.
>>
>> You point out an interesting issue with agents taking on reporting node functionality.
>>
>> I don't, however, think that an agent that takes on reporting node functionality for a non supporting host needs to be adjacent to the host.  The important thing is that it has visibility to all of the traffic sent to the host.
>>
>> I suggest keeping the first paragraph but changing the SHOULD to a MAY.
>>
>> I also suggest changing the SHOULD to a MAY in the fourth paragraph and changing the first sentence to:
>>
>> A Diameter Agent MAY take on reporting node behavior for Diameter endpoints that do not support the DOIC solution.
> I agree with everything up to there. (Not necessarily for the reasons given, but I've been pushing for this to be MAY or non-normative for a while now :-) )
>
>
>> The Diameter Agent MUST have visibility to all traffic destined for the non supporting host in order to become the reporting node for the Diameter endpoint.
> I see the issue, but I think that answer needs more thought. It seems to disallow the case where you have a pair of agents in an active-active configuration in front of a non-supporting server, unless they sync OCS. I strongly suspect that case will be the rule, at least for telecom deployments.
SRD> I don't think it rules these deployments out, it just points out 
that they might be hard to implement.  "Has visibility" doesn't mean 
"personally handles".  There would need to be state sharing between the 
two agents for it to work correctly, but it can work.
>
> /Ben


From nobody Tue Dec 16 07:07:32 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78E551A1AF2 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:07:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PSASoQv_Cvs5 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:07:28 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99B5E1A1B0C for <dime@ietf.org>; Tue, 16 Dec 2014 07:07:27 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBGF7Q9M049361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 09:07:26 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54904984.9080802@usdonovans.com>
Date: Tue, 16 Dec 2014 09:07:25 -0600
X-Mao-Original-Outgoing-Id: 440435245.654219-3c1a2c9edba05a4c0f72a4f3717ae31b
Content-Transfer-Encoding: quoted-printable
Message-Id: <6EF55321-C08A-411C-959D-31DC7BFE973F@nostrum.com>
References: <5486FA8B.6040503@usdonovans.com> <BA5AEFCE-D814-44F8-939B-5BC5CDDA69B2@nostrum.com> <54904984.9080802@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/KG8Fdg4brJBUx7iafT9Z8-c213g
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested changes #9 and #10
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 15:07:30 -0000

> On Dec 16, 2014, at 9:02 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>>> The Diameter Agent MUST have visibility to all traffic destined for =
the non supporting host in order to become the reporting node for the =
Diameter endpoint.
>> I see the issue, but I think that answer needs more thought. It seems =
to disallow the case where you have a pair of agents in an active-active =
configuration in front of a non-supporting server, unless they sync OCS. =
I strongly suspect that case will be the rule, at least for telecom =
deployments.
> SRD> I don't think it rules these deployments out, it just points out =
that they might be hard to implement.  "Has visibility" doesn't mean =
"personally handles".  There would need to be state sharing between the =
two agents for it to work correctly, but it can work.
>=20

For the record, I think active-active agents will be too common for us =
to require inter-agent OCS state sharing for it to work.

This problem will also exist for aggregated servers. That is also common =
place.=


From nobody Tue Dec 16 07:15:03 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B11B1A1B30 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:14:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KoVC-MP1X34S for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:14:56 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B6B21A1B44 for <dime@ietf.org>; Tue, 16 Dec 2014 07:14:38 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:63266 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y0tpa-0007Hb-RH; Tue, 16 Dec 2014 07:14:37 -0800
Message-ID: <54904C5A.2070502@usdonovans.com>
Date: Tue, 16 Dec 2014 09:14:34 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net> <5489A416.2000403@usdonovans.com> <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com>
In-Reply-To: <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5FCJS79k3K7G6-b84tfEUdJtVEA
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 15:14:58 -0000

Ben,

I see a two or three options here:

1) We add a new attribution AVP and all of the text associated with it.  
This has obvious schedule implications.

2) We treat this the same way as we treated the issue with multiple 
sources of OC-OLR AVPs and add text somewhere in the draft saying that 
if agents are selecting abatement algorithms then care must be taken to 
make sure that all agents that handle traffic for the same Diameter node 
must select the same algorithm for all transactions involving that 
Diameter node.

3) Number two plus reacting node behavior statements saying that the 
reacting node SHOULD ignore overload reports for a node that has an 
active OCS if the received overload report is of a different type then 
stored in the active OCS.

I vote for number 3.

Regards,

Steve

On 12/11/14, 12:38 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:03 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ulrich,
>>
>> I see your concern.  To summarize, if we have the following configuration:
>>
>>     ----A1----
>>    /          \
>>   C            S
>>    \          /
>>     ----A2----
>>
>> And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 indicates rate then there is ambiguity.
>>
>> I agree, this warrants a warning statement somewhere in the document.
>>
>> If there is general agreement on this then I'll propose wording and location.
>>
> What sort of guidance should we give here? IMO, this is a worse problem than for realm reports, or at least having it for both realm and host reports makes it considerably worse than before. I think variations on this will happen for almost any Diameter network of non-trivial size.
>
> I also think it's reasonable that A1 and A2 might select different algorithms towards C. For example, lets say C, A1, and S all support rate, but A2 does not. S might select rate towards A1, but loss towards A2.
>
> If we can't handle this, I think the entire solution breaks down.
>
> I propose that the best way to handle this is to add source-attribution into OLRs, and guidance for what C should do if it gets different capabilities for the same host or realm from different paths. This _might_ also help solve the "different reports for same realm" problem and the "can't tell if an intervening agent supports DOIC" problem.
>
>
>> Steve
>>
>> On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>>   
>>> yes, it’s about capability announcement, and my concern in with announcing the selected algorithm in answer messages (while no OLRs are sent). Multiple  agents modifying the selected algorithm in the Supported-Features AVPs in answer messages may  result in ambiguity in DOIC behaviour for downstream DOIC nodes.
>>>   
>>> Ulrich
>>>   
>>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>>> Sent: Wednesday, December 10, 2014 1:41 PM
>>> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>>> Subject: Re: [Dime] Ulrich's suggested change @12
>>>   
>>> Ulrich,
>>>
>>> This paragraph is talking about capability announcement.  We deal with the issues related to multiple sources of overload reports already elsewhere in the document.
>>>
>>> I still do see the need for a change.
>>>
>>> Steve
>>>
>>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>> I agree, my comment and proposal do not hit the mark.
>>>   
>>> The intention was to say that known issues exist if there are multiple agents on multiple paths between client and server. The agents may not be able to ensure that there is no ambiguity in DOIC behaviour for the client. E.g. from the client’s point of view the answer to a first request (which was modified by agent A1) could indicate: DOIC is supported, currenty no overload, once in overload loss will be selected; and the answer to the next request (which was modified by agent A2) could indicate: DOIC is supported, some?? reduction is requested using rate. The client, however, may not be prepared for rate.
>>>   
>>> Maybe a warning note could be added to say that the agent may not always be able to ensure that there is no ambiguity.
>>>   
>>> Ulrich
>>>   
>>>   
>>>   
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>> Sent: Tuesday, December 09, 2014 2:45 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change @12
>>>   
>>> Ulrich,
>>>
>>> For your suggested change #12:
>>>
>>> Section 4.1.3, last paragraph:
>>> Existing text:
>>>     When making changes to the OC-Supported-Features AVP the Diameter
>>>     Agent needs to ensure that there is no ambiguity in DOIC behavior for
>>>     both upstream and downstream DOIC nodes.
>>>   
>>> Comment: while that is true, in addition problems similar to those
>>> identified in the note in section 3.3 may result from making changes.
>>>   
>>> Proposal: Add the note:
>>>        Note: Known issues exist if multiple sources for overload reports
>>>        which apply to the same Diameter entity exist.  Reacting nodes
>>>        have no way of determining the source and, as such, will treat
>>>        them as coming from a single source.  Variance in sequence numbers
>>>        between the two sources can then cause incorrect overload
>>>        abatement treatment to be applied for indeterminate periods of
>>>        time.
>>> I don't understand how these are related.  The change to the OC-Supported-Features AVP made by the agent apply only to the transaction.  In addition, this paragraph doesn't mention overload reports.
>>>
>>> Regards,
>>>
>>> Steve
>>>
>>>
>>>
>>>   
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Tue Dec 16 07:35:47 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96EA61A1BB1 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:35:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4qGvGxProp7F for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 07:35:43 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48A521A1BAC for <dime@ietf.org>; Tue, 16 Dec 2014 07:35:43 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBGFZgUj051864 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 09:35:42 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54904C5A.2070502@usdonovans.com>
Date: Tue, 16 Dec 2014 09:35:41 -0600
X-Mao-Original-Outgoing-Id: 440436941.800051-ebc7063d76a6b4b0c236f5e8061ee125
Content-Transfer-Encoding: quoted-printable
Message-Id: <4C4C3C8F-3A9B-4062-98FE-F980F170AD3D@nostrum.com>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net> <5489A416.2000403@usdonovans.com> <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com> <54904C5A.2070502@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/F07OzZVvk6x1P_DDTN7anenC3RY
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Dec 2014 15:35:45 -0000

> On Dec 16, 2014, at 9:14 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ben,
>=20
> I see a two or three options here:
>=20
> 1) We add a new attribution AVP and all of the text associated with =
it.  This has obvious schedule implications.

Agreed that it has schedule implications. Schedule is important, but a =
workable solution is more important. (I concede that we have not yet =
established consensus that this is non-workable--see below)

>=20
> 2) We treat this the same way as we treated the issue with multiple =
sources of OC-OLR AVPs and add text somewhere in the draft saying that =
if agents are selecting abatement algorithms then care must be taken to =
make sure that all agents that handle traffic for the same Diameter node =
must select the same algorithm for all transactions involving that =
Diameter node.

On reflection, this is a more general problem than just algorithm =
choices. It's a generalization of the problem with multiple realm-report =
sources for a single realm. Basically we have a problem when you have =
more than one reporting node for a given overload scope. (The problem of =
multiple algorithms for the same "scope" would also apply to the =
multiple realm-report source issue.)

Basically, I think we've discovered the scope of the multiple =
reporting-node problem is considerably larger than we thought. That =
means we at least need to consider whether the decision to defer that =
solution is still reasonable. Remember that we made that decision at =
least partly because we thought the problem would not be that common.

>=20
> 3) Number two plus reacting node behavior statements saying that the =
reacting node SHOULD ignore overload reports for a node that has an =
active OCS if the received overload report is of a different type then =
stored in the active OCS.

Do you mean different OLR type, or different algorithm for the same OLR =
type?

>=20
> I vote for number 3.
>=20
> Regards,
>=20
> Steve
>=20
> On 12/11/14, 12:38 PM, Ben Campbell wrote:
>>> On Dec 11, 2014, at 8:03 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>> Ulrich,
>>>=20
>>> I see your concern.  To summarize, if we have the following =
configuration:
>>>=20
>>>    ----A1----
>>>   /          \
>>>  C            S
>>>   \          /
>>>    ----A2----
>>>=20
>>> And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 =
indicates rate then there is ambiguity.
>>>=20
>>> I agree, this warrants a warning statement somewhere in the =
document.
>>>=20
>>> If there is general agreement on this then I'll propose wording and =
location.
>>>=20
>> What sort of guidance should we give here? IMO, this is a worse =
problem than for realm reports, or at least having it for both realm and =
host reports makes it considerably worse than before. I think variations =
on this will happen for almost any Diameter network of non-trivial size.
>>=20
>> I also think it's reasonable that A1 and A2 might select different =
algorithms towards C. For example, lets say C, A1, and S all support =
rate, but A2 does not. S might select rate towards A1, but loss towards =
A2.
>>=20
>> If we can't handle this, I think the entire solution breaks down.
>>=20
>> I propose that the best way to handle this is to add =
source-attribution into OLRs, and guidance for what C should do if it =
gets different capabilities for the same host or realm from different =
paths. This _might_ also help solve the "different reports for same =
realm" problem and the "can't tell if an intervening agent supports =
DOIC" problem.
>>=20
>>=20
>>> Steve
>>>=20
>>> On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Steve,
>>>>  yes, it=92s about capability announcement, and my concern in with =
announcing the selected algorithm in answer messages (while no OLRs are =
sent). Multiple  agents modifying the selected algorithm in the =
Supported-Features AVPs in answer messages may  result in ambiguity in =
DOIC behaviour for downstream DOIC nodes.
>>>>  Ulrich
>>>>  From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>>>> Sent: Wednesday, December 10, 2014 1:41 PM
>>>> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>>>> Subject: Re: [Dime] Ulrich's suggested change @12
>>>>  Ulrich,
>>>>=20
>>>> This paragraph is talking about capability announcement.  We deal =
with the issues related to multiple sources of overload reports already =
elsewhere in the document.
>>>>=20
>>>> I still do see the need for a change.
>>>>=20
>>>> Steve
>>>>=20
>>>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Steve,
>>>> I agree, my comment and proposal do not hit the mark.
>>>>  The intention was to say that known issues exist if there are =
multiple agents on multiple paths between client and server. The agents =
may not be able to ensure that there is no ambiguity in DOIC behaviour =
for the client. E.g. from the client=92s point of view the answer to a =
first request (which was modified by agent A1) could indicate: DOIC is =
supported, currenty no overload, once in overload loss will be selected; =
and the answer to the next request (which was modified by agent A2) =
could indicate: DOIC is supported, some?? reduction is requested using =
rate. The client, however, may not be prepared for rate.
>>>>  Maybe a warning note could be added to say that the agent may not =
always be able to ensure that there is no ambiguity.
>>>>  Ulrich
>>>>      From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext =
Steve Donovan
>>>> Sent: Tuesday, December 09, 2014 2:45 PM
>>>> To: dime@ietf.org
>>>> Subject: [Dime] Ulrich's suggested change @12
>>>>  Ulrich,
>>>>=20
>>>> For your suggested change #12:
>>>>=20
>>>> Section 4.1.3, last paragraph:
>>>> Existing text:
>>>>    When making changes to the OC-Supported-Features AVP the =
Diameter
>>>>    Agent needs to ensure that there is no ambiguity in DOIC =
behavior for
>>>>    both upstream and downstream DOIC nodes.
>>>>  Comment: while that is true, in addition problems similar to those
>>>> identified in the note in section 3.3 may result from making =
changes.
>>>>  Proposal: Add the note:
>>>>       Note: Known issues exist if multiple sources for overload =
reports
>>>>       which apply to the same Diameter entity exist.  Reacting =
nodes
>>>>       have no way of determining the source and, as such, will =
treat
>>>>       them as coming from a single source.  Variance in sequence =
numbers
>>>>       between the two sources can then cause incorrect overload
>>>>       abatement treatment to be applied for indeterminate periods =
of
>>>>       time.
>>>> I don't understand how these are related.  The change to the =
OC-Supported-Features AVP made by the agent apply only to the =
transaction.  In addition, this paragraph doesn't mention overload =
reports.
>>>>=20
>>>> Regards,
>>>>=20
>>>> Steve
>>>>=20
>>>>=20
>>>>=20
>>>> =20
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20


From nobody Tue Dec 16 19:02:52 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADF631A1A6B for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 19:02:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VOiPe9TpPVzC for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 19:02:48 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77F221A1A74 for <dime@ietf.org>; Tue, 16 Dec 2014 19:02:48 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH32kP7009189 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 21:02:47 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440478165.879654-962704febedd5904d064ac1b8947d23f
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com>
Date: Tue, 16 Dec 2014 21:02:45 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/PPMZSUjauSvd538DGBYcb4lFgng
Subject: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 03:02:51 -0000

Here's some nits, editorial, and structural comments that are generally =
non-substantive. With the possible exception of comments about 2119 =
language, most of these could be ignored without consequence, but I =
think we'd have a better document if we at least thought about them:

-- General:=20

We keep referring to the DOIC "solution". I think "mechanism" is more =
appropriate. I would think of a DOIC "solution" as a deployment that =
leverages the DOIC "mechanism".

We overuse the word Diameter in front of other things. E.g. Diameter =
nodes, Diameter Agents, Diameter clients, Diameter servers, etc. This =
entire draft is about Diameter; we don't have to keep saying it. It =
tends to get awkward when we use it a lot in close proximity.

Should we put consistently quotes around "loss" when we describe the =
"loss" algorithm?

-- Requirements (2119 language section)

This is oddly placed. I'm used to seeing that after the introduction, =
either stand-alone or as part of a larger terminology section. The RFC =
editor recommends putting it as section 2.=20

-- section 2, Abatement Algorithm: "A mechanism..."

I suggest "An extensible mechanism..."

-- Section 2, Diversion:

Still needs work.  the "by selecting" phrase needs to indicate what does =
the selecting. "Path" should probably be "path or destination".

Proposed text:

"An overload abatement mechanism, where the reacting node selects =
alternate destinations or paths for for requests."

-- section 2, OCS: "Reporting and reacting node internally maintained =
state..."

I suggest "Internal state maintained by a reporting or reacting node..."

-- section 2, Realm-Routed Requests: "... does not know the host that =
will service..."

I suggest: "... does not know which host will service ..."

We should also add a comment that it may be possible to apply diversion =
to realm routed requests.

-- section 2, Throttling: " ... a Diameter Client not sending =
requests..."

I suggest " ... a Client choosing to not send requests ..."

-- section 3, 2nd paragraph:

Client, servers, and agents should not be capitalized. Should "Reporting =
node" and "Reacting node" be hyphenated?  Consider moving the last =
sentence to the start of the next paragraph.

-- section 3.1, paragraph 1: " This is made possible by adding overload =
control AVPs, the OC-OLR AVP and the OC- Supported-Features AVP, as =
optional AVPs into existing commands..."

I suggest "This is made possible by adding the optional overload control =
AVPs OC-OLR and OC-Supported-Features into existing commands."

-- section 3.1, 3rd paragraph: "Reporting nodes also include overload =
reports..."

"Reporting nodes _may_ also include overload reports..."

-- section 3.1, 4th paragraph: "Clients MAY report..."

Should not be normative in this section.

-- section 3.2, 6th paragraph: "The OC-Feature-Vector AVP will =
contain..."

"... will _always_ contain..."

-- section 3.2, 7th paragraph: " ... all answer messages to requests =
..."

suggest "... all answers to requests..."

-- section 3.2, paragraph 9: "Reporting nodes are allowed to..."

"Reporting nodes can..."

Also consider clarifying that they can change algorithms =
_between_transactions_, as long as there's no active overload condition.

-- section 3.2, paragraph 10 (starting with "The individual features..."

Consider moving this entire paragraph to earlier in the section.

-- section 3.2, paragraph 11: "The DCA mechanism must also allow..."

--> "The DCA mechanism allows..."

"... the agent updates the OC-Supported-Features..." --> " ... the agent =
can update the OC-Supported-Features..."

-- section 3.3, general:

Much of this section is redundant to stuff in the parent section. I =
suggest reducing the parent section detail, and keeping it here. (This =
may be true for subsequent children of section 3.)

-- 3.3, third paragraph:

s/ , / : /

-- 3.3, paragraph 4:

In this overview, I suggest text saying that HOST_REPORT indicates a =
host report, and just using the term "host report" the rest of the time. =
(Same for realm report)

-- 3.3, para 7: "A host-report, for instance, will generally by =
generated by tracking utilization of resources..."

I suggest "A host-report might be generated by tracking use of =
resources..."

-- 3.3, para 9: " ... are responsible for applying the overload =
abatement algorithm..."

I suggest " ... apply the abatement algorithm..."

-- 3.4, para 2: " ... the definition of new report types and the =
definition of new scopes ..."

Aren't these sort of the same thing? That is, you add new scopes by =
extending report type?

-- 3.4, para 3:

First two sentences are a bit confusing. A new reader will likely think =
they contradict, without some explanation that OC-Feature-Vector is a =
child of OC-S-F.

-- 3.4, para 4:

First sentence has already been stated more than once. No need to repeat =
here.

-- 4.1.1, Para 1: "It MAY include the OC-Feature-Vector AVP."

consider adding  ", as a sub-avp of OC-Supported-Features."

- 4.1.1, last paragraph: "This behavior is described in ..."

What is the antecedent to "this"? If it's "loss algorithm" behavior, =
then the reference to section 4.2 should not be needed.

-- 4.1.2, para 2:

It's probably worth reiterating that the reacting node may not be the =
server, and this requirement may mean inserting AVPS into answers that =
came from upstream.

-- 4.1.2, para 3: "...response messages ... "

"... _answer_ messages ... "

-- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:

This is also true if it needs to announce some other feature that needs =
to be indicated.

-- 4.1.3, para 3: "... Agent MUST include OC-Supported-Features in =
request messages it receives..."

I suspect this should say "... requests that it _forwards_" or =
"_relays_".

-- 4.1.3, para 5 and 6:

Is the reporting node section limited to endpoints? If not, the these =
paragraphs effectively restate normative language about reporting node =
behavior from that section. Once we've said what a reporting node =
normatively has to do, we should just be able to say that an agent =
acting as a reporting node has all the responsibilities of a reporting =
node, and not restate the normative requirements.

-- 4.1.3, para 7:

The first MAY is a consequence (the complement) of the 2nd MAY. It =
should at least not be 2119 language, and probably can be omitted =
entirely.

-- 4.1.3, para 9, last sentence:

Does this mean an agent can only change OC-S-F in an answer if it =
changed it in the request? I don't think we want that restriction, but =
the context and "as such," seem to scope the MAY to that situation.

-- 4.1.3, para 9: "ambiguity"

I'm not sure that's is the word we want here. An agent could muck things =
up without being ambiguous. Perhaps "inconsistency"?

-- 4.2.1.1, para 1:

Do I understand correctly that the reacting node only keeps OCS for =
those combinations that it has actually received an OLR for? If so, =
that's not clear from the wording.

-- 4.2.1.2, para 1:

Likewise, the reporting node only keeps OCS for actual overload =
conditions where it sends OLRs?

-- 4.2.1.3, para 2:

Should this combination include origin-host or origin-realm? App-Id?

-- 4.2.1.3,  para 3: ... a reporting node MUST process..."

Should that be "reacting node"?

-- 4.2.1.3, para 4:=20

Paragraph does not make sense. (I think we've already discussed this one =
from Ulrich's comments).

-- 4.2.1.3, 3rd para from end: "... update the OCS entry as being =
expired."

I suggest language like " invalid" or "terminated". I take "expired" to =
mean "naturally expired", which is different from the case described =
here. There may be subtle behavior difference. (For example, a reacting =
node might choose to log "expirations" differently than "explicit =
terminations".)

-- 4.2.1.4, para 9: "... including the reduction percentage..."

I suggest "... including, for example, the reduction percentage..."

-- 4.2.1.4, para 11: " ... MUST update the sequence number ..."

I suggest s / update / increment

-- 4.2.2, 2nd to last para:

 I think we need something a bit stronger here. The endpoint needs to =
take some action that makes sense for the application. The details of =
that are beyond our scope, but the general need is not.

-- 4.2.3, para 2:

Doesn't this also need to match the scope for the request type? E.g. =
Destination realm or destination host? For example, a host report for =
host A would not match OCS for host B, even though both had the same =
report type and application id.

-- 4.2.3, paras 8 and 9:

We put the currently less favored approach first, with the favored =
approach in the following paragraph. I suggest we put the more favored =
approach first.


-- 4.2.3, last para:

An example of what we have in mind could be helpful here.


-- 4.3, para 4:

We should clarify that this is talking about mandatory to understand for =
DOIC, but not for the enclosing transaction.=20

-- 4.3, para 5:

Why is it different depending on whether the feature is an algorithm or =
not? Also, isn't this mostly redundant to the paragraph about new =
normative behavior?

-- 4.3, para 6, last sentence

This is redundant to earlier normative language in the section (assuming =
a new report type will always involve new normative behavior.)

-- 4.3, para 7, last sentence

Also redundant

-- 4.3, last para, last sentence:

It's not clear if this means section 8 of this doc, or 6733. I suggest =
putting this sentence before the subsequent one.

-- 5.1, para 4:

Convoluted paragraph. How about "How about "reporting nodes request the =
stateless reduction of the number of requests by an indicated =
percentage."=20

We should also clarify that this reduction is in comparison to what the =
reacting node otherwise would have sent, rather than what it may have =
previously sent.

-- 5.3, para 5:

Needs a sentence or paragraph to describe the 100% issue before =
describing how to back down from it.

"... following concerns are RECOMMENDED ..."

following procedures...?

-- 5.3, para 6: "... does not receive an OLR in messages sent to the =
formerly overloaded node..."

Do we mean "... does not receive an OLR in answers received from the =
formerly overloaded node..."?

-- para 6, last paragraph

Paragraph is off topic for section. It probably belongs in the =
extensibility section, or at least somewhere other than here.

-- 6.1, last para:

I think we moved this to 6.2, but forgot to delete it here.

-- 6.2:

Why did the AVP code jump to TBD6? (Also seems out of order in the =
table.)

Is it to late to rename the value to OLR_LOSS_ALGO?

-- 9.4, para 2: "A node MUST not..."

"A node MUST _NOT_ ..."

-- References:

5905 and 5729 are not cited in the document.

draft-ietf-dime-e2e-sec-req-00: Outdated version.

























From nobody Tue Dec 16 20:48:44 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D7E01A1BCF for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 20:48:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XQ68tLW48ba5 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 20:48:42 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13EBC1A008A for <dime@ietf.org>; Tue, 16 Dec 2014 20:48:41 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH4meAc017797 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 22:48:41 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440484520.224279-9e329ad3ed8f41f09327d5ff0f36e8ab
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com>
Date: Tue, 16 Dec 2014 22:48:40 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/0-xFUUEcmEdYoYchUoyuqc0jDTE
Subject: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 04:48:43 -0000

Section 4.1.2, (4th paragraph from end ) says that a reporting node =
cannot change algorithms during an active overload condition. We fail to =
say anything about when reacting nodes could change their list of =
supported algorithms. That leaves us with the question about what =
happens if a reporting node has an active OCS, and gets a new request =
with an OC-S-F that does not support the active algorithm.

The obvious answer is that reacting nodes shouldn't do that-- but I =
think there would still be legal scenarios where it could happen anyway. =
So even if we say that a single reacting node should not change its =
algorithm list while it has active OCS, we still need to handle the =
situation for reporting nodes.=


From nobody Tue Dec 16 20:55:56 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD84A1A1BDF for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 20:55:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ovt-99okaB2N for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 20:55:53 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE0FE1A008A for <dime@ietf.org>; Tue, 16 Dec 2014 20:55:52 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH4tpoZ018508 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 22:55:52 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440484951.56229-afd42d8554c689a5ff01afab9c0ee56b
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com>
Date: Tue, 16 Dec 2014 22:55:51 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/fPjr4txf9fvfiUnXDq2vPiqB-PA
Subject: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 04:55:55 -0000

We currently define the unit for OC-Validity-Duration as milliseconds.

Section 4.2.3 says (in a note) that transit time for OLRs can be safely =
ignored. That is likely true if the validity durations can generally be =
assumed to be long in comparison to transit time. It is _not_ true if =
validity duration can be a small number of milliseconds. That could lead =
to situations where the reporting node thinks the report has expired =
before the reacting node even sees it.

Really, I don't think milliseconds are a reasonable unit here. I can't =
imagine any useful and safe application for sub-second validity =
durations, nor can I imagine it ever being useful to distinguish between =
X seconds and X + 0.001 seconds. We should choose a unit that lends =
itself to reasonable value ranges. I suggest we change it to seconds.

Thanks!

/Ben.=


From nobody Tue Dec 16 21:02:28 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 404821A1BCF for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:02:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7HWUo4_OgbVM for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:02:26 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46AEE1A008A for <dime@ietf.org>; Tue, 16 Dec 2014 21:02:26 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH52PAv019107 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 23:02:25 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440485345.046192-7e768d40cbd9ee4cf3fb0743f5e26060
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <FD8A6495-AE13-4CA6-BD38-B97EA21A0B9A@nostrum.com>
Date: Tue, 16 Dec 2014 23:02:25 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-IJvHCh5RI0Fy0Fh0tTqYGcFJa0
Subject: [Dime] DOIC WGLC: Requirement for OC-Feature-Vector values
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 05:02:27 -0000

Section 4.3 requires all extensions with "new normative behaviors" to =
define a new feature bit for OC-Feature-Vector.

I still think that's too strong a requirement. If a new feature is =
backwards-compatible, then we may well not really need a feature bit. =
For example, SIP doesn't define a new feature tag for every new header. =
Also, keep in mind this is   a field of 1 bit flags. We only get 64 of =
those.

I propose we change this to say that "any non-backwards compatible" =
feature requires a new feature bit.

Thanks!

/Ben.=


From nobody Tue Dec 16 21:07:47 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 047831A1BED for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:07:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 13MK9aMMYT94 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:07:41 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A8801A1BCF for <dime@ietf.org>; Tue, 16 Dec 2014 21:07:41 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH57eqM019515 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 23:07:41 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440485660.268122-4d9b8d987ab822cc8ac9bb0bbe8b00d5
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <94CD92E2-B801-4EC4-BECE-5C2B0788B361@nostrum.com>
Date: Tue, 16 Dec 2014 23:07:40 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/6uwT7SJsyq9BNUQvf5ExS-zx_Tg
Subject: [Dime] DOIC WGLC: loss algorithm behavior with expiring OLRs
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 05:07:44 -0000

Section 5.3 (paragraph 7) says that, for the loss algorithm, a reacting =
node should slowly ramp back up if an OLR expires. This seems to be for =
the general case of expiring loss-algorithm OLRs, since the case of =
expiring 100% reduction OLRs was dealt with in the preceding paragraphs.

We have guidance elsewhere that a _reporting_node_ should end an =
overload condition in a controlled fashion. If both the reacting node =
and reporting node are trying to do this, you may get unexpected =
behavior. It makes sense for the reacting node to ramp up slowly from =
100% reduction, since the reporting node could not update the reduction =
percentage until expired. But for an percentage reduction that still =
allows non-trivial traffic, the reporting node should be gradually =
ramping down the reduction.

I propose we strike the entire paragraph from section 5.3.



From nobody Tue Dec 16 21:11:46 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FF951A1BF0 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:11:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qM7ZT7MRnjzR for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:11:41 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BCCE1A1BDF for <dime@ietf.org>; Tue, 16 Dec 2014 21:11:41 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH5Be1V019851 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 23:11:41 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440485900.367144-ff2d862790b8f3fd0a90a2741f6a969b
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <93DEBE9A-62A4-4637-9BF8-FFCD4195B115@nostrum.com>
Date: Tue, 16 Dec 2014 23:11:40 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/S3zkGFgk0P00KsDn2koD1OpNRS4
Subject: [Dime] DOIC WGLC: Implicit values for OC-OLR
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 05:11:43 -0000

(No, this is not the general rant on implicit values you from me :-)  )

In section 6.3, paragraph 1, we have the following sentence:

" The OC-OLR AVP does not explicitly contain all information needed by =
the reacting node to decide whether a subsequent request must undergo =
abatement using the received reduction percentage."

I think this may vary by report type. For example, peer reports might =
need to include at least  some things explicitly that are implicit for =
host and realm reports. It's even different between host and realm =
reports. Therefore, I think we should remove it from this section, and =
put the specifics in the description of each report type.





From nobody Tue Dec 16 21:13:38 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45FD81A1BDF for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:13:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GSVM2e-fOhFM for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:13:31 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF7901A1BCF for <dime@ietf.org>; Tue, 16 Dec 2014 21:13:31 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH5DUiL020008 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 23:13:31 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440486009.982025-67580e16cfa3fa74cf0ed135ad39ef25
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com>
Date: Tue, 16 Dec 2014 23:13:30 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-5DqPVW8Rrugeq8vy7RSpINfaD8
Subject: [Dime] DOIC WGLC: Sequence Number uniqueness
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 05:13:34 -0000

Section 6.4, paragraph 2 says the following:

" The sequence number is only required to be unique between two DOIC =
nodes."

Is that limitation useful? What about agents that pass it OLRs without =
change?

Thanks!

Ben.


From nobody Tue Dec 16 21:19:09 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7C4F1A1BCF for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:19:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uq2P0xHTrPO3 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 21:19:04 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68ABE1A0394 for <dime@ietf.org>; Tue, 16 Dec 2014 21:19:03 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH5J2vc020407 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Dec 2014 23:19:03 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
From: Ben Campbell <ben@nostrum.com>
Content-Type: text/plain; charset=us-ascii
X-Mao-Original-Outgoing-Id: 440486341.990595-51544f0bbecbe17b76cc937a8bdac26f
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Message-Id: <494D7700-4468-4AB5-8F74-69273DE409AB@nostrum.com>
Date: Tue, 16 Dec 2014 23:19:02 -0600
To: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/nAqGHkpArg97zR1yGT9KT45Eo9Q
Subject: [Dime] DOIC WGLC: OC-Reduction-Percentage default value
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 05:19:07 -0000

Section 6.7 says that OC-Reduction-Percentage has a default value of =
zero.

I don't think we need a "general" default for this. The loss algorithm =
says OC-Reduction-Percentage MUST be included. If some other algorithm =
uses it, and needs a default, it can define one for the context of that =
algorithm. (And we shouldn't assume every algorithm will need a default =
of zero.)

I propose we strike the default value from 6.7.=


From nobody Tue Dec 16 22:27:35 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 206661A212D for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 22:27:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M9Wkn_pJS3at for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 22:27:30 -0800 (PST)
Received: from mail-lb0-x22e.google.com (mail-lb0-x22e.google.com [IPv6:2a00:1450:4010:c04::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9391C1A1E0C for <dime@ietf.org>; Tue, 16 Dec 2014 22:27:29 -0800 (PST)
Received: by mail-lb0-f174.google.com with SMTP id 10so12038500lbg.5 for <dime@ietf.org>; Tue, 16 Dec 2014 22:27:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=gSrgoqrgZF51kkwLQJlXJRLlHNZ3g6V4MFmOFAmEG94=; b=R6P3lVPgJuWshYxvuQcWjrwLyGGIinCVzu7IWuAMgWaWR5tky33Q+u46odg9qvrjQS bajR2yQfkGM9ZKLlrO2MQ83MUJE8Ql1KkHld+8+7YqdHtiLPy7ma4nmntwoRRXJRU56p t1YLpqDrxyInVpQiq3d1x8dT7hnhvuGagwtE5OjlbsZAg4xiaL5r6OU0C4larmjMrvbm PyS7TxOiuqlPFS2ON397ToHqhQcAzXUddRb6eX+HL0h2/xpBnpQ2nbqYoQxBGM+8yOWL LCdv9otczPOxMQqptA1ZwlSnhyl9fuiZUiWSGh9BKWEtkWdFQo8HFOsI5JBe2sjdPeso UnOw==
X-Received: by 10.112.160.104 with SMTP id xj8mr700019lbb.62.1418797647975; Tue, 16 Dec 2014 22:27:27 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id k1sm703097laf.19.2014.12.16.22.27.26 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 16 Dec 2014 22:27:27 -0800 (PST)
Message-ID: <5491224D.1060109@gmail.com>
Date: Wed, 17 Dec 2014 08:27:25 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>, "dime@ietf.org list" <dime@ietf.org>,  draft-ietf-dime-ovli@tools.ietf.org
References: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com>
In-Reply-To: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/2eBZsOFIXfwX7xYo_TWkWdBqqnI
Subject: Re: [Dime] DOIC WGLC: Sequence Number uniqueness
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 06:27:31 -0000

Then they pass the SN unmodified, obviously. I rather have it explicitly 
mentioned that e.g. an agent can modify the SN without that causing the 
debate whether it is correct or not. Do you have a specific case in mind 
where it could cause issues?

- jouni

12/17/2014 7:13 AM, Ben Campbell kirjoitti:
> Section 6.4, paragraph 2 says the following:
>
> " The sequence number is only required to be unique between two DOIC nodes."
>
> Is that limitation useful? What about agents that pass it OLRs without change?
>
> Thanks!
>
> Ben.
>


From nobody Tue Dec 16 22:28:53 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F7A11A1E0C for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 22:28:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Lf0rcsTPm4H for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 22:28:50 -0800 (PST)
Received: from mail-la0-x231.google.com (mail-la0-x231.google.com [IPv6:2a00:1450:4010:c03::231]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78EB01A1A73 for <dime@ietf.org>; Tue, 16 Dec 2014 22:28:49 -0800 (PST)
Received: by mail-la0-f49.google.com with SMTP id hs14so12637501lab.36 for <dime@ietf.org>; Tue, 16 Dec 2014 22:28:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=KJhims+nx+lgQ9r5LswSkO1sPnbBbZHZcCCPxcuFI3w=; b=g20MJ4dpOeGBgrOp0lCkZA5EWQk/vpFmV/90FiugZ5EEJ6YTlvLpllsXTMgcmbjZUo yheGhfOMEEWtN6rZhZ7PyYyoDrZo6NfcY+VUP0yfVcxysxb2L6Hl5oLXBGHhzO4BgL+g VNiCYLvxDDFlM6+AlQxUxF1lw+cR+1uWHCFg9R3U8kvmuR+rxJ6oVT5x4b/3NscqckM8 xtr1baOFcf6lwadRCYTCVQyvMzf7oe/DfUDQ6PjdkBq5uCv1v12FFatB3Kz55Jy0uADZ kMkVM9FQH4bZfyHuY1aSwA5asXByYvv1bfA0W6Dmg6uSDJ9SFJcO56yV0VIm6VNw+K5c lOBg==
X-Received: by 10.112.14.6 with SMTP id l6mr16686691lbc.91.1418797727985; Tue, 16 Dec 2014 22:28:47 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id r4sm706477lar.3.2014.12.16.22.28.46 for <dime@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 16 Dec 2014 22:28:47 -0800 (PST)
Message-ID: <5491229D.6040709@gmail.com>
Date: Wed, 17 Dec 2014 08:28:45 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <494D7700-4468-4AB5-8F74-69273DE409AB@nostrum.com>
In-Reply-To: <494D7700-4468-4AB5-8F74-69273DE409AB@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/zoklYIc_UiwKChU9A1pRP-X6VBw
Subject: Re: [Dime] DOIC WGLC: OC-Reduction-Percentage default value
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 06:28:51 -0000

OK with me.

- Jouni

12/17/2014 7:19 AM, Ben Campbell kirjoitti:
> Section 6.7 says that OC-Reduction-Percentage has a default value of zero.
>
> I don't think we need a "general" default for this. The loss algorithm says OC-Reduction-Percentage MUST be included. If some other algorithm uses it, and needs a default, it can define one for the context of that algorithm. (And we shouldn't assume every algorithm will need a default of zero.)
>
> I propose we strike the default value from 6.7.
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Tue Dec 16 22:35:40 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00DCA1A0673 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 22:35:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XYZROflBq75x for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 22:35:37 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42ACB1A066B for <dime@ietf.org>; Tue, 16 Dec 2014 22:35:37 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBH6ZXIP026619 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 00:35:34 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491224D.1060109@gmail.com>
Date: Wed, 17 Dec 2014 00:35:33 -0600
X-Mao-Original-Outgoing-Id: 440490933.557568-ebbbd7d3fd89bace288c4b193571b69b
Content-Transfer-Encoding: quoted-printable
Message-Id: <AA8D3B9B-9271-4E5A-89AD-F44DBC62026B@nostrum.com>
References: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com> <5491224D.1060109@gmail.com>
To: Jouni Korhonen <jouni.nospam@gmail.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/uP0y4I3_UEsZdJUO54Lf58Xkfw8
Cc: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
Subject: Re: [Dime] DOIC WGLC: Sequence Number uniqueness
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 06:35:39 -0000

I'm not worried so much about nodes changing it. I'm just wondering if =
that is the right scope of uniqueness. I'm not sure why "between any two =
nodes" is relevant. Or even if "uniqueness" is relevant.=20

It's a sequence number that gets incremented, not a unique ID per se.

So, here's an example: A reporting node sends both realm reports and =
host reports to the same reacting node. If the sequence number has to be =
unique between two nodes, does that mean that the realm report and host =
reports must never have the same sequence number? If we start the =
sequence at zero and increment for each change (as is recommended =
elsewhere), they are highly likely to have the same sequence number at =
some point in time.

I think the _real_ requirement is that the sequence number not repeat  =
for non-identical OLRs over the lifetime of a particular OCS instance.


> On Dec 17, 2014, at 12:27 AM, Jouni Korhonen <jouni.nospam@gmail.com> =
wrote:
>=20
>=20
> Then they pass the SN unmodified, obviously. I rather have it =
explicitly mentioned that e.g. an agent can modify the SN without that =
causing the debate whether it is correct or not. Do you have a specific =
case in mind where it could cause issues?
>=20
> - jouni
>=20
> 12/17/2014 7:13 AM, Ben Campbell kirjoitti:
>> Section 6.4, paragraph 2 says the following:
>>=20
>> " The sequence number is only required to be unique between two DOIC =
nodes."
>>=20
>> Is that limitation useful? What about agents that pass it OLRs =
without change?
>>=20
>> Thanks!
>>=20
>> Ben.
>>=20


From nobody Tue Dec 16 23:01:04 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B78C61A6ED8 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 23:01:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pms6rDHLsU8E for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 23:01:01 -0800 (PST)
Received: from mail-la0-x22e.google.com (mail-la0-x22e.google.com [IPv6:2a00:1450:4010:c03::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1857F1A1EFE for <dime@ietf.org>; Tue, 16 Dec 2014 23:01:01 -0800 (PST)
Received: by mail-la0-f46.google.com with SMTP id q1so12466497lam.5 for <dime@ietf.org>; Tue, 16 Dec 2014 23:00:59 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=tRRhU+Bb6E30QqvFwjWpv3Jznxv+hYiWNE+/dQaEQJs=; b=OGbGtc0J8AXpB2P2yJAnJbX17FU4rajiT04CcAJVkgrVkaETkAT8DgXffl42SwFXin GT0EjQlf0NdCZLhq+LAwvlPuutEDMSeOsd33Sj5O0j8qwjPCJ7A9MmiHPbVkDLpl+aOR Uu93+XRPdF+Wr+T4AKbM4cW+/qCZY5c67AN146VNfvCZ4TsY5P99ORbvJY7LGUcVr0+1 E+qgbwDaRKaXFpqYMiHOIOsRa9ZY9kKvn7tK7dJ0ZegkSzkzecDonbArdJ4eywL//JEm KQg4UO3X6AQ+/6J3cG5Wq3taP1Vp7NH2tK4y+1lpn1IYOZRrhNIIUZpW2diEvRtQvatO wZNg==
X-Received: by 10.112.168.164 with SMTP id zx4mr31230562lbb.28.1418799659532;  Tue, 16 Dec 2014 23:00:59 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id h7sm716466lbl.41.2014.12.16.23.00.57 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 16 Dec 2014 23:00:57 -0800 (PST)
Message-ID: <54912A28.2060004@gmail.com>
Date: Wed, 17 Dec 2014 09:00:56 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com> <5491224D.1060109@gmail.com> <AA8D3B9B-9271-4E5A-89AD-F44DBC62026B@nostrum.com>
In-Reply-To: <AA8D3B9B-9271-4E5A-89AD-F44DBC62026B@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/bgVPiP0rm5Zh6B5aW1qY12DxWMA
Cc: "dime@ietf.org list" <dime@ietf.org>, draft-ietf-dime-ovli@tools.ietf.org
Subject: Re: [Dime] DOIC WGLC: Sequence Number uniqueness
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 07:01:03 -0000

Good point. I would be OK with that change.

- Jouni

12/17/2014 8:35 AM, Ben Campbell kirjoitti:
> I'm not worried so much about nodes changing it. I'm just wondering if that is the right scope of uniqueness. I'm not sure why "between any two nodes" is relevant. Or even if "uniqueness" is relevant.
>
> It's a sequence number that gets incremented, not a unique ID per se.
>
> So, here's an example: A reporting node sends both realm reports and host reports to the same reacting node. If the sequence number has to be unique between two nodes, does that mean that the realm report and host reports must never have the same sequence number? If we start the sequence at zero and increment for each change (as is recommended elsewhere), they are highly likely to have the same sequence number at some point in time.
>
> I think the _real_ requirement is that the sequence number not repeat  for non-identical OLRs over the lifetime of a particular OCS instance.
>
>
>> On Dec 17, 2014, at 12:27 AM, Jouni Korhonen <jouni.nospam@gmail.com> wrote:
>>
>>
>> Then they pass the SN unmodified, obviously. I rather have it explicitly mentioned that e.g. an agent can modify the SN without that causing the debate whether it is correct or not. Do you have a specific case in mind where it could cause issues?
>>
>> - jouni
>>
>> 12/17/2014 7:13 AM, Ben Campbell kirjoitti:
>>> Section 6.4, paragraph 2 says the following:
>>>
>>> " The sequence number is only required to be unique between two DOIC nodes."
>>>
>>> Is that limitation useful? What about agents that pass it OLRs without change?
>>>
>>> Thanks!
>>>
>>> Ben.
>>>
>


From nobody Tue Dec 16 23:03:09 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E640D1A6D3F for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 23:03:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S2T2tih7nX20 for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 23:03:06 -0800 (PST)
Received: from mail-la0-x235.google.com (mail-la0-x235.google.com [IPv6:2a00:1450:4010:c03::235]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 014E91A1EFE for <dime@ietf.org>; Tue, 16 Dec 2014 23:03:06 -0800 (PST)
Received: by mail-la0-f53.google.com with SMTP id gm9so12858914lab.12 for <dime@ietf.org>; Tue, 16 Dec 2014 23:03:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=RvYfano1sAp3z4MAcxhjwGOiB+1FCEBbMQfuTIZtcCs=; b=CYdiU3QFJ7aCTXzUOCyk/qk3agUL6/nrOKtAq6zcNBSIwYYvgFQpFppf8lS9FVJPZp Glmwu5NQ236ZXqdDT+/bIwhswZPIWUCnhojW+66gtlqkuCsYcyfjowxlDrCDuGF/IJYy mLs20AMO8TF/wc8z7I7jVIddi4DhktlE10cBV+NSnf1A2G8t0ZJ4DNsfOMZdJytmPdSt xWF9uILXavZfoVbwJLUVeAgZaaF50fwMPUrDJgJgk6zgCxIKZ5pXUcb1A1LrbvCpUypq mP4pFHw+mm2LNenYpCLKRXKnRyTZMkgP3giuDy1PR8R9svlgr9Tb5iArcNsgiDRkdJTt tK7Q==
X-Received: by 10.152.22.199 with SMTP id g7mr39704061laf.23.1418799784435; Tue, 16 Dec 2014 23:03:04 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id ri2sm719448lbb.34.2014.12.16.23.03.03 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 16 Dec 2014 23:03:03 -0800 (PST)
Message-ID: <54912AA6.2080706@gmail.com>
Date: Wed, 17 Dec 2014 09:03:02 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>, "dime@ietf.org list" <dime@ietf.org>,  draft-ietf-dime-ovli@tools.ietf.org
References: <93DEBE9A-62A4-4637-9BF8-FFCD4195B115@nostrum.com>
In-Reply-To: <93DEBE9A-62A4-4637-9BF8-FFCD4195B115@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ALgOdHL-69f8srXOdJKYL6GckPs
Subject: Re: [Dime] DOIC WGLC: Implicit values for OC-OLR
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 07:03:08 -0000

OK with me.

- Jouni

12/17/2014 7:11 AM, Ben Campbell kirjoitti:
> (No, this is not the general rant on implicit values you from me :-)  )
>
> In section 6.3, paragraph 1, we have the following sentence:
>
> " The OC-OLR AVP does not explicitly contain all information needed by the reacting node to decide whether a subsequent request must undergo abatement using the received reduction percentage."
>
> I think this may vary by report type. For example, peer reports might need to include at least  some things explicitly that are implicit for host and realm reports. It's even different between host and realm reports. Therefore, I think we should remove it from this section, and put the specifics in the description of each report type.
>
>
>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Tue Dec 16 23:12:18 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D8BD1A1BED for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 23:12:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h9-3DJwtn9Wc for <dime@ietfa.amsl.com>; Tue, 16 Dec 2014 23:12:13 -0800 (PST)
Received: from mail-lb0-x234.google.com (mail-lb0-x234.google.com [IPv6:2a00:1450:4010:c04::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCB751A6F21 for <dime@ietf.org>; Tue, 16 Dec 2014 23:11:58 -0800 (PST)
Received: by mail-lb0-f180.google.com with SMTP id l4so12044802lbv.39 for <dime@ietf.org>; Tue, 16 Dec 2014 23:11:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-type:content-transfer-encoding; bh=HaJhx81k0IZNfNyz1DVMXibwpGkIsDUnzWQtMOr39Tg=; b=OCzKVvFdsfjwwSkmpT3eCyyO6pR3wJ8fv0Q0khQmtbQpc/LK/FWRJQZmyEw8wUAr2n Tjd1jPmfwH7m0zEsUOcXS1iISFRZrZMzBWmbNJ5kRkIVTFN5KfGqnr+oBk9XKJxfNib6 Ts4K1vTr3oeTJ7jayaPyWsSgjfQvI5NSYsSdF/7Eb2qlb0lG9DJBY6Z4EktYx0gTamu7 BVrtJn29XvvOluoYj1QtogogcyQKROLPW1H1vgHtrOv4qixYjfDUWMbzcUk9PO2LAIVA NTh+DcTD4lA3H2k9/DS1WOlXWb9ztavRoLzrWfWlmHv9XHlrdzJoEIFCVyTegpADsfNM ikkA==
X-Received: by 10.112.91.43 with SMTP id cb11mr39110755lbb.63.1418800317424; Tue, 16 Dec 2014 23:11:57 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id v8sm728505lae.6.2014.12.16.23.11.55 for <dime@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 16 Dec 2014 23:11:56 -0800 (PST)
Message-ID: <54912CBA.8080701@gmail.com>
Date: Wed, 17 Dec 2014 09:11:54 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com>
In-Reply-To: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/i5GebyscNdpeF91p8ctjv6uMle8
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 07:12:15 -0000

While changing algorithm "on fly" is undesirable both reporting and 
reacting nodes need to be prepared for the situation, specifically if 
the reacting node keeps advertising multiple supported algorithms.

I think we need to flag this better in the text but stress that such 
behaviour is not desired. And in some cases not even possible to do 
cleanly (depending on the algorithm).

- Jouni

12/17/2014 6:48 AM, Ben Campbell kirjoitti:
> Section 4.1.2, (4th paragraph from end ) says that a reporting node cannot change algorithms during an active overload condition. We fail to say anything about when reacting nodes could change their list of supported algorithms. That leaves us with the question about what happens if a reporting node has an active OCS, and gets a new request with an OC-S-F that does not support the active algorithm.
>
> The obvious answer is that reacting nodes shouldn't do that-- but I think there would still be legal scenarios where it could happen anyway. So even if we say that a single reacting node should not change its algorithm list while it has active OCS, we still need to handle the situation for reporting nodes.
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 00:49:45 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F8ED1A1B51 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 00:49:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TqIhX3dH32NC for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 00:49:31 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C35ED1A1B35 for <dime@ietf.org>; Wed, 17 Dec 2014 00:49:30 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBH8nSnW010172 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 17 Dec 2014 08:49:28 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBH8nRKe019837 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 17 Dec 2014 09:49:27 +0100
Received: from DEMUHTC008.nsn-intra.net (10.159.42.39) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Wed, 17 Dec 2014 09:49:27 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC008.nsn-intra.net ([10.159.42.39]) with mapi id 14.03.0195.001; Wed, 17 Dec 2014 09:49:27 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAL2Z7uAAD8mAIAACZWAgAY/jwCAAU9ggIABPegg
Date: Wed, 17 Dec 2014 08:49:27 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com>
In-Reply-To: <549046D3.3090104@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.101]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 5214
X-purgate-ID: 151667::1418806168-0000677A-86BFAAFB/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/kFnXg6wVNWTAUvpkFo9KPONOHFI
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 08:49:37 -0000

Yes please.

-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
Sent: Tuesday, December 16, 2014 3:51 PM
To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #15

I'll delete the paragraph.

Do we need explicit statements for the two conditions below?

Steve


On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve, Ben,
>
> I'm fine with deleting the paragraph.
> But for my clarification please confirm that ignoring the complete set of=
 OLRs is allowed when one of these OLRs contains a report type that was not=
 advertized, or two of the OLRs contain the same report type.
>
> Regards
> Ulrich
>
>
>
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Thursday, December 11, 2014 8:26 PM
> To: Ben Campbell
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
>
>
> On 12/11/14, 12:51 PM, Ben Campbell wrote:
>>> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> w=
rote:
>>>
>>> I thought this paragraph was covering unrecognized values for all AVPs.
>> I agree that's what it covered. But I think we failed to cover the unrec=
ognized AVP case. If we don't have anything to say beyond what 6733 says, t=
hen it might not be strictly necessary, but it might still be worth saying =
that "unrecognized sub-AVPs are treated as per RFC6733".
> That is probably worth saying.
>>>    Maybe it is better to remove the paragraph entirely and make sure th=
at the definition of each AVP addresses what is done with unrecognized valu=
es.
>> Possibly. There are AVPs where there's no such thing as an unrecognized =
value. There may be AVPs where the allowed values vary by algorithm. If we =
do take that route, we probably need language here that says unrecognized v=
alues are handled as described by the AVP definition or the algorithm.
> Agreed.
>>> Steve
>>>
>>> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>>>>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com>=
 wrote:
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> Actually, the wording you suggested wasn't quite right.  It should be=
:
>>>>>
>>>>>     When receiving an OC-OLR AVP with unknown values, the overload re=
port
>>>>>     SHOULD be silently discarded by reacting nodes and the event SHOU=
LD
>>>>>     be logged.
>>>>>
>>>>> It's not just about report type values but unknown values for any of =
the AVPs in the OLR.
>>>>>
>>>>> This seems like a good requirement to include in the specification to=
 ensure common behavior in reacting nodes.  I don't feel strongly about thi=
s but I would like to hear other opinions.
>>>> I think this is still not quite complete.
>>>>
>>>> If you receive a sub-AVP that you don't understand, then you should ig=
nore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown=
 AVP has the m-bit set.) If you receive a known sub-AVP, with a value you d=
on't understand, the behavior should be AVP specific. For Report-Type, that=
 means ignore the whole OLR.
>>>>
>>>> It's not clear to me whether the original text was about arbitrary avp=
s, or Report-Type.
>>>>
>>>>> Steve
>>>>>
>>>>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>>> Hi Steve,
>>>>>>
>>>>>> I think it was pointed out by Ben that we do not specify behaviour o=
f a node for cases where it detects that another node is breaking the rule.
>>>>>> The rule is:
>>>>>>      A reporting node MUST NOT send overload reports of a type that =
has
>>>>>>      not been advertised as supported by the reacting node.
>>>>>> See section 4.2.3.
>>>>>>
>>>>>> Regards
>>>>>> Ulrich
>>>>>>
>>>>>>     From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve=
 Donovan
>>>>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>>>>> To: dime@ietf.org
>>>>>> Subject: [Dime] Ulrich's suggested change #15
>>>>>>
>>>>>> Ulrich,
>>>>>>
>>>>>> For your suggested change #15:
>>>>>> Section 4.2.1.3, 4th paragraph:
>>>>>> Existing text:
>>>>>>      When receiving an OC-OLR AVPs with unknown values, a reacting n=
ode
>>>>>>      SHOULD be silently discarded by reacting nodes and the event SH=
OULD
>>>>>>      be logged.
>>>>>> Comment: text is confusing. Maybe the intention was to say:
>>>>>>      When receiving an OC-OLR AVPs with an unsupported report type v=
alue, a reacting node
>>>>>>      SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>>>>      be logged.
>>>>>> But even that is not correct.
>>>>>> Proposal: Remove the paragraph.
>>>>>> The intent was that an OC-OLR that contains unknown values should be=
 discarded.  I agree that the wording needs to be changes as you suggested.=
  I don't agree with removing the paragraph.  Can you elaborate on why you =
think it is not correct when changed as you suggested?
>>>>>>
>>>>>> Regards,
>>>>>>
>>>>>> Steve
>>>>>>
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 06:22:10 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15E621A8931 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:22:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gt4k9z87oAiR for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:22:07 -0800 (PST)
Received: from mail-la0-x22b.google.com (mail-la0-x22b.google.com [IPv6:2a00:1450:4010:c03::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EE811A884B for <dime@ietf.org>; Wed, 17 Dec 2014 06:22:07 -0800 (PST)
Received: by mail-la0-f43.google.com with SMTP id s18so13298521lam.30 for <dime@ietf.org>; Wed, 17 Dec 2014 06:22:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=oAz3fNB5pJVWRj4AY/SwSAAA/xwx02u9v1orvbojHE0=; b=UP5MK/H3txz8l81yPvmL9AzC7A2/25EOH2RkiVL6DHqE8foNDMqQhaVB9K5qEHv6gT bvpai1l2+EhMp/CohFQ3nOz2O32j9gylov3DbwLkKh2F/WfRMpjzXOovKrNPJJSkAHgB 7hW8y8jLzzm+LJnJBJBk0FlJqtAwcsbG84IS+LpH7x9ocAq9f7kXWvNxzd9v3tiSIVVA uky9bQ4zLPciCTB+T3s1RWW6xbVc2Y+bVxO1njLIl0qxIegWe7Pcrk1lcPJ2wiRbiq0V 5jADEkbHCP9SBu/AwCTeC5t7WvKd0eA/DisOXu1X/aMtxLvH3yF11xzE8W/WtXX6VIAZ Ll9Q==
X-Received: by 10.152.170.194 with SMTP id ao2mr42238183lac.12.1418826125881;  Wed, 17 Dec 2014 06:22:05 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id e5sm976420laf.44.2014.12.17.06.22.04 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 17 Dec 2014 06:22:04 -0800 (PST)
Message-ID: <5491918B.9060602@gmail.com>
Date: Wed, 17 Dec 2014 16:22:03 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org list" <dime@ietf.org>
References: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com>
In-Reply-To: <E40BBE9C-0668-46D5-9C90-62063B8E9131@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/EfeOJEYWQG7tZJlK7_vEqnhrJKk
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-doc-rate-control
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:22:09 -0000

Folks,

There was enough support and zero against adopting this I-D as a WG 
item. Authors, submit the document as draft-ietf-dime-*-00

- Jouni & Lionel

12/3/2014 12:12 PM, Jouni kirjoitti:
> Folks,
>
> As we discussed and agreed during the Honolulu meeting we ask for the WG adoption for draft-donovan-dime-doc-rate-control unless counter proposals show up. The "wait period" for counter proposals has been more than enough.
>
> This mail starts a two week adoption call for draft-donovan-dime-doc-rate-control as a WG Item.
>
> Express your support or disagreements in the mailing list. The call ends
> 17th Dec EOB (CET+1).
>
> - Jouni & Lionel
>


From nobody Wed Dec 17 06:22:30 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AEFF1A884B for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:22:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HCjzvYzZa6_i for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:22:28 -0800 (PST)
Received: from mail-la0-x234.google.com (mail-la0-x234.google.com [IPv6:2a00:1450:4010:c03::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D58971A897C for <dime@ietf.org>; Wed, 17 Dec 2014 06:22:27 -0800 (PST)
Received: by mail-la0-f52.google.com with SMTP id hs14so13366242lab.11 for <dime@ietf.org>; Wed, 17 Dec 2014 06:22:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=lkdGTSP5lUeXS4GFPsUNN/IfvERu3LqbxZwWqdWLAPs=; b=mwWuap8wYWothhECVLxnGyiMjOWGWWBAeYFIAA5LZHnUc0lBLT7BmrX8RXeLCQUOIV cgSKmE6a8acTbhqgM7ay7Kz4TglX1B2icHSse95bCJoC/24YNCzMbo4nMN/oLl0bxBcb Z8wBh4OQKGhqvmDzdKNlqCK0L1PFSyZOUukmyUqY7JvD6xGe3DkmoVTzGVSb+fhWEUQa 5DUx2fhqb7NWCsU3Nb+P4DnTZ+vCGoeNXpxjgjrPHXNeYbcmOs11bxDtc/vU4xbv3H1Q GyVhzU6EPsJjKTAbgUq9IrJpKbXDGEIJOrDURs2rhWZxVfTzorkCvIm8gPlTDR1wPaFA 1qKw==
X-Received: by 10.112.210.100 with SMTP id mt4mr41082635lbc.31.1418826146388;  Wed, 17 Dec 2014 06:22:26 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id x1sm977035lae.42.2014.12.17.06.22.24 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 17 Dec 2014 06:22:25 -0800 (PST)
Message-ID: <5491919F.7000506@gmail.com>
Date: Wed, 17 Dec 2014 16:22:23 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: "dime@ietf.org list" <dime@ietf.org>
References: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com>
In-Reply-To: <32615952-7107-45B6-85AD-AD9F57FBE418@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/DtxE_TOVY3A5xA3KxFHaghDJ7MM
Subject: Re: [Dime] Call for WG adoption: draft-donovan-dime-agent-overload
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:22:29 -0000

Folks,

There was enough support and zero against adopting this I-D as a WG 
item. Authors, submit the document as draft-ietf-dime-*-00

- Jouni & Lionel

12/3/2014 12:12 PM, Jouni kirjoitti:
> Folks,
>
> As we discussed and agreed during the Honolulu meeting we ask for the WG adoption for draft-donovan-dime-agent-overload unless counter proposals show up. The "wait period" for counter proposals has been more than enough.
>
> This mail starts a two week adoption call for draft-donovan-dime-agent-overload as a WG Item.
>
> Express your support or disagreements in the mailing list. The call ends
> 17th Dec EOB (CET+1).
>
> - Jouni & Lionel
>


From nobody Wed Dec 17 06:28:23 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFF791A8A7D for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:28:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.121
X-Spam-Level: 
X-Spam-Status: No, score=-0.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_BACKHAIR_11=1, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MGkoVyam0lC9 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:28:15 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A627C1A1AA4 for <dime@ietf.org>; Wed, 17 Dec 2014 06:28:15 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53660 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1FaH-00005T-Hh for dime@ietf.org; Wed, 17 Dec 2014 06:28:14 -0800
Message-ID: <549192FD.7060403@usdonovans.com>
Date: Wed, 17 Dec 2014 08:28:13 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com>
In-Reply-To: <54912CBA.8080701@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Ez63y9hkjUqFT32N-kiAXCb7xtc
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:28:17 -0000

The only way for a reacting node to attempt to change the algorithm is 
by removing an algorithm that had been advertised before the overload 
condition started and stopping to advertise it during an overload condition.

   C------------------>S   The reacting node advertises loss and rate
    OC-S-F(loss+rate)
   C<------------------S   The reporting node enters overload using the 
rate algorithm
           OC-S-F(rate)
           OC-OLR(...)
   C------------------>S   The reacting node stops advertising the rate 
algorithm
     OC-S-F(loss)

It is certainly conceivable that this could happen as a result of 
configuration changes at the reacting node.

I don't think, however, that we need to add any behavior changes for the 
reporting node in this case.  It is reasonable to expect a reacting node 
to continue to support an abatement algorithm it was advertising when an 
overload occurrence started for the duration of that active overload 
occurrence.  In fact, it would be detrimental to the reporting node, 
which is in an overload state, to do extra work because a reacting node 
started sending a different set of features in the OC-S-F AVP.

We already say that a reporting node must not change the algorithm 
during an active overload condition.  I propose that we strengthen this 
to include when a new set of features and abatement algorithms are 
advertised by the reporting node.  Those new features and abatement 
algorithms cannot go into effect until the existing active overload 
condition is resolved.  This would look like the following on the wire:

   C------------------>S   The reacting node advertises loss and rate
    OC-S-F(loss+rate)
   C<------------------S   The reporting node enters overload using the 
rate algorithm
           OC-S-F(rate)
           OC-OLR(...)
   C------------------>S   The reacting node stops advertising the rate 
algorithm
     OC-S-F(loss)
   C<------------------S   The reporting node ignores the new set of 
features
           OC-S-F(rate)
           OC-OLR(...)
   C------------------>S
     OC-S-F(loss)
   C<------------------S   The overload condition ends
           OC-S-F(rate)
           OC-OLR(Validity-Duration:0)
   C------------------>S   The reporting node processes the new set of 
features
     OC-S-F(loss)
   C<------------------S
           OC-S-F(loss)

Steve

On 12/17/14, 1:11 AM, Jouni Korhonen wrote:
> While changing algorithm "on fly" is undesirable both reporting and 
> reacting nodes need to be prepared for the situation, specifically if 
> the reacting node keeps advertising multiple supported algorithms.
>
> I think we need to flag this better in the text but stress that such 
> behaviour is not desired. And in some cases not even possible to do 
> cleanly (depending on the algorithm).
>
> - Jouni
>
> 12/17/2014 6:48 AM, Ben Campbell kirjoitti:
>> Section 4.1.2, (4th paragraph from end ) says that a reporting node 
>> cannot change algorithms during an active overload condition. We fail 
>> to say anything about when reacting nodes could change their list of 
>> supported algorithms. That leaves us with the question about what 
>> happens if a reporting node has an active OCS, and gets a new request 
>> with an OC-S-F that does not support the active algorithm.
>>
>> The obvious answer is that reacting nodes shouldn't do that-- but I 
>> think there would still be legal scenarios where it could happen 
>> anyway. So even if we say that a single reacting node should not 
>> change its algorithm list while it has active OCS, we still need to 
>> handle the situation for reporting nodes.
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 06:31:28 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 381041A8A89 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:31:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XCI95XE1P9jg for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:31:26 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CC3A1A8A61 for <dime@ietf.org>; Wed, 17 Dec 2014 06:31:25 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53666 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1FdI-00048F-Ub for dime@ietf.org; Wed, 17 Dec 2014 06:31:24 -0800
Message-ID: <549193B8.6000603@usdonovans.com>
Date: Wed, 17 Dec 2014 08:31:20 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com>
In-Reply-To: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/7Kf-bbZJ1e46LWG5J9KQf5DWx0w
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:31:27 -0000

Why not change the paragraph in section 4.2.3 to indicate that the 
transit time should be taken into consideration when setting validity 
duration to a small number or milliseconds?

Steve

On 12/16/14, 10:55 PM, Ben Campbell wrote:
> We currently define the unit for OC-Validity-Duration as milliseconds.
>
> Section 4.2.3 says (in a note) that transit time for OLRs can be safely ignored. That is likely true if the validity durations can generally be assumed to be long in comparison to transit time. It is _not_ true if validity duration can be a small number of milliseconds. That could lead to situations where the reporting node thinks the report has expired before the reacting node even sees it.
>
> Really, I don't think milliseconds are a reasonable unit here. I can't imagine any useful and safe application for sub-second validity durations, nor can I imagine it ever being useful to distinguish between X seconds and X + 0.001 seconds. We should choose a unit that lends itself to reasonable value ranges. I suggest we change it to seconds.
>
> Thanks!
>
> /Ben.
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 06:40:32 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC3EC1A1AB1 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:40:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NfzdOddJgAKR for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:40:30 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7E0F1A871B for <dime@ietf.org>; Wed, 17 Dec 2014 06:40:30 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53698 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1Fm7-0003F3-OZ for dime@ietf.org; Wed, 17 Dec 2014 06:40:30 -0800
Message-ID: <549195DA.6030207@usdonovans.com>
Date: Wed, 17 Dec 2014 08:40:26 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com> <5491224D.1060109@gmail.com> <AA8D3B9B-9271-4E5A-89AD-F44DBC62026B@nostrum.com> <54912A28.2060004@gmail.com>
In-Reply-To: <54912A28.2060004@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/yPsEnp71y6QQQ37e_9xyCO13XNA
Subject: Re: [Dime] DOIC WGLC: Sequence Number uniqueness
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:40:32 -0000

So the proposal is to change:

"The sequence number is only required to be unique between two DOIC nodes."

To:

"The sequence number must not repeat for non-identical OLRs over the 
lifetime of a particular OCS instance. "?

While true, I'm not sure that we even need that statement.

I propose that we just remove the first sentence and not replace it with 
anything.

Steve

On 12/17/14, 1:00 AM, Jouni Korhonen wrote:
> Good point. I would be OK with that change.
>
> - Jouni
>
> 12/17/2014 8:35 AM, Ben Campbell kirjoitti:
>> I'm not worried so much about nodes changing it. I'm just wondering 
>> if that is the right scope of uniqueness. I'm not sure why "between 
>> any two nodes" is relevant. Or even if "uniqueness" is relevant.
>>
>> It's a sequence number that gets incremented, not a unique ID per se.
>>
>> So, here's an example: A reporting node sends both realm reports and 
>> host reports to the same reacting node. If the sequence number has to 
>> be unique between two nodes, does that mean that the realm report and 
>> host reports must never have the same sequence number? If we start 
>> the sequence at zero and increment for each change (as is recommended 
>> elsewhere), they are highly likely to have the same sequence number 
>> at some point in time.
>>
>> I think the _real_ requirement is that the sequence number not 
>> repeat  for non-identical OLRs over the lifetime of a particular OCS 
>> instance.
>>
>>
>>> On Dec 17, 2014, at 12:27 AM, Jouni Korhonen 
>>> <jouni.nospam@gmail.com> wrote:
>>>
>>>
>>> Then they pass the SN unmodified, obviously. I rather have it 
>>> explicitly mentioned that e.g. an agent can modify the SN without 
>>> that causing the debate whether it is correct or not. Do you have a 
>>> specific case in mind where it could cause issues?
>>>
>>> - jouni
>>>
>>> 12/17/2014 7:13 AM, Ben Campbell kirjoitti:
>>>> Section 6.4, paragraph 2 says the following:
>>>>
>>>> " The sequence number is only required to be unique between two 
>>>> DOIC nodes."
>>>>
>>>> Is that limitation useful? What about agents that pass it OLRs 
>>>> without change?
>>>>
>>>> Thanks!
>>>>
>>>> Ben.
>>>>
>>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 06:42:15 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A50F1A8A9C for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:42:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0WJDSKNPHF1f for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:42:10 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AB661A8A9B for <dime@ietf.org>; Wed, 17 Dec 2014 06:42:10 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53703 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1Fnk-0005NW-3I for dime@ietf.org; Wed, 17 Dec 2014 06:42:09 -0800
Message-ID: <54919640.70908@usdonovans.com>
Date: Wed, 17 Dec 2014 08:42:08 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <494D7700-4468-4AB5-8F74-69273DE409AB@nostrum.com> <5491229D.6040709@gmail.com>
In-Reply-To: <5491229D.6040709@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-Eynu4qUyWU77WfHeEBkQiOv1u8
Subject: Re: [Dime] DOIC WGLC: OC-Reduction-Percentage default value
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:42:11 -0000

+1
On 12/17/14, 12:28 AM, Jouni Korhonen wrote:
> OK with me.
>
> - Jouni
>
> 12/17/2014 7:19 AM, Ben Campbell kirjoitti:
>> Section 6.7 says that OC-Reduction-Percentage has a default value of 
>> zero.
>>
>> I don't think we need a "general" default for this. The loss 
>> algorithm says OC-Reduction-Percentage MUST be included. If some 
>> other algorithm uses it, and needs a default, it can define one for 
>> the context of that algorithm. (And we shouldn't assume every 
>> algorithm will need a default of zero.)
>>
>> I propose we strike the default value from 6.7.
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 06:45:46 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC1021A8A8D for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:45:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4SYHvxNdOuZr for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:45:42 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D3101A8A8C for <dime@ietf.org>; Wed, 17 Dec 2014 06:45:42 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53712 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1Fr8-0009cp-Ev for dime@ietf.org; Wed, 17 Dec 2014 06:45:41 -0800
Message-ID: <54919712.6040007@usdonovans.com>
Date: Wed, 17 Dec 2014 08:45:38 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <94CD92E2-B801-4EC4-BECE-5C2B0788B361@nostrum.com>
In-Reply-To: <94CD92E2-B801-4EC4-BECE-5C2B0788B361@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Hro9jx5h20dNvportbVXYrxIDpk
Subject: Re: [Dime] DOIC WGLC: loss algorithm behavior with expiring OLRs
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:45:43 -0000

I agree.  In addition, the explanatory paragraph that follows should be 
moved to after the paragraph that discusses behavior after 100% reduction.

Steve

On 12/16/14, 11:07 PM, Ben Campbell wrote:
> Section 5.3 (paragraph 7) says that, for the loss algorithm, a reacting node should slowly ramp back up if an OLR expires. This seems to be for the general case of expiring loss-algorithm OLRs, since the case of expiring 100% reduction OLRs was dealt with in the preceding paragraphs.
>
> We have guidance elsewhere that a _reporting_node_ should end an overload condition in a controlled fashion. If both the reacting node and reporting node are trying to do this, you may get unexpected behavior. It makes sense for the reacting node to ramp up slowly from 100% reduction, since the reporting node could not update the reduction percentage until expired. But for an percentage reduction that still allows non-trivial traffic, the reporting node should be gradually ramping down the reduction.
>
> I propose we strike the entire paragraph from section 5.3.
>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 06:48:23 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 993B51A8A94 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:48:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ITHvDsow4Am6 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 06:48:16 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D78421A8AA1 for <dime@ietf.org>; Wed, 17 Dec 2014 06:48:16 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53713 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1Fte-000ClT-AF for dime@ietf.org; Wed, 17 Dec 2014 06:48:16 -0800
Message-ID: <549197AE.3080104@usdonovans.com>
Date: Wed, 17 Dec 2014 08:48:14 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <FD8A6495-AE13-4CA6-BD38-B97EA21A0B9A@nostrum.com>
In-Reply-To: <FD8A6495-AE13-4CA6-BD38-B97EA21A0B9A@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Rfjf4bFKocLd3sZ-7I-rzODGbTw
Subject: Re: [Dime] DOIC WGLC: Requirement for OC-Feature-Vector values
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 14:48:18 -0000

I'm ok with this change.

Steve

On 12/16/14, 11:02 PM, Ben Campbell wrote:
> Section 4.3 requires all extensions with "new normative behaviors" to define a new feature bit for OC-Feature-Vector.
>
> I still think that's too strong a requirement. If a new feature is backwards-compatible, then we may well not really need a feature bit. For example, SIP doesn't define a new feature tag for every new header. Also, keep in mind this is   a field of 1 bit flags. We only get 64 of those.
>
> I propose we change this to say that "any non-backwards compatible" feature requires a new feature bit.
>
> Thanks!
>
> /Ben.
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 08:26:57 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDF3E1A8B84 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:26:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PlK4P5o1oJgl for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:26:52 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2752C1A8AF6 for <dime@ietf.org>; Wed, 17 Dec 2014 08:26:52 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53821 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1HR2-0007wI-29 for dime@ietf.org; Wed, 17 Dec 2014 08:26:51 -0800
Message-ID: <5491AEC7.8070307@usdonovans.com>
Date: Wed, 17 Dec 2014 10:26:47 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: dime@ietf.org
References: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com>
In-Reply-To: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/afEUES6Erl_Dul2e-JHHG43iNHw
Subject: Re: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 16:26:55 -0000

On 12/16/14, 9:02 PM, Ben Campbell wrote:
> Here's some nits, editorial, and structural comments that are generally non-substantive. With the possible exception of comments about 2119 language, most of these could be ignored without consequence, but I think we'd have a better document if we at least thought about them:
>
> -- General:
>
> We keep referring to the DOIC "solution". I think "mechanism" is more appropriate. I would think of a DOIC "solution" as a deployment that leverages the DOIC "mechanism".
SRD> I don't see an issue here, as long as we are consistent.
>
> We overuse the word Diameter in front of other things. E.g. Diameter nodes, Diameter Agents, Diameter clients, Diameter servers, etc. This entire draft is about Diameter; we don't have to keep saying it. It tends to get awkward when we use it a lot in close proximity.
SRD> This was done based on feedback from Benoit.  We are being 
explicit.  If there are paragraphs where it is particularly cumbersome, 
please point out those paragraphs and we can try to make them less 
cumbersome.
>
> Should we put consistently quotes around "loss" when we describe the "loss" algorithm?
>
> -- Requirements (2119 language section)
>
> This is oddly placed. I'm used to seeing that after the introduction, either stand-alone or as part of a larger terminology section. The RFC editor recommends putting it as section 2.
SRD> Ok.
>
> -- section 2, Abatement Algorithm: "A mechanism..."
>
> I suggest "An extensible mechanism..."
SRD> Ok.
>
> -- Section 2, Diversion:
>
> Still needs work.  the "by selecting" phrase needs to indicate what does the selecting. "Path" should probably be "path or destination".
>
> Proposed text:
>
> "An overload abatement mechanism, where the reacting node selects alternate destinations or paths for for requests."
SRD> I'm ok with this wording.
>
> -- section 2, OCS: "Reporting and reacting node internally maintained state..."
>
> I suggest "Internal state maintained by a reporting or reacting node..."
SRD> Ok.
>
> -- section 2, Realm-Routed Requests: "... does not know the host that will service..."
>
> I suggest: "... does not know which host will service ..."
SRD> Ok.
>
> We should also add a comment that it may be possible to apply diversion to realm routed requests.
SRD> Where?
>
> -- section 2, Throttling: " ... a Diameter Client not sending requests..."
>
> I suggest " ... a Client choosing to not send requests ..."
SRD> A Diameter Client...
>
> -- section 3, 2nd paragraph:
>
> Client, servers, and agents should not be capitalized. Should "Reporting node" and "Reacting node" be hyphenated?  Consider moving the last sentence to the start of the next paragraph.
SRD> The capitalization of Diameter Clients, Diameter Servers and 
Diameter agents was Benoit's suggestion to make it explicit what is 
being referred to.  I don't see the need for hyphenation in this 
context.  I'm ok with moving the sentence.
>
> -- section 3.1, paragraph 1: " This is made possible by adding overload control AVPs, the OC-OLR AVP and the OC- Supported-Features AVP, as optional AVPs into existing commands..."
>
> I suggest "This is made possible by adding the optional overload control AVPs OC-OLR and OC-Supported-Features into existing commands."
SRD> OK.
>
> -- section 3.1, 3rd paragraph: "Reporting nodes also include overload reports..."
>
> "Reporting nodes _may_ also include overload reports..."
SRD> OK.
>
> -- section 3.1, 4th paragraph: "Clients MAY report..."
>
> Should not be normative in this section.
SRD> Agreed.
>
> -- section 3.2, 6th paragraph: "The OC-Feature-Vector AVP will contain..."
>
> "... will _always_ contain..."
SRD> Ok.
>
> -- section 3.2, 7th paragraph: " ... all answer messages to requests ..."
>
> suggest "... all answers to requests..."
SRD> Ok.
>
> -- section 3.2, paragraph 9: "Reporting nodes are allowed to..."
>
> "Reporting nodes can..."
SRD> Ok.
>
> Also consider clarifying that they can change algorithms _between_transactions_, as long as there's no active overload condition.
>
> -- section 3.2, paragraph 10 (starting with "The individual features..."
>
> Consider moving this entire paragraph to earlier in the section.
>
> -- section 3.2, paragraph 11: "The DCA mechanism must also allow..."
SRD> This paragraph looks redundant.  I suggest removing it.
>
> --> "The DCA mechanism allows..."
>
> "... the agent updates the OC-Supported-Features..." --> " ... the agent can update the OC-Supported-Features..."
SRD> Ok.
>
> -- section 3.3, general:
>
> Much of this section is redundant to stuff in the parent section. I suggest reducing the parent section detail, and keeping it here. (This may be true for subsequent children of section 3.)
SRD> Do you have specific suggestions?
>
> -- 3.3, third paragraph:
>
> s/ , / : /
SRD> I don't agree.  The commas are there because it is a list.
>
> -- 3.3, paragraph 4:
>
> In this overview, I suggest text saying that HOST_REPORT indicates a host report, and just using the term "host report" the rest of the time. (Same for realm report)
SRD> Why?
>
> -- 3.3, para 7: "A host-report, for instance, will generally by generated by tracking utilization of resources..."
>
> I suggest "A host-report might be generated by tracking use of resources..."
SRD> OK.
>
> -- 3.3, para 9: " ... are responsible for applying the overload abatement algorithm..."
>
> I suggest " ... apply the abatement algorithm..."
SRD> Ok.
>
> -- 3.4, para 2: " ... the definition of new report types and the definition of new scopes ..."
>
> Aren't these sort of the same thing? That is, you add new scopes by extending report type?
SRD> Can't you have a how report that applies only to sessions on that host?
>
> -- 3.4, para 3:
>
> First two sentences are a bit confusing. A new reader will likely think they contradict, without some explanation that OC-Feature-Vector is a child of OC-S-F.
SRD> They seam clear to me.  Do you have a suggested clarification?
>
> -- 3.4, para 4:
>
> First sentence has already been stated more than once. No need to repeat here.
SRD> The first sentence is there to provide context for the second 
sentence.
>
> -- 4.1.1, Para 1: "It MAY include the OC-Feature-Vector AVP."
>
> consider adding  ", as a sub-avp of OC-Supported-Features."
SRD> OK
>
> - 4.1.1, last paragraph: "This behavior is described in ..."
>
> What is the antecedent to "this"? If it's "loss algorithm" behavior, then the reference to section 4.2 should not be needed.
SRD> Agreed.
>
> -- 4.1.2, para 2:
>
> It's probably worth reiterating that the reacting node may not be the server, and this requirement may mean inserting AVPS into answers that came from upstream.
SRD> I don't see the need.  Do you have suggested wording?
>
> -- 4.1.2, para 3: "...response messages ... "
>
> "... _answer_ messages ..."
SRD> OK.
>
> -- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:
>
> This is also true if it needs to announce some other feature that needs to be indicated.
SRD> This paragraph is talking specifically about algorithms and is 
needed because the AVP is optional.  Are you suggesting another 
sentence, another paragraph?  I'm guessing that the case you talk about 
is already covered elsewhere.
>
> -- 4.1.3, para 3: "... Agent MUST include OC-Supported-Features in request messages it receives..."
>
> I suspect this should say "... requests that it _forwards_" or "_relays_".
SRD> To differentiate between the requests that it rejects.  Ok, I think 
relays is the better word.
>
> -- 4.1.3, para 5 and 6:
>
> Is the reporting node section limited to endpoints? If not, the these paragraphs effectively restate normative language about reporting node behavior from that section. Once we've said what a reporting node normatively has to do, we should just be able to say that an agent acting as a reporting node has all the responsibilities of a reporting node, and not restate the normative requirements.
SRD> I'm ok with this but it feels like more than an editorial change to me.
>
> -- 4.1.3, para 7:
>
> The first MAY is a consequence (the complement) of the 2nd MAY. It should at least not be 2119 language, and probably can be omitted entirely.
SRD> Do you have suggested wording?
>
> -- 4.1.3, para 9, last sentence:
>
> Does this mean an agent can only change OC-S-F in an answer if it changed it in the request? I don't think we want that restriction, but the context and "as such," seem to scope the MAY to that situation.
SRD> I don't read it that way.  The first sentence is describing one 
reason why an agent might change OC-S-F.  It doesn't say it is the only 
reason.
>
> -- 4.1.3, para 9: "ambiguity"
>
> I'm not sure that's is the word we want here. An agent could muck things up without being ambiguous. Perhaps "inconsistency"?
SRD> The point is that the reacting nodes and reporting nodes must 
unambiguously know what to do.  I think ambiguous is the right word.
>
> -- 4.2.1.1, para 1:
>
> Do I understand correctly that the reacting node only keeps OCS for those combinations that it has actually received an OLR for? If so, that's not clear from the wording.
SRD> Do you have suggested wording?
>
> -- 4.2.1.2, para 1:
>
> Likewise, the reporting node only keeps OCS for actual overload conditions where it sends OLRs?
SRD> Do you have suggested wording?
>
> -- 4.2.1.3, para 2:
>
> Should this combination include origin-host or origin-realm? App-Id?
SRD> I don't understand this.
>
> -- 4.2.1.3,  para 3: ... a reporting node MUST process..."
>
> Should that be "reacting node"?
SRD> Yes.
>
> -- 4.2.1.3, para 4:
>
> Paragraph does not make sense. (I think we've already discussed this one from Ulrich's comments).
SRD> Yes, this is addressed already.
>
> -- 4.2.1.3, 3rd para from end: "... update the OCS entry as being expired."
>
> I suggest language like " invalid" or "terminated". I take "expired" to mean "naturally expired", which is different from the case described here. There may be subtle behavior difference. (For example, a reacting node might choose to log "expirations" differently than "explicit terminations".)
SRD> For the context of this specification I think expired works.  
Implementations can differentiate types of expired if they have a 
reason.  Nothing here prevents that.
>
> -- 4.2.1.4, para 9: "... including the reduction percentage..."
>
> I suggest "... including, for example, the reduction percentage..."
SRD> OK.
>
> -- 4.2.1.4, para 11: " ... MUST update the sequence number ..."
>
> I suggest s / update / increment
SRD> OK.
>
> -- 4.2.2, 2nd to last para:
>
>   I think we need something a bit stronger here. The endpoint needs to take some action that makes sense for the application. The details of that are beyond our scope, but the general need is not.
SRD> We cannot enforce application behavior in a Diameter 
specification.   I don't see the need for anything more .  Do you have 
suggested wording?
>
> -- 4.2.3, para 2:
>
> Doesn't this also need to match the scope for the request type? E.g. Destination realm or destination host? For example, a host report for host A would not match OCS for host B, even though both had the same report type and application id.
SRD> I guess this matters when an agent is the reporting node.
>
> -- 4.2.3, paras 8 and 9:
>
> We put the currently less favored approach first, with the favored approach in the following paragraph. I suggest we put the more favored approach first.
SRD> OK.
>
>
> -- 4.2.3, last para:
>
> An example of what we have in mind could be helpful here.
SRD> I'm open to suggested wording...
>
>
> -- 4.3, para 4:
>
> We should clarify that this is talking about mandatory to understand for DOIC, but not for the enclosing transaction.
SRD> i'm not clear on what you are suggesting.  Do you have suggested 
wording?
>
> -- 4.3, para 5:
>
> Why is it different depending on whether the feature is an algorithm or not? Also, isn't this mostly redundant to the paragraph about new normative behavior?
SRD> I agree, this paragraph can be removed.
>
> -- 4.3, para 6, last sentence
>
> This is redundant to earlier normative language in the section (assuming a new report type will always involve new normative behavior.)
SRD> I agree, the last sentence can be removed.
>
> -- 4.3, para 7, last sentence
>
> Also redundant
SRD> Agreed.
>
> -- 4.3, last para, last sentence:
>
> It's not clear if this means section 8 of this doc, or 6733. I suggest putting this sentence before the subsequent one.
SRD> OK.
>
> -- 5.1, para 4:
>
> Convoluted paragraph. How about "How about "reporting nodes request the stateless reduction of the number of requests by an indicated percentage."
SRD> Ok.
>
> We should also clarify that this reduction is in comparison to what the reacting node otherwise would have sent, rather than what it may have previously sent.
SRD> Isn't this already covered?  Do you have suggested wording?
>
> -- 5.3, para 5:
>
> Needs a sentence or paragraph to describe the 100% issue before describing how to back down from it.
SRD> It's discussed earlier in the document.  I'm ok with adding it 
again.  Do you have suggested wording?
>
> "... following concerns are RECOMMENDED ..."
>
> following procedures...?
SRD> OK.
>
> -- 5.3, para 6: "... does not receive an OLR in messages sent to the formerly overloaded node..."
>
> Do we mean "... does not receive an OLR in answers received from the formerly overloaded node..."?
SRD> Agreed.
>
> -- para 6, last paragraph
>
> Paragraph is off topic for section. It probably belongs in the extensibility section, or at least somewhere other than here.
SRD> Do you mean section 6? This isn't about extensibility but about how 
Diameter applications integrate DOIC.  It probably belongs in the intro 
or overview sections.
>
> -- 6.1, last para:
>
> I think we moved this to 6.2, but forgot to delete it here.
SRD> Yup, already addressed as part of Ulrich's comments.
>
> -- 6.2:
>
> Why did the AVP code jump to TBD6? (Also seems out of order in the table.)
SRD> Historical reasons.  Doesn't matter, the real values will be filled 
in eventually.
>
> Is it to late to rename the value to OLR_LOSS_ALGO?
SRD> Yes. :-)
>
> -- 9.4, para 2: "A node MUST not..."
>
> "A node MUST _NOT_ ..."
SRD> Ok.
>
> -- References:
>
> 5905 and 5729 are not cited in the document.
SRD> Ok.
>
> draft-ietf-dime-e2e-sec-req-00: Outdated version.
SRD> Ok.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 08:28:53 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B21D71A8BC3 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:28:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gx57MYXJ9u7R for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:28:47 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F02751A8BC0 for <dime@ietf.org>; Wed, 17 Dec 2014 08:28:46 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHGSjHp080547 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 10:28:46 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <549192FD.7060403@usdonovans.com>
Date: Wed, 17 Dec 2014 10:28:45 -0600
X-Mao-Original-Outgoing-Id: 440526524.362778-2f645816acc168ad07422fcbe45acbfc
Content-Transfer-Encoding: quoted-printable
Message-Id: <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/Sf4ru3vQYD4JaKtlun3dbuHnA3g
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 16:28:50 -0000

I seem to be completely failing at describing the issue.

Imagine this picture:

C1---
        \
          -------A------S
	 /
C2---

Now, assume S is overloaded. Consider two cases:

1) C1 and C2 support DOIC. A either doesn't support it, or does support =
it but passes DCA unchanged. Is this flow legal? (I assume "yes", since =
"no" would have some nasty implications about mixed capability =
environments.)

C1 ------>A------>S
(loss + rate)
C1 <------A<------S
                   (rate)
                   (OLR-rate)
C2------->A------>S
(loss)
C2<------A<-------S
                   (loss)
                   (OLR-loss)


2) Now assume C1 and C2 do not support DOIC, but A does, but A changes =
config mid way through. According to your proposal, I _think_ it would =
work like this (see difference in last answer)

C1 ------>A------>S
                 (loss + rate)
C1 <------A<------S
                   (rate)
                   (OLR-rate)
C2------->A------>S
                    (loss)
C2<------A<-------S
                   (_rate_)
                   (OLR-rate)


The problem is, S cannot tell the difference between the two flows. In =
the first case, there are two separate reacting nodes with different =
capabilities. In the second case there's a single reacting node with =
changing capabilities. But from S's perspective, the requests look =
exactly the same.

(At this point, some one will point out that in the first case, the =
OC-S-F difference can correspond to different Origin-Host values, and in =
case 2 they do not. Maybe S can infer the difference from that. To that, =
I say assume now that C1 and C2 are really agents, and all the traffic =
is coming from a single client behind them. The issue would be the same, =
but Origin-Host would never change.)



> On Dec 17, 2014, at 8:28 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> The only way for a reacting node to attempt to change the algorithm is =
by removing an algorithm that had been advertised before the overload =
condition started and stopping to advertise it during an overload =
condition.
>=20
>  C------------------>S   The reacting node advertises loss and rate
>   OC-S-F(loss+rate)
>  C<------------------S   The reporting node enters overload using the =
rate algorithm
>          OC-S-F(rate)
>          OC-OLR(...)
>  C------------------>S   The reacting node stops advertising the rate =
algorithm
>    OC-S-F(loss)
>=20
> It is certainly conceivable that this could happen as a result of =
configuration changes at the reacting node.
>=20
> I don't think, however, that we need to add any behavior changes for =
the reporting node in this case.  It is reasonable to expect a reacting =
node to continue to support an abatement algorithm it was advertising =
when an overload occurrence started for the duration of that active =
overload occurrence.  In fact, it would be detrimental to the reporting =
node, which is in an overload state, to do extra work because a reacting =
node started sending a different set of features in the OC-S-F AVP.
>=20
> We already say that a reporting node must not change the algorithm =
during an active overload condition.  I propose that we strengthen this =
to include when a new set of features and abatement algorithms are =
advertised by the reporting node.  Those new features and abatement =
algorithms cannot go into effect until the existing active overload =
condition is resolved.  This would look like the following on the wire:
>=20
>  C------------------>S   The reacting node advertises loss and rate
>   OC-S-F(loss+rate)
>  C<------------------S   The reporting node enters overload using the =
rate algorithm
>          OC-S-F(rate)
>          OC-OLR(...)
>  C------------------>S   The reacting node stops advertising the rate =
algorithm
>    OC-S-F(loss)
>  C<------------------S   The reporting node ignores the new set of =
features
>          OC-S-F(rate)
>          OC-OLR(...)
>  C------------------>S
>    OC-S-F(loss)
>  C<------------------S   The overload condition ends
>          OC-S-F(rate)
>          OC-OLR(Validity-Duration:0)
>  C------------------>S   The reporting node processes the new set of =
features
>    OC-S-F(loss)
>  C<------------------S
>          OC-S-F(loss)
>=20
> Steve
>=20
> On 12/17/14, 1:11 AM, Jouni Korhonen wrote:
>> While changing algorithm "on fly" is undesirable both reporting and =
reacting nodes need to be prepared for the situation, specifically if =
the reacting node keeps advertising multiple supported algorithms.
>>=20
>> I think we need to flag this better in the text but stress that such =
behaviour is not desired. And in some cases not even possible to do =
cleanly (depending on the algorithm).
>>=20
>> - Jouni
>>=20
>> 12/17/2014 6:48 AM, Ben Campbell kirjoitti:
>>> Section 4.1.2, (4th paragraph from end ) says that a reporting node =
cannot change algorithms during an active overload condition. We fail to =
say anything about when reacting nodes could change their list of =
supported algorithms. That leaves us with the question about what =
happens if a reporting node has an active OCS, and gets a new request =
with an OC-S-F that does not support the active algorithm.
>>>=20
>>> The obvious answer is that reacting nodes shouldn't do that-- but I =
think there would still be legal scenarios where it could happen anyway. =
So even if we say that a single reacting node should not change its =
algorithm list while it has active OCS, we still need to handle the =
situation for reporting nodes.
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>>=20
>>=20
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 17 08:31:00 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56F871A8B84 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:30:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4yzeJit71RU9 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:30:53 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04A4C1A8F3C for <dime@ietf.org>; Wed, 17 Dec 2014 08:30:47 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHGUkjf080710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 10:30:46 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <549193B8.6000603@usdonovans.com>
Date: Wed, 17 Dec 2014 10:30:45 -0600
X-Mao-Original-Outgoing-Id: 440526645.094785-135b7a8b8710d8e2b59652913769245e
Content-Transfer-Encoding: quoted-printable
Message-Id: <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/vp4PK-O_sZQe0VtXO9-wKxc4Tr0
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 16:30:55 -0000

Why would you ever set validity duration to a small number of =
milliseconds?

I think asking nodes to take transit time into consideration adds =
considerable complexity.

> On Dec 17, 2014, at 8:31 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Why not change the paragraph in section 4.2.3 to indicate that the =
transit time should be taken into consideration when setting validity =
duration to a small number or milliseconds?
>=20
> Steve
>=20
> On 12/16/14, 10:55 PM, Ben Campbell wrote:
>> We currently define the unit for OC-Validity-Duration as =
milliseconds.
>>=20
>> Section 4.2.3 says (in a note) that transit time for OLRs can be =
safely ignored. That is likely true if the validity durations can =
generally be assumed to be long in comparison to transit time. It is =
_not_ true if validity duration can be a small number of milliseconds. =
That could lead to situations where the reporting node thinks the report =
has expired before the reacting node even sees it.
>>=20
>> Really, I don't think milliseconds are a reasonable unit here. I =
can't imagine any useful and safe application for sub-second validity =
durations, nor can I imagine it ever being useful to distinguish between =
X seconds and X + 0.001 seconds. We should choose a unit that lends =
itself to reasonable value ranges. I suggest we change it to seconds.
>>=20
>> Thanks!
>>=20
>> /Ben.
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Wed Dec 17 08:31:34 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFF8D1A8BBD for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:31:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NxacgdH0o-7T for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:31:30 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F7C41A8B84 for <dime@ietf.org>; Wed, 17 Dec 2014 08:31:30 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHGUkjg080710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 10:31:30 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <549195DA.6030207@usdonovans.com>
Date: Wed, 17 Dec 2014 10:31:30 -0600
X-Mao-Original-Outgoing-Id: 440526689.901631-36fecb2cd0ef001e236629e76d3fd62e
Content-Transfer-Encoding: quoted-printable
Message-Id: <3B788EE3-C248-43F6-AB00-AC90492FBE8C@nostrum.com>
References: <C54130E8-1AD6-4256-8008-63B2B465B508@nostrum.com> <5491224D.1060109@gmail.com> <AA8D3B9B-9271-4E5A-89AD-F44DBC62026B@nostrum.com> <54912A28.2060004@gmail.com> <549195DA.6030207@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/d8qtV70LYcPUMcM37mVbBTypMN8
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Sequence Number uniqueness
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 16:31:32 -0000

> On Dec 17, 2014, at 8:40 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> So the proposal is to change:
>=20
> "The sequence number is only required to be unique between two DOIC =
nodes."
>=20
> To:
>=20
> "The sequence number must not repeat for non-identical OLRs over the =
lifetime of a particular OCS instance. "?
>=20
> While true, I'm not sure that we even need that statement.
>=20
> I propose that we just remove the first sentence and not replace it =
with anything.

I'm okay with that. I think the other bits are sufficiently explained =
elsewhere.


From nobody Wed Dec 17 08:43:57 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CC961A8AF5 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:43:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kRALyBVGyqmY for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 08:43:50 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 680791A1BC0 for <dime@ietf.org>; Wed, 17 Dec 2014 08:43:43 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53838 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1HhL-0004kW-NS; Wed, 17 Dec 2014 08:43:42 -0800
Message-ID: <5491B2BB.30709@usdonovans.com>
Date: Wed, 17 Dec 2014 10:43:39 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com>
In-Reply-To: <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/OGvNw9yqP35VO2Kv7sqsAjAFxIU
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 16:43:52 -0000

On 12/17/14, 10:30 AM, Ben Campbell wrote:
> Why would you ever set validity duration to a small number of milliseconds?
Why not?
>
> I think asking nodes to take transit time into consideration adds considerable complexity.
I don't see that saying that validity duration values less then the RTT 
should be avoided is adding considerable complexity.
>
>> On Dec 17, 2014, at 8:31 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Why not change the paragraph in section 4.2.3 to indicate that the transit time should be taken into consideration when setting validity duration to a small number or milliseconds?
>>
>> Steve
>>
>> On 12/16/14, 10:55 PM, Ben Campbell wrote:
>>> We currently define the unit for OC-Validity-Duration as milliseconds.
>>>
>>> Section 4.2.3 says (in a note) that transit time for OLRs can be safely ignored. That is likely true if the validity durations can generally be assumed to be long in comparison to transit time. It is _not_ true if validity duration can be a small number of milliseconds. That could lead to situations where the reporting node thinks the report has expired before the reacting node even sees it.
>>>
>>> Really, I don't think milliseconds are a reasonable unit here. I can't imagine any useful and safe application for sub-second validity durations, nor can I imagine it ever being useful to distinguish between X seconds and X + 0.001 seconds. We should choose a unit that lends itself to reasonable value ranges. I suggest we change it to seconds.
>>>
>>> Thanks!
>>>
>>> /Ben.
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 09:26:19 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AC941A1BF3 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 09:26:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vld3u13c83HN for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 09:26:14 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 929631A1BEE for <dime@ietf.org>; Wed, 17 Dec 2014 09:26:14 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:53869 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1IMV-0001iY-Ad; Wed, 17 Dec 2014 09:26:13 -0800
Message-ID: <5491BCB3.30608@usdonovans.com>
Date: Wed, 17 Dec 2014 11:26:11 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com>
In-Reply-To: <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/qcYLpVNTyysydO9ybQ5kgi_WASE
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 17:26:16 -0000

Ben,

The value of the Origin-Host matters greatly here.  In both cases, what 
S needs to know is if there is a reacting node for traffic coming from 
C1 and if there is a reacting node for traffic coming from C2.

More inline.

Steve


On 12/17/14, 10:28 AM, Ben Campbell wrote:
> I seem to be completely failing at describing the issue.
>
> Imagine this picture:
>
> C1---
>          \
>            -------A------S
> 	 /
> C2---
>
> Now, assume S is overloaded. Consider two cases:
>
> 1) C1 and C2 support DOIC. A either doesn't support it, or does support it but passes DCA unchanged. Is this flow legal? (I assume "yes", since "no" would have some nasty implications about mixed capability environments.)
>
> C1 ------>A------>S
> (loss + rate)
> C1 <------A<------S
>                     (rate)
>                     (OLR-rate)
> C2------->A------>S
> (loss)
> C2<------A<-------S
>                     (loss)
>                     (OLR-loss)
SRD> Yes, this is legal and is no different then the case where C1 and 
C2 are directly connected to S.
>
> 2) Now assume C1 and C2 do not support DOIC, but A does, but A changes config mid way through. According to your proposal, I _think_ it would work like this (see difference in last answer)
>
> C1 ------>A------>S
>                   (loss + rate)
> C1 <------A<------S
>                     (rate)
>                     (OLR-rate)
> C2------->A------>S
>                      (loss)
> C2<------A<-------S
>                     (_rate_)
>                     (OLR-rate)
SRD> In this case S would need to select loss because the reacting node 
for C2 only supports loss.  It doesn't matter if the reacting node for 
C2 resides in the element called C2 or if it resides in A.  All S needs 
to know is if there is a reacting node for traffic originated by C2.  S 
differentiates the source of the traffic using the Origin-Host AVP in 
the request messages.
>
>
> The problem is, S cannot tell the difference between the two flows. In the first case, there are two separate reacting nodes with different capabilities. In the second case there's a single reacting node with changing capabilities. But from S's perspective, the requests look exactly the same.
SRD> There are two separate reacting nodes in the second case as well.  
They are "virtual" reacting nodes that happen to reside in A.
>
> (At this point, some one will point out that in the first case, the OC-S-F difference can correspond to different Origin-Host values, and in case 2 they do not. Maybe S can infer the difference from that. To that, I say assume now that C1 and C2 are really agents, and all the traffic is coming from a single client behind them. The issue would be the same, but Origin-Host would never change.)
>
>
>
>> On Dec 17, 2014, at 8:28 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> The only way for a reacting node to attempt to change the algorithm is by removing an algorithm that had been advertised before the overload condition started and stopping to advertise it during an overload condition.
>>
>>   C------------------>S   The reacting node advertises loss and rate
>>    OC-S-F(loss+rate)
>>   C<------------------S   The reporting node enters overload using the rate algorithm
>>           OC-S-F(rate)
>>           OC-OLR(...)
>>   C------------------>S   The reacting node stops advertising the rate algorithm
>>     OC-S-F(loss)
>>
>> It is certainly conceivable that this could happen as a result of configuration changes at the reacting node.
>>
>> I don't think, however, that we need to add any behavior changes for the reporting node in this case.  It is reasonable to expect a reacting node to continue to support an abatement algorithm it was advertising when an overload occurrence started for the duration of that active overload occurrence.  In fact, it would be detrimental to the reporting node, which is in an overload state, to do extra work because a reacting node started sending a different set of features in the OC-S-F AVP.
>>
>> We already say that a reporting node must not change the algorithm during an active overload condition.  I propose that we strengthen this to include when a new set of features and abatement algorithms are advertised by the reporting node.  Those new features and abatement algorithms cannot go into effect until the existing active overload condition is resolved.  This would look like the following on the wire:
>>
>>   C------------------>S   The reacting node advertises loss and rate
>>    OC-S-F(loss+rate)
>>   C<------------------S   The reporting node enters overload using the rate algorithm
>>           OC-S-F(rate)
>>           OC-OLR(...)
>>   C------------------>S   The reacting node stops advertising the rate algorithm
>>     OC-S-F(loss)
>>   C<------------------S   The reporting node ignores the new set of features
>>           OC-S-F(rate)
>>           OC-OLR(...)
>>   C------------------>S
>>     OC-S-F(loss)
>>   C<------------------S   The overload condition ends
>>           OC-S-F(rate)
>>           OC-OLR(Validity-Duration:0)
>>   C------------------>S   The reporting node processes the new set of features
>>     OC-S-F(loss)
>>   C<------------------S
>>           OC-S-F(loss)
>>
>> Steve
>>
>> On 12/17/14, 1:11 AM, Jouni Korhonen wrote:
>>> While changing algorithm "on fly" is undesirable both reporting and reacting nodes need to be prepared for the situation, specifically if the reacting node keeps advertising multiple supported algorithms.
>>>
>>> I think we need to flag this better in the text but stress that such behaviour is not desired. And in some cases not even possible to do cleanly (depending on the algorithm).
>>>
>>> - Jouni
>>>
>>> 12/17/2014 6:48 AM, Ben Campbell kirjoitti:
>>>> Section 4.1.2, (4th paragraph from end ) says that a reporting node cannot change algorithms during an active overload condition. We fail to say anything about when reacting nodes could change their list of supported algorithms. That leaves us with the question about what happens if a reporting node has an active OCS, and gets a new request with an OC-S-F that does not support the active algorithm.
>>>>
>>>> The obvious answer is that reacting nodes shouldn't do that-- but I think there would still be legal scenarios where it could happen anyway. So even if we say that a single reacting node should not change its algorithm list while it has active OCS, we still need to handle the situation for reporting nodes.
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 09:29:00 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A5C31A1BC0 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 09:28:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0MWFyWNbKKdX for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 09:28:57 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38E7C1A1BD6 for <dime@ietf.org>; Wed, 17 Dec 2014 09:28:57 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHHSuGG086134 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 11:28:56 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491B2BB.30709@usdonovans.com>
Date: Wed, 17 Dec 2014 11:28:55 -0600
X-Mao-Original-Outgoing-Id: 440530135.642317-5c95618f8be270ff391a1fbd3e9af34f
Content-Transfer-Encoding: quoted-printable
Message-Id: <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/JUsTfbvCcBnTXsyHhkd4beu59sg
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 17:28:59 -0000

> On Dec 17, 2014, at 10:43 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>=20
> On 12/17/14, 10:30 AM, Ben Campbell wrote:
>> Why would you ever set validity duration to a small number of =
milliseconds?
> Why not?

Because it's false precision. It's more likely to be harmful than =
useful. The precision of a value should be appropriate for it's the =
precision of its measurement. Inappropriate precision leads to bad =
decisions. [1]

The validity duration means one of two things, or a combination of them: =
1) I estimate that I will be overloaded for roughly X time and/or 2) I =
will tell you if I am still overloaded, with sufficient notice you can =
reasonably act on it before the expiration.

(Of the two, I think 2) is the more realistic.)

For 1: If we think we can estimate how long it you are likely to be =
overloaded down to sub-second precision, I'd like to see the magic =
prediction algorithm.

For 2: Sub second validity durations require multiple updates a second =
to refresh the OLR state. That creates a _lot_ of almost certainly =
useless work for the reacting node.


[1] http://en.wikipedia.org/wiki/False_precision


>>=20
>> I think asking nodes to take transit time into consideration adds =
considerable complexity.
> I don't see that saying that validity duration values less then the =
RTT should be avoided is adding considerable complexity.

We currently don't have a requirement to estimate RTT, other than "we =
assume it's not crazy big." This would add one.

>>=20
>>> On Dec 17, 2014, at 8:31 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>> Why not change the paragraph in section 4.2.3 to indicate that the =
transit time should be taken into consideration when setting validity =
duration to a small number or milliseconds?
>>>=20
>>> Steve
>>>=20
>>> On 12/16/14, 10:55 PM, Ben Campbell wrote:
>>>> We currently define the unit for OC-Validity-Duration as =
milliseconds.
>>>>=20
>>>> Section 4.2.3 says (in a note) that transit time for OLRs can be =
safely ignored. That is likely true if the validity durations can =
generally be assumed to be long in comparison to transit time. It is =
_not_ true if validity duration can be a small number of milliseconds. =
That could lead to situations where the reporting node thinks the report =
has expired before the reacting node even sees it.
>>>>=20
>>>> Really, I don't think milliseconds are a reasonable unit here. I =
can't imagine any useful and safe application for sub-second validity =
durations, nor can I imagine it ever being useful to distinguish between =
X seconds and X + 0.001 seconds. We should choose a unit that lends =
itself to reasonable value ranges. I suggest we change it to seconds.
>>>>=20
>>>> Thanks!
>>>>=20
>>>> /Ben.
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>=20
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20


From nobody Wed Dec 17 09:41:59 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF8151A6F17 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 09:41:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ASaugpOj__rc for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 09:41:55 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BE921A6EE7 for <dime@ietf.org>; Wed, 17 Dec 2014 09:41:55 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHHfsh2087247 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 11:41:55 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491BCB3.30608@usdonovans.com>
Date: Wed, 17 Dec 2014 11:41:54 -0600
X-Mao-Original-Outgoing-Id: 440530914.331482-0f7d50adfd880a20d688c4f84ed37dbd
Content-Transfer-Encoding: quoted-printable
Message-Id: <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/8B6Fx7mUx2KN-r8oZNl6PhUpdYM
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 17:41:58 -0000

Okay, new picture:

    =20
> On Dec 17, 2014, at 11:26 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> Ben,
>=20
> The value of the Origin-Host matters greatly here.  In both cases, =
what S needs to know is if there is a reacting node for traffic coming =
from C1 and if there is a reacting node for traffic coming from C2.

There is no assumption in the draft right now that we have a correlation =
between reacting nodes and clients. That might be required for =
client-targed OLRs, but we don't have those yet.

Consider a different picture. In this case, C never supports DOIC. the =
reacting node role happens either at A1/A2 or at A3, depending on which =
flow you look at.

        A1---
       /         \
C --             -------A3------S
       \         /
         A2---

Now, assume the same flows, but substitute A1 for C1, A2, for C2, and A3 =
for A. All requests now have the same origin-host.

Before you say this is unrealistic: The issue is the same for any =
situation where one client can send traffic across multiple agents to =
the same destination. It doesn't matter if there is one or a million.


>=20
> More inline.
>=20
> Steve
>=20
>=20
> On 12/17/14, 10:28 AM, Ben Campbell wrote:
>> I seem to be completely failing at describing the issue.
>>=20
>> Imagine this picture:
>>=20
>> C1---
>>         \
>>           -------A------S
>> 	 /
>> C2---
>>=20
>> Now, assume S is overloaded. Consider two cases:
>>=20
>> 1) C1 and C2 support DOIC. A either doesn't support it, or does =
support it but passes DCA unchanged. Is this flow legal? (I assume =
"yes", since "no" would have some nasty implications about mixed =
capability environments.)
>>=20
>> C1 ------>A------>S
>> (loss + rate)
>> C1 <------A<------S
>>                    (rate)
>>                    (OLR-rate)
>> C2------->A------>S
>> (loss)
>> C2<------A<-------S
>>                    (loss)
>>                    (OLR-loss)
> SRD> Yes, this is legal and is no different then the case where C1 and =
C2 are directly connected to S.
>>=20
>> 2) Now assume C1 and C2 do not support DOIC, but A does, but A =
changes config mid way through. According to your proposal, I _think_ it =
would work like this (see difference in last answer)
>>=20
>> C1 ------>A------>S
>>                  (loss + rate)
>> C1 <------A<------S
>>                    (rate)
>>                    (OLR-rate)
>> C2------->A------>S
>>                     (loss)
>> C2<------A<-------S
>>                    (_rate_)
>>                    (OLR-rate)
> SRD> In this case S would need to select loss because the reacting =
node for C2 only supports loss.  It doesn't matter if the reacting node =
for C2 resides in the element called C2 or if it resides in A.  All S =
needs to know is if there is a reacting node for traffic originated by =
C2.  S differentiates the source of the traffic using the Origin-Host =
AVP in the request messages.

If we expect a separate reacting node "instance" for each request =
origin-host, we need to say so. But it still doesn't work for the single =
client example.


>>=20
>>=20
>> The problem is, S cannot tell the difference between the two flows. =
In the first case, there are two separate reacting nodes with different =
capabilities. In the second case there's a single reacting node with =
changing capabilities. But from S's perspective, the requests look =
exactly the same.
> SRD> There are two separate reacting nodes in the second case as well. =
 They are "virtual" reacting nodes that happen to reside in A.

Where does the draft say or even imply that? It would make sense if we =
were asking for different abatement for C1 and C2, but we are not.  But =
in any case, consider the single client example above.

>>=20
>> (At this point, some one will point out that in the first case, the =
OC-S-F difference can correspond to different Origin-Host values, and in =
case 2 they do not. Maybe S can infer the difference from that. To that, =
I say assume now that C1 and C2 are really agents, and all the traffic =
is coming from a single client behind them. The issue would be the same, =
but Origin-Host would never change.)
>>=20
>>=20
>>=20
>>> On Dec 17, 2014, at 8:28 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>> The only way for a reacting node to attempt to change the algorithm =
is by removing an algorithm that had been advertised before the overload =
condition started and stopping to advertise it during an overload =
condition.
>>>=20
>>>  C------------------>S   The reacting node advertises loss and rate
>>>   OC-S-F(loss+rate)
>>>  C<------------------S   The reporting node enters overload using =
the rate algorithm
>>>          OC-S-F(rate)
>>>          OC-OLR(...)
>>>  C------------------>S   The reacting node stops advertising the =
rate algorithm
>>>    OC-S-F(loss)
>>>=20
>>> It is certainly conceivable that this could happen as a result of =
configuration changes at the reacting node.
>>>=20
>>> I don't think, however, that we need to add any behavior changes for =
the reporting node in this case.  It is reasonable to expect a reacting =
node to continue to support an abatement algorithm it was advertising =
when an overload occurrence started for the duration of that active =
overload occurrence.  In fact, it would be detrimental to the reporting =
node, which is in an overload state, to do extra work because a reacting =
node started sending a different set of features in the OC-S-F AVP.
>>>=20
>>> We already say that a reporting node must not change the algorithm =
during an active overload condition.  I propose that we strengthen this =
to include when a new set of features and abatement algorithms are =
advertised by the reporting node.  Those new features and abatement =
algorithms cannot go into effect until the existing active overload =
condition is resolved.  This would look like the following on the wire:
>>>=20
>>>  C------------------>S   The reacting node advertises loss and rate
>>>   OC-S-F(loss+rate)
>>>  C<------------------S   The reporting node enters overload using =
the rate algorithm
>>>          OC-S-F(rate)
>>>          OC-OLR(...)
>>>  C------------------>S   The reacting node stops advertising the =
rate algorithm
>>>    OC-S-F(loss)
>>>  C<------------------S   The reporting node ignores the new set of =
features
>>>          OC-S-F(rate)
>>>          OC-OLR(...)
>>>  C------------------>S
>>>    OC-S-F(loss)
>>>  C<------------------S   The overload condition ends
>>>          OC-S-F(rate)
>>>          OC-OLR(Validity-Duration:0)
>>>  C------------------>S   The reporting node processes the new set of =
features
>>>    OC-S-F(loss)
>>>  C<------------------S
>>>          OC-S-F(loss)
>>>=20
>>> Steve
>>>=20
>>> On 12/17/14, 1:11 AM, Jouni Korhonen wrote:
>>>> While changing algorithm "on fly" is undesirable both reporting and =
reacting nodes need to be prepared for the situation, specifically if =
the reacting node keeps advertising multiple supported algorithms.
>>>>=20
>>>> I think we need to flag this better in the text but stress that =
such behaviour is not desired. And in some cases not even possible to do =
cleanly (depending on the algorithm).
>>>>=20
>>>> - Jouni
>>>>=20
>>>> 12/17/2014 6:48 AM, Ben Campbell kirjoitti:
>>>>> Section 4.1.2, (4th paragraph from end ) says that a reporting =
node cannot change algorithms during an active overload condition. We =
fail to say anything about when reacting nodes could change their list =
of supported algorithms. That leaves us with the question about what =
happens if a reporting node has an active OCS, and gets a new request =
with an OC-S-F that does not support the active algorithm.
>>>>>=20
>>>>> The obvious answer is that reacting nodes shouldn't do that-- but =
I think there would still be legal scenarios where it could happen =
anyway. So even if we say that a single reacting node should not change =
its algorithm list while it has active OCS, we still need to handle the =
situation for reporting nodes.
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>>=20
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>=20
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20


From nobody Wed Dec 17 10:34:59 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F6141A1B98 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 10:34:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level: 
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XNzcqBljsiJ0 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 10:34:54 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7123C1A0055 for <dime@ietf.org>; Wed, 17 Dec 2014 10:34:54 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54190 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1JQv-0005Pd-SG; Wed, 17 Dec 2014 10:34:52 -0800
Message-ID: <5491CCC9.3090809@usdonovans.com>
Date: Wed, 17 Dec 2014 12:34:49 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com>
In-Reply-To: <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com>
Content-Type: multipart/alternative; boundary="------------080607050504080904040303"
X-OutGoing-Spam-Status: No, score=0.6
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/DG-6-ZlkWYuuuxv7s_GxN0R2lec
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 18:34:57 -0000

This is a multi-part message in MIME format.
--------------080607050504080904040303
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit


On 12/17/14, 11:41 AM, Ben Campbell wrote:
> Okay, new picture:
>
>       
>> On Dec 17, 2014, at 11:26 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>> Ben,
>>
>> The value of the Origin-Host matters greatly here.  In both cases, what S needs to know is if there is a reacting node for traffic coming from C1 and if there is a reacting node for traffic coming from C2.
> There is no assumption in the draft right now that we have a correlation between reacting nodes and clients. That might be required for client-targed OLRs, but we don't have those yet.
>
> Consider a different picture. In this case, C never supports DOIC. the reacting node role happens either at A1/A2 or at A3, depending on which flow you look at.
>
>          A1---
>         /         \
> C --             -------A3------S
>         \         /
>           A2---
>
> Now, assume the same flows, but substitute A1 for C1, A2, for C2, and A3 for A. All requests now have the same origin-host.
>
> Before you say this is unrealistic: The issue is the same for any situation where one client can send traffic across multiple agents to the same destination. It doesn't matter if there is one or a million.

SRD> Yes, this is nasty.  With attribution S can detect the scenario.  
I'm not sure what it does once it selects it.  This can be addressed to 
some degree by adding a deployment recommendation that  all agents 
taking on reacting node functionality for a single endpoint  select the 
same algorithm.

>
>
>> More inline.
>>
>> Steve
>>
>>
>> On 12/17/14, 10:28 AM, Ben Campbell wrote:
>>> I seem to be completely failing at describing the issue.
>>>
>>> Imagine this picture:
>>>
>>> C1---
>>>          \
>>>            -------A------S
>>> 	 /
>>> C2---
>>>
>>> Now, assume S is overloaded. Consider two cases:
>>>
>>> 1) C1 and C2 support DOIC. A either doesn't support it, or does support it but passes DCA unchanged. Is this flow legal? (I assume "yes", since "no" would have some nasty implications about mixed capability environments.)
>>>
>>> C1 ------>A------>S
>>> (loss + rate)
>>> C1 <------A<------S
>>>                     (rate)
>>>                     (OLR-rate)
>>> C2------->A------>S
>>> (loss)
>>> C2<------A<-------S
>>>                     (loss)
>>>                     (OLR-loss)
>> SRD> Yes, this is legal and is no different then the case where C1 and C2 are directly connected to S.
>>> 2) Now assume C1 and C2 do not support DOIC, but A does, but A changes config mid way through. According to your proposal, I _think_ it would work like this (see difference in last answer)
>>>
>>> C1 ------>A------>S
>>>                   (loss + rate)
>>> C1 <------A<------S
>>>                     (rate)
>>>                     (OLR-rate)
>>> C2------->A------>S
>>>                      (loss)
>>> C2<------A<-------S
>>>                     (_rate_)
>>>                     (OLR-rate)
>> SRD> In this case S would need to select loss because the reacting node for C2 only supports loss.  It doesn't matter if the reacting node for C2 resides in the element called C2 or if it resides in A.  All S needs to know is if there is a reacting node for traffic originated by C2.  S differentiates the source of the traffic using the Origin-Host AVP in the request messages.
> If we expect a separate reacting node "instance" for each request origin-host, we need to say so. But it still doesn't work for the single client example.
SRD> We can certainly make it explicit.
>
>
>>>
>>> The problem is, S cannot tell the difference between the two flows. In the first case, there are two separate reacting nodes with different capabilities. In the second case there's a single reacting node with changing capabilities. But from S's perspective, the requests look exactly the same.
>> SRD> There are two separate reacting nodes in the second case as well.  They are "virtual" reacting nodes that happen to reside in A.
> Where does the draft say or even imply that? It would make sense if we were asking for different abatement for C1 and C2, but we are not.  But in any case, consider the single client example above.
SRD> Section 4.1.3, second paragraph - "A Diameter Agent SHOULD take on 
reacting node behavior for Diameter endpoints that do not support the 
DOIC solution."
>
>>> (At this point, some one will point out that in the first case, the OC-S-F difference can correspond to different Origin-Host values, and in case 2 they do not. Maybe S can infer the difference from that. To that, I say assume now that C1 and C2 are really agents, and all the traffic is coming from a single client behind them. The issue would be the same, but Origin-Host would never change.)
>>>
>>>
>>>
>>>> On Dec 17, 2014, at 8:28 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>> The only way for a reacting node to attempt to change the algorithm is by removing an algorithm that had been advertised before the overload condition started and stopping to advertise it during an overload condition.
>>>>
>>>>   C------------------>S   The reacting node advertises loss and rate
>>>>    OC-S-F(loss+rate)
>>>>   C<------------------S   The reporting node enters overload using the rate algorithm
>>>>           OC-S-F(rate)
>>>>           OC-OLR(...)
>>>>   C------------------>S   The reacting node stops advertising the rate algorithm
>>>>     OC-S-F(loss)
>>>>
>>>> It is certainly conceivable that this could happen as a result of configuration changes at the reacting node.
>>>>
>>>> I don't think, however, that we need to add any behavior changes for the reporting node in this case.  It is reasonable to expect a reacting node to continue to support an abatement algorithm it was advertising when an overload occurrence started for the duration of that active overload occurrence.  In fact, it would be detrimental to the reporting node, which is in an overload state, to do extra work because a reacting node started sending a different set of features in the OC-S-F AVP.
>>>>
>>>> We already say that a reporting node must not change the algorithm during an active overload condition.  I propose that we strengthen this to include when a new set of features and abatement algorithms are advertised by the reporting node.  Those new features and abatement algorithms cannot go into effect until the existing active overload condition is resolved.  This would look like the following on the wire:
>>>>
>>>>   C------------------>S   The reacting node advertises loss and rate
>>>>    OC-S-F(loss+rate)
>>>>   C<------------------S   The reporting node enters overload using the rate algorithm
>>>>           OC-S-F(rate)
>>>>           OC-OLR(...)
>>>>   C------------------>S   The reacting node stops advertising the rate algorithm
>>>>     OC-S-F(loss)
>>>>   C<------------------S   The reporting node ignores the new set of features
>>>>           OC-S-F(rate)
>>>>           OC-OLR(...)
>>>>   C------------------>S
>>>>     OC-S-F(loss)
>>>>   C<------------------S   The overload condition ends
>>>>           OC-S-F(rate)
>>>>           OC-OLR(Validity-Duration:0)
>>>>   C------------------>S   The reporting node processes the new set of features
>>>>     OC-S-F(loss)
>>>>   C<------------------S
>>>>           OC-S-F(loss)
>>>>
>>>> Steve
>>>>
>>>> On 12/17/14, 1:11 AM, Jouni Korhonen wrote:
>>>>> While changing algorithm "on fly" is undesirable both reporting and reacting nodes need to be prepared for the situation, specifically if the reacting node keeps advertising multiple supported algorithms.
>>>>>
>>>>> I think we need to flag this better in the text but stress that such behaviour is not desired. And in some cases not even possible to do cleanly (depending on the algorithm).
>>>>>
>>>>> - Jouni
>>>>>
>>>>> 12/17/2014 6:48 AM, Ben Campbell kirjoitti:
>>>>>> Section 4.1.2, (4th paragraph from end ) says that a reporting node cannot change algorithms during an active overload condition. We fail to say anything about when reacting nodes could change their list of supported algorithms. That leaves us with the question about what happens if a reporting node has an active OCS, and gets a new request with an OC-S-F that does not support the active algorithm.
>>>>>>
>>>>>> The obvious answer is that reacting nodes shouldn't do that-- but I think there would still be legal scenarios where it could happen anyway. So even if we say that a single reacting node should not change its algorithm list while it has active OCS, we still need to handle the situation for reporting nodes.
>>>>>> _______________________________________________
>>>>>> DiME mailing list
>>>>>> DiME@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>>>
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


--------------080607050504080904040303
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <div class="moz-cite-prefix">On 12/17/14, 11:41 AM, Ben Campbell
      wrote:<br>
    </div>
    <blockquote
      cite="mid:0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com"
      type="cite">
      <pre wrap="">Okay, new picture:

     
</pre>
      <blockquote type="cite">
        <pre wrap="">On Dec 17, 2014, at 11:26 AM, Steve Donovan <a class="moz-txt-link-rfc2396E" href="mailto:srdonovan@usdonovans.com">&lt;srdonovan@usdonovans.com&gt;</a> wrote:

Ben,

The value of the Origin-Host matters greatly here.  In both cases, what S needs to know is if there is a reacting node for traffic coming from C1 and if there is a reacting node for traffic coming from C2.
</pre>
      </blockquote>
      <pre wrap="">
There is no assumption in the draft right now that we have a correlation between reacting nodes and clients. That might be required for client-targed OLRs, but we don't have those yet.

Consider a different picture. In this case, C never supports DOIC. the reacting node role happens either at A1/A2 or at A3, depending on which flow you look at.

        A1---
       /         \
C --             -------A3------S
       \         /
         A2---

Now, assume the same flows, but substitute A1 for C1, A2, for C2, and A3 for A. All requests now have the same origin-host.

Before you say this is unrealistic: The issue is the same for any situation where one client can send traffic across multiple agents to the same destination. It doesn't matter if there is one or a million.</pre>
    </blockquote>
    <br>
    SRD&gt; Yes, this is nasty.&nbsp; With attribution S can detect the
    scenario.&nbsp; I'm not sure what it does once it selects it.&nbsp; This can
    be addressed to some degree by adding a deployment recommendation
    that&nbsp; all agents taking on reacting node functionality for a single
    endpoint&nbsp; select the same algorithm.&nbsp; <br>
    <br>
    <blockquote
      cite="mid:0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com"
      type="cite">
      <pre wrap="">


</pre>
      <blockquote type="cite">
        <pre wrap="">
More inline.

Steve


On 12/17/14, 10:28 AM, Ben Campbell wrote:
</pre>
        <blockquote type="cite">
          <pre wrap="">I seem to be completely failing at describing the issue.

Imagine this picture:

C1---
        \
          -------A------S
	 /
C2---

Now, assume S is overloaded. Consider two cases:

1) C1 and C2 support DOIC. A either doesn't support it, or does support it but passes DCA unchanged. Is this flow legal? (I assume "yes", since "no" would have some nasty implications about mixed capability environments.)

C1 ------&gt;A------&gt;S
(loss + rate)
C1 &lt;------A&lt;------S
                   (rate)
                   (OLR-rate)
C2-------&gt;A------&gt;S
(loss)
C2&lt;------A&lt;-------S
                   (loss)
                   (OLR-loss)
</pre>
        </blockquote>
        <pre wrap="">SRD&gt; Yes, this is legal and is no different then the case where C1 and C2 are directly connected to S.
</pre>
        <blockquote type="cite">
          <pre wrap="">
2) Now assume C1 and C2 do not support DOIC, but A does, but A changes config mid way through. According to your proposal, I _think_ it would work like this (see difference in last answer)

C1 ------&gt;A------&gt;S
                 (loss + rate)
C1 &lt;------A&lt;------S
                   (rate)
                   (OLR-rate)
C2-------&gt;A------&gt;S
                    (loss)
C2&lt;------A&lt;-------S
                   (_rate_)
                   (OLR-rate)
</pre>
        </blockquote>
        <pre wrap="">SRD&gt; In this case S would need to select loss because the reacting node for C2 only supports loss.  It doesn't matter if the reacting node for C2 resides in the element called C2 or if it resides in A.  All S needs to know is if there is a reacting node for traffic originated by C2.  S differentiates the source of the traffic using the Origin-Host AVP in the request messages.
</pre>
      </blockquote>
      <pre wrap="">
If we expect a separate reacting node "instance" for each request origin-host, we need to say so. But it still doesn't work for the single client example.</pre>
    </blockquote>
    SRD&gt; We can certainly make it explicit.<br>
    <blockquote
      cite="mid:0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com"
      type="cite">
      <pre wrap="">


</pre>
      <blockquote type="cite">
        <blockquote type="cite">
          <pre wrap="">

The problem is, S cannot tell the difference between the two flows. In the first case, there are two separate reacting nodes with different capabilities. In the second case there's a single reacting node with changing capabilities. But from S's perspective, the requests look exactly the same.
</pre>
        </blockquote>
        <pre wrap="">SRD&gt; There are two separate reacting nodes in the second case as well.  They are "virtual" reacting nodes that happen to reside in A.
</pre>
      </blockquote>
      <pre wrap="">
Where does the draft say or even imply that? It would make sense if we were asking for different abatement for C1 and C2, but we are not.  But in any case, consider the single client example above.</pre>
    </blockquote>
    SRD&gt; Section 4.1.3, second paragraph - "A Diameter Agent SHOULD
    take on reacting node behavior for Diameter endpoints that do not
    support the DOIC solution."
    <meta http-equiv="content-type" content="text/html;
      charset=ISO-8859-1">
    <blockquote
      cite="mid:0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com"
      type="cite">
      <pre wrap="">

</pre>
      <blockquote type="cite">
        <blockquote type="cite">
          <pre wrap="">
(At this point, some one will point out that in the first case, the OC-S-F difference can correspond to different Origin-Host values, and in case 2 they do not. Maybe S can infer the difference from that. To that, I say assume now that C1 and C2 are really agents, and all the traffic is coming from a single client behind them. The issue would be the same, but Origin-Host would never change.)



</pre>
          <blockquote type="cite">
            <pre wrap="">On Dec 17, 2014, at 8:28 AM, Steve Donovan <a class="moz-txt-link-rfc2396E" href="mailto:srdonovan@usdonovans.com">&lt;srdonovan@usdonovans.com&gt;</a> wrote:

The only way for a reacting node to attempt to change the algorithm is by removing an algorithm that had been advertised before the overload condition started and stopping to advertise it during an overload condition.

 C------------------&gt;S   The reacting node advertises loss and rate
  OC-S-F(loss+rate)
 C&lt;------------------S   The reporting node enters overload using the rate algorithm
         OC-S-F(rate)
         OC-OLR(...)
 C------------------&gt;S   The reacting node stops advertising the rate algorithm
   OC-S-F(loss)

It is certainly conceivable that this could happen as a result of configuration changes at the reacting node.

I don't think, however, that we need to add any behavior changes for the reporting node in this case.  It is reasonable to expect a reacting node to continue to support an abatement algorithm it was advertising when an overload occurrence started for the duration of that active overload occurrence.  In fact, it would be detrimental to the reporting node, which is in an overload state, to do extra work because a reacting node started sending a different set of features in the OC-S-F AVP.

We already say that a reporting node must not change the algorithm during an active overload condition.  I propose that we strengthen this to include when a new set of features and abatement algorithms are advertised by the reporting node.  Those new features and abatement algorithms cannot go into effect until the existing active overload condition is resolved.  This would look like the following on the wire:

 C------------------&gt;S   The reacting node advertises loss and rate
  OC-S-F(loss+rate)
 C&lt;------------------S   The reporting node enters overload using the rate algorithm
         OC-S-F(rate)
         OC-OLR(...)
 C------------------&gt;S   The reacting node stops advertising the rate algorithm
   OC-S-F(loss)
 C&lt;------------------S   The reporting node ignores the new set of features
         OC-S-F(rate)
         OC-OLR(...)
 C------------------&gt;S
   OC-S-F(loss)
 C&lt;------------------S   The overload condition ends
         OC-S-F(rate)
         OC-OLR(Validity-Duration:0)
 C------------------&gt;S   The reporting node processes the new set of features
   OC-S-F(loss)
 C&lt;------------------S
         OC-S-F(loss)

Steve

On 12/17/14, 1:11 AM, Jouni Korhonen wrote:
</pre>
            <blockquote type="cite">
              <pre wrap="">While changing algorithm "on fly" is undesirable both reporting and reacting nodes need to be prepared for the situation, specifically if the reacting node keeps advertising multiple supported algorithms.

I think we need to flag this better in the text but stress that such behaviour is not desired. And in some cases not even possible to do cleanly (depending on the algorithm).

- Jouni

12/17/2014 6:48 AM, Ben Campbell kirjoitti:
</pre>
              <blockquote type="cite">
                <pre wrap="">Section 4.1.2, (4th paragraph from end ) says that a reporting node cannot change algorithms during an active overload condition. We fail to say anything about when reacting nodes could change their list of supported algorithms. That leaves us with the question about what happens if a reporting node has an active OCS, and gets a new request with an OC-S-F that does not support the active algorithm.

The obvious answer is that reacting nodes shouldn't do that-- but I think there would still be legal scenarios where it could happen anyway. So even if we say that a single reacting node should not change its algorithm list while it has active OCS, we still need to handle the situation for reporting nodes.
_______________________________________________
DiME mailing list
<a class="moz-txt-link-abbreviated" href="mailto:DiME@ietf.org">DiME@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a>

</pre>
              </blockquote>
              <pre wrap="">_______________________________________________
DiME mailing list
<a class="moz-txt-link-abbreviated" href="mailto:DiME@ietf.org">DiME@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a>

</pre>
            </blockquote>
            <pre wrap="">_______________________________________________
DiME mailing list
<a class="moz-txt-link-abbreviated" href="mailto:DiME@ietf.org">DiME@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a>
</pre>
          </blockquote>
          <pre wrap="">
</pre>
        </blockquote>
        <pre wrap="">
</pre>
      </blockquote>
      <pre wrap="">

</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------080607050504080904040303--


From nobody Wed Dec 17 10:40:52 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3BFF1A1B8B for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 10:40:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yp4zdBz4BQOh for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 10:40:43 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F3881A1B75 for <dime@ietf.org>; Wed, 17 Dec 2014 10:40:43 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54192 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1JWa-0000eN-Jr; Wed, 17 Dec 2014 10:40:42 -0800
Message-ID: <5491CE28.2020205@usdonovans.com>
Date: Wed, 17 Dec 2014 12:40:40 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com>
In-Reply-To: <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=0.6
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/aACpzTwlkrK6brJXXF2Bg82NFjM
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 18:40:51 -0000

I don't feel strongly one way or the other.  This was changed based on 
discussions at the interim meeting.  I believe Maria Cruz originally 
proposed it.

One other approach, if we don't want to support durations of .001 
seconds would be to put a minimum duration but allow millisecond 
granularity above that.

I'll step out of the argument and let someone else be champion for 
millisecond granularity.

Steve

On 12/17/14, 11:28 AM, Ben Campbell wrote:
>> On Dec 17, 2014, at 10:43 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>>
>> On 12/17/14, 10:30 AM, Ben Campbell wrote:
>>> Why would you ever set validity duration to a small number of milliseconds?
>> Why not?
> Because it's false precision. It's more likely to be harmful than useful. The precision of a value should be appropriate for it's the precision of its measurement. Inappropriate precision leads to bad decisions. [1]
>
> The validity duration means one of two things, or a combination of them: 1) I estimate that I will be overloaded for roughly X time and/or 2) I will tell you if I am still overloaded, with sufficient notice you can reasonably act on it before the expiration.
>
> (Of the two, I think 2) is the more realistic.)
>
> For 1: If we think we can estimate how long it you are likely to be overloaded down to sub-second precision, I'd like to see the magic prediction algorithm.
>
> For 2: Sub second validity durations require multiple updates a second to refresh the OLR state. That creates a _lot_ of almost certainly useless work for the reacting node.
>
>
> [1] http://en.wikipedia.org/wiki/False_precision
>
>
>>> I think asking nodes to take transit time into consideration adds considerable complexity.
>> I don't see that saying that validity duration values less then the RTT should be avoided is adding considerable complexity.
> We currently don't have a requirement to estimate RTT, other than "we assume it's not crazy big." This would add one.
>
>>>> On Dec 17, 2014, at 8:31 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>> Why not change the paragraph in section 4.2.3 to indicate that the transit time should be taken into consideration when setting validity duration to a small number or milliseconds?
>>>>
>>>> Steve
>>>>
>>>> On 12/16/14, 10:55 PM, Ben Campbell wrote:
>>>>> We currently define the unit for OC-Validity-Duration as milliseconds.
>>>>>
>>>>> Section 4.2.3 says (in a note) that transit time for OLRs can be safely ignored. That is likely true if the validity durations can generally be assumed to be long in comparison to transit time. It is _not_ true if validity duration can be a small number of milliseconds. That could lead to situations where the reporting node thinks the report has expired before the reacting node even sees it.
>>>>>
>>>>> Really, I don't think milliseconds are a reasonable unit here. I can't imagine any useful and safe application for sub-second validity durations, nor can I imagine it ever being useful to distinguish between X seconds and X + 0.001 seconds. We should choose a unit that lends itself to reasonable value ranges. I suggest we change it to seconds.
>>>>>
>>>>> Thanks!
>>>>>
>>>>> /Ben.
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Wed Dec 17 10:52:02 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBAFE1A700B for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 10:51:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id letVoEWKgyEc for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 10:51:50 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5E9F1A1B9B for <dime@ietf.org>; Wed, 17 Dec 2014 10:51:45 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHIpiQt093179 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 12:51:45 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491CCC9.3090809@usdonovans.com>
Date: Wed, 17 Dec 2014 12:51:44 -0600
X-Mao-Original-Outgoing-Id: 440535103.945728-2d2e6d6fc12cb10062dec00810c1cf62
Content-Transfer-Encoding: quoted-printable
Message-Id: <8D669BA2-05AD-496C-9B96-109ABF703A07@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/uaLVz99HQ1jzf3_8WXJZekynseU
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 18:51:52 -0000

> On Dec 17, 2014, at 12:34 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>> Where does the draft say or even imply that? It would make sense if =
we were asking for different abatement for C1 and C2, but we are not.  =
But in any case, consider the single client example above.
> SRD> Section 4.1.3, second paragraph - "A Diameter Agent SHOULD take =
on reacting node behavior for Diameter endpoints that do not support the =
DOIC solution."
>=20

I don't think that, as written, implies a separate virtual reacting node =
(I assume with potentially distinct capabilities) for each =
non-supporting client.=


From nobody Wed Dec 17 11:00:11 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2902F1A6FF0 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 11:00:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9DwDUha5u9SO for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 11:00:09 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D57DD1A6FEE for <dime@ietf.org>; Wed, 17 Dec 2014 11:00:08 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHJ07AN093842 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 13:00:08 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491CCC9.3090809@usdonovans.com>
Date: Wed, 17 Dec 2014 13:00:07 -0600
X-Mao-Original-Outgoing-Id: 440535606.616584-b40f608c373df2d250e9cbab624f6195
Content-Transfer-Encoding: quoted-printable
Message-Id: <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/xQPccXwbhVA-O1cxv12CFtEMHzA
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 19:00:10 -0000

> On Dec 17, 2014, at 12:34 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>> Okay, new picture:
>>=20
>>     =20
>>=20
>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan =
<srdonovan@usdonovans.com>
>>>  wrote:
>>>=20
>>> Ben,
>>>=20
>>> The value of the Origin-Host matters greatly here.  In both cases, =
what S needs to know is if there is a reacting node for traffic coming =
from C1 and if there is a reacting node for traffic coming from C2.
>>>=20
>> There is no assumption in the draft right now that we have a =
correlation between reacting nodes and clients. That might be required =
for client-targed OLRs, but we don't have those yet.
>>=20
>> Consider a different picture. In this case, C never supports DOIC. =
the reacting node role happens either at A1/A2 or at A3, depending on =
which flow you look at.
>>=20
>>         A1---
>>        /         \
>> C --             -------A3------S
>>        \         /
>>          A2---
>>=20
>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, and =
A3 for A. All requests now have the same origin-host.
>>=20
>> Before you say this is unrealistic: The issue is the same for any =
situation where one client can send traffic across multiple agents to =
the same destination. It doesn't matter if there is one or a million.
>>=20
>=20
> SRD> Yes, this is nasty.  With attribution S can detect the scenario.  =
I'm not sure what it does once it selects it.  This can be addressed to =
some degree by adding a deployment recommendation that  all agents =
taking on reacting node functionality for a single endpoint  select the =
same algorithm. =20


I think some sort of attribution is the long-term solution. Another =
option might be some sort of DCA state identifier, or a combination of =
the two. (e.g. multiple "virtual" reacting node at the same physical =
node.) The details will be non-trivial to figure out.

But to close the loop, I think the _short_ term solution is to say that, =
while a reporting node should not _initiate_ a change in algorithms =
during an overload condition, it must still handle the situation where =
the reacting node forces a change. We could go further to say that =
reacting node also should not initiate such a change, but we would have =
to recognize that there are scenarios where that guidance cannot be =
enforced, and the reporting node still has to handle them.

We might need to think about what it means from an OCS perspective for a =
reporting node to send OLRs with different algorithms (or potentially =
other capability parameters) for the "same" overload event.=20


From nobody Wed Dec 17 11:03:59 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 89F5E1A7016 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 11:03:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.39
X-Spam-Level: 
X-Spam-Status: No, score=0.39 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MANGLED_TOOL=2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JRy1QhW6F5bv for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 11:03:52 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B50C1A1BC4 for <dime@ietf.org>; Wed, 17 Dec 2014 11:03:52 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHJ3p66094209 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 13:03:51 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491CE28.2020205@usdonovans.com>
Date: Wed, 17 Dec 2014 13:03:50 -0600
X-Mao-Original-Outgoing-Id: 440535830.889892-3fbaa4a7bbdf9f309d1bbc9547bc667d
Content-Transfer-Encoding: quoted-printable
Message-Id: <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/TFAXWPcLkNhkSAnGOkurUzmizEg
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 19:03:57 -0000

> On Dec 17, 2014, at 12:40 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> I don't feel strongly one way or the other.  This was changed based on =
discussions at the interim meeting.  I believe Maria Cruz originally =
proposed it.
>=20
> One other approach, if we don't want to support durations of .001 =
seconds would be to put a minimum duration but allow millisecond =
granularity above that.

That brings up the question about whether there is any point to =
distinguish a duration of X from a duration of X+.001. My gut tells me =
that's still a false precision problem.

(Honestly, I think 1 second precision is pushing it, but the next =
natural resolution is 1 minute, which seems too blunt. We could do =
something like units of 10s, but I suspect that would be =
counter-intuitive enough to cause implementation errors.)

>=20
> I'll step out of the argument and let someone else be champion for =
millisecond granularity.

Any other takers? Are there real use cases for sub-second precision?

>=20
> Steve
>=20
> On 12/17/14, 11:28 AM, Ben Campbell wrote:
>>> On Dec 17, 2014, at 10:43 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>>=20
>>> On 12/17/14, 10:30 AM, Ben Campbell wrote:
>>>> Why would you ever set validity duration to a small number of =
milliseconds?
>>> Why not?
>> Because it's false precision. It's more likely to be harmful than =
useful. The precision of a value should be appropriate for it's the =
precision of its measurement. Inappropriate precision leads to bad =
decisions. [1]
>>=20
>> The validity duration means one of two things, or a combination of =
them: 1) I estimate that I will be overloaded for roughly X time and/or =
2) I will tell you if I am still overloaded, with sufficient notice you =
can reasonably act on it before the expiration.
>>=20
>> (Of the two, I think 2) is the more realistic.)
>>=20
>> For 1: If we think we can estimate how long it you are likely to be =
overloaded down to sub-second precision, I'd like to see the magic =
prediction algorithm.
>>=20
>> For 2: Sub second validity durations require multiple updates a =
second to refresh the OLR state. That creates a _lot_ of almost =
certainly useless work for the reacting node.
>>=20
>>=20
>> [1] http://en.wikipedia.org/wiki/False_precision
>>=20
>>=20
>>>> I think asking nodes to take transit time into consideration adds =
considerable complexity.
>>> I don't see that saying that validity duration values less then the =
RTT should be avoided is adding considerable complexity.
>> We currently don't have a requirement to estimate RTT, other than "we =
assume it's not crazy big." This would add one.
>>=20
>>>>> On Dec 17, 2014, at 8:31 AM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>>>=20
>>>>> Why not change the paragraph in section 4.2.3 to indicate that the =
transit time should be taken into consideration when setting validity =
duration to a small number or milliseconds?
>>>>>=20
>>>>> Steve
>>>>>=20
>>>>> On 12/16/14, 10:55 PM, Ben Campbell wrote:
>>>>>> We currently define the unit for OC-Validity-Duration as =
milliseconds.
>>>>>>=20
>>>>>> Section 4.2.3 says (in a note) that transit time for OLRs can be =
safely ignored. That is likely true if the validity durations can =
generally be assumed to be long in comparison to transit time. It is =
_not_ true if validity duration can be a small number of milliseconds. =
That could lead to situations where the reporting node thinks the report =
has expired before the reacting node even sees it.
>>>>>>=20
>>>>>> Really, I don't think milliseconds are a reasonable unit here. I =
can't imagine any useful and safe application for sub-second validity =
durations, nor can I imagine it ever being useful to distinguish between =
X seconds and X + 0.001 seconds. We should choose a unit that lends =
itself to reasonable value ranges. I suggest we change it to seconds.
>>>>>>=20
>>>>>> Thanks!
>>>>>>=20
>>>>>> /Ben.
>>>>>> _______________________________________________
>>>>>> DiME mailing list
>>>>>> DiME@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/dime
>>>>>>=20
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>=20


From nobody Wed Dec 17 13:35:39 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B58951A87ED for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 13:35:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tyrfxdaBICtG for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 13:35:36 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9AF01A87A6 for <dime@ietf.org>; Wed, 17 Dec 2014 13:35:36 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54949 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1MFn-000CJi-Mj; Wed, 17 Dec 2014 13:35:32 -0800
Message-ID: <5491F723.6080203@usdonovans.com>
Date: Wed, 17 Dec 2014 15:35:31 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com>
In-Reply-To: <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=0.6
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/41_yiCcEBD7uOb-MZ-8K7bw9YQE
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 21:35:37 -0000

On 12/17/14 1:00 PM, Ben Campbell wrote:
>> On Dec 17, 2014, at 12:34 PM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>>> Okay, new picture:
>>>
>>>       
>>>
>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan <srdonovan@usdonovans.com>
>>>>   wrote:
>>>>
>>>> Ben,
>>>>
>>>> The value of the Origin-Host matters greatly here.  In both cases, what S needs to know is if there is a reacting node for traffic coming from C1 and if there is a reacting node for traffic coming from C2.
>>>>
>>> There is no assumption in the draft right now that we have a correlation between reacting nodes and clients. That might be required for client-targed OLRs, but we don't have those yet.
>>>
>>> Consider a different picture. In this case, C never supports DOIC. the reacting node role happens either at A1/A2 or at A3, depending on which flow you look at.
>>>
>>>          A1---
>>>         /         \
>>> C --             -------A3------S
>>>         \         /
>>>           A2---
>>>
>>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, and A3 for A. All requests now have the same origin-host.
>>>
>>> Before you say this is unrealistic: The issue is the same for any situation where one client can send traffic across multiple agents to the same destination. It doesn't matter if there is one or a million.
>>>
>> SRD> Yes, this is nasty.  With attribution S can detect the scenario.  I'm not sure what it does once it selects it.  This can be addressed to some degree by adding a deployment recommendation that  all agents taking on reacting node functionality for a single endpoint  select the same algorithm.
>
> I think some sort of attribution is the long-term solution. Another option might be some sort of DCA state identifier, or a combination of the two. (e.g. multiple "virtual" reacting node at the same physical node.) The details will be non-trivial to figure out.
>
> But to close the loop, I think the _short_ term solution is to say that, while a reporting node should not _initiate_ a change in algorithms during an overload condition, it must still handle the situation where the reacting node forces a change. We could go further to say that reacting node also should not initiate such a change, but we would have to recognize that there are scenarios where that guidance cannot be enforced, and the reporting node still has to handle them.
>
> We might need to think about what it means from an OCS perspective for a reporting node to send OLRs with different algorithms (or potentially other capability parameters) for the "same" overload event.
SRD> I think it is a better solution to stay with what we have now.  The 
reporting node MUST NOT change the algorithm during an active overload 
condition.  If a reacting node advertises support for it, the reacting 
node is saying it will support that algorithm for the duration of any 
overload condition that happens prior to the reacting node changing the 
advertised algorithm.  The change in advertised algorithm will take 
effect after the overload condition goes away.

SRD> I don't think we need to update the OCS in this document to handle 
multiple algorithms.  This can be done in the extension drafts.  We 
might want to make it clear, as it appears it isn't already, that a 
reacting node might need to support multiple algorithms at the same time.
>
>


From nobody Wed Dec 17 13:54:21 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECDA21A70FD for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 13:54:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v3TVOSMkQMJp for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 13:54:17 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68D9D1A7021 for <dime@ietf.org>; Wed, 17 Dec 2014 13:54:17 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHLsEEe008652 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 15:54:16 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491F723.6080203@usdonovans.com>
Date: Wed, 17 Dec 2014 15:54:14 -0600
X-Mao-Original-Outgoing-Id: 440546053.89789-c6f5263ed257bf14ecb13ddf9c4727a1
Content-Transfer-Encoding: quoted-printable
Message-Id: <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com> <5491F723.6080203@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/DXbp7bd_yLJuIjyRhlLaPrncswM
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 21:54:20 -0000

> On Dec 17, 2014, at 3:35 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>=20
> On 12/17/14 1:00 PM, Ben Campbell wrote:
>>> On Dec 17, 2014, at 12:34 PM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>>> Okay, new picture:
>>>>=20
>>>>     =20
>>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan =
<srdonovan@usdonovans.com>
>>>>>  wrote:
>>>>>=20
>>>>> Ben,
>>>>>=20
>>>>> The value of the Origin-Host matters greatly here.  In both cases, =
what S needs to know is if there is a reacting node for traffic coming =
from C1 and if there is a reacting node for traffic coming from C2.
>>>>>=20
>>>> There is no assumption in the draft right now that we have a =
correlation between reacting nodes and clients. That might be required =
for client-targed OLRs, but we don't have those yet.
>>>>=20
>>>> Consider a different picture. In this case, C never supports DOIC. =
the reacting node role happens either at A1/A2 or at A3, depending on =
which flow you look at.
>>>>=20
>>>>         A1---
>>>>        /         \
>>>> C --             -------A3------S
>>>>        \         /
>>>>          A2---
>>>>=20
>>>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, =
and A3 for A. All requests now have the same origin-host.
>>>>=20
>>>> Before you say this is unrealistic: The issue is the same for any =
situation where one client can send traffic across multiple agents to =
the same destination. It doesn't matter if there is one or a million.
>>>>=20
>>> SRD> Yes, this is nasty.  With attribution S can detect the =
scenario.  I'm not sure what it does once it selects it.  This can be =
addressed to some degree by adding a deployment recommendation that  all =
agents taking on reacting node functionality for a single endpoint  =
select the same algorithm.
>>=20
>> I think some sort of attribution is the long-term solution. Another =
option might be some sort of DCA state identifier, or a combination of =
the two. (e.g. multiple "virtual" reacting node at the same physical =
node.) The details will be non-trivial to figure out.
>>=20
>> But to close the loop, I think the _short_ term solution is to say =
that, while a reporting node should not _initiate_ a change in =
algorithms during an overload condition, it must still handle the =
situation where the reacting node forces a change. We could go further =
to say that reacting node also should not initiate such a change, but we =
would have to recognize that there are scenarios where that guidance =
cannot be enforced, and the reporting node still has to handle them.
>>=20
>> We might need to think about what it means from an OCS perspective =
for a reporting node to send OLRs with different algorithms (or =
potentially other capability parameters) for the "same" overload event.
> SRD> I think it is a better solution to stay with what we have now.  =
The reporting node MUST NOT change the algorithm during an active =
overload condition.  If a reacting node advertises support for it, the =
reacting node is saying it will support that algorithm for the duration =
of any overload condition that happens prior to the reacting node =
changing the advertised algorithm.  The change in advertised algorithm =
will take effect after the overload condition goes away.
>=20

I disagree. I don't think we want to allow the reporting node to ever =
indicate an algorithm that was not advertised in the request. That =
violates normative language earlier in the section that says the =
selected algorithm MUST be one of the ones advertised in the request. It =
can also cause problems for reacting nodes, where they get OLRs for an =
algorithm they don't understand.=20

I think that's considerably more important that restricting the =
reporting node from changing algorithms (Which, btw, does no harm with =
the only algorithms that we are seriously contemplating.We speculate =
that it might cause harm for some future algorithm.)

Remember, this is not just about a single reacting node changing it's =
capabilities, it's also about multiple reacting nodes with different =
capabilities. We can't disallow one without disallowing the other.


> SRD> I don't think we need to update the OCS in this document to =
handle multiple algorithms.  This can be done in the extension drafts.  =
We might want to make it clear, as it appears it isn't already, that a =
reacting node might need to support multiple algorithms at the same =
time.

Do you mean reacting or reporting node in the last sentence? Assuming =
you mean it as written, the problem is not that a reacting node may need =
to support multiple algorithms at the same time. It's that it may get =
OLRs that it cannot act upon because it doesn't support the algorithm.

If, otoh, you meant reporting node, I don't understand how a reporting =
node can have multiple algorithms for the same overload event, without =
reflecting that possibility in the OCS.



>>=20
>>=20
>=20


From nobody Wed Dec 17 14:23:52 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B5D61A874B for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 14:23:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level: 
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QEgjqJHfnWFC for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 14:23:49 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.244.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5553A1A876F for <dime@ietf.org>; Wed, 17 Dec 2014 14:23:49 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:55380 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y1N0U-0000J8-3u; Wed, 17 Dec 2014 14:23:47 -0800
Message-ID: <54920272.80508@usdonovans.com>
Date: Wed, 17 Dec 2014 16:23:46 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com> <5491F723.6080203@usdonovans.com> <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com>
In-Reply-To: <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=0.6
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-LIUGkQGgTeIEovkfPRAswiUXUM
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 22:23:51 -0000

On 12/17/14 3:54 PM, Ben Campbell wrote:
>> On Dec 17, 2014, at 3:35 PM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>>
>> On 12/17/14 1:00 PM, Ben Campbell wrote:
>>>> On Dec 17, 2014, at 12:34 PM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>>> Okay, new picture:
>>>>>
>>>>>       
>>>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan <srdonovan@usdonovans.com>
>>>>>>   wrote:
>>>>>>
>>>>>> Ben,
>>>>>>
>>>>>> The value of the Origin-Host matters greatly here.  In both cases, what S needs to know is if there is a reacting node for traffic coming from C1 and if there is a reacting node for traffic coming from C2.
>>>>>>
>>>>> There is no assumption in the draft right now that we have a correlation between reacting nodes and clients. That might be required for client-targed OLRs, but we don't have those yet.
>>>>>
>>>>> Consider a different picture. In this case, C never supports DOIC. the reacting node role happens either at A1/A2 or at A3, depending on which flow you look at.
>>>>>
>>>>>          A1---
>>>>>         /         \
>>>>> C --             -------A3------S
>>>>>         \         /
>>>>>           A2---
>>>>>
>>>>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, and A3 for A. All requests now have the same origin-host.
>>>>>
>>>>> Before you say this is unrealistic: The issue is the same for any situation where one client can send traffic across multiple agents to the same destination. It doesn't matter if there is one or a million.
>>>>>
>>>> SRD> Yes, this is nasty.  With attribution S can detect the scenario.  I'm not sure what it does once it selects it.  This can be addressed to some degree by adding a deployment recommendation that  all agents taking on reacting node functionality for a single endpoint  select the same algorithm.
>>> I think some sort of attribution is the long-term solution. Another option might be some sort of DCA state identifier, or a combination of the two. (e.g. multiple "virtual" reacting node at the same physical node.) The details will be non-trivial to figure out.
>>>
>>> But to close the loop, I think the _short_ term solution is to say that, while a reporting node should not _initiate_ a change in algorithms during an overload condition, it must still handle the situation where the reacting node forces a change. We could go further to say that reacting node also should not initiate such a change, but we would have to recognize that there are scenarios where that guidance cannot be enforced, and the reporting node still has to handle them.
>>>
>>> We might need to think about what it means from an OCS perspective for a reporting node to send OLRs with different algorithms (or potentially other capability parameters) for the "same" overload event.
>> SRD> I think it is a better solution to stay with what we have now.  The reporting node MUST NOT change the algorithm during an active overload condition.  If a reacting node advertises support for it, the reacting node is saying it will support that algorithm for the duration of any overload condition that happens prior to the reacting node changing the advertised algorithm.  The change in advertised algorithm will take effect after the overload condition goes away.
>>
> I disagree. I don't think we want to allow the reporting node to ever indicate an algorithm that was not advertised in the request. That violates normative language earlier in the section that says the selected algorithm MUST be one of the ones advertised in the request. It can also cause problems for reacting nodes, where they get OLRs for an algorithm they don't understand.
SRD> They clearly do understand the algorithm.  They advertised it 
before the overload report started.  We can change the normative 
language to cover this exception.  I think the principle of minimizing 
work on an overloaded reporting node is the more important principle 
here.  If the reacting node changes the advertised set of algorithms 
during an active overload condition then the overloaded reporting node 
will be required to send end-of-overload OLRs for the previous algorithm 
and then send start-of-overload OLRs for the new algorithm.  This seems 
complex at a time the overloaded node should be focusing on getting out 
of the overload condition.
>
> I think that's considerably more important that restricting the reporting node from changing algorithms (Which, btw, does no harm with the only algorithms that we are seriously contemplating.We speculate that it might cause harm for some future algorithm.)
SRD> We already have the restriction on the reporting node.
>
> Remember, this is not just about a single reacting node changing it's capabilities, it's also about multiple reacting nodes with different capabilities. We can't disallow one without disallowing the other.
SRD> Multiple reacting nodes with different capabilities is all the more 
reason to hold things constant during an overload condition.  I'm not 
proposing disallowing reacting nodes from changing the set of 
capabilities, I'm proposing that these changes don't take effect while 
there is an active overload condition.
>
>
>> SRD> I don't think we need to update the OCS in this document to handle multiple algorithms.  This can be done in the extension drafts.  We might want to make it clear, as it appears it isn't already, that a reacting node might need to support multiple algorithms at the same time.
> Do you mean reacting or reporting node in the last sentence? Assuming you mean it as written, the problem is not that a reacting node may need to support multiple algorithms at the same time. It's that it may get OLRs that it cannot act upon because it doesn't support the algorithm.
SRD> I meant reporting nodes.
>
> If, otoh, you meant reporting node, I don't understand how a reporting node can have multiple algorithms for the same overload event, without reflecting that possibility in the OCS.
SRD> Yes, it will need to be reflected in the OCS.  We don't have 
multiple algorithms now so it isn't needed now.  I'm saying we might 
want to say it might me needed in the future.
>
>
>
>>>
>


From nobody Wed Dec 17 14:33:18 2014
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE6CE1A875E; Wed, 17 Dec 2014 14:33:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VH8Hzn7PzhcF; Wed, 17 Dec 2014 14:33:12 -0800 (PST)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B3881A6FDB; Wed, 17 Dec 2014 14:33:12 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 5.7.4
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141217223312.6301.31887.idtracker@ietfa.amsl.com>
Date: Wed, 17 Dec 2014 14:33:12 -0800
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/L3KdS88TyhZxTBZTXFWqM0B3kJg
Cc: dime@ietf.org
Subject: [Dime] I-D Action: draft-ietf-dime-doic-rate-control-00.txt
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 22:33:14 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Diameter Maintenance and Extensions Working Group of the IETF.

        Title           : Diameter Overload Rate Control
        Authors         : Steve Donovan
                          Eric Noel
	Filename        : draft-ietf-dime-doic-rate-control-00.txt
	Pages           : 18
	Date            : 2014-12-17

Abstract:
   This specification documents an extension to the Diameter Overload
   Indication Conveyance (DOIC) base solution.  This extension adds a
   new overload control abatement algorithm.  This abatement algorithm
   allows for a DOIC reporting node to specify a maximum rate at which a
   DOIC reacting node sends Diameter requests sent to the DOIC reporting
   node.

Requirements

The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dime-doic-rate-control/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dime-doic-rate-control-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Dec 17 14:33:38 2014
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C1E01A8779; Wed, 17 Dec 2014 14:33:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rHa_4DMVwNZO; Wed, 17 Dec 2014 14:33:29 -0800 (PST)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DE131A8783; Wed, 17 Dec 2014 14:33:28 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 5.7.4
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141217223328.3890.2769.idtracker@ietfa.amsl.com>
Date: Wed, 17 Dec 2014 14:33:28 -0800
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/cmg6BfSXf8nz8Owp2-szVLrAXqQ
Cc: dime@ietf.org
Subject: [Dime] I-D Action: draft-ietf-dime-agent-overload-00.txt
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 22:33:31 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Diameter Maintenance and Extensions Working Group of the IETF.

        Title           : Diameter Agent Overload
        Author          : Steve Donovan
	Filename        : draft-ietf-dime-agent-overload-00.txt
	Pages           : 18
	Date            : 2014-12-17

Abstract:
   This specification documents an extension to the Diameter Overload
   Control (DOC) base solution.  The extension addresses the handling of
   occurrances of overload of a Diameter agent.

Requirements

The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dime-agent-overload/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dime-agent-overload-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Dec 17 14:39:02 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FC101A0121 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 14:39:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6CPmb-K2DJXl for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 14:38:57 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA4F51A008D for <dime@ietf.org>; Wed, 17 Dec 2014 14:38:57 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHMcuFW012314 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 16:38:57 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54920272.80508@usdonovans.com>
Date: Wed, 17 Dec 2014 16:38:56 -0600
X-Mao-Original-Outgoing-Id: 440548736.441289-fba32af7028bdf11db4fa1ff312e1ae8
Content-Transfer-Encoding: quoted-printable
Message-Id: <52901958-73B6-49FE-8DA4-A8D2F8276DD0@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com> <5491F723.6080203@usdonovans.com> <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com> <54920272.80508@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/N75rvmeB7F-ebPT-bTYElqwRO7g
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 22:39:00 -0000

> On Dec 17, 2014, at 4:23 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>=20
> On 12/17/14 3:54 PM, Ben Campbell wrote:
>>> On Dec 17, 2014, at 3:35 PM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>=20
>>>=20
>>> On 12/17/14 1:00 PM, Ben Campbell wrote:
>>>>> On Dec 17, 2014, at 12:34 PM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>>>=20
>>>>>> Okay, new picture:
>>>>>>=20
>>>>>>     =20
>>>>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan =
<srdonovan@usdonovans.com>
>>>>>>>  wrote:
>>>>>>>=20
>>>>>>> Ben,
>>>>>>>=20
>>>>>>> The value of the Origin-Host matters greatly here.  In both =
cases, what S needs to know is if there is a reacting node for traffic =
coming from C1 and if there is a reacting node for traffic coming from =
C2.
>>>>>>>=20
>>>>>> There is no assumption in the draft right now that we have a =
correlation between reacting nodes and clients. That might be required =
for client-targed OLRs, but we don't have those yet.
>>>>>>=20
>>>>>> Consider a different picture. In this case, C never supports =
DOIC. the reacting node role happens either at A1/A2 or at A3, depending =
on which flow you look at.
>>>>>>=20
>>>>>>         A1---
>>>>>>        /         \
>>>>>> C --             -------A3------S
>>>>>>        \         /
>>>>>>          A2---
>>>>>>=20
>>>>>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, =
and A3 for A. All requests now have the same origin-host.
>>>>>>=20
>>>>>> Before you say this is unrealistic: The issue is the same for any =
situation where one client can send traffic across multiple agents to =
the same destination. It doesn't matter if there is one or a million.
>>>>>>=20
>>>>> SRD> Yes, this is nasty.  With attribution S can detect the =
scenario.  I'm not sure what it does once it selects it.  This can be =
addressed to some degree by adding a deployment recommendation that  all =
agents taking on reacting node functionality for a single endpoint  =
select the same algorithm.
>>>> I think some sort of attribution is the long-term solution. Another =
option might be some sort of DCA state identifier, or a combination of =
the two. (e.g. multiple "virtual" reacting node at the same physical =
node.) The details will be non-trivial to figure out.
>>>>=20
>>>> But to close the loop, I think the _short_ term solution is to say =
that, while a reporting node should not _initiate_ a change in =
algorithms during an overload condition, it must still handle the =
situation where the reacting node forces a change. We could go further =
to say that reacting node also should not initiate such a change, but we =
would have to recognize that there are scenarios where that guidance =
cannot be enforced, and the reporting node still has to handle them.
>>>>=20
>>>> We might need to think about what it means from an OCS perspective =
for a reporting node to send OLRs with different algorithms (or =
potentially other capability parameters) for the "same" overload event.
>>> SRD> I think it is a better solution to stay with what we have now.  =
The reporting node MUST NOT change the algorithm during an active =
overload condition.  If a reacting node advertises support for it, the =
reacting node is saying it will support that algorithm for the duration =
of any overload condition that happens prior to the reacting node =
changing the advertised algorithm.  The change in advertised algorithm =
will take effect after the overload condition goes away.
>>>=20
>> I disagree. I don't think we want to allow the reporting node to ever =
indicate an algorithm that was not advertised in the request. That =
violates normative language earlier in the section that says the =
selected algorithm MUST be one of the ones advertised in the request. It =
can also cause problems for reacting nodes, where they get OLRs for an =
algorithm they don't understand.
> SRD> They clearly do understand the algorithm.  They advertised it =
before the overload report started.  We can change the normative =
language to cover this exception.

In my first scenario, this is not true. C2 (or A2)  _never_ understood =
the rate algorithm, and never advertised support for it.

The whole point of this exercise was to show that the reporting node =
cannot, in the general case, distinguish between multiple reacting nodes =
with different capabilities, and a single reacting node that changes =
capabilities.

By "general case", I mean no assumption that the reacting nodes are =
peers with the reporting nodes, and no assumption that you can correlate =
origin-host values (in requests) to reacting-nodes.=20


>  I think the principle of minimizing work on an overloaded reporting =
node is the more important principle here.  If the reacting node changes =
the advertised set of algorithms during an active overload condition =
then the overloaded reporting node will be required to send =
end-of-overload OLRs for the previous algorithm and then send =
start-of-overload OLRs for the new algorithm.  This seems complex at a =
time the overloaded node should be focusing on getting out of the =
overload condition.

Sending an OLR that the reacting node does not understand will not help =
you get out of overload.

I don't see how this is any more complex that if you simply have =
multiple reacting nodes with different capabilities--and I don't see how =
to avoid supporting that case.

>>=20
>> I think that's considerably more important that restricting the =
reporting node from changing algorithms (Which, btw, does no harm with =
the only algorithms that we are seriously contemplating.We speculate =
that it might cause harm for some future algorithm.)
> SRD> We already have the restriction on the reporting node.

We already have both restrictions, and they contradict. I believe the =
_existing_ restriction to not select an algorithm that is not advertised =
in the request is more important than the _existing_ restriction to not =
change algorithms during an overload condition.


>>=20
>> Remember, this is not just about a single reacting node changing it's =
capabilities, it's also about multiple reacting nodes with different =
capabilities. We can't disallow one without disallowing the other.
> SRD> Multiple reacting nodes with different capabilities is all the =
more reason to hold things constant during an overload condition.

I don't follow that. You seem to be pushing towards using the same =
algorithm for all reacting nodes once an overload condition starts. Is =
that your intent?  (Given the possibility that some future reacting node =
will only support "loss", that "same algorithm" would pretty much always =
need to be loss.)

>  I'm not proposing disallowing reacting nodes from changing the set of =
capabilities, I'm proposing that these changes don't take effect while =
there is an active overload condition.

The problem exists even if no reacting node ever changes its =
capabilities.

>>=20
>>=20
>>> SRD> I don't think we need to update the OCS in this document to =
handle multiple algorithms.  This can be done in the extension drafts.  =
We might want to make it clear, as it appears it isn't already, that a =
reacting node might need to support multiple algorithms at the same =
time.
>> Do you mean reacting or reporting node in the last sentence? Assuming =
you mean it as written, the problem is not that a reacting node may need =
to support multiple algorithms at the same time. It's that it may get =
OLRs that it cannot act upon because it doesn't support the algorithm.
> SRD> I meant reporting nodes.
>>=20
>> If, otoh, you meant reporting node, I don't understand how a =
reporting node can have multiple algorithms for the same overload event, =
without reflecting that possibility in the OCS.
> SRD> Yes, it will need to be reflected in the OCS.  We don't have =
multiple algorithms now so it isn't needed now.  I'm saying we might =
want to say it might me needed in the future.

I'd rather not make each new algorithm redefine the basic structure of =
OCS.

But, if you recall, my point was to say we need to _think_ about how =
this impacts OCS, not that we necessarily need to change anything. Are =
you opposed to thinking about it? (And no, I don't think this short =
exchange quite counts as that.)

>>=20
>>=20
>>=20
>>>>=20
>>=20
>=20


From nobody Wed Dec 17 15:01:18 2014
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DC681A0024 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 15:01:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hfmbEV-hRg3r for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 15:01:15 -0800 (PST)
Received: from mail-la0-x232.google.com (mail-la0-x232.google.com [IPv6:2a00:1450:4010:c03::232]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E7DC51A000A for <dime@ietf.org>; Wed, 17 Dec 2014 15:01:14 -0800 (PST)
Received: by mail-la0-f50.google.com with SMTP id pn19so33618lab.37 for <dime@ietf.org>; Wed, 17 Dec 2014 15:01:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=9KItW6IVCK+vgDEUvt3ySQZwn/M5Ev6KjegkGB+bwzE=; b=wqb1yyL1p987c3AuBX73BGP/7wJxeODEK6+yxtjOmHFyTqu2Eln+FgzdexwzpINhHw SNyV32uSPaHi6IsU+SPiQS5UfkZf6vDZ1RNj7ysFbGjb0a0+uhk+8Ko5xQP2ATqiJChG 3LkdYmCZ/7Uwm2F2ChOQHR5XR/p9B8126nnmiDPSv/wrwAjSAYek+D7PwMrKCCjXL5SN PFRyrEs4Jvy8aa1XotMNW4DkkvU+0xCsQByg4OsBoja7HC2K/aAPkRA8M8hXXF7Sk8yE lGiDv1xlGTdVPIBPp8K5C/JdZkGqLMgK2qnGHpI2j6IJPaLyOKxEySr5NqjC4isI6IZk xABA==
X-Received: by 10.152.27.228 with SMTP id w4mr32096262lag.75.1418857273439; Wed, 17 Dec 2014 15:01:13 -0800 (PST)
Received: from [10.17.0.23] ([83.150.126.201]) by mx.google.com with ESMTPSA id nv1sm1269862lbb.38.2014.12.17.15.01.11 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 17 Dec 2014 15:01:12 -0800 (PST)
Message-ID: <54920B37.4060201@gmail.com>
Date: Thu, 18 Dec 2014 01:01:11 +0200
From: Jouni Korhonen <jouni.nospam@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com> <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com>
In-Reply-To: <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/h23U1i22dyQ4xdyZXl80kC40TDU
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 23:01:16 -0000

[snip]

>> I'll step out of the argument and let someone else be champion for millisecond granularity.
>
> Any other takers? Are there real use cases for sub-second precision?

I do not really care. We changed that from seconds to milliseconds for 
some reason.. but no not see a reason to change it back either.

- Jouni

>
>>
>> Steve
>>


From nobody Wed Dec 17 15:08:09 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFC7F1A0058 for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 15:08:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tbNunZC2yMvm for <dime@ietfa.amsl.com>; Wed, 17 Dec 2014 15:08:01 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16BEF1A0030 for <dime@ietf.org>; Wed, 17 Dec 2014 15:07:44 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBHN7dtT014694 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 17 Dec 2014 17:07:39 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54920B37.4060201@gmail.com>
Date: Wed, 17 Dec 2014 17:07:38 -0600
X-Mao-Original-Outgoing-Id: 440550458.489466-9e9fab1a257d7cb421242ba50ed73d2a
Content-Transfer-Encoding: quoted-printable
Message-Id: <2BE199F8-262D-40AB-A567-A857E94B3A6A@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com> <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com> <54920B37.4060201@gmail.com>
To: Jouni Korhonen <jouni.nospam@gmail.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/3OduquFoJxUWUw9CDc8RnGZRT10
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Dec 2014 23:08:07 -0000

> On Dec 17, 2014, at 5:01 PM, Jouni Korhonen <jouni.nospam@gmail.com> =
wrote:
>=20
> [snip]
>=20
>>> I'll step out of the argument and let someone else be champion for =
millisecond granularity.
>>=20
>> Any other takers? Are there real use cases for sub-second precision?
>=20
> I do not really care. We changed that from seconds to milliseconds for =
some reason.. but no not see a reason to change it back either.

I'd argue that we should make it the "right thing", regardless of =
whether we changed it before. (Although remembering why might go far to =
answering my last question below.)

I've describe why I think it is false precision, and can become harmful. =
To rephrase it, choosing too small of durations will cause harm by =
forcing rapid OLR updates (as in many per second.) These updates cause =
work for both reporting nodes and reacting nodes.=20

We could offer guidance of how to avoid that harm. Or we could choose a =
resolution that makes it harder to cause such harm in the first place. I =
think good protocol design favors the later.

Do you disagree with the potential for harm? Or do you see some use case =
for sub-second precision that I've missed?



From nobody Thu Dec 18 01:09:54 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EFBA1A6F68 for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 01:09:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iJ5Ljyok-l5D for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 01:09:47 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D27A1A6F64 for <dime@ietf.org>; Thu, 18 Dec 2014 01:09:46 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBI99i5Z023866 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 18 Dec 2014 09:09:44 GMT
Received: from DEMUHTC003.nsn-intra.net ([10.159.42.34]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBI99hbY022993 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 18 Dec 2014 10:09:43 +0100
Received: from DEMUHTC009.nsn-intra.net (10.159.42.40) by DEMUHTC003.nsn-intra.net (10.159.42.34) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 18 Dec 2014 10:09:43 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC009.nsn-intra.net ([10.159.42.40]) with mapi id 14.03.0195.001; Thu, 18 Dec 2014 10:09:42 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #16
Thread-Index: AQHQE7lXyc+G3J0M1EW8kbPFxFEQNZyHfq1QgANENfD///h3AIAAAngAgAZo/cCAASFYAIAC0YbQ
Date: Thu, 18 Dec 2014 09:09:42 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235BEF@DEMUMBX014.nsn-intra.net>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com> <5489F246.5040801@usdonovans.com> <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D9000668152359A7@DEMUMBX014.nsn-intra.net> <549047A0.4060503@usdonovans.com>
In-Reply-To: <549047A0.4060503@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.119]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 8619
X-purgate-ID: 151667::1418893784-0000677A-CC461740/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/HpfgJp0_yGjsJm_RV4V-JkZUQd8
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 09:09:53 -0000

Steve,

I'm still not convinced.

Another proposal:

If diversion abatement treatment is possible (i.e. a different path for the=
 request can be selected where the overloaded node is not part of the diffe=
rent path), then the reacting node SHOULD apply diversion abatement treatme=
nt to the request. Otherwise the reacting node SHOULD apply throttling abat=
ement treatment to the request.=20

Ulrich

-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
Sent: Tuesday, December 16, 2014 3:54 PM
To: Wiehe, Ulrich (NSN - DE/Munich); ext Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #16

Ulrich,

I still think the following statements are sufficient:

    For OLRs of type host, if the request is a host-routed request then the=
 reacting node SHOULD
    apply throttling abatement treatment to the request.

    For OLRs of type host, if the request is a realm-routed request then th=
e reacting node
    SHOULD apply diversion abatement treatment to the request.

    For OLRs of type realm, the reacting node SHOULD
    apply throttling abatement treatment to the request, independent of the=
 type (host-routed or
    realm-routed) of request.

Regards,

Steve

On 12/15/14, 2:42 PM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
> can you please summarize the status of #16. I'm getting lost.
>
> Regards
> Ulrich
>
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]
> Sent: Thursday, December 11, 2014 8:45 PM
> To: Steve Donovan
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #16
>
>
>> On Dec 11, 2014, at 1:36 PM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>
>>
>> On 12/11/14, 1:03 PM, Ben Campbell wrote:
>>>> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>>>
>>>> Ulrich,
>>>>
>>>> I agree with your assumptions below.  For the third one, the only time=
 it is possible, at least from a DOIC perspective, to send to another host =
is if it is a realm-routed request.  I might also change the "not overloade=
d" to "less overloaded".
>>>>
>>>> I do think the statements can be improved to differentiate between beh=
avior for host reports and realm reports.
>>>>
>>>> How about the following:
>>>>     For OLRs of type host, if the request is a host-routed request the=
n the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request.
>>>>
>>>>     For OLRs of type host, If the request is a realm-routed request th=
en the reacting node
>>>>     SHOULD apply diversion abatement treatment to the request.
>>> Personally, I think that should be non-normative. Or if normative, no s=
tronger than MAY. I agree it's a good choice, but I think we can leave it t=
o the market to enforce.
>> If we make it non normative then we probably need an additional statemen=
t along the lines of "the reacting node MUST attempt to reduce traffic by t=
he amount requested in the OLR" if we don't already have it somewhere else =
in the document.
> Agreed
>
>>> I think there when we distinguish request-type, we need to consider _wh=
en_. For example, an agent may _receive_ a realm routed request but _send_ =
a host-routed request. And for a client, that may be even more subtle.
>>>
>>> This really does seem like a case of server selection.
>> I don't think it's that subtle.  If server selection hasn't already happ=
ened for a request and that request is selected for abatement and the reque=
st would have otherwise been routed to an overloaded host then the request =
should/may be diverted to another server.
>>
>> Server selection could have happened as a result of a previous transacti=
on specifying the host for subsequent transactions or by the presence of th=
e Destination-Host in the message when it arrives at an agent.  It could ha=
ve also already happened as a result of configuration.
> In the case of a client, the decision on whether to divert vs just not se=
nd a request may be heavily influenced by the client application.  (Not nec=
essarily the _Diameter_ application.)  In the case of either, a node might =
have local knowledge that a 2nd server can handle everything the first serv=
er can handle. Even if a downstream node performed server selection, a node=
 with such knowledge might override it. We don't necessarily need to talk a=
bout that sort of thing, but we should avoid language that forbids it.
>
>
>>>>     For OLRs of type realm, the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request, independent o=
f the type (host-routed or
>>>>     realm-routed) of request.
>>> Again, I think this should not be normative. In this case this is prett=
y much a statement of fact--you simply cannot reasonably divert given the w=
ay that Diameter routing works. I suppose there might be a case where a nod=
e has some magical knowledge that realm2 can handle anything that realm1 ca=
n, and could divert to a different realm (which we probably still don't wan=
t to forbid.)
>>>
>>>> Regards,
>>>>
>>>> Steve
>>>>
>>>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>> Steve,
>>>>> yes, then, maybe, the definition of Diversion is not correct?
>>>>> What are other people's views?
>>>>>
>>>>> My assumption was:
>>>>> If a host is overloaded, it does not help to direct traffic to that h=
ost via a different path.
>>>>> If a realm is overloaded, it does not help to direct traffic to that =
realm via a different path.
>>>>> If a host is overloaded, it helps to select an alternative (not overl=
oaded) host (if possible) and direct traffic to that host.
>>>>> If a realm is overloaded, there never is an alternative (not overload=
ed) realm to which traffic could be directed.
>>>>>
>>>>> With the current definition of Diversion, Diversion is no appropriate=
 means to address host overload and is no appropriate means to address real=
m overload. It may be ok for agent overload only.
>>>>>
>>>>> Regards
>>>>> Ulrich
>>>>>
>>>>> From: DiME [
>>>>> mailto:dime-bounces@ietf.org
>>>>> ] On Behalf Of ext Steve Donovan
>>>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>>>> To:
>>>>> dime@ietf.org
>>>>>
>>>>> Subject: [Dime] Ulrich's suggested change #16
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> For your suggested change #16:
>>>>> Section 4.2.2, 5th and 6th paragraph:
>>>>> Existing text:
>>>>>     If the request is a host-routed request then the reacting node SH=
OULD
>>>>>     apply throttling abatement treatment to the request.
>>>>>       If the request is a realm-routed request then the reacting node
>>>>>     SHOULD apply diversion abatement treatment to the request.
>>>>>
>>>>> Comment: I don't think so. If the reacting node selects the server an=
d
>>>>> then detects that the selected server is overloaded and then detects =
that
>>>>> the request does not survive (i.e. is subject to abatement), then the=
 reacting
>>>>> node SHOULD apply diversion treatment (i.e. select an alternative ser=
ver if possible).
>>>>> If the reacting node does not select the server (either a. because th=
e server was
>>>>> already selected by a downstream node, or b. because the server will =
be selected
>>>>> by an upstream node) then there is no point in applying diversion and=
 the reacting
>>>>> node SHOULD apply throttling of requests that do not survive.
>>>>>
>>>>> Proposal: replace the paragraphs with:
>>>>>     If the reacting node does not select the server then it SHOULD ap=
ply
>>>>>     throttling abatement to the request.
>>>>>
>>>>>     If the reacting node selects the server then it SHOULD apply dive=
rsion
>>>>>     abatement treatment (i.e. select an alternative server if possibl=
e) to
>>>>>     the request.
>>>>> Diversion is not selecting an alternative node to handle the request.=
  Diversion is selecting an alternative route to the selected node.
>>>>>
>>>>> Whether it is appropriate to select an alternative node for a request=
 is an application decision that probably changes on a per command-code bas=
is within the application. Logic like this is outside the scope of the DOIC=
 specification.
>>>>>
>>>>> The text is correct based on the definition of diversion.
>>>>>
>>>>> Regards,
>>>>>
>>>>> Steve
>>>>>
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 18 01:17:34 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A294E1A6F64 for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 01:17:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6TpmAfXvIt7i for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 01:17:29 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8CA561A6EF0 for <dime@ietf.org>; Thu, 18 Dec 2014 01:17:28 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBI9HQPJ012207 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 18 Dec 2014 09:17:26 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBI9HQo5011397 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 18 Dec 2014 10:17:26 +0100
Received: from DEMUHTC008.nsn-intra.net (10.159.42.39) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Thu, 18 Dec 2014 10:17:26 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC008.nsn-intra.net ([10.159.42.39]) with mapi id 14.03.0195.001; Thu, 18 Dec 2014 10:17:26 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change @12
Thread-Index: AQHQE7ZHD23zRsD0mUyK0fJgC7jhrJyHbHpAgAFIcACAAa52UIAH+zpfgALANtA=
Date: Thu, 18 Dec 2014 09:17:25 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235C03@DEMUMBX014.nsn-intra.net>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net> <5489A416.2000403@usdonovans.com> <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com> <54904C5A.2070502@usdonovans.com>
In-Reply-To: <54904C5A.2070502@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.119]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 6413
X-purgate-ID: 151667::1418894247-0000677A-1CD3F931/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/cZGdFbcUeY2TOpTU1uZbiHRlmY0
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 09:17:32 -0000

Steve, Ben,

I'm in favour of 2).
Actually I do not understand 3) as it talks about overload reports, while t=
he issue is about capability anouncement.

Ulrich

-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
Sent: Tuesday, December 16, 2014 4:15 PM
To: Ben Campbell
Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change @12

Ben,

I see a two or three options here:

1) We add a new attribution AVP and all of the text associated with it. =20
This has obvious schedule implications.

2) We treat this the same way as we treated the issue with multiple=20
sources of OC-OLR AVPs and add text somewhere in the draft saying that=20
if agents are selecting abatement algorithms then care must be taken to=20
make sure that all agents that handle traffic for the same Diameter node=20
must select the same algorithm for all transactions involving that=20
Diameter node.

3) Number two plus reacting node behavior statements saying that the=20
reacting node SHOULD ignore overload reports for a node that has an=20
active OCS if the received overload report is of a different type then=20
stored in the active OCS.

I vote for number 3.

Regards,

Steve

On 12/11/14, 12:38 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:03 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>
>> Ulrich,
>>
>> I see your concern.  To summarize, if we have the following configuratio=
n:
>>
>>     ----A1----
>>    /          \
>>   C            S
>>    \          /
>>     ----A2----
>>
>> And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 ind=
icates rate then there is ambiguity.
>>
>> I agree, this warrants a warning statement somewhere in the document.
>>
>> If there is general agreement on this then I'll propose wording and loca=
tion.
>>
> What sort of guidance should we give here? IMO, this is a worse problem t=
han for realm reports, or at least having it for both realm and host report=
s makes it considerably worse than before. I think variations on this will =
happen for almost any Diameter network of non-trivial size.
>
> I also think it's reasonable that A1 and A2 might select different algori=
thms towards C. For example, lets say C, A1, and S all support rate, but A2=
 does not. S might select rate towards A1, but loss towards A2.
>
> If we can't handle this, I think the entire solution breaks down.
>
> I propose that the best way to handle this is to add source-attribution i=
nto OLRs, and guidance for what C should do if it gets different capabiliti=
es for the same host or realm from different paths. This _might_ also help =
solve the "different reports for same realm" problem and the "can't tell if=
 an intervening agent supports DOIC" problem.
>
>
>> Steve
>>
>> On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>>  =20
>>> yes, it's about capability announcement, and my concern in with announc=
ing the selected algorithm in answer messages (while no OLRs are sent). Mul=
tiple  agents modifying the selected algorithm in the Supported-Features AV=
Ps in answer messages may  result in ambiguity in DOIC behaviour for downst=
ream DOIC nodes.
>>>  =20
>>> Ulrich
>>>  =20
>>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>>> Sent: Wednesday, December 10, 2014 1:41 PM
>>> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>>> Subject: Re: [Dime] Ulrich's suggested change @12
>>>  =20
>>> Ulrich,
>>>
>>> This paragraph is talking about capability announcement.  We deal with =
the issues related to multiple sources of overload reports already elsewher=
e in the document.
>>>
>>> I still do see the need for a change.
>>>
>>> Steve
>>>
>>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>> I agree, my comment and proposal do not hit the mark.
>>>  =20
>>> The intention was to say that known issues exist if there are multiple =
agents on multiple paths between client and server. The agents may not be a=
ble to ensure that there is no ambiguity in DOIC behaviour for the client. =
E.g. from the client's point of view the answer to a first request (which w=
as modified by agent A1) could indicate: DOIC is supported, currenty no ove=
rload, once in overload loss will be selected; and the answer to the next r=
equest (which was modified by agent A2) could indicate: DOIC is supported, =
some?? reduction is requested using rate. The client, however, may not be p=
repared for rate.
>>>  =20
>>> Maybe a warning note could be added to say that the agent may not alway=
s be able to ensure that there is no ambiguity.
>>>  =20
>>> Ulrich
>>>  =20
>>>  =20
>>>  =20
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donova=
n
>>> Sent: Tuesday, December 09, 2014 2:45 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change @12
>>>  =20
>>> Ulrich,
>>>
>>> For your suggested change #12:
>>>
>>> Section 4.1.3, last paragraph:
>>> Existing text:
>>>     When making changes to the OC-Supported-Features AVP the Diameter
>>>     Agent needs to ensure that there is no ambiguity in DOIC behavior f=
or
>>>     both upstream and downstream DOIC nodes.
>>>  =20
>>> Comment: while that is true, in addition problems similar to those
>>> identified in the note in section 3.3 may result from making changes.
>>>  =20
>>> Proposal: Add the note:
>>>        Note: Known issues exist if multiple sources for overload report=
s
>>>        which apply to the same Diameter entity exist.  Reacting nodes
>>>        have no way of determining the source and, as such, will treat
>>>        them as coming from a single source.  Variance in sequence numbe=
rs
>>>        between the two sources can then cause incorrect overload
>>>        abatement treatment to be applied for indeterminate periods of
>>>        time.
>>> I don't understand how these are related.  The change to the OC-Support=
ed-Features AVP made by the agent apply only to the transaction.  In additi=
on, this paragraph doesn't mention overload reports.
>>>
>>> Regards,
>>>
>>> Steve
>>>
>>>
>>>
>>>  =20
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Thu Dec 18 09:11:38 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7C301A909C for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 09:11:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4_TFn80-jOCH for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 09:11:20 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C6A71A9077 for <dime@ietf.org>; Thu, 18 Dec 2014 09:11:19 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBIHBGlm025965 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 18 Dec 2014 17:11:16 GMT
Received: from DEMUHTC003.nsn-intra.net ([10.159.42.34]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBIHBFSd011879 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 18 Dec 2014 18:11:15 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC003.nsn-intra.net ([10.159.42.34]) with mapi id 14.03.0195.001; Thu, 18 Dec 2014 18:11:15 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Jouni Korhonen <jouni.nospam@gmail.com>
Thread-Topic: [Dime] DOIC WGLC: duration unit
Thread-Index: AQHQGbXAWRMJZc/vrkarMpVgZ93RA5yTyBAAgAAhXYCAAAObgIAADKaAgAAUDACAAAZ5AIAAQlCAgAABzgCAAT19AA==
Date: Thu, 18 Dec 2014 17:11:14 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235C94@DEMUMBX014.nsn-intra.net>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com> <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com> <54920B37.4060201@gmail.com> <2BE199F8-262D-40AB-A567-A857E94B3A6A@nostrum.com>
In-Reply-To: <2BE199F8-262D-40AB-A567-A857E94B3A6A@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.102]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 1957
X-purgate-ID: 151667::1418922676-0000677A-15274DBF/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/zmw43o9OmZhnkGLis3c-5zBlSvo
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 17:11:25 -0000

Ben,

my inclination is to change back to seconds. However, seconds allow a maxim=
um value that is 1000 times higher and may be regarded unreasonably high. I=
n a previous version of the draft we had an upper limit, and maybe when goi=
ng back to seconds we should re-introduce an upper limit so that the protoc=
ol does not allow unreasonably long durations.

Ulrich


-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
Sent: Thursday, December 18, 2014 12:08 AM
To: Jouni Korhonen
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: duration unit


> On Dec 17, 2014, at 5:01 PM, Jouni Korhonen <jouni.nospam@gmail.com> wrot=
e:
>=20
> [snip]
>=20
>>> I'll step out of the argument and let someone else be champion for mill=
isecond granularity.
>>=20
>> Any other takers? Are there real use cases for sub-second precision?
>=20
> I do not really care. We changed that from seconds to milliseconds for so=
me reason.. but no not see a reason to change it back either.

I'd argue that we should make it the "right thing", regardless of whether w=
e changed it before. (Although remembering why might go far to answering my=
 last question below.)

I've describe why I think it is false precision, and can become harmful. To=
 rephrase it, choosing too small of durations will cause harm by forcing ra=
pid OLR updates (as in many per second.) These updates cause work for both =
reporting nodes and reacting nodes.=20

We could offer guidance of how to avoid that harm. Or we could choose a res=
olution that makes it harder to cause such harm in the first place. I think=
 good protocol design favors the later.

Do you disagree with the potential for harm? Or do you see some use case fo=
r sub-second precision that I've missed?


_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 18 09:46:41 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C3DA1A914F for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 09:46:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 209uFSz5koNj for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 09:46:36 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3AA031A1B8E for <dime@ietf.org>; Thu, 18 Dec 2014 09:46:36 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBIHkYAU022568 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 18 Dec 2014 17:46:34 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBIHkWI6020343 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 18 Dec 2014 18:46:33 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.49]) by DEMUHTC004.nsn-intra.net ([10.159.42.35]) with mapi id 14.03.0195.001; Thu, 18 Dec 2014 18:46:32 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] DOIC WGLC: Changing Algorithms
Thread-Index: AQHQGbTAD7bF1y5nZ0Ktqi3JfsBjdJyTTUsAgAB56ICAACGtgIAAEAyAgAAEZQCAAA7IgIAABxKAgAAra4CAAAU7AIAACEAAgAAEPQCAAU0+QA==
Date: Thu, 18 Dec 2014 17:46:32 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815235CCD@DEMUMBX014.nsn-intra.net>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com> <5491F723.6080203@usdonovans.com> <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com> <54920272.80508@usdonovans.com> <52901958-73B6-49FE-8DA4-A8D2F8276DD0@nostrum.com>
In-Reply-To: <52901958-73B6-49FE-8DA4-A8D2F8276DD0@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.102]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 9515
X-purgate-ID: 151667::1418924794-0000677A-61D5BC59/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/SKcioQNXl-iVWtJqw0buwu0u9Pw
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 17:46:39 -0000

Ben, Steve,

Section 4.2.1.2 says:
   A reporting node SHOULD maintain OCS entries per supported Diameter
   application, per supported (and eventually selected) Abatement
   Algorithm and per report-type.

For example, an HSS would maintain two OCSs for S6a host-type reports, one =
for loss and one for rate. When receiving a request that advertises only lo=
ss, the returned OLR would be the one according to the loss-OCS; When recei=
ving a request that advertises loss and rate, the HSS has two returned OLR =
would be the one according to the rate-OCS.

I don't see a problem when algorithm is changed at the reacting node.

Ulrich



-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
Sent: Wednesday, December 17, 2014 11:39 PM
To: Steve Donovan
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms


> On Dec 17, 2014, at 4:23 PM, Steve Donovan <srdonovan@usdonovans.com> wro=
te:
>=20
>=20
> On 12/17/14 3:54 PM, Ben Campbell wrote:
>>> On Dec 17, 2014, at 3:35 PM, Steve Donovan <srdonovan@usdonovans.com> w=
rote:
>>>=20
>>>=20
>>> On 12/17/14 1:00 PM, Ben Campbell wrote:
>>>>> On Dec 17, 2014, at 12:34 PM, Steve Donovan <srdonovan@usdonovans.com=
> wrote:
>>>>>=20
>>>>>> Okay, new picture:
>>>>>>=20
>>>>>>     =20
>>>>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan <srdonovan@usdonovans.c=
om>
>>>>>>>  wrote:
>>>>>>>=20
>>>>>>> Ben,
>>>>>>>=20
>>>>>>> The value of the Origin-Host matters greatly here.  In both cases, =
what S needs to know is if there is a reacting node for traffic coming from=
 C1 and if there is a reacting node for traffic coming from C2.
>>>>>>>=20
>>>>>> There is no assumption in the draft right now that we have a correla=
tion between reacting nodes and clients. That might be required for client-=
targed OLRs, but we don't have those yet.
>>>>>>=20
>>>>>> Consider a different picture. In this case, C never supports DOIC. t=
he reacting node role happens either at A1/A2 or at A3, depending on which =
flow you look at.
>>>>>>=20
>>>>>>         A1---
>>>>>>        /         \
>>>>>> C --             -------A3------S
>>>>>>        \         /
>>>>>>          A2---
>>>>>>=20
>>>>>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, an=
d A3 for A. All requests now have the same origin-host.
>>>>>>=20
>>>>>> Before you say this is unrealistic: The issue is the same for any si=
tuation where one client can send traffic across multiple agents to the sam=
e destination. It doesn't matter if there is one or a million.
>>>>>>=20
>>>>> SRD> Yes, this is nasty.  With attribution S can detect the scenario.=
  I'm not sure what it does once it selects it.  This can be addressed to s=
ome degree by adding a deployment recommendation that  all agents taking on=
 reacting node functionality for a single endpoint  select the same algorit=
hm.
>>>> I think some sort of attribution is the long-term solution. Another op=
tion might be some sort of DCA state identifier, or a combination of the tw=
o. (e.g. multiple "virtual" reacting node at the same physical node.) The d=
etails will be non-trivial to figure out.
>>>>=20
>>>> But to close the loop, I think the _short_ term solution is to say tha=
t, while a reporting node should not _initiate_ a change in algorithms duri=
ng an overload condition, it must still handle the situation where the reac=
ting node forces a change. We could go further to say that reacting node al=
so should not initiate such a change, but we would have to recognize that t=
here are scenarios where that guidance cannot be enforced, and the reportin=
g node still has to handle them.
>>>>=20
>>>> We might need to think about what it means from an OCS perspective for=
 a reporting node to send OLRs with different algorithms (or potentially ot=
her capability parameters) for the "same" overload event.
>>> SRD> I think it is a better solution to stay with what we have now.  Th=
e reporting node MUST NOT change the algorithm during an active overload co=
ndition.  If a reacting node advertises support for it, the reacting node i=
s saying it will support that algorithm for the duration of any overload co=
ndition that happens prior to the reacting node changing the advertised alg=
orithm.  The change in advertised algorithm will take effect after the over=
load condition goes away.
>>>=20
>> I disagree. I don't think we want to allow the reporting node to ever in=
dicate an algorithm that was not advertised in the request. That violates n=
ormative language earlier in the section that says the selected algorithm M=
UST be one of the ones advertised in the request. It can also cause problem=
s for reacting nodes, where they get OLRs for an algorithm they don't under=
stand.
> SRD> They clearly do understand the algorithm.  They advertised it before=
 the overload report started.  We can change the normative language to cove=
r this exception.

In my first scenario, this is not true. C2 (or A2)  _never_ understood the =
rate algorithm, and never advertised support for it.

The whole point of this exercise was to show that the reporting node cannot=
, in the general case, distinguish between multiple reacting nodes with dif=
ferent capabilities, and a single reacting node that changes capabilities.

By "general case", I mean no assumption that the reacting nodes are peers w=
ith the reporting nodes, and no assumption that you can correlate origin-ho=
st values (in requests) to reacting-nodes.=20


>  I think the principle of minimizing work on an overloaded reporting node=
 is the more important principle here.  If the reacting node changes the ad=
vertised set of algorithms during an active overload condition then the ove=
rloaded reporting node will be required to send end-of-overload OLRs for th=
e previous algorithm and then send start-of-overload OLRs for the new algor=
ithm.  This seems complex at a time the overloaded node should be focusing =
on getting out of the overload condition.

Sending an OLR that the reacting node does not understand will not help you=
 get out of overload.

I don't see how this is any more complex that if you simply have multiple r=
eacting nodes with different capabilities--and I don't see how to avoid sup=
porting that case.

>>=20
>> I think that's considerably more important that restricting the reportin=
g node from changing algorithms (Which, btw, does no harm with the only alg=
orithms that we are seriously contemplating.We speculate that it might caus=
e harm for some future algorithm.)
> SRD> We already have the restriction on the reporting node.

We already have both restrictions, and they contradict. I believe the _exis=
ting_ restriction to not select an algorithm that is not advertised in the =
request is more important than the _existing_ restriction to not change alg=
orithms during an overload condition.


>>=20
>> Remember, this is not just about a single reacting node changing it's ca=
pabilities, it's also about multiple reacting nodes with different capabili=
ties. We can't disallow one without disallowing the other.
> SRD> Multiple reacting nodes with different capabilities is all the more =
reason to hold things constant during an overload condition.

I don't follow that. You seem to be pushing towards using the same algorith=
m for all reacting nodes once an overload condition starts. Is that your in=
tent?  (Given the possibility that some future reacting node will only supp=
ort "loss", that "same algorithm" would pretty much always need to be loss.=
)

>  I'm not proposing disallowing reacting nodes from changing the set of ca=
pabilities, I'm proposing that these changes don't take effect while there =
is an active overload condition.

The problem exists even if no reacting node ever changes its capabilities.

>>=20
>>=20
>>> SRD> I don't think we need to update the OCS in this document to handle=
 multiple algorithms.  This can be done in the extension drafts.  We might =
want to make it clear, as it appears it isn't already, that a reacting node=
 might need to support multiple algorithms at the same time.
>> Do you mean reacting or reporting node in the last sentence? Assuming yo=
u mean it as written, the problem is not that a reacting node may need to s=
upport multiple algorithms at the same time. It's that it may get OLRs that=
 it cannot act upon because it doesn't support the algorithm.
> SRD> I meant reporting nodes.
>>=20
>> If, otoh, you meant reporting node, I don't understand how a reporting n=
ode can have multiple algorithms for the same overload event, without refle=
cting that possibility in the OCS.
> SRD> Yes, it will need to be reflected in the OCS.  We don't have multipl=
e algorithms now so it isn't needed now.  I'm saying we might want to say i=
t might me needed in the future.

I'd rather not make each new algorithm redefine the basic structure of OCS.

But, if you recall, my point was to say we need to _think_ about how this i=
mpacts OCS, not that we necessarily need to change anything. Are you oppose=
d to thinking about it? (And no, I don't think this short exchange quite co=
unts as that.)

>>=20
>>=20
>>=20
>>>>=20
>>=20
>=20

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Thu Dec 18 15:47:13 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1DAA1A923B for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 15:47:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q5PdTf7T6hc8 for <dime@ietfa.amsl.com>; Thu, 18 Dec 2014 15:47:10 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 598671A9239 for <dime@ietf.org>; Thu, 18 Dec 2014 15:47:10 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBINl6Nj061845 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 18 Dec 2014 17:47:07 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235C94@DEMUMBX014.nsn-intra.net>
Date: Thu, 18 Dec 2014 17:47:06 -0600
X-Mao-Original-Outgoing-Id: 440639226.127802-4b17089089755a49502fa37441915134
Content-Transfer-Encoding: quoted-printable
Message-Id: <EF4A3B0F-1FA2-49C4-BA33-45C6EFFBAACA@nostrum.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com> <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com> <54920B37.4060201@gmail.com> <2BE199F8-262D-40AB-A567-A857E94B3A6A@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235C94@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/p1oBckXQ0Rk6OQxMB_DQYm-Cu0Y
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Dec 2014 23:47:11 -0000

Hi Ulrich,

You bring up a good point that we need to document the limits, or at =
least describe the implications of choosing to long or short of a =
duration either way. I suspect 1s is still too short for most =
situations, and  ( 2^32 - 1 / 1000 )s is probably still too long.

(Don't get me wrong; I still think millisecond resolution for this is =
silly.)

Thanks!

Ben.

> On Dec 18, 2014, at 11:11 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> Ben,
>=20
> my inclination is to change back to seconds. However, seconds allow a =
maximum value that is 1000 times higher and may be regarded unreasonably =
high. In a previous version of the draft we had an upper limit, and =
maybe when going back to seconds we should re-introduce an upper limit =
so that the protocol does not allow unreasonably long durations.
>=20
> Ulrich
>=20
>=20
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben =
Campbell
> Sent: Thursday, December 18, 2014 12:08 AM
> To: Jouni Korhonen
> Cc: dime@ietf.org
> Subject: Re: [Dime] DOIC WGLC: duration unit
>=20
>=20
>> On Dec 17, 2014, at 5:01 PM, Jouni Korhonen <jouni.nospam@gmail.com> =
wrote:
>>=20
>> [snip]
>>=20
>>>> I'll step out of the argument and let someone else be champion for =
millisecond granularity.
>>>=20
>>> Any other takers? Are there real use cases for sub-second precision?
>>=20
>> I do not really care. We changed that from seconds to milliseconds =
for some reason.. but no not see a reason to change it back either.
>=20
> I'd argue that we should make it the "right thing", regardless of =
whether we changed it before. (Although remembering why might go far to =
answering my last question below.)
>=20
> I've describe why I think it is false precision, and can become =
harmful. To rephrase it, choosing too small of durations will cause harm =
by forcing rapid OLR updates (as in many per second.) These updates =
cause work for both reporting nodes and reacting nodes.=20
>=20
> We could offer guidance of how to avoid that harm. Or we could choose =
a resolution that makes it harder to cause such harm in the first place. =
I think good protocol design favors the later.
>=20
> Do you disagree with the potential for harm? Or do you see some use =
case for sub-second precision that I've missed?
>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Fri Dec 19 10:07:39 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF47F1ACCF9 for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 10:07:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Awvyco3fcSt for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 10:07:34 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 909111ACCFD for <dime@ietf.org>; Fri, 19 Dec 2014 10:07:31 -0800 (PST)
X-AuditID: c1b4fb30-f79d66d00000744c-c5-549469616b55
Received: from ESESSHC017.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 8B.83.29772.16964945; Fri, 19 Dec 2014 19:07:29 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.101]) by ESESSHC017.ericsson.se ([153.88.183.69]) with mapi id 14.03.0195.001; Fri, 19 Dec 2014 19:07:29 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>, "ext Steve Donovan" <srdonovan@usdonovans.com>, ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #16
Thread-Index: AQHQE7lXyc+G3J0M1EW8kbPFxFEQNZyHfq1QgANENfD///h3AIAAAngAgAZo/cCAASFYAIAC0YbQgAIsHfA=
Date: Fri, 19 Dec 2014 18:07:28 +0000
Message-ID: <087A34937E64E74E848732CFF8354B9209895065@ESESSMB101.ericsson.se>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com> <5489F246.5040801@usdonovans.com> <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D9000668152359A7@DEMUMBX014.nsn-intra.net> <549047A0.4060503@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235BEF@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235BEF@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.17]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpgkeLIzCtJLcpLzFFi42KZGfG3Rjcxc0qIwdEJuhbzO0+zW8ztXcFm saGJx2Ld2xVMDiweS5b8ZPKYtfMJi8fP9VfZPVa97WMNYInisklJzcksSy3St0vgylj/aT9b wVz3io6ni5gaGGdYdjFyckgImEh8mruTCcIWk7hwbz0biC0kcIRRYuLjGgh7CaPE1FVWIDab gJ3EpdMvgOq5OEQEJjFKdPX+YwZJMAsoS8ze8YAdxBYWMJS4c+klK4gtImAkMfPkfTYIO0mi rekbWJxFQFWi9fdMsMW8Ar4SSycfYgYZKiRwmVni7vQ1YIM4BQIkWk7dBWtgBLru+6k1TBDL xCVuPZkPdbWAxJI955khbFGJl4//AdVzANmKEsv75SDKdSQW7P7EBmFrSyxb+JoZYq+gxMmZ T1gmMIrNQjJ1FpKWWUhaZiFpWcDIsopRtDi1OCk33chIL7UoM7m4OD9PLy+1ZBMjMMoObvlt sIPx5XPHQ4wCHIxKPLwbpkwOEWJNLCuuzD3EKM3BoiTOu/DcvGAhgfTEktTs1NSC1KL4otKc 1OJDjEwcnFINjPpCH6ctYn8V/91R+ObiCwyP0uyCvxzdV1pVZnQnZ94kJcbDu6cq3r4sPvtm xSXRZdzz1J9aMlxcOK32z+GgL3rPWKwOXXyyXFg87OrWkJS6Rf9t3c+k7TzJvFyGl/+LSZTU iu5NJ9ae2/Nxlffk8guuS9rfJ1e/cN67x281Q+uqzKavNnphltOUWIozEg21mIuKEwHmbFb6 kwIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/yUl8wgXqwILVz-AcSxnj7nZZr9g
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 18:07:37 -0000

Hello all,

I agree with Ulrich proposal.
Best regards
/MCruz

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Wiehe, Ulrich (NSN -=
 DE/Munich)
Sent: jueves, 18 de diciembre de 2014 10:10
To: ext Steve Donovan; ext Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #16

Steve,

I'm still not convinced.

Another proposal:

If diversion abatement treatment is possible (i.e. a different path for the=
 request can be selected where the overloaded node is not part of the diffe=
rent path), then the reacting node SHOULD apply diversion abatement treatme=
nt to the request. Otherwise the reacting node SHOULD apply throttling abat=
ement treatment to the request.=20

Ulrich

-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
Sent: Tuesday, December 16, 2014 3:54 PM
To: Wiehe, Ulrich (NSN - DE/Munich); ext Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #16

Ulrich,

I still think the following statements are sufficient:

    For OLRs of type host, if the request is a host-routed request then the=
 reacting node SHOULD
    apply throttling abatement treatment to the request.

    For OLRs of type host, if the request is a realm-routed request then th=
e reacting node
    SHOULD apply diversion abatement treatment to the request.

    For OLRs of type realm, the reacting node SHOULD
    apply throttling abatement treatment to the request, independent of the=
 type (host-routed or
    realm-routed) of request.

Regards,

Steve

On 12/15/14, 2:42 PM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
> can you please summarize the status of #16. I'm getting lost.
>
> Regards
> Ulrich
>
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]
> Sent: Thursday, December 11, 2014 8:45 PM
> To: Steve Donovan
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #16
>
>
>> On Dec 11, 2014, at 1:36 PM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>
>>
>> On 12/11/14, 1:03 PM, Ben Campbell wrote:
>>>> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>>>
>>>> Ulrich,
>>>>
>>>> I agree with your assumptions below.  For the third one, the only time=
 it is possible, at least from a DOIC perspective, to send to another host =
is if it is a realm-routed request.  I might also change the "not overloade=
d" to "less overloaded".
>>>>
>>>> I do think the statements can be improved to differentiate between beh=
avior for host reports and realm reports.
>>>>
>>>> How about the following:
>>>>     For OLRs of type host, if the request is a host-routed request the=
n the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request.
>>>>
>>>>     For OLRs of type host, If the request is a realm-routed request th=
en the reacting node
>>>>     SHOULD apply diversion abatement treatment to the request.
>>> Personally, I think that should be non-normative. Or if normative, no s=
tronger than MAY. I agree it's a good choice, but I think we can leave it t=
o the market to enforce.
>> If we make it non normative then we probably need an additional statemen=
t along the lines of "the reacting node MUST attempt to reduce traffic by t=
he amount requested in the OLR" if we don't already have it somewhere else =
in the document.
> Agreed
>
>>> I think there when we distinguish request-type, we need to consider _wh=
en_. For example, an agent may _receive_ a realm routed request but _send_ =
a host-routed request. And for a client, that may be even more subtle.
>>>
>>> This really does seem like a case of server selection.
>> I don't think it's that subtle.  If server selection hasn't already happ=
ened for a request and that request is selected for abatement and the reque=
st would have otherwise been routed to an overloaded host then the request =
should/may be diverted to another server.
>>
>> Server selection could have happened as a result of a previous transacti=
on specifying the host for subsequent transactions or by the presence of th=
e Destination-Host in the message when it arrives at an agent.  It could ha=
ve also already happened as a result of configuration.
> In the case of a client, the decision on whether to divert vs just not se=
nd a request may be heavily influenced by the client application.  (Not nec=
essarily the _Diameter_ application.)  In the case of either, a node might =
have local knowledge that a 2nd server can handle everything the first serv=
er can handle. Even if a downstream node performed server selection, a node=
 with such knowledge might override it. We don't necessarily need to talk a=
bout that sort of thing, but we should avoid language that forbids it.
>
>
>>>>     For OLRs of type realm, the reacting node SHOULD
>>>>     apply throttling abatement treatment to the request, independent o=
f the type (host-routed or
>>>>     realm-routed) of request.
>>> Again, I think this should not be normative. In this case this is=20
>>> pretty much a statement of fact--you simply cannot reasonably divert=20
>>> given the way that Diameter routing works. I suppose there might be=20
>>> a case where a node has some magical knowledge that realm2 can=20
>>> handle anything that realm1 can, and could divert to a different=20
>>> realm (which we probably still don't want to forbid.)
>>>
>>>> Regards,
>>>>
>>>> Steve
>>>>
>>>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>> Steve,
>>>>> yes, then, maybe, the definition of Diversion is not correct?
>>>>> What are other people's views?
>>>>>
>>>>> My assumption was:
>>>>> If a host is overloaded, it does not help to direct traffic to that h=
ost via a different path.
>>>>> If a realm is overloaded, it does not help to direct traffic to that =
realm via a different path.
>>>>> If a host is overloaded, it helps to select an alternative (not overl=
oaded) host (if possible) and direct traffic to that host.
>>>>> If a realm is overloaded, there never is an alternative (not overload=
ed) realm to which traffic could be directed.
>>>>>
>>>>> With the current definition of Diversion, Diversion is no appropriate=
 means to address host overload and is no appropriate means to address real=
m overload. It may be ok for agent overload only.
>>>>>
>>>>> Regards
>>>>> Ulrich
>>>>>
>>>>> From: DiME [
>>>>> mailto:dime-bounces@ietf.org
>>>>> ] On Behalf Of ext Steve Donovan
>>>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>>>> To:
>>>>> dime@ietf.org
>>>>>
>>>>> Subject: [Dime] Ulrich's suggested change #16
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> For your suggested change #16:
>>>>> Section 4.2.2, 5th and 6th paragraph:
>>>>> Existing text:
>>>>>     If the request is a host-routed request then the reacting node SH=
OULD
>>>>>     apply throttling abatement treatment to the request.
>>>>>       If the request is a realm-routed request then the reacting node
>>>>>     SHOULD apply diversion abatement treatment to the request.
>>>>>
>>>>> Comment: I don't think so. If the reacting node selects the server=20
>>>>> and then detects that the selected server is overloaded and then=20
>>>>> detects that the request does not survive (i.e. is subject to=20
>>>>> abatement), then the reacting node SHOULD apply diversion treatment (=
i.e. select an alternative server if possible).
>>>>> If the reacting node does not select the server (either a. because=20
>>>>> the server was already selected by a downstream node, or b.=20
>>>>> because the server will be selected by an upstream node) then=20
>>>>> there is no point in applying diversion and the reacting node SHOULD =
apply throttling of requests that do not survive.
>>>>>
>>>>> Proposal: replace the paragraphs with:
>>>>>     If the reacting node does not select the server then it SHOULD ap=
ply
>>>>>     throttling abatement to the request.
>>>>>
>>>>>     If the reacting node selects the server then it SHOULD apply dive=
rsion
>>>>>     abatement treatment (i.e. select an alternative server if possibl=
e) to
>>>>>     the request.
>>>>> Diversion is not selecting an alternative node to handle the request.=
  Diversion is selecting an alternative route to the selected node.
>>>>>
>>>>> Whether it is appropriate to select an alternative node for a request=
 is an application decision that probably changes on a per command-code bas=
is within the application. Logic like this is outside the scope of the DOIC=
 specification.
>>>>>
>>>>> The text is correct based on the definition of diversion.
>>>>>
>>>>> Regards,
>>>>>
>>>>> Steve
>>>>>
>>>>>
>>>> _______________________________________________
>>>> DiME mailing list
>>>> DiME@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dime
>

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Fri Dec 19 10:09:14 2014
Return-Path: <maria.cruz.bartolome@ericsson.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5103A1ACCF9 for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 10:09:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gkn5DlNMLOUW for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 10:09:09 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 020951A8A66 for <dime@ietf.org>; Fri, 19 Dec 2014 10:08:55 -0800 (PST)
X-AuditID: c1b4fb30-f79d66d00000744c-a3-549469b54bae
Received: from ESESSHC015.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 99.C3.29772.5B964945; Fri, 19 Dec 2014 19:08:54 +0100 (CET)
Received: from ESESSMB101.ericsson.se ([169.254.1.101]) by ESESSHC015.ericsson.se ([153.88.183.63]) with mapi id 14.03.0195.001; Fri, 19 Dec 2014 19:08:53 +0100
From: Maria Cruz Bartolome <maria.cruz.bartolome@ericsson.com>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>, "ext Steve Donovan" <srdonovan@usdonovans.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change @12
Thread-Index: AQHQE7ZHD23zRsD0mUyK0fJgC7jhrJyHbHpAgAFIcACAAa52UIAH+zpfgALANtCAAidCsA==
Date: Fri, 19 Dec 2014 18:08:52 +0000
Message-ID: <087A34937E64E74E848732CFF8354B920989507A@ESESSMB101.ericsson.se>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net> <5489A416.2000403@usdonovans.com> <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com> <54904C5A.2070502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235C03@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235C03@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.17]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpgkeLIzCtJLcpLzFFi42KZGfG3Rndb5pQQgy+n2Czmd55mt5jbu4LN YkMTj8W6tyuYHFg8liz5yeQxa+cTFo+f66+ye6x628cawBLFZZOSmpNZllqkb5fAlbHl3EbG gv+mFf8bb7I2MB7V6mLk5JAQMJGYOvcIC4QtJnHh3nq2LkYuDiGBI4wSq/evZoJwljBKfDm1 nhWkik3ATuLS6RdgCRGBPkaJB60fmUASzALKErN3PGAHsYUFDCWOrr4I1iAiYCQx+egaRgg7 TGLqz7Ng9SwCqhKHjs8HWsfBwSvgK7FphzhIWEhgAbPEu/XcIDanQIDE0VMvwa5jBLru+6k1 UKvEJW49mc8EcbWAxJI955khbFGJl4//sYKMlBBQlFjeLwdRriOxYPcnNghbW2LZwtdg5bwC ghInZz5hmcAoNgvJ1FlIWmYhaZmFpGUBI8sqRtHi1OKk3HQjI73Uoszk4uL8PL281JJNjMAo O7jlt8EOxpfPHQ8xCnAwKvHwbpgyOUSINbGsuDL3EKM0B4uSOO/Cc/OChQTSE0tSs1NTC1KL 4otKc1KLDzEycXBKNTB27Mn+2HvVfaN8zR0/r60zDxvEsMsWGcz5neByJnFjRqn3XnUxV6v7 rg2BSqtr7RfyvctuN/7acDa2ZtavD+un/tt9La91yYXY9ZPVWjfG7VG1TNFxfcky3UjBSEwx ZtPJVq/Nm64ucBT/4efJah7/MPj384+zTton3D1j4SNw2SlsisBqk1QlluKMREMt5qLiRABb JsoJkwIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-vk62WY5W01tYutsslBLW1lBY5w
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 18:09:12 -0000

Dear all,

In favor of 2),  unless 3) could be clarified, not clear to me neither.
Thanks
/MCruz

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Wiehe, Ulrich (NSN -=
 DE/Munich)
Sent: jueves, 18 de diciembre de 2014 10:17
To: ext Steve Donovan; Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change @12

Steve, Ben,

I'm in favour of 2).
Actually I do not understand 3) as it talks about overload reports, while t=
he issue is about capability anouncement.

Ulrich

-----Original Message-----
From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
Sent: Tuesday, December 16, 2014 4:15 PM
To: Ben Campbell
Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change @12

Ben,

I see a two or three options here:

1) We add a new attribution AVP and all of the text associated with it. =20
This has obvious schedule implications.

2) We treat this the same way as we treated the issue with multiple sources=
 of OC-OLR AVPs and add text somewhere in the draft saying that if agents a=
re selecting abatement algorithms then care must be taken to make sure that=
 all agents that handle traffic for the same Diameter node must select the =
same algorithm for all transactions involving that Diameter node.

3) Number two plus reacting node behavior statements saying that the reacti=
ng node SHOULD ignore overload reports for a node that has an active OCS if=
 the received overload report is of a different type then stored in the act=
ive OCS.

I vote for number 3.

Regards,

Steve

On 12/11/14, 12:38 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:03 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>
>> Ulrich,
>>
>> I see your concern.  To summarize, if we have the following configuratio=
n:
>>
>>     ----A1----
>>    /          \
>>   C            S
>>    \          /
>>     ----A2----
>>
>> And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 ind=
icates rate then there is ambiguity.
>>
>> I agree, this warrants a warning statement somewhere in the document.
>>
>> If there is general agreement on this then I'll propose wording and loca=
tion.
>>
> What sort of guidance should we give here? IMO, this is a worse problem t=
han for realm reports, or at least having it for both realm and host report=
s makes it considerably worse than before. I think variations on this will =
happen for almost any Diameter network of non-trivial size.
>
> I also think it's reasonable that A1 and A2 might select different algori=
thms towards C. For example, lets say C, A1, and S all support rate, but A2=
 does not. S might select rate towards A1, but loss towards A2.
>
> If we can't handle this, I think the entire solution breaks down.
>
> I propose that the best way to handle this is to add source-attribution i=
nto OLRs, and guidance for what C should do if it gets different capabiliti=
es for the same host or realm from different paths. This _might_ also help =
solve the "different reports for same realm" problem and the "can't tell if=
 an intervening agent supports DOIC" problem.
>
>
>> Steve
>>
>> On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>>  =20
>>> yes, it's about capability announcement, and my concern in with announc=
ing the selected algorithm in answer messages (while no OLRs are sent). Mul=
tiple  agents modifying the selected algorithm in the Supported-Features AV=
Ps in answer messages may  result in ambiguity in DOIC behaviour for downst=
ream DOIC nodes.
>>>  =20
>>> Ulrich
>>>  =20
>>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>>> Sent: Wednesday, December 10, 2014 1:41 PM
>>> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>>> Subject: Re: [Dime] Ulrich's suggested change @12
>>>  =20
>>> Ulrich,
>>>
>>> This paragraph is talking about capability announcement.  We deal with =
the issues related to multiple sources of overload reports already elsewher=
e in the document.
>>>
>>> I still do see the need for a change.
>>>
>>> Steve
>>>
>>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>> Steve,
>>> I agree, my comment and proposal do not hit the mark.
>>>  =20
>>> The intention was to say that known issues exist if there are multiple =
agents on multiple paths between client and server. The agents may not be a=
ble to ensure that there is no ambiguity in DOIC behaviour for the client. =
E.g. from the client's point of view the answer to a first request (which w=
as modified by agent A1) could indicate: DOIC is supported, currenty no ove=
rload, once in overload loss will be selected; and the answer to the next r=
equest (which was modified by agent A2) could indicate: DOIC is supported, =
some?? reduction is requested using rate. The client, however, may not be p=
repared for rate.
>>>  =20
>>> Maybe a warning note could be added to say that the agent may not alway=
s be able to ensure that there is no ambiguity.
>>>  =20
>>> Ulrich
>>>  =20
>>>  =20
>>>  =20
>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve=20
>>> Donovan
>>> Sent: Tuesday, December 09, 2014 2:45 PM
>>> To: dime@ietf.org
>>> Subject: [Dime] Ulrich's suggested change @12
>>>  =20
>>> Ulrich,
>>>
>>> For your suggested change #12:
>>>
>>> Section 4.1.3, last paragraph:
>>> Existing text:
>>>     When making changes to the OC-Supported-Features AVP the Diameter
>>>     Agent needs to ensure that there is no ambiguity in DOIC behavior f=
or
>>>     both upstream and downstream DOIC nodes.
>>>  =20
>>> Comment: while that is true, in addition problems similar to those=20
>>> identified in the note in section 3.3 may result from making changes.
>>>  =20
>>> Proposal: Add the note:
>>>        Note: Known issues exist if multiple sources for overload report=
s
>>>        which apply to the same Diameter entity exist.  Reacting nodes
>>>        have no way of determining the source and, as such, will treat
>>>        them as coming from a single source.  Variance in sequence numbe=
rs
>>>        between the two sources can then cause incorrect overload
>>>        abatement treatment to be applied for indeterminate periods of
>>>        time.
>>> I don't understand how these are related.  The change to the OC-Support=
ed-Features AVP made by the agent apply only to the transaction.  In additi=
on, this paragraph doesn't mention overload reports.
>>>
>>> Regards,
>>>
>>> Steve
>>>
>>>
>>>
>>>  =20
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Fri Dec 19 11:58:40 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D326A1A6FD4 for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 11:58:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RUZagySXtPbX for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 11:58:19 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B7DF1A6FB5 for <dime@ietf.org>; Fri, 19 Dec 2014 11:58:19 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBJJwGM8068248 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Dec 2014 13:58:17 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235CCD@DEMUMBX014.nsn-intra.net>
Date: Fri, 19 Dec 2014 13:58:16 -0600
X-Mao-Original-Outgoing-Id: 440711896.365872-f04a2b4c67eaa4e11322b459a03a83ec
Content-Transfer-Encoding: quoted-printable
Message-Id: <8FB9C2A7-7D61-4D46-9808-AD17DB61B8CE@nostrum.com>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com> <5491F723.6080203@usdonovans.com> <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com> <54920272.80508@usdonovans.com> <52901958-73B6-49FE-8DA4-A8D2F8276DD0@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235CCD@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/D2jY9u0s-d7ddrU49i37VtdB7Nc
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 19:58:25 -0000

Steve and I had an offline discussion, and I think we agree that the =
reporting node can be forced to change algorithms during an active =
overload condition, if it gets a request that doesn't advertise support =
for the active algorithm.

We currently have text forbidding the reporting node from changing =
algorithms during an active overload condition, without making this =
exception. We assume that we still want to otherwise keep the limitation =
on algorithm changes during overload. Here's a concrete proposal:

In 4.1.2:

Old:

For an ongoing overload condition, a reporting node MUST NOT change the =
selected algorithm during the period of time that it is in an overload =
condition and, as a result, is sending OC-OLR AVPs in answer messages.

New:

For an ongoing overload condition, a reporting node MUST NOT initiate a =
change to the selected algorithm during the period of time that it is in =
an overload condition and, as a result, is sending OC-OLR AVPs in answer =
messages. This rule does not affect the case where the =
OC-Supported-Features in a new request matching the OLR does not =
advertise support for the current algorithm, in which case the reporting =
node would be forced to change algorithms. However, this rule does =
constrain the reporting node from changing algorithms simply because the =
reacting node advertises other algorithms in addition to one currently =
in use.

Added text in 4.1.1:

If a reacting node is using an abatement algorithm to abate traffic due =
to an active OLR from a reporting node, the reacting node SHOULD =
continue to advertise support for that algorithm in future requests that =
match the OLR, until the overload condition is terminated.


> On Dec 18, 2014, at 11:46 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> Ben, Steve,
>=20
> Section 4.2.1.2 says:
>   A reporting node SHOULD maintain OCS entries per supported Diameter
>   application, per supported (and eventually selected) Abatement
>   Algorithm and per report-type.
>=20
> For example, an HSS would maintain two OCSs for S6a host-type reports, =
one for loss and one for rate. When receiving a request that advertises =
only loss, the returned OLR would be the one according to the loss-OCS; =
When receiving a request that advertises loss and rate, the HSS has two =
returned OLR would be the one according to the rate-OCS.
>=20
> I don't see a problem when algorithm is changed at the reacting node.
>=20
> Ulrich
>=20
>=20
>=20
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben =
Campbell
> Sent: Wednesday, December 17, 2014 11:39 PM
> To: Steve Donovan
> Cc: dime@ietf.org
> Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
>=20
>=20
>> On Dec 17, 2014, at 4:23 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>=20
>>=20
>> On 12/17/14 3:54 PM, Ben Campbell wrote:
>>>> On Dec 17, 2014, at 3:35 PM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>>=20
>>>>=20
>>>> On 12/17/14 1:00 PM, Ben Campbell wrote:
>>>>>> On Dec 17, 2014, at 12:34 PM, Steve Donovan =
<srdonovan@usdonovans.com> wrote:
>>>>>>=20
>>>>>>> Okay, new picture:
>>>>>>>=20
>>>>>>>=20
>>>>>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan =
<srdonovan@usdonovans.com>
>>>>>>>> wrote:
>>>>>>>>=20
>>>>>>>> Ben,
>>>>>>>>=20
>>>>>>>> The value of the Origin-Host matters greatly here.  In both =
cases, what S needs to know is if there is a reacting node for traffic =
coming from C1 and if there is a reacting node for traffic coming from =
C2.
>>>>>>>>=20
>>>>>>> There is no assumption in the draft right now that we have a =
correlation between reacting nodes and clients. That might be required =
for client-targed OLRs, but we don't have those yet.
>>>>>>>=20
>>>>>>> Consider a different picture. In this case, C never supports =
DOIC. the reacting node role happens either at A1/A2 or at A3, depending =
on which flow you look at.
>>>>>>>=20
>>>>>>>        A1---
>>>>>>>       /         \
>>>>>>> C --             -------A3------S
>>>>>>>       \         /
>>>>>>>         A2---
>>>>>>>=20
>>>>>>> Now, assume the same flows, but substitute A1 for C1, A2, for =
C2, and A3 for A. All requests now have the same origin-host.
>>>>>>>=20
>>>>>>> Before you say this is unrealistic: The issue is the same for =
any situation where one client can send traffic across multiple agents =
to the same destination. It doesn't matter if there is one or a million.
>>>>>>>=20
>>>>>> SRD> Yes, this is nasty.  With attribution S can detect the =
scenario.  I'm not sure what it does once it selects it.  This can be =
addressed to some degree by adding a deployment recommendation that  all =
agents taking on reacting node functionality for a single endpoint  =
select the same algorithm.
>>>>> I think some sort of attribution is the long-term solution. =
Another option might be some sort of DCA state identifier, or a =
combination of the two. (e.g. multiple "virtual" reacting node at the =
same physical node.) The details will be non-trivial to figure out.
>>>>>=20
>>>>> But to close the loop, I think the _short_ term solution is to say =
that, while a reporting node should not _initiate_ a change in =
algorithms during an overload condition, it must still handle the =
situation where the reacting node forces a change. We could go further =
to say that reacting node also should not initiate such a change, but we =
would have to recognize that there are scenarios where that guidance =
cannot be enforced, and the reporting node still has to handle them.
>>>>>=20
>>>>> We might need to think about what it means from an OCS perspective =
for a reporting node to send OLRs with different algorithms (or =
potentially other capability parameters) for the "same" overload event.
>>>> SRD> I think it is a better solution to stay with what we have now. =
 The reporting node MUST NOT change the algorithm during an active =
overload condition.  If a reacting node advertises support for it, the =
reacting node is saying it will support that algorithm for the duration =
of any overload condition that happens prior to the reacting node =
changing the advertised algorithm.  The change in advertised algorithm =
will take effect after the overload condition goes away.
>>>>=20
>>> I disagree. I don't think we want to allow the reporting node to =
ever indicate an algorithm that was not advertised in the request. That =
violates normative language earlier in the section that says the =
selected algorithm MUST be one of the ones advertised in the request. It =
can also cause problems for reacting nodes, where they get OLRs for an =
algorithm they don't understand.
>> SRD> They clearly do understand the algorithm.  They advertised it =
before the overload report started.  We can change the normative =
language to cover this exception.
>=20
> In my first scenario, this is not true. C2 (or A2)  _never_ understood =
the rate algorithm, and never advertised support for it.
>=20
> The whole point of this exercise was to show that the reporting node =
cannot, in the general case, distinguish between multiple reacting nodes =
with different capabilities, and a single reacting node that changes =
capabilities.
>=20
> By "general case", I mean no assumption that the reacting nodes are =
peers with the reporting nodes, and no assumption that you can correlate =
origin-host values (in requests) to reacting-nodes.=20
>=20
>=20
>> I think the principle of minimizing work on an overloaded reporting =
node is the more important principle here.  If the reacting node changes =
the advertised set of algorithms during an active overload condition =
then the overloaded reporting node will be required to send =
end-of-overload OLRs for the previous algorithm and then send =
start-of-overload OLRs for the new algorithm.  This seems complex at a =
time the overloaded node should be focusing on getting out of the =
overload condition.
>=20
> Sending an OLR that the reacting node does not understand will not =
help you get out of overload.
>=20
> I don't see how this is any more complex that if you simply have =
multiple reacting nodes with different capabilities--and I don't see how =
to avoid supporting that case.
>=20
>>>=20
>>> I think that's considerably more important that restricting the =
reporting node from changing algorithms (Which, btw, does no harm with =
the only algorithms that we are seriously contemplating.We speculate =
that it might cause harm for some future algorithm.)
>> SRD> We already have the restriction on the reporting node.
>=20
> We already have both restrictions, and they contradict. I believe the =
_existing_ restriction to not select an algorithm that is not advertised =
in the request is more important than the _existing_ restriction to not =
change algorithms during an overload condition.
>=20
>=20
>>>=20
>>> Remember, this is not just about a single reacting node changing =
it's capabilities, it's also about multiple reacting nodes with =
different capabilities. We can't disallow one without disallowing the =
other.
>> SRD> Multiple reacting nodes with different capabilities is all the =
more reason to hold things constant during an overload condition.
>=20
> I don't follow that. You seem to be pushing towards using the same =
algorithm for all reacting nodes once an overload condition starts. Is =
that your intent?  (Given the possibility that some future reacting node =
will only support "loss", that "same algorithm" would pretty much always =
need to be loss.)
>=20
>> I'm not proposing disallowing reacting nodes from changing the set of =
capabilities, I'm proposing that these changes don't take effect while =
there is an active overload condition.
>=20
> The problem exists even if no reacting node ever changes its =
capabilities.
>=20
>>>=20
>>>=20
>>>> SRD> I don't think we need to update the OCS in this document to =
handle multiple algorithms.  This can be done in the extension drafts.  =
We might want to make it clear, as it appears it isn't already, that a =
reacting node might need to support multiple algorithms at the same =
time.
>>> Do you mean reacting or reporting node in the last sentence? =
Assuming you mean it as written, the problem is not that a reacting node =
may need to support multiple algorithms at the same time. It's that it =
may get OLRs that it cannot act upon because it doesn't support the =
algorithm.
>> SRD> I meant reporting nodes.
>>>=20
>>> If, otoh, you meant reporting node, I don't understand how a =
reporting node can have multiple algorithms for the same overload event, =
without reflecting that possibility in the OCS.
>> SRD> Yes, it will need to be reflected in the OCS.  We don't have =
multiple algorithms now so it isn't needed now.  I'm saying we might =
want to say it might me needed in the future.
>=20
> I'd rather not make each new algorithm redefine the basic structure of =
OCS.
>=20
> But, if you recall, my point was to say we need to _think_ about how =
this impacts OCS, not that we necessarily need to change anything. Are =
you opposed to thinking about it? (And no, I don't think this short =
exchange quite counts as that.)
>=20
>>>=20
>>>=20
>>>=20
>>>>>=20
>>>=20
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Fri Dec 19 13:45:26 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 306C01AC3D0 for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 13:45:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bSpf2nhbvl-S for <dime@ietfa.amsl.com>; Fri, 19 Dec 2014 13:45:22 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17E241A1BD2 for <dime@ietf.org>; Fri, 19 Dec 2014 13:45:22 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBJLjKBk077496 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Dec 2014 15:45:21 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5491AEC7.8070307@usdonovans.com>
Date: Fri, 19 Dec 2014 15:45:20 -0600
X-Mao-Original-Outgoing-Id: 440718320.500968-fbdf0943c954e95a68a21c4564ac6c88
Content-Transfer-Encoding: quoted-printable
Message-Id: <ECEC60E8-3E83-46F6-834D-D5D615660E4E@nostrum.com>
References: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com> <5491AEC7.8070307@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/7M111i30Xk9U3oPVWxtKKv8Q7To
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Dec 2014 21:45:25 -0000

> On Dec 17, 2014, at 10:26 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
>=20
> On 12/16/14, 9:02 PM, Ben Campbell wrote:
>>=20

[...]

>> We keep referring to the DOIC "solution". I think "mechanism" is more =
appropriate. I would think of a DOIC "solution" as a deployment that =
leverages the DOIC "mechanism".
> SRD> I don't see an issue here, as long as we are consistent.

I think we are pretty consistent in saying "solution". I guess that =
seems a bit pretentious to me, but I can live with it.

>>=20
>> We overuse the word Diameter in front of other things. E.g. Diameter =
nodes, Diameter Agents, Diameter clients, Diameter servers, etc. This =
entire draft is about Diameter; we don't have to keep saying it. It =
tends to get awkward when we use it a lot in close proximity.
> SRD> This was done based on feedback from Benoit.  We are being =
explicit.  If there are paragraphs where it is particularly cumbersome, =
please point out those paragraphs and we can try to make them less =
cumbersome.

I'd argue that explicit and redundant are not the same things. (The =
document is pretty explicit that we are talking Diameter.)  But if =
Benoit wants it, I won't complain further, other than to note that RFC =
6733 uses the terms client, agent, and server regularly without =
prefixing them with Diameter.  :-)

[...]

>>=20
>> -- section 2, Realm-Routed Requests: "... does not know the host that =
will service..."
>>=20
>> I suggest: "... does not know which host will service ..."
> SRD> Ok.
>>=20
>> We should also add a comment that it may be possible to apply =
diversion to realm routed requests.
> SRD> Where?

In the realm-routed request definition. (This was a continuation of the =
previous comment.)


>>=20
>> -- section 3, 2nd paragraph:
>>=20
>> Client, servers, and agents should not be capitalized. Should =
"Reporting node" and "Reacting node" be hyphenated?  Consider moving the =
last sentence to the start of the next paragraph.
> SRD> The capitalization of Diameter Clients, Diameter Servers and =
Diameter agents was Benoit's suggestion to make it explicit what is =
being referred to.

RFC 6733 does not generally capitalize client, agent, or server. I agree =
that Diameter is  a proper name, but the other terms are not.=20


>  I don't see the need for hyphenation in this context.

I don't have strong feelings on that one.

>  I'm ok with moving the sentence.
>>=20


>>=20
>> -- section 3.2, paragraph 11: "The DCA mechanism must also allow..."
> SRD> This paragraph looks redundant.  I suggest removing it.

Isn't this the first mention of the feature vector indicating things =
other than algorithms? If so, I'm not sure I agree that it's redundant.

>>=20
>> --> "The DCA mechanism allows..."
>>=20

>>=20
>> Much of this section is redundant to stuff in the parent section. I =
suggest reducing the parent section detail, and keeping it here. (This =
may be true for subsequent children of section 3.)
> SRD> Do you have specific suggestions?

Remove the 2nd to last and 3rd to last paragraph in 3.0.

>>=20
>> -- 3.3, third paragraph:
>>=20
>> s/ , / : /
> SRD> I don't agree.  The commas are there because it is a list.

A colon is the appropriate punctuation to set a list or enumeration off =
from the preceding text. This would be more obvious if the list included =
more than 2 items, so that it would have imbedded commas.  (e.g. "I have =
three things: The first thing, the second thing, and the third thing.")

>>=20
>> -- 3.3, paragraph 4:
>>=20
>> In this overview, I suggest text saying that HOST_REPORT indicates a =
host report, and just using the term "host report" the rest of the time. =
(Same for realm report)
> SRD> Why?

We currently aren't consistent. Sometimes we say "host report", and =
sometimes we say "report of type 'HOST_REPORT'". I suggest we make that =
consistent, and "host report" is the less cumbersome.

[...]

>>=20
>> -- 3.4, para 2: " ... the definition of new report types and the =
definition of new scopes ..."
>>=20
>> Aren't these sort of the same thing? That is, you add new scopes by =
extending report type?
> SRD> Can't you have a how report that applies only to sessions on that =
host?

By adding some new AVP that indicates sessions? I guess so.

>>=20
>> -- 3.4, para 3:
>>=20
>> First two sentences are a bit confusing. A new reader will likely =
think they contradict, without some explanation that OC-Feature-Vector =
is a child of OC-S-F.
> SRD> They seam clear to me.  Do you have a suggested clarification?

"A DOIC node communicates supported features by including them in the =
OC-Feature-Vector AVP, as a sub-AVP of OC-Supported-Features.

>>=20
>> -- 3.4, para 4:
>>=20
>> First sentence has already been stated more than once. No need to =
repeat here.
> SRD> The first sentence is there to provide context for the second =
sentence.

That can be done less redundantly. For example:

"Overload reports can be also extended by adding new sub-AVPs to the =
OC-OLR AVP, allowing ..."


>>=20
>> -- 4.1.2, para 2:
>>=20
>> It's probably worth reiterating that the reacting node may not be the =
server, and this requirement may mean inserting AVPS into answers that =
came from upstream.
> SRD> I don't see the need.  Do you have suggested wording?

Nevermind. I think 4.1.3 handles this.
>>=20
>> -- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:
>>=20
>> This is also true if it needs to announce some other feature that =
needs to be indicated.
> SRD> This paragraph is talking specifically about algorithms and is =
needed because the AVP is optional.  Are you suggesting another =
sentence, another paragraph?  I'm guessing that the case you talk about =
is already covered elsewhere.

We say this in 4.1.1 on reacting node behavior. We should make the same =
statement for reporting node behavior. This is the definitive section on =
reporting node behavior. If it's repeated elsewhere, we should consider =
whether _that_ text is redundant.

>>=20
>> -- 4.1.3, para 3: "... Agent MUST include OC-Supported-Features in =
request messages it receives..."
>>=20
>> I suspect this should say "... requests that it _forwards_" or =
"_relays_".
> SRD> To differentiate between the requests that it rejects.

Or requests that it normally wouldn't relay. (e.g. watchdogs, =
capabilities exchange, etc.)

>  Ok, I think relays is the better word.

Ok.

>>=20
>> -- 4.1.3, para 5 and 6:
>>=20
>> Is the reporting node section limited to endpoints? If not, the these =
paragraphs effectively restate normative language about reporting node =
behavior from that section. Once we've said what a reporting node =
normatively has to do, we should just be able to say that an agent =
acting as a reporting node has all the responsibilities of a reporting =
node, and not restate the normative requirements.
> SRD> I'm ok with this but it feels like more than an editorial change =
to me.

I don't think it would change the meaning, just the structure. (I _did_ =
mention "structural" in the preface to my comments :-)  )


>>=20
>> -- 4.1.3, para 7:
>>=20
>> The first MAY is a consequence (the complement) of the 2nd MAY. It =
should at least not be 2119 language, and probably can be omitted =
entirely.
> SRD> Do you have suggested wording?

"If a request already has the OC-Supported-Features AVP, a Diameter =
agent MAY modify it to reflect the features appropriate for the =
transaction."

Any MAY has an an implied "MIGHT NOT". But if we think it's not clear, =
we can tack on "Otherwise, the agent relays the OC-Supported-Features =
AVP without change."

>>=20
>> -- 4.1.3, para 9, last sentence:
>>=20
>> Does this mean an agent can only change OC-S-F in an answer if it =
changed it in the request? I don't think we want that restriction, but =
the context and "as such," seem to scope the MAY to that situation.
> SRD> I don't read it that way.  The first sentence is describing one =
reason why an agent might change OC-S-F.  It doesn't say it is the only =
reason.

I read "as such" to make the second sentence dependent on the first. If =
we want to make them equal, I suggest removing the "as such".

>>=20
>> -- 4.1.3, para 9: "ambiguity"
>>=20
>> I'm not sure that's is the word we want here. An agent could muck =
things up without being ambiguous. Perhaps "inconsistency"?
> SRD> The point is that the reacting nodes and reporting nodes must =
unambiguously know what to do.  I think ambiguous is the right word.

I can construct behavior that is not ambiguous to upstream or downstream =
nodes, but still breaks normative requirements. How about " ... ensure =
that it does not introduce incorrect behavior for either the upstream or =
downstream DOIC nodes."

>>=20
>> -- 4.2.1.1, para 1:
>>=20
>> Do I understand correctly that the reacting node only keeps OCS for =
those combinations that it has actually received an OLR for? If so, =
that's not clear from the wording.
> SRD> Do you have suggested wording?

It depends. Does a reacting node keep OCS when it hasn't received an =
OLR?

If no:

"A reacting node SHOULD maintain the following OCS for each active OLR =
it receives per Diameter application..."

if yes:

Then I think the section needs some more thought to distinguish between =
what is stored for OLRs, vs when no OLR is received.

Also, I think the preface to the second bullet list seems wrong. I don't =
see how you could make an implementation work right without at least =
keeping sequence number and expiration time, at least when you have an =
active OLR.



>>=20
>> -- 4.2.1.2, para 1:
>>=20
>> Likewise, the reporting node only keeps OCS for actual overload =
conditions where it sends OLRs?
> SRD> Do you have suggested wording?
>>=20

This seems dependent on the same question as for the last comment. But =
assuming it only has to keep state of actual OLRs:

"A reporting node SHOULD maintain OCS entries for each OLR it sends, per =
..."

>> -- 4.2.1.3, para 2:
>>=20
>> Should this combination include origin-host or origin-realm? App-Id?
> SRD> I don't understand this.

Ah, I misread the paragraph. But I think we are really talking about the =
algorithm, OC-OLR AVP, and other AVPs in the answer that are needed to =
understand the OLR. (e.g. Origin-Host, Origin-Realm, Application)

[...]

>>=20
>> -- 4.2.1.3, 3rd para from end: "... update the OCS entry as being =
expired."
>>=20
>> I suggest language like " invalid" or "terminated". I take "expired" =
to mean "naturally expired", which is different from the case described =
here. There may be subtle behavior difference. (For example, a reacting =
node might choose to log "expirations" differently than "explicit =
terminations".)
> SRD> For the context of this specification I think expired works.  =
Implementations can differentiate types of expired if they have a =
reason.  Nothing here prevents that.

Ok.

[...]

>>=20
>> -- 4.2.2, 2nd to last para:
>>=20
>>  I think we need something a bit stronger here. The endpoint needs to =
take some action that makes sense for the application. The details of =
that are beyond our scope, but the general need is not.
> SRD> We cannot enforce application behavior in a Diameter =
specification.   I don't see the need for anything more .  Do you have =
suggested wording?

Diameter endpoints that throttle requests [ MUST /need to ] do so =
according to the rules of the client application. Those rules will vary =
by application, and are beyond the scope of this document.


>> -- 4.2.3, para 2:
>>=20
>> Doesn't this also need to match the scope for the request type? E.g. =
Destination realm or destination host? For example, a host report for =
host A would not match OCS for host B, even though both had the same =
report type and application id.
> SRD> I guess this matters when an agent is the reporting node.
>>=20

I think it matters the same if the reporting node is an endpoint. For =
example, would you consider a host-routed-request with D-H: "foo" to =
match an host report for host "bar"?  (I'm on the fence here whether =
that is correct behavior, but I think the behavior should be the same =
for endpoints and agents.)

Actually, on reflection, how does this affect the scenario of an agent =
that passes through a host report and generates a realm report? Or a =
server that generates both?

>> -- 4.2.3, last para:
>>=20
>> An example of what we have in mind could be helpful here.
> SRD> I'm open to suggested wording...
>>=20

Add "For example, it might wait some period of time after overload ends =
before terminating the OLR, or it might send a series of OLRs indicating =
progressively less overload severity."

>>=20
>> -- 4.3, para 4:
>>=20
>> We should clarify that this is talking about mandatory to understand =
for DOIC, but not for the enclosing transaction.
> SRD> i'm not clear on what you are suggesting.

We need to be clear that receiving a DOIC avp with a mandatory AVP that =
you don't understand means you ignore the DOIC AVPs, but does not cause =
the Diameter transaction to fail. Or was it your intent to allow an =
application to say that if you get a DOIC avp that you can't process, =
you have to fail the Diameter transaction?

>  Do you have suggested wording?

Depends on the answer to the question above.

[...]


>>=20
>> -- 5.1, para 4:
>>=20
>> Convoluted paragraph. How about "How about "reporting nodes request =
the stateless reduction of the number of requests by an indicated =
percentage."
> SRD> Ok.
>>=20
>> We should also clarify that this reduction is in comparison to what =
the reacting node otherwise would have sent, rather than what it may =
have previously sent.
> SRD> Isn't this already covered?  Do you have suggested wording?

I don't see where we say it in the definition of "loss". It's implied by =
the example logic, but I think it needs to be more explicit. How about =
adding the following sentence:

"This percentage reduction is in comparison to the number of messages =
the node otherwise would send, regardless of how many requests the node =
might have sent in the past."


>>=20
>> -- para 6, last paragraph
>>=20
>> Paragraph is off topic for section. It probably belongs in the =
extensibility section, or at least somewhere other than here.
> SRD> Do you mean section 6? This isn't about extensibility but about =
how Diameter applications integrate DOIC.

Agreed that it is probably not about extensibility. But it's not about =
AVP definitions, either.

>  It probably belongs in the intro or overview sections.

Agreed. I'd suggest the intro.



>>=20
>> -- 6.2:
>>=20
>> Why did the AVP code jump to TBD6? (Also seems out of order in the =
table.)
> SRD> Historical reasons.  Doesn't matter, the real values will be =
filled in eventually.
>>=20

IANA will probably allocate them in order of TBDX numbers. I'd suggest =
reordering them (here and in the table) to keep child AVP definitions =
with their parent definition.



From nobody Mon Dec 22 05:14:38 2014
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 506FB1A03A8 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 05:14:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c9yCBjNCu8_h for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 05:14:35 -0800 (PST)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 117151A8BC4 for <dime@ietf.org>; Mon, 22 Dec 2014 05:14:32 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
To: dime@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 5.9.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20141222131432.16903.66371.idtracker@ietfa.amsl.com>
Date: Mon, 22 Dec 2014 05:14:32 -0800
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/-bhFSRl21Pyt5dQNPfC0XBfsyyw
Subject: [Dime] Milestones changed for dime WG
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 13:14:37 -0000

Changed milestone "Submit a document on 'Diameter Load Information' as
a working group item", set state to active from review, accepting new
milestone.

Changed milestone "Submit I-D 'Diameter Load Information' to the IESG
for consideration as a Proposed Standard", set state to active from
review, accepting new milestone.

URL: http://datatracker.ietf.org/wg/dime/charter/


From nobody Mon Dec 22 05:26:25 2014
Return-Path: <bclaise@cisco.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87AD61A03AB for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 05:26:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hsp_Tq-Tzxc0 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 05:26:22 -0800 (PST)
Received: from bgl-iport-2.cisco.com (bgl-iport-2.cisco.com [72.163.197.26]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78D781A03A8 for <dime@ietf.org>; Mon, 22 Dec 2014 05:26:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=802; q=dns/txt; s=iport; t=1419254781; x=1420464381; h=message-id:date:from:mime-version:to:subject:references: in-reply-to:content-transfer-encoding; bh=iefCchoR7xH8RDAMIUWbt4YHH/m1KGqkb1rzkw+cRqs=; b=TI9THbsMelJ7fx+s/AhUArSuCfaCj25qILKxtz9SSgLAGST+kbjNEXbG 8uAedQzQMu6d3nugAEdO4x58w+ZxdwQx0JNndc1GapdlDzsEc9yVzC+av 6iZQX4VtXdghp+NUS6WGv5xvUjtZFQdQs8uxn/XNlFDWTVhYxLUuX2ogv g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Au4EAAobmFRIo8UY/2dsb2JhbABbg1hYxj0KhXACgTABAQEBAX2EDQEBBAEBATU2ChELIQwKDwkDAgECARUwBgEMBgIBARCIGA3POAEBAQEBAQEBAQEBAQEBAQEBAQEBFASPeQqEHwEElwOGA4tIIoNvPTGCQwEBAQ
X-IronPort-AV: E=Sophos;i="5.07,624,1413244800"; d="scan'208";a="48674323"
Received: from vla196-nat.cisco.com (HELO bgl-core-3.cisco.com) ([72.163.197.24]) by bgl-iport-2.cisco.com with ESMTP; 22 Dec 2014 13:26:16 +0000
Received: from [10.60.67.84] (ams-bclaise-8913.cisco.com [10.60.67.84]) by bgl-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id sBMDQ773027086; Mon, 22 Dec 2014 13:26:14 GMT
Message-ID: <54981BEF.7040706@cisco.com>
Date: Mon, 22 Dec 2014 14:26:07 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.7.0
MIME-Version: 1.0
To: Jouni <jouni.nospam@gmail.com>, "dime@ietf.org list" <dime@ietf.org>
References: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
In-Reply-To: <AED052B2-4DAB-47B0-B3C9-FB04E8D04444@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/cKC8366jK7UwxxJtC4ILF1rAhOc
Subject: Re: [Dime] early IANA assignments for DOIC
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 13:26:23 -0000

Dear all,

I see many comments on DOIC, part of the WG last call.
I propose to finalize the formal request as soon as the WGLC comments 
are taken into account.

Regards, Benoit
> Folks,
>
> During the last meeting we had discussion on early IANA assignment of AVP codes for the DOIC. The actual process for that is now BCPed in RFC7120. So far we have one request, which hardly meets the criteria of the "sufficient interest in the community". Are there others (Steve is noted in the Honolulu meeting minutes) who would like to see the IANA process started already ahead of time before the I-D leaves the WG or around that time?.
>
> - Jouni & Lionel
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Mon Dec 22 06:12:32 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A4DA1A8F45 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 06:12:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.779
X-Spam-Level: 
X-Spam-Status: No, score=0.779 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, HTML_MESSAGE=0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b5IpJQHJhftE for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 06:12:29 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 099751A883C for <dime@ietf.org>; Mon, 22 Dec 2014 06:12:29 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64427 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y33ii-0000RA-Gz; Mon, 22 Dec 2014 06:12:26 -0800
Message-ID: <549826C8.1090809@usdonovans.com>
Date: Mon, 22 Dec 2014 08:12:24 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  Ben Campbell <ben@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net>
Content-Type: multipart/alternative; boundary="------------090602050901080206090402"
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/i0XVfbDNsODdaPktfxTx4oj4Z_Q
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 14:12:31 -0000

This is a multi-part message in MIME format.
--------------090602050901080206090402
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit

I have added the following statements:

    When receiving an answer message with multiple OLRs and multiple of
    the OLRs are of the same supported report types, a reporting node
    SHOULD ignore the duplicated OLRs.

    A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP
    that contains an unrecognized value.

Regards,

Steve

On 12/17/14 2:49 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Yes please.
>
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Tuesday, December 16, 2014 3:51 PM
> To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
> Cc: dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
>
> I'll delete the paragraph.
>
> Do we need explicit statements for the two conditions below?
>
> Steve
>
>
> On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve, Ben,
>>
>> I'm fine with deleting the paragraph.
>> But for my clarification please confirm that ignoring the complete set of OLRs is allowed when one of these OLRs contains a report type that was not advertized, or two of the OLRs contain the same report type.
>>
>> Regards
>> Ulrich
>>
>>
>>
>> -----Original Message-----
>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>> Sent: Thursday, December 11, 2014 8:26 PM
>> To: Ben Campbell
>> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change #15
>>
>>
>> On 12/11/14, 12:51 PM, Ben Campbell wrote:
>>>> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>
>>>> I thought this paragraph was covering unrecognized values for all AVPs.
>>> I agree that's what it covered. But I think we failed to cover the unrecognized AVP case. If we don't have anything to say beyond what 6733 says, then it might not be strictly necessary, but it might still be worth saying that "unrecognized sub-AVPs are treated as per RFC6733".
>> That is probably worth saying.
>>>>     Maybe it is better to remove the paragraph entirely and make sure that the definition of each AVP addresses what is done with unrecognized values.
>>> Possibly. There are AVPs where there's no such thing as an unrecognized value. There may be AVPs where the allowed values vary by algorithm. If we do take that route, we probably need language here that says unrecognized values are handled as described by the AVP definition or the algorithm.
>> Agreed.
>>>> Steve
>>>>
>>>> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>>>>>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>>>
>>>>>> Ulrich,
>>>>>>
>>>>>> Actually, the wording you suggested wasn't quite right.  It should be:
>>>>>>
>>>>>>      When receiving an OC-OLR AVP with unknown values, the overload report
>>>>>>      SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>>>      be logged.
>>>>>>
>>>>>> It's not just about report type values but unknown values for any of the AVPs in the OLR.
>>>>>>
>>>>>> This seems like a good requirement to include in the specification to ensure common behavior in reacting nodes.  I don't feel strongly about this but I would like to hear other opinions.
>>>>> I think this is still not quite complete.
>>>>>
>>>>> If you receive a sub-AVP that you don't understand, then you should ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a value you don't understand, the behavior should be AVP specific. For Report-Type, that means ignore the whole OLR.
>>>>>
>>>>> It's not clear to me whether the original text was about arbitrary avps, or Report-Type.
>>>>>
>>>>>> Steve
>>>>>>
>>>>>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>>>> Hi Steve,
>>>>>>>
>>>>>>> I think it was pointed out by Ben that we do not specify behaviour of a node for cases where it detects that another node is breaking the rule.
>>>>>>> The rule is:
>>>>>>>       A reporting node MUST NOT send overload reports of a type that has
>>>>>>>       not been advertised as supported by the reacting node.
>>>>>>> See section 4.2.3.
>>>>>>>
>>>>>>> Regards
>>>>>>> Ulrich
>>>>>>>
>>>>>>>      From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>>>>>> Sent: Tuesday, December 09, 2014 2:52 PM
>>>>>>> To: dime@ietf.org
>>>>>>> Subject: [Dime] Ulrich's suggested change #15
>>>>>>>
>>>>>>> Ulrich,
>>>>>>>
>>>>>>> For your suggested change #15:
>>>>>>> Section 4.2.1.3, 4th paragraph:
>>>>>>> Existing text:
>>>>>>>       When receiving an OC-OLR AVPs with unknown values, a reacting node
>>>>>>>       SHOULD be silently discarded by reacting nodes and the event SHOULD
>>>>>>>       be logged.
>>>>>>> Comment: text is confusing. Maybe the intention was to say:
>>>>>>>       When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
>>>>>>>       SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>>>>>>       be logged.
>>>>>>> But even that is not correct.
>>>>>>> Proposal: Remove the paragraph.
>>>>>>> The intent was that an OC-OLR that contains unknown values should be discarded.  I agree that the wording needs to be changes as you suggested.  I don't agree with removing the paragraph.  Can you elaborate on why you think it is not correct when changed as you suggested?
>>>>>>>
>>>>>>> Regards,
>>>>>>>
>>>>>>> Steve
>>>>>>>
>>>>>> _______________________________________________
>>>>>> DiME mailing list
>>>>>> DiME@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/dime
>


--------------090602050901080206090402
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    I have added the following statements:<br>
    <br>
    <meta http-equiv="content-type" content="text/html;
      charset=windows-1252">
    <pre>   When receiving an answer message with multiple OLRs and multiple of
   the OLRs are of the same supported report types, a reporting node
   SHOULD ignore the duplicated OLRs.

   A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP
   that contains an unrecognized value.
</pre>
    Regards,<br>
    <br>
    Steve<br>
    <br>
    <div class="moz-cite-prefix">On 12/17/14 2:49 AM, Wiehe, Ulrich (NSN
      - DE/Munich) wrote:<br>
    </div>
    <blockquote
cite="mid:5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net"
      type="cite">
      <pre wrap="">Yes please.

-----Original Message-----
From: ext Steve Donovan [<a class="moz-txt-link-freetext" href="mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>] 
Sent: Tuesday, December 16, 2014 3:51 PM
To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
Cc: <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a>
Subject: Re: [Dime] Ulrich's suggested change #15

I'll delete the paragraph.

Do we need explicit statements for the two conditions below?

Steve


On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
</pre>
      <blockquote type="cite">
        <pre wrap="">Steve, Ben,

I'm fine with deleting the paragraph.
But for my clarification please confirm that ignoring the complete set of OLRs is allowed when one of these OLRs contains a report type that was not advertized, or two of the OLRs contain the same report type.

Regards
Ulrich



-----Original Message-----
From: ext Steve Donovan [<a class="moz-txt-link-freetext" href="mailto:srdonovan@usdonovans.com">mailto:srdonovan@usdonovans.com</a>]
Sent: Thursday, December 11, 2014 8:26 PM
To: Ben Campbell
Cc: Wiehe, Ulrich (NSN - DE/Munich); <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a>
Subject: Re: [Dime] Ulrich's suggested change #15


On 12/11/14, 12:51 PM, Ben Campbell wrote:
</pre>
        <blockquote type="cite">
          <blockquote type="cite">
            <pre wrap="">On Dec 11, 2014, at 8:05 AM, Steve Donovan <a class="moz-txt-link-rfc2396E" href="mailto:srdonovan@usdonovans.com">&lt;srdonovan@usdonovans.com&gt;</a> wrote:

I thought this paragraph was covering unrecognized values for all AVPs.
</pre>
          </blockquote>
          <pre wrap="">I agree that's what it covered. But I think we failed to cover the unrecognized AVP case. If we don't have anything to say beyond what 6733 says, then it might not be strictly necessary, but it might still be worth saying that "unrecognized sub-AVPs are treated as per RFC6733".
</pre>
        </blockquote>
        <pre wrap="">That is probably worth saying.
</pre>
        <blockquote type="cite">
          <blockquote type="cite">
            <pre wrap="">   Maybe it is better to remove the paragraph entirely and make sure that the definition of each AVP addresses what is done with unrecognized values.
</pre>
          </blockquote>
          <pre wrap="">Possibly. There are AVPs where there's no such thing as an unrecognized value. There may be AVPs where the allowed values vary by algorithm. If we do take that route, we probably need language here that says unrecognized values are handled as described by the AVP definition or the algorithm.
</pre>
        </blockquote>
        <pre wrap="">Agreed.
</pre>
        <blockquote type="cite">
          <blockquote type="cite">
            <pre wrap="">Steve

On 12/10/14, 5:26 PM, Ben Campbell wrote:
</pre>
            <blockquote type="cite">
              <blockquote type="cite">
                <pre wrap="">On Dec 10, 2014, at 6:48 AM, Steve Donovan <a class="moz-txt-link-rfc2396E" href="mailto:srdonovan@usdonovans.com">&lt;srdonovan@usdonovans.com&gt;</a> wrote:

Ulrich,

Actually, the wording you suggested wasn't quite right.  It should be:

    When receiving an OC-OLR AVP with unknown values, the overload report
    SHOULD be silently discarded by reacting nodes and the event SHOULD
    be logged.

It's not just about report type values but unknown values for any of the AVPs in the OLR.

This seems like a good requirement to include in the specification to ensure common behavior in reacting nodes.  I don't feel strongly about this but I would like to hear other opinions.
</pre>
              </blockquote>
              <pre wrap="">I think this is still not quite complete.

If you receive a sub-AVP that you don't understand, then you should ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a value you don't understand, the behavior should be AVP specific. For Report-Type, that means ignore the whole OLR.

It's not clear to me whether the original text was about arbitrary avps, or Report-Type.

</pre>
              <blockquote type="cite">
                <pre wrap="">Steve

On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
</pre>
                <blockquote type="cite">
                  <pre wrap="">Hi Steve,

I think it was pointed out by Ben that we do not specify behaviour of a node for cases where it detects that another node is breaking the rule.
The rule is:
     A reporting node MUST NOT send overload reports of a type that has
     not been advertised as supported by the reacting node.
See section 4.2.3.

Regards
Ulrich

    From: DiME [<a class="moz-txt-link-freetext" href="mailto:dime-bounces@ietf.org">mailto:dime-bounces@ietf.org</a>] On Behalf Of ext Steve Donovan
Sent: Tuesday, December 09, 2014 2:52 PM
To: <a class="moz-txt-link-abbreviated" href="mailto:dime@ietf.org">dime@ietf.org</a>
Subject: [Dime] Ulrich's suggested change #15

Ulrich,

For your suggested change #15:
Section 4.2.1.3, 4th paragraph:
Existing text:
     When receiving an OC-OLR AVPs with unknown values, a reacting node
     SHOULD be silently discarded by reacting nodes and the event SHOULD
     be logged.
Comment: text is confusing. Maybe the intention was to say:
     When receiving an OC-OLR AVPs with an unsupported report type value, a reacting node
     SHOULD silently discarded the OC-OLR AVP and the event SHOULD
     be logged.
But even that is not correct.
Proposal: Remove the paragraph.
The intent was that an OC-OLR that contains unknown values should be discarded.  I agree that the wording needs to be changes as you suggested.  I don't agree with removing the paragraph.  Can you elaborate on why you think it is not correct when changed as you suggested?

Regards,

Steve

</pre>
                </blockquote>
                <pre wrap="">_______________________________________________
DiME mailing list
<a class="moz-txt-link-abbreviated" href="mailto:DiME@ietf.org">DiME@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/dime">https://www.ietf.org/mailman/listinfo/dime</a>
</pre>
              </blockquote>
            </blockquote>
          </blockquote>
        </blockquote>
        <pre wrap="">
</pre>
      </blockquote>
      <pre wrap="">

</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------090602050901080206090402--


From nobody Mon Dec 22 06:30:06 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 816E41A8FD2 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 06:30:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.279
X-Spam-Level: 
X-Spam-Status: No, score=0.279 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id puVxaZrdXq-j for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 06:30:02 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C203B1A8F4D for <dime@ietf.org>; Mon, 22 Dec 2014 06:30:02 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64440 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y33zg-000871-JX; Mon, 22 Dec 2014 06:30:00 -0800
Message-ID: <54982AE4.2070705@usdonovans.com>
Date: Mon, 22 Dec 2014 08:29:56 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  ext Ben Campbell <ben@nostrum.com>
References: <548701E1.3060502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235234@DEMUMBX014.nsn-intra.net> <54884556.90108@usdonovans.com> <9B6C0FB1-B3D5-4050-B79D-E429A440CE79@nostrum.com> <5489F246.5040801@usdonovans.com> <8D4FC2F7-30F8-41AF-9F19-209BB48FCB9D@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D9000668152359A7@DEMUMBX014.nsn-intra.net> <549047A0.4060503@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235BEF@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235BEF@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/oEuh3_F-nvnd0F36grhnpIiToSI
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #16
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 14:30:04 -0000

I've made this change.  It will be in the next version of -06 that 
should come out today.

Steve

On 12/18/14 3:09 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve,
>
> I'm still not convinced.
>
> Another proposal:
>
> If diversion abatement treatment is possible (i.e. a different path for the request can be selected where the overloaded node is not part of the different path), then the reacting node SHOULD apply diversion abatement treatment to the request. Otherwise the reacting node SHOULD apply throttling abatement treatment to the request.
>
> Ulrich
>
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Tuesday, December 16, 2014 3:54 PM
> To: Wiehe, Ulrich (NSN - DE/Munich); ext Ben Campbell
> Cc: dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #16
>
> Ulrich,
>
> I still think the following statements are sufficient:
>
>      For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
>      apply throttling abatement treatment to the request.
>
>      For OLRs of type host, if the request is a realm-routed request then the reacting node
>      SHOULD apply diversion abatement treatment to the request.
>
>      For OLRs of type realm, the reacting node SHOULD
>      apply throttling abatement treatment to the request, independent of the type (host-routed or
>      realm-routed) of request.
>
> Regards,
>
> Steve
>
> On 12/15/14, 2:42 PM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve,
>> can you please summarize the status of #16. I'm getting lost.
>>
>> Regards
>> Ulrich
>>
>> -----Original Message-----
>> From: ext Ben Campbell [mailto:ben@nostrum.com]
>> Sent: Thursday, December 11, 2014 8:45 PM
>> To: Steve Donovan
>> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change #16
>>
>>
>>> On Dec 11, 2014, at 1:36 PM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>
>>>
>>> On 12/11/14, 1:03 PM, Ben Campbell wrote:
>>>>> On Dec 10, 2014, at 7:06 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>>>
>>>>> Ulrich,
>>>>>
>>>>> I agree with your assumptions below.  For the third one, the only time it is possible, at least from a DOIC perspective, to send to another host is if it is a realm-routed request.  I might also change the "not overloaded" to "less overloaded".
>>>>>
>>>>> I do think the statements can be improved to differentiate between behavior for host reports and realm reports.
>>>>>
>>>>> How about the following:
>>>>>      For OLRs of type host, if the request is a host-routed request then the reacting node SHOULD
>>>>>      apply throttling abatement treatment to the request.
>>>>>
>>>>>      For OLRs of type host, If the request is a realm-routed request then the reacting node
>>>>>      SHOULD apply diversion abatement treatment to the request.
>>>> Personally, I think that should be non-normative. Or if normative, no stronger than MAY. I agree it's a good choice, but I think we can leave it to the market to enforce.
>>> If we make it non normative then we probably need an additional statement along the lines of "the reacting node MUST attempt to reduce traffic by the amount requested in the OLR" if we don't already have it somewhere else in the document.
>> Agreed
>>
>>>> I think there when we distinguish request-type, we need to consider _when_. For example, an agent may _receive_ a realm routed request but _send_ a host-routed request. And for a client, that may be even more subtle.
>>>>
>>>> This really does seem like a case of server selection.
>>> I don't think it's that subtle.  If server selection hasn't already happened for a request and that request is selected for abatement and the request would have otherwise been routed to an overloaded host then the request should/may be diverted to another server.
>>>
>>> Server selection could have happened as a result of a previous transaction specifying the host for subsequent transactions or by the presence of the Destination-Host in the message when it arrives at an agent.  It could have also already happened as a result of configuration.
>> In the case of a client, the decision on whether to divert vs just not send a request may be heavily influenced by the client application.  (Not necessarily the _Diameter_ application.)  In the case of either, a node might have local knowledge that a 2nd server can handle everything the first server can handle. Even if a downstream node performed server selection, a node with such knowledge might override it. We don't necessarily need to talk about that sort of thing, but we should avoid language that forbids it.
>>
>>
>>>>>      For OLRs of type realm, the reacting node SHOULD
>>>>>      apply throttling abatement treatment to the request, independent of the type (host-routed or
>>>>>      realm-routed) of request.
>>>> Again, I think this should not be normative. In this case this is pretty much a statement of fact--you simply cannot reasonably divert given the way that Diameter routing works. I suppose there might be a case where a node has some magical knowledge that realm2 can handle anything that realm1 can, and could divert to a different realm (which we probably still don't want to forbid.)
>>>>
>>>>> Regards,
>>>>>
>>>>> Steve
>>>>>
>>>>> On 12/9/14, 11:29 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>>>> Steve,
>>>>>> yes, then, maybe, the definition of Diversion is not correct?
>>>>>> What are other people's views?
>>>>>>
>>>>>> My assumption was:
>>>>>> If a host is overloaded, it does not help to direct traffic to that host via a different path.
>>>>>> If a realm is overloaded, it does not help to direct traffic to that realm via a different path.
>>>>>> If a host is overloaded, it helps to select an alternative (not overloaded) host (if possible) and direct traffic to that host.
>>>>>> If a realm is overloaded, there never is an alternative (not overloaded) realm to which traffic could be directed.
>>>>>>
>>>>>> With the current definition of Diversion, Diversion is no appropriate means to address host overload and is no appropriate means to address realm overload. It may be ok for agent overload only.
>>>>>>
>>>>>> Regards
>>>>>> Ulrich
>>>>>>
>>>>>> From: DiME [
>>>>>> mailto:dime-bounces@ietf.org
>>>>>> ] On Behalf Of ext Steve Donovan
>>>>>> Sent: Tuesday, December 09, 2014 3:06 PM
>>>>>> To:
>>>>>> dime@ietf.org
>>>>>>
>>>>>> Subject: [Dime] Ulrich's suggested change #16
>>>>>>
>>>>>> Ulrich,
>>>>>>
>>>>>> For your suggested change #16:
>>>>>> Section 4.2.2, 5th and 6th paragraph:
>>>>>> Existing text:
>>>>>>      If the request is a host-routed request then the reacting node SHOULD
>>>>>>      apply throttling abatement treatment to the request.
>>>>>>        If the request is a realm-routed request then the reacting node
>>>>>>      SHOULD apply diversion abatement treatment to the request.
>>>>>>
>>>>>> Comment: I don't think so. If the reacting node selects the server and
>>>>>> then detects that the selected server is overloaded and then detects that
>>>>>> the request does not survive (i.e. is subject to abatement), then the reacting
>>>>>> node SHOULD apply diversion treatment (i.e. select an alternative server if possible).
>>>>>> If the reacting node does not select the server (either a. because the server was
>>>>>> already selected by a downstream node, or b. because the server will be selected
>>>>>> by an upstream node) then there is no point in applying diversion and the reacting
>>>>>> node SHOULD apply throttling of requests that do not survive.
>>>>>>
>>>>>> Proposal: replace the paragraphs with:
>>>>>>      If the reacting node does not select the server then it SHOULD apply
>>>>>>      throttling abatement to the request.
>>>>>>
>>>>>>      If the reacting node selects the server then it SHOULD apply diversion
>>>>>>      abatement treatment (i.e. select an alternative server if possible) to
>>>>>>      the request.
>>>>>> Diversion is not selecting an alternative node to handle the request.  Diversion is selecting an alternative route to the selected node.
>>>>>>
>>>>>> Whether it is appropriate to select an alternative node for a request is an application decision that probably changes on a per command-code basis within the application. Logic like this is outside the scope of the DOIC specification.
>>>>>>
>>>>>> The text is correct based on the definition of diversion.
>>>>>>
>>>>>> Regards,
>>>>>>
>>>>>> Steve
>>>>>>
>>>>>>
>>>>> _______________________________________________
>>>>> DiME mailing list
>>>>> DiME@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Mon Dec 22 06:33:25 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBDB01A8FD4 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 06:33:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.279
X-Spam-Level: 
X-Spam-Status: No, score=0.279 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9tgARC0mXrs7 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 06:33:17 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5FB111A8FD5 for <dime@ietf.org>; Mon, 22 Dec 2014 06:33:17 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64443 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y342q-000C97-6K; Mon, 22 Dec 2014 06:33:16 -0800
Message-ID: <54982BA7.70005@usdonovans.com>
Date: Mon, 22 Dec 2014 08:33:11 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>,  Ben Campbell <ben@nostrum.com>
References: <5486FCBF.4000707@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152351D9@DEMUMBX014.nsn-intra.net> <54883F5C.1060603@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235675@DEMUMBX014.nsn-intra.net> <5489A416.2000403@usdonovans.com> <64AB1BC6-8D34-4DEB-B801-C5C127047C8C@nostrum.com> <54904C5A.2070502@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235C03@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815235C03@DEMUMBX014.nsn-intra.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/YdmksDRHhRHoSu7j4TygW9IfJ2E
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change @12
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 14:33:19 -0000

Number 3 is badly phrased.  It was supposed to be from the reporting 
node perspective.

Either way, I believe this issue is addressed by Ben's proposal in the 
DOIC WGLC: Changing Algorithms thread.

Regards,

Steve

On 12/18/14 3:17 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve, Ben,
>
> I'm in favour of 2).
> Actually I do not understand 3) as it talks about overload reports, while the issue is about capability anouncement.
>
> Ulrich
>
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Tuesday, December 16, 2014 4:15 PM
> To: Ben Campbell
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change @12
>
> Ben,
>
> I see a two or three options here:
>
> 1) We add a new attribution AVP and all of the text associated with it.
> This has obvious schedule implications.
>
> 2) We treat this the same way as we treated the issue with multiple
> sources of OC-OLR AVPs and add text somewhere in the draft saying that
> if agents are selecting abatement algorithms then care must be taken to
> make sure that all agents that handle traffic for the same Diameter node
> must select the same algorithm for all transactions involving that
> Diameter node.
>
> 3) Number two plus reacting node behavior statements saying that the
> reacting node SHOULD ignore overload reports for a node that has an
> active OCS if the received overload report is of a different type then
> stored in the active OCS.
>
> I vote for number 3.
>
> Regards,
>
> Steve
>
> On 12/11/14, 12:38 PM, Ben Campbell wrote:
>>> On Dec 11, 2014, at 8:03 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>
>>> Ulrich,
>>>
>>> I see your concern.  To summarize, if we have the following configuration:
>>>
>>>      ----A1----
>>>     /          \
>>>    C            S
>>>     \          /
>>>      ----A2----
>>>
>>> And A1 indicates loss in in the OC-S-F AVP in answer messages and A2 indicates rate then there is ambiguity.
>>>
>>> I agree, this warrants a warning statement somewhere in the document.
>>>
>>> If there is general agreement on this then I'll propose wording and location.
>>>
>> What sort of guidance should we give here? IMO, this is a worse problem than for realm reports, or at least having it for both realm and host reports makes it considerably worse than before. I think variations on this will happen for almost any Diameter network of non-trivial size.
>>
>> I also think it's reasonable that A1 and A2 might select different algorithms towards C. For example, lets say C, A1, and S all support rate, but A2 does not. S might select rate towards A1, but loss towards A2.
>>
>> If we can't handle this, I think the entire solution breaks down.
>>
>> I propose that the best way to handle this is to add source-attribution into OLRs, and guidance for what C should do if it gets different capabilities for the same host or realm from different paths. This _might_ also help solve the "different reports for same realm" problem and the "can't tell if an intervening agent supports DOIC" problem.
>>
>>
>>> Steve
>>>
>>> On 12/11/14, 7:31 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Steve,
>>>>    
>>>> yes, it's about capability announcement, and my concern in with announcing the selected algorithm in answer messages (while no OLRs are sent). Multiple  agents modifying the selected algorithm in the Supported-Features AVPs in answer messages may  result in ambiguity in DOIC behaviour for downstream DOIC nodes.
>>>>    
>>>> Ulrich
>>>>    
>>>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>>>> Sent: Wednesday, December 10, 2014 1:41 PM
>>>> To: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>>>> Subject: Re: [Dime] Ulrich's suggested change @12
>>>>    
>>>> Ulrich,
>>>>
>>>> This paragraph is talking about capability announcement.  We deal with the issues related to multiple sources of overload reports already elsewhere in the document.
>>>>
>>>> I still do see the need for a change.
>>>>
>>>> Steve
>>>>
>>>> On 12/9/14, 10:46 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>>>> Steve,
>>>> I agree, my comment and proposal do not hit the mark.
>>>>    
>>>> The intention was to say that known issues exist if there are multiple agents on multiple paths between client and server. The agents may not be able to ensure that there is no ambiguity in DOIC behaviour for the client. E.g. from the client's point of view the answer to a first request (which was modified by agent A1) could indicate: DOIC is supported, currenty no overload, once in overload loss will be selected; and the answer to the next request (which was modified by agent A2) could indicate: DOIC is supported, some?? reduction is requested using rate. The client, however, may not be prepared for rate.
>>>>    
>>>> Maybe a warning note could be added to say that the agent may not always be able to ensure that there is no ambiguity.
>>>>    
>>>> Ulrich
>>>>    
>>>>    
>>>>    
>>>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donovan
>>>> Sent: Tuesday, December 09, 2014 2:45 PM
>>>> To: dime@ietf.org
>>>> Subject: [Dime] Ulrich's suggested change @12
>>>>    
>>>> Ulrich,
>>>>
>>>> For your suggested change #12:
>>>>
>>>> Section 4.1.3, last paragraph:
>>>> Existing text:
>>>>      When making changes to the OC-Supported-Features AVP the Diameter
>>>>      Agent needs to ensure that there is no ambiguity in DOIC behavior for
>>>>      both upstream and downstream DOIC nodes.
>>>>    
>>>> Comment: while that is true, in addition problems similar to those
>>>> identified in the note in section 3.3 may result from making changes.
>>>>    
>>>> Proposal: Add the note:
>>>>         Note: Known issues exist if multiple sources for overload reports
>>>>         which apply to the same Diameter entity exist.  Reacting nodes
>>>>         have no way of determining the source and, as such, will treat
>>>>         them as coming from a single source.  Variance in sequence numbers
>>>>         between the two sources can then cause incorrect overload
>>>>         abatement treatment to be applied for indeterminate periods of
>>>>         time.
>>>> I don't understand how these are related.  The change to the OC-Supported-Features AVP made by the agent apply only to the transaction.  In addition, this paragraph doesn't mention overload reports.
>>>>
>>>> Regards,
>>>>
>>>> Steve
>>>>
>>>>
>>>>
>>>>    
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Mon Dec 22 08:56:26 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E7CE1A1A8C for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 08:56:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.579
X-Spam-Level: *
X-Spam-Status: No, score=1.579 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWFOAf-KqyBR for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 08:56:21 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E68C11A0371 for <dime@ietf.org>; Mon, 22 Dec 2014 08:56:21 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64574 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y36HJ-0004mW-H9; Mon, 22 Dec 2014 08:56:20 -0800
Message-ID: <54984D31.5000201@usdonovans.com>
Date: Mon, 22 Dec 2014 10:56:17 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com> <5491AEC7.8070307@usdonovans.com> <ECEC60E8-3E83-46F6-834D-D5D615660E4E@nostrum.com>
In-Reply-To: <ECEC60E8-3E83-46F6-834D-D5D615660E4E@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ZORgTupyiKARSx2Jxpja1u-BTcE
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 16:56:24 -0000

On 12/19/14 3:45 PM, Ben Campbell wrote:
>> On Dec 17, 2014, at 10:26 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>
>>
>> On 12/16/14, 9:02 PM, Ben Campbell wrote:
> [...]
>
>>> We keep referring to the DOIC "solution". I think "mechanism" is more appropriate. I would think of a DOIC "solution" as a deployment that leverages the DOIC "mechanism".
>> SRD> I don't see an issue here, as long as we are consistent.
> I think we are pretty consistent in saying "solution". I guess that seems a bit pretentious to me, but I can live with it.
>
>>> We overuse the word Diameter in front of other things. E.g. Diameter nodes, Diameter Agents, Diameter clients, Diameter servers, etc. This entire draft is about Diameter; we don't have to keep saying it. It tends to get awkward when we use it a lot in close proximity.
>> SRD> This was done based on feedback from Benoit.  We are being explicit.  If there are paragraphs where it is particularly cumbersome, please point out those paragraphs and we can try to make them less cumbersome.
> I'd argue that explicit and redundant are not the same things. (The document is pretty explicit that we are talking Diameter.)  But if Benoit wants it, I won't complain further, other than to note that RFC 6733 uses the terms client, agent, and server regularly without prefixing them with Diameter.  :-)
>
> [...]
>
>>> -- section 2, Realm-Routed Requests: "... does not know the host that will service..."
>>>
>>> I suggest: "... does not know which host will service ..."
>> SRD> Ok.
>>> We should also add a comment that it may be possible to apply diversion to realm routed requests.
>> SRD> Where?
> In the realm-routed request definition. (This was a continuation of the previous comment.)
SRD> I don't see the need.
>
>
>>> -- section 3, 2nd paragraph:
>>>
>>> Client, servers, and agents should not be capitalized. Should "Reporting node" and "Reacting node" be hyphenated?  Consider moving the last sentence to the start of the next paragraph.
>> SRD> The capitalization of Diameter Clients, Diameter Servers and Diameter agents was Benoit's suggestion to make it explicit what is being referred to.
> RFC 6733 does not generally capitalize client, agent, or server. I agree that Diameter is  a proper name, but the other terms are not.
>
>
>>   I don't see the need for hyphenation in this context.
> I don't have strong feelings on that one.
>
>>   I'm ok with moving the sentence.
>
>>> -- section 3.2, paragraph 11: "The DCA mechanism must also allow..."
>> SRD> This paragraph looks redundant.  I suggest removing it.
> Isn't this the first mention of the feature vector indicating things other than algorithms? If so, I'm not sure I agree that it's redundant.
SRD> I moved the paragraph.
>
>>> --> "The DCA mechanism allows..."
>>>
>>> Much of this section is redundant to stuff in the parent section. I suggest reducing the parent section detail, and keeping it here. (This may be true for subsequent children of section 3.)
>> SRD> Do you have specific suggestions?
> Remove the 2nd to last and 3rd to last paragraph in 3.0.
SRD> Done
>
>>> -- 3.3, third paragraph:
>>>
>>> s/ , / : /
>> SRD> I don't agree.  The commas are there because it is a list.
> A colon is the appropriate punctuation to set a list or enumeration off from the preceding text. This would be more obvious if the list included more than 2 items, so that it would have imbedded commas.  (e.g. "I have three things: The first thing, the second thing, and the third thing.")
SRD> I was looking at the wrong paragraph.  I agree with this change.
>
>>> -- 3.3, paragraph 4:
>>>
>>> In this overview, I suggest text saying that HOST_REPORT indicates a host report, and just using the term "host report" the rest of the time. (Same for realm report)
>> SRD> Why?
> We currently aren't consistent. Sometimes we say "host report", and sometimes we say "report of type 'HOST_REPORT'". I suggest we make that consistent, and "host report" is the less cumbersome.
SRD> I still don't see the need.
>
> [...]
>
>>> -- 3.4, para 2: " ... the definition of new report types and the definition of new scopes ..."
>>>
>>> Aren't these sort of the same thing? That is, you add new scopes by extending report type?
>> SRD> Can't you have a how report that applies only to sessions on that host?
> By adding some new AVP that indicates sessions? I guess so.
>
>>> -- 3.4, para 3:
>>>
>>> First two sentences are a bit confusing. A new reader will likely think they contradict, without some explanation that OC-Feature-Vector is a child of OC-S-F.
>> SRD> They seam clear to me.  Do you have a suggested clarification?
> "A DOIC node communicates supported features by including them in the OC-Feature-Vector AVP, as a sub-AVP of OC-Supported-Features.
SRD> Ok.
>
>>> -- 3.4, para 4:
>>>
>>> First sentence has already been stated more than once. No need to repeat here.
>> SRD> The first sentence is there to provide context for the second sentence.
> That can be done less redundantly. For example:
>
> "Overload reports can be also extended by adding new sub-AVPs to the OC-OLR AVP, allowing ..."
SRD> Ok.
>
>
>>> -- 4.1.2, para 2:
>>>
>>> It's probably worth reiterating that the reacting node may not be the server, and this requirement may mean inserting AVPS into answers that came from upstream.
>> SRD> I don't see the need.  Do you have suggested wording?
> Nevermind. I think 4.1.3 handles this.
>>> -- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:
>>>
>>> This is also true if it needs to announce some other feature that needs to be indicated.
>> SRD> This paragraph is talking specifically about algorithms and is needed because the AVP is optional.  Are you suggesting another sentence, another paragraph?  I'm guessing that the case you talk about is already covered elsewhere.
> We say this in 4.1.1 on reacting node behavior. We should make the same statement for reporting node behavior. This is the definitive section on reporting node behavior. If it's repeated elsewhere, we should consider whether _that_ text is redundant.
SRD> Again, this paragraph is dealing specifically with rules around 
which the algorithms supported by the reporting node interact with the 
OC-Features-Vector AVP.  The statement on other features is three 
paragraphs later.
>
>>> -- 4.1.3, para 3: "... Agent MUST include OC-Supported-Features in request messages it receives..."
>>>
>>> I suspect this should say "... requests that it _forwards_" or "_relays_".
>> SRD> To differentiate between the requests that it rejects.
> Or requests that it normally wouldn't relay. (e.g. watchdogs, capabilities exchange, etc.)
>
>>   Ok, I think relays is the better word.
> Ok.
>
>>> -- 4.1.3, para 5 and 6:
>>>
>>> Is the reporting node section limited to endpoints? If not, the these paragraphs effectively restate normative language about reporting node behavior from that section. Once we've said what a reporting node normatively has to do, we should just be able to say that an agent acting as a reporting node has all the responsibilities of a reporting node, and not restate the normative requirements.
>> SRD> I'm ok with this but it feels like more than an editorial change to me.
> I don't think it would change the meaning, just the structure. (I _did_ mention "structural" in the preface to my comments :-)  )
SRD> I have removed the two offending paragraphs.
>
>
>>> -- 4.1.3, para 7:
>>>
>>> The first MAY is a consequence (the complement) of the 2nd MAY. It should at least not be 2119 language, and probably can be omitted entirely.
>> SRD> Do you have suggested wording?
> "If a request already has the OC-Supported-Features AVP, a Diameter agent MAY modify it to reflect the features appropriate for the transaction."
>
> Any MAY has an an implied "MIGHT NOT". But if we think it's not clear, we can tack on "Otherwise, the agent relays the OC-Supported-Features AVP without change."
SRD> Changed, including the Otherwise... sentence.
>
>>> -- 4.1.3, para 9, last sentence:
>>>
>>> Does this mean an agent can only change OC-S-F in an answer if it changed it in the request? I don't think we want that restriction, but the context and "as such," seem to scope the MAY to that situation.
>> SRD> I don't read it that way.  The first sentence is describing one reason why an agent might change OC-S-F.  It doesn't say it is the only reason.
> I read "as such" to make the second sentence dependent on the first. If we want to make them equal, I suggest removing the "as such".
SRD> Ok.
>
>>> -- 4.1.3, para 9: "ambiguity"
>>>
>>> I'm not sure that's is the word we want here. An agent could muck things up without being ambiguous. Perhaps "inconsistency"?
>> SRD> The point is that the reacting nodes and reporting nodes must unambiguously know what to do.  I think ambiguous is the right word.
> I can construct behavior that is not ambiguous to upstream or downstream nodes, but still breaks normative requirements. How about " ... ensure that it does not introduce incorrect behavior for either the upstream or downstream DOIC nodes."
SRD> Ok.
>
>>> -- 4.2.1.1, para 1:
>>>
>>> Do I understand correctly that the reacting node only keeps OCS for those combinations that it has actually received an OLR for? If so, that's not clear from the wording.
>> SRD> Do you have suggested wording?
> It depends. Does a reacting node keep OCS when it hasn't received an OLR?
>
> If no:
>
> "A reacting node SHOULD maintain the following OCS for each active OLR it receives per Diameter application..."
>
> if yes:
>
> Then I think the section needs some more thought to distinguish between what is stored for OLRs, vs when no OLR is received.
>
> Also, I think the preface to the second bullet list seems wrong. I don't see how you could make an implementation work right without at least keeping sequence number and expiration time, at least when you have an active OLR.
>
>
>
>>> -- 4.2.1.2, para 1:
>>>
>>> Likewise, the reporting node only keeps OCS for actual overload conditions where it sends OLRs?
>> SRD> Do you have suggested wording?
> This seems dependent on the same question as for the last comment. But assuming it only has to keep state of actual OLRs:
>
> "A reporting node SHOULD maintain OCS entries for each OLR it sends, per ..."
SRD> I'll start a thread to discuss these two items.
>
>>> -- 4.2.1.3, para 2:
>>>
>>> Should this combination include origin-host or origin-realm? App-Id?
>> SRD> I don't understand this.
> Ah, I misread the paragraph. But I think we are really talking about the algorithm, OC-OLR AVP, and other AVPs in the answer that are needed to understand the OLR. (e.g. Origin-Host, Origin-Realm, Application)
>
> [...]
>
>>> -- 4.2.1.3, 3rd para from end: "... update the OCS entry as being expired."
>>>
>>> I suggest language like " invalid" or "terminated". I take "expired" to mean "naturally expired", which is different from the case described here. There may be subtle behavior difference. (For example, a reacting node might choose to log "expirations" differently than "explicit terminations".)
>> SRD> For the context of this specification I think expired works.  Implementations can differentiate types of expired if they have a reason.  Nothing here prevents that.
> Ok.
>
> [...]
>
>>> -- 4.2.2, 2nd to last para:
>>>
>>>   I think we need something a bit stronger here. The endpoint needs to take some action that makes sense for the application. The details of that are beyond our scope, but the general need is not.
>> SRD> We cannot enforce application behavior in a Diameter specification.   I don't see the need for anything more .  Do you have suggested wording?
> Diameter endpoints that throttle requests [ MUST /need to ] do so according to the rules of the client application. Those rules will vary by application, and are beyond the scope of this document.
SRD> Ok, without the MUST.
>
>
>>> -- 4.2.3, para 2:
>>>
>>> Doesn't this also need to match the scope for the request type? E.g. Destination realm or destination host? For example, a host report for host A would not match OCS for host B, even though both had the same report type and application id.
>> SRD> I guess this matters when an agent is the reporting node.
> I think it matters the same if the reporting node is an endpoint. For example, would you consider a host-routed-request with D-H: "foo" to match an host report for host "bar"?  (I'm on the fence here whether that is correct behavior, but I think the behavior should be the same for endpoints and agents.)
>
> Actually, on reflection, how does this affect the scenario of an agent that passes through a host report and generates a realm report? Or a server that generates both?
SRD> Yes, I believe it does.  I suggest we delete paragraph 2, as the 
criteria for matching an OCS will be report type dependent.
>
>>> -- 4.2.3, last para:
>>>
>>> An example of what we have in mind could be helpful here.
>> SRD> I'm open to suggested wording...
> Add "For example, it might wait some period of time after overload ends before terminating the OLR, or it might send a series of OLRs indicating progressively less overload severity."
SRD> Ok.
>
>>> -- 4.3, para 4:
>>>
>>> We should clarify that this is talking about mandatory to understand for DOIC, but not for the enclosing transaction.
>> SRD> i'm not clear on what you are suggesting.
> We need to be clear that receiving a DOIC avp with a mandatory AVP that you don't understand means you ignore the DOIC AVPs, but does not cause the Diameter transaction to fail. Or was it your intent to allow an application to say that if you get a DOIC avp that you can't process, you have to fail the Diameter transaction?
>
>>   Do you have suggested wording?
> Depends on the answer to the question above.
>
> [...]
SRD> This requires discussion on the list.  I'll start a thread.
>
>
>>> -- 5.1, para 4:
>>>
>>> Convoluted paragraph. How about "How about "reporting nodes request the stateless reduction of the number of requests by an indicated percentage."
>> SRD> Ok.
>>> We should also clarify that this reduction is in comparison to what the reacting node otherwise would have sent, rather than what it may have previously sent.
>> SRD> Isn't this already covered?  Do you have suggested wording?
> I don't see where we say it in the definition of "loss". It's implied by the example logic, but I think it needs to be more explicit. How about adding the following sentence:
>
> "This percentage reduction is in comparison to the number of messages the node otherwise would send, regardless of how many requests the node might have sent in the past."
SRD> Ok.
>
>
>>> -- para 6, last paragraph
>>>
>>> Paragraph is off topic for section. It probably belongs in the extensibility section, or at least somewhere other than here.
>> SRD> Do you mean section 6? This isn't about extensibility but about how Diameter applications integrate DOIC.
> Agreed that it is probably not about extensibility. But it's not about AVP definitions, either.
>
>>   It probably belongs in the intro or overview sections.
> Agreed. I'd suggest the intro.
SRD> Done.
>
>
>
>>> -- 6.2:
>>>
>>> Why did the AVP code jump to TBD6? (Also seems out of order in the table.)
>> SRD> Historical reasons.  Doesn't matter, the real values will be filled in eventually.
> IANA will probably allocate them in order of TBDX numbers. I'd suggest reordering them (here and in the table) to keep child AVP definitions with their parent definition.
SRD> Done.
>
>
>


From nobody Mon Dec 22 08:57:41 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9E861A1A9C for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 08:57:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.579
X-Spam-Level: *
X-Spam-Status: No, score=1.579 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kPHo4bs5SJ9r for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 08:57:38 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A99321A19FE for <dime@ietf.org>; Mon, 22 Dec 2014 08:57:38 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64575 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y36IZ-0006R7-9f for dime@ietf.org; Mon, 22 Dec 2014 08:57:37 -0800
Message-ID: <54984D7E.3010405@usdonovans.com>
Date: Mon, 22 Dec 2014 10:57:34 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/h_510A9Ehh86_gwH291m_dSXFvM
Subject: [Dime] Handling of mandatory sub-avps
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 16:57:39 -0000

All,

The following is an open issue from Ben's suggested editorial changes 
that still needs to be addressed.

Regards,

Steve
>> -- 4.3, para 4:
>>
>> We should clarify that this is talking about mandatory to understand for DOIC, but not for the enclosing transaction.
> SRD> i'm not clear on what you are suggesting.

We need to be clear that receiving a DOIC avp with a mandatory AVP that you don't understand means you ignore the DOIC AVPs, but does not cause the Diameter transaction to fail. Or was it your intent to allow an application to say that if you get a DOIC avp that you can't process, you have to fail the Diameter transaction?

>   Do you have suggested wording?

Depends on the answer to the question above.


From nobody Mon Dec 22 08:57:52 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D9921A1AA3 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 08:57:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.579
X-Spam-Level: *
X-Spam-Status: No, score=1.579 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TpltIePNqRKH for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 08:57:44 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 869B21A1AA2 for <dime@ietf.org>; Mon, 22 Dec 2014 08:57:44 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64576 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y36Ig-0006cM-HR for dime@ietf.org; Mon, 22 Dec 2014 08:57:43 -0800
Message-ID: <54984D85.905@usdonovans.com>
Date: Mon, 22 Dec 2014 10:57:41 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/4S0hpb25XNFz7txvAY5xpsOrmag
Subject: [Dime] OCS handling (from Ben's suggested editorial changes)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 16:57:45 -0000

All,

These are two related items from Ben's suggested editorial changes that 
still need to be resolved.

Regards,

Steve

>> -- 4.2.1.1, para 1:
>>
>> Do I understand correctly that the reacting node only keeps OCS for those combinations that it has actually received an OLR for? If so, that's not clear from the wording.
> SRD> Do you have suggested wording?

It depends. Does a reacting node keep OCS when it hasn't received an OLR?

If no:

"A reacting node SHOULD maintain the following OCS for each active OLR it receives per Diameter application..."

if yes:

Then I think the section needs some more thought to distinguish between what is stored for OLRs, vs when no OLR is received.

Also, I think the preface to the second bullet list seems wrong. I don't see how you could make an implementation work right without at least keeping sequence number and expiration time, at least when you have an active OLR.



>> -- 4.2.1.2, para 1:
>>
>> Likewise, the reporting node only keeps OCS for actual overload conditions where it sends OLRs?
> SRD> Do you have suggested wording?

This seems dependent on the same question as for the last comment. But assuming it only has to keep state of actual OLRs:

"A reporting node SHOULD maintain OCS entries for each OLR it sends, per ..."



From nobody Mon Dec 22 12:24:54 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 531311A6F62 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 12:24:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 66TmtHdm24jL for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 12:24:47 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpida-esg-02.alcatel-lucent.com [135.245.210.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B485A1A6F10 for <dime@ietf.org>; Mon, 22 Dec 2014 12:24:46 -0800 (PST)
Received: from fr712usmtp2.zeu.alcatel-lucent.com (unknown [135.239.2.42]) by Websense Email Security Gateway with ESMTPS id 7A1BEB147720A for <dime@ietf.org>; Mon, 22 Dec 2014 20:24:40 +0000 (GMT)
Received: from FR712WXCHHUB03.zeu.alcatel-lucent.com (fr712wxchhub03.zeu.alcatel-lucent.com [135.239.2.74]) by fr712usmtp2.zeu.alcatel-lucent.com (GMO) with ESMTP id sBMKOiaA028355 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <dime@ietf.org>; Mon, 22 Dec 2014 21:24:44 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR712WXCHHUB03.zeu.alcatel-lucent.com ([135.239.2.74]) with mapi id 14.03.0195.001; Mon, 22 Dec 2014 21:24:44 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: "dime@ietf.org list" <dime@ietf.org>
Thread-Topic: [Dime] DOIC WGLC: Editorial Comments
Thread-Index: AQHQGaX2yBuizEzFP0uz7fxPPCNUpZyT6HGAgAGygDA=
Date: Mon, 22 Dec 2014 20:24:43 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F4240@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com> <5491AEC7.8070307@usdonovans.com>
In-Reply-To: <5491AEC7.8070307@usdonovans.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.38]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/b7Ffi7UTXXifUpbyOi8AhwLbQ3g
Subject: Re: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 20:24:52 -0000

Dear all

Hereafter some comments (with JJ>)on some of the points discussed between B=
en and Steve. They are not essential
=20

-- section 3.1, 3rd paragraph: "Reporting nodes also include overload repor=
ts..."

"Reporting nodes _may_ also include overload reports..."=20
JJ> The "may" is ambiguous as there is a SHOULD in 4.2.3 when an active OCS=
. For my clarification, has a "may" in lower case a different meaning from =
a MAY in upper case. To be only descriptive as with 1st sentence of the par=
agraph : eg " Reporting nodes communicate overload occurrences by sending t=
he OLR AVP in answers (coming from 3.4, para 4".=20

 [...]

-- section 3.3, general:

Much of this section is redundant to stuff in the parent section. (**JJ sec=
tion 3)I suggest reducing the parent section detail, and keeping it here. (=
This may be true for subsequent children of section 3.) (**JJ effectively, =
but may need significant modifications )=20
SRD> Do you have specific suggestions?
Ben> Remove the 2nd to last and 3rd to last paragraph in 3.0.
JJ> OK but in 3.3 to use the text of the removed paragraphs from 3.0 for ho=
st report as well as for realm report

 [...]
=20

-- 4.1.3, para 9: "ambiguity"

I'm not sure that's is the word we want here. An agent could muck things up=
 without being ambiguous. Perhaps "inconsistency"?=20
SRD> The point is that the reacting nodes and reporting nodes must
unambiguously know what to do.  I think ambiguous is the right word

Ben> I can construct behavior that is not ambiguous to upstream or downstre=
am nodes, but still breaks normative requirements. How about " ... ensure t=
hat it does not introduce incorrect behavior for either the upstream or dow=
nstream DOIC nodes."

JJ> as Ben, ambiguity is not so right.=20
A proposal: "When making changes to the OC-Supported-Features or OC-OLR AVP=
s, the Diameter Agent needs to ensure  consistency in its behavior with bot=
h upstream and downstream DOIC nodes".
=09

-- 4.2.1.1, para 1:

Do I understand correctly that the reacting node only keeps OCS for those c=
ombinations that it has actually received an OLR for? If so, that's not cle=
ar from the wording.=20
SRD> Do you have suggested wording?
Ben> It depends. Does a reacting node keep OCS when it hasn't received an O=
LR?

If no:

"A reacting node SHOULD maintain the following OCS for each active OLR it r=
eceives per Diameter application..."

if yes:

Then I think the section needs some more thought to distinguish between wha=
t is stored for OLRs, vs when no OLR is received.

Also, I think the preface to the second bullet list seems wrong. I don't se=
e how you could make an implementation work right without at least keeping =
sequence number and expiration time, at least when you have an active OLR.

JJ>  my point would be to describe in 4.2.1.3 when an OCS is created / dele=
ted (as in 4.2.1.4 for Reporting node which addresses the creation of an OC=
S, deletion should also be added))
About the MAY in the preface to the second bullet list, to a have a SHOULD =
in line with 1st paragraph statement "the A reacting node SHOULD maintain t=
he following OCS..." As it is implementation, there were remarks that vario=
us ways can  address the OCS or equivalent  handling

[...]

-- 4.2.1.3, para 2:

Should this combination include origin-host or origin-realm? App-Id?=20
SRD> I don't understand this.
JJ> not sure we need additional text as it is elsewhere described the match=
ing of an OLR to an OCS

[...]

 -- 4.2.2, 2nd to last para:
=20
I think we need something a bit stronger here. The endpoint needs to take s=
ome action that makes sense for the application. The details of that are be=
yond our scope, but the general need is not.
SRD> We cannot enforce application behavior in a Diameter specification.   =
I don't see the need for anything more .  Do you have suggested wording?

Ben> Diameter endpoints that throttle requests [ MUST /need to ] do so acco=
rding to the rules of the client application. Those rules will vary by appl=
ication, and are beyond the scope of this document.
SRD> Ok, without the MUST

JJ> We have in the same section:.: "The abatement treatment applied depends=
 on the context of the request". We can write "...depends on the applicatio=
n and on the context of the request". Is it not enough?

[...]

-- 4.2.3, para 2:

Doesn't this also need to match the scope for the request type? E.g. Destin=
ation realm or destination host? For example, a host report for host A woul=
d not match OCS for host B, even though both had the same report type and a=
pplication id.=20
SRD> I guess this matters when an agent is the reporting node

Ben> I think it matters the same if the reporting node is an endpoint. For =
example, would you consider a host-routed-request with D-H: "foo" to match =
an host report for host "bar"?  (I'm on the fence here whether that is corr=
ect behavior, but I think the behavior should be the same for endpoints and=
 agents.)

Actually, on reflection, how does this affect the scenario of an agent that=
 passes through a host report and generates a realm report? Or a server tha=
t generates both?

SRD> Yes, I believe it does.  I suggest we delete paragraph 2, as the
criteria for matching an OCS will be report type dependent.

JJ>  here 4.2.3 is for the reporting node behavior. It was discussed a whil=
e ago if the OCS in the reporting node  was per client (so taking into acco=
unt the Origin Host of the request or an  OCS common to all clients, so ind=
ependent of the Origin Host of the request and with the same OLR sent to al=
l clients. The second option (common OCS)  was retained for this draft. The=
 OCS per client would be an option for a further extension.  Si I am OK wit=
h the current wording.

-- 4.2.3, last para:

An example of what we have in mind could be helpful here.
SRD> I'm open to suggested wording...

Ben> Add "For example, it might wait some period of time after overload end=
s before terminating the OLR, or it might send a series of OLRs indicating =
progressively less overload severity."
SRD> Ok

JJ>  Avoiding  oscillation is an important requirement of RFC7068  and this=
 sentence is one in the draft dealing with oscillations.?  A basic oscillat=
ion case is the following one, can we a text (in fact a guidance ) on this/=
 point. There are also som=F9e relma	ted qtement in=20
"e.g a reporting node having requested a strong traffic reduction, then nor=
mally a bit later may observe that it is no more overloaded due to the redu=
ced  traffic received, but it should not immediately send an OLR with a sma=
ll traffic reduction or even terminates the overload condition as this will=
 most probably again result in a strong increase of the incoming traffic as=
 no more reduced, so creating an oscillation."
This point is somewhat also addressed in the two last paragraphs of 5, in t=
he context of the loss algorithm. This oscillation aspect is more general a=
nd so be addressed in this 4.2.3 section

[...]

-- 4.3, para 4:=20
We should clarify that this is talking about mandatory to understand for DO=
IC, but not for the enclosing transaction.

SRD> i'm not clear on what you are suggesting.

Ben> We need to be clear that receiving a DOIC avp with a mandatory AVP tha=
t you don't understand means you ignore the DOIC AVPs, but does not cause t=
he Diameter transaction to fail. Or was it your intent to allow an applicat=
ion to say that if you get a DOIC avp that you can't process, you have to f=
ail the Diameter transaction?

SRD> This requires discussion on the list.  I'll start a thread.

JJ> In OC-Supported-Features AVP sent by reacting node, no bit in the OC-Fe=
ature-Vector is mandatory except the bit for loss algorithm support. Then i=
f there are additional AVPs in the OC-Supported-Features AVP, they can be i=
gnored except if they are related to a particular feature bit in the OC-Fea=
ture-Vector which make this additional AVP mandatory to be supported if the=
 feature is supported by the reporting node.  In any case, the request shou=
ld not fail.
If the OLR AVP contains new AVPs, this will be also related to the correspo=
nding feature bit that, if supported,  may require the new AVP be  mandator=
y in the OLRS sent back by the reporting node.. This will be part of the ne=
w feature description introducing additional AVPs. So I do not think we nee=
d to say more in this draft. This will be in the extension.

[...]

-- 5.1, para 4:

Convoluted paragraph. How about "How about "reporting nodes request the sta=
teless reduction of the number of requests by an indicated percentage."=20
SRD> Ok.=20
JJ> OK on Ben wording but "stateless" can be removed as  mentioned earlier =
in the section and not directly linked to this sentence.=20

Then about "...to what the reacting node otherwise would have sent" , this =
point, I think, is described in 5.3 paragraph 4


Best regards

JJacques=20


-----Message d'origine-----
De=A0: DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9=A0: mercredi 17 d=E9cembre 2014 17:27
=C0=A0: dime@ietf.org
Objet=A0: Re: [Dime] DOIC WGLC: Editorial Comments


On 12/16/14, 9:02 PM, Ben Campbell wrote:
> Here's some nits, editorial, and structural comments that are generally n=
on-substantive. With the possible exception of comments about 2119 language=
, most of these could be ignored without consequence, but I think we'd have=
 a better document if we at least thought about them:
>
> -- General:
>
> We keep referring to the DOIC "solution". I think "mechanism" is more app=
ropriate. I would think of a DOIC "solution" as a deployment that leverages=
 the DOIC "mechanism".
SRD> I don't see an issue here, as long as we are consistent.
>
> We overuse the word Diameter in front of other things. E.g. Diameter node=
s, Diameter Agents, Diameter clients, Diameter servers, etc. This entire dr=
aft is about Diameter; we don't have to keep saying it. It tends to get awk=
ward when we use it a lot in close proximity.
SRD> This was done based on feedback from Benoit.  We are being
explicit.  If there are paragraphs where it is particularly cumbersome, ple=
ase point out those paragraphs and we can try to make them less cumbersome.
>
> Should we put consistently quotes around "loss" when we describe the "los=
s" algorithm?
>
> -- Requirements (2119 language section)
>
> This is oddly placed. I'm used to seeing that after the introduction, eit=
her stand-alone or as part of a larger terminology section. The RFC editor =
recommends putting it as section 2.
SRD> Ok.
>
> -- section 2, Abatement Algorithm: "A mechanism..."
>
> I suggest "An extensible mechanism..."
SRD> Ok.
>
> -- Section 2, Diversion:
>
> Still needs work.  the "by selecting" phrase needs to indicate what does =
the selecting. "Path" should probably be "path or destination".
>
> Proposed text:
>
> "An overload abatement mechanism, where the reacting node selects alterna=
te destinations or paths for for requests."
SRD> I'm ok with this wording.
>
> -- section 2, OCS: "Reporting and reacting node internally maintained sta=
te..."
>
> I suggest "Internal state maintained by a reporting or reacting node..."
SRD> Ok.
>
> -- section 2, Realm-Routed Requests: "... does not know the host that wil=
l service..."
>
> I suggest: "... does not know which host will service ..."
SRD> Ok.
>
> We should also add a comment that it may be possible to apply diversion t=
o realm routed requests.
SRD> Where?
>
> -- section 2, Throttling: " ... a Diameter Client not sending requests...=
"
>
> I suggest " ... a Client choosing to not send requests ..."
SRD> A Diameter Client...
>
> -- section 3, 2nd paragraph:
>
> Client, servers, and agents should not be capitalized. Should "Reporting =
node" and "Reacting node" be hyphenated?  Consider moving the last sentence=
 to the start of the next paragraph.
SRD> The capitalization of Diameter Clients, Diameter Servers and
Diameter agents was Benoit's suggestion to make it explicit what is being r=
eferred to.  I don't see the need for hyphenation in this context.  I'm ok =
with moving the sentence.
>
> -- section 3.1, paragraph 1: " This is made possible by adding overload c=
ontrol AVPs, the OC-OLR AVP and the OC- Supported-Features AVP, as optional=
 AVPs into existing commands..."
>
> I suggest "This is made possible by adding the optional overload control =
AVPs OC-OLR and OC-Supported-Features into existing commands."
SRD> OK.
>
> -- section 3.1, 3rd paragraph: "Reporting nodes also include overload rep=
orts..."
>
> "Reporting nodes _may_ also include overload reports..."
SRD> OK.
>
> -- section 3.1, 4th paragraph: "Clients MAY report..."
>
> Should not be normative in this section.
SRD> Agreed.
>
> -- section 3.2, 6th paragraph: "The OC-Feature-Vector AVP will contain...=
"
>
> "... will _always_ contain..."
SRD> Ok.
>
> -- section 3.2, 7th paragraph: " ... all answer messages to requests ..."
>
> suggest "... all answers to requests..."
SRD> Ok.
>
> -- section 3.2, paragraph 9: "Reporting nodes are allowed to..."
>
> "Reporting nodes can..."
SRD> Ok.
>
> Also consider clarifying that they can change algorithms _between_transac=
tions_, as long as there's no active overload condition.
>
> -- section 3.2, paragraph 10 (starting with "The individual features..."
>
> Consider moving this entire paragraph to earlier in the section.
>
> -- section 3.2, paragraph 11: "The DCA mechanism must also allow..."
SRD> This paragraph looks redundant.  I suggest removing it.
>
> --> "The DCA mechanism allows..."
>
> "... the agent updates the OC-Supported-Features..." --> " ... the agent =
can update the OC-Supported-Features..."
SRD> Ok.
>
> -- section 3.3, general:
>
> Much of this section is redundant to stuff in the parent section. I=20
> suggest reducing the parent section detail, and keeping it here. (This=20
> may be true for subsequent children of section 3.)
SRD> Do you have specific suggestions?
>
> -- 3.3, third paragraph:
>
> s/ , / : /
SRD> I don't agree.  The commas are there because it is a list.
>
> -- 3.3, paragraph 4:
>
> In this overview, I suggest text saying that HOST_REPORT indicates a=20
> host report, and just using the term "host report" the rest of the=20
> time. (Same for realm report)
SRD> Why?
>
> -- 3.3, para 7: "A host-report, for instance, will generally by generated=
 by tracking utilization of resources..."
>
> I suggest "A host-report might be generated by tracking use of resources.=
.."
SRD> OK.
>
> -- 3.3, para 9: " ... are responsible for applying the overload abatement=
 algorithm..."
>
> I suggest " ... apply the abatement algorithm..."
SRD> Ok.
>
> -- 3.4, para 2: " ... the definition of new report types and the definiti=
on of new scopes ..."
>
> Aren't these sort of the same thing? That is, you add new scopes by exten=
ding report type?
SRD> Can't you have a how report that applies only to sessions on that host=
?
>
> -- 3.4, para 3:
>
> First two sentences are a bit confusing. A new reader will likely think t=
hey contradict, without some explanation that OC-Feature-Vector is a child =
of OC-S-F.
SRD> They seam clear to me.  Do you have a suggested clarification?
>
> -- 3.4, para 4:
>
> First sentence has already been stated more than once. No need to repeat =
here.
SRD> The first sentence is there to provide context for the second
sentence.
>
> -- 4.1.1, Para 1: "It MAY include the OC-Feature-Vector AVP."
>
> consider adding  ", as a sub-avp of OC-Supported-Features."
SRD> OK
>
> - 4.1.1, last paragraph: "This behavior is described in ..."
>
> What is the antecedent to "this"? If it's "loss algorithm" behavior, then=
 the reference to section 4.2 should not be needed.
SRD> Agreed.
>
> -- 4.1.2, para 2:
>
> It's probably worth reiterating that the reacting node may not be the ser=
ver, and this requirement may mean inserting AVPS into answers that came fr=
om upstream.
SRD> I don't see the need.  Do you have suggested wording?
>
> -- 4.1.2, para 3: "...response messages ... "
>
> "... _answer_ messages ..."
SRD> OK.
>
> -- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:
>
> This is also true if it needs to announce some other feature that needs t=
o be indicated.
SRD> This paragraph is talking specifically about algorithms and is
needed because the AVP is optional.  Are you suggesting another sentence, a=
nother paragraph?  I'm guessing that the case you talk about is already cov=
ered elsewhere.
>
> -- 4.1.3, para 3: "... Agent MUST include OC-Supported-Features in reques=
t messages it receives..."
>
> I suspect this should say "... requests that it _forwards_" or "_relays_"=
.
SRD> To differentiate between the requests that it rejects.  Ok, I think
relays is the better word.
>
> -- 4.1.3, para 5 and 6:
>
> Is the reporting node section limited to endpoints? If not, the these par=
agraphs effectively restate normative language about reporting node behavio=
r from that section. Once we've said what a reporting node normatively has =
to do, we should just be able to say that an agent acting as a reporting no=
de has all the responsibilities of a reporting node, and not restate the no=
rmative requirements.
SRD> I'm ok with this but it feels like more than an editorial change to me=
.
>
> -- 4.1.3, para 7:
>
> The first MAY is a consequence (the complement) of the 2nd MAY. It should=
 at least not be 2119 language, and probably can be omitted entirely.
SRD> Do you have suggested wording?
>
> -- 4.1.3, para 9, last sentence:
>
> Does this mean an agent can only change OC-S-F in an answer if it changed=
 it in the request? I don't think we want that restriction, but the context=
 and "as such," seem to scope the MAY to that situation.
SRD> I don't read it that way.  The first sentence is describing one
reason why an agent might change OC-S-F.  It doesn't say it is the only rea=
son.
>
> -- 4.1.3, para 9: "ambiguity"
>
> I'm not sure that's is the word we want here. An agent could muck things =
up without being ambiguous. Perhaps "inconsistency"?
SRD> The point is that the reacting nodes and reporting nodes must
unambiguously know what to do.  I think ambiguous is the right word.
>
> -- 4.2.1.1, para 1:
>
> Do I understand correctly that the reacting node only keeps OCS for those=
 combinations that it has actually received an OLR for? If so, that's not c=
lear from the wording.
SRD> Do you have suggested wording?
>
> -- 4.2.1.2, para 1:
>
> Likewise, the reporting node only keeps OCS for actual overload condition=
s where it sends OLRs?
SRD> Do you have suggested wording?
>
> -- 4.2.1.3, para 2:
>
> Should this combination include origin-host or origin-realm? App-Id?
SRD> I don't understand this.
>
> -- 4.2.1.3,  para 3: ... a reporting node MUST process..."
>
> Should that be "reacting node"?
SRD> Yes.
>
> -- 4.2.1.3, para 4:
>
> Paragraph does not make sense. (I think we've already discussed this one =
from Ulrich's comments).
SRD> Yes, this is addressed already.
>
> -- 4.2.1.3, 3rd para from end: "... update the OCS entry as being expired=
."
>
> I suggest language like " invalid" or "terminated". I take "expired"=20
> to mean "naturally expired", which is different from the case=20
> described here. There may be subtle behavior difference. (For example,=20
> a reacting node might choose to log "expirations" differently than=20
> "explicit terminations".)
SRD> For the context of this specification I think expired works. =20
Implementations can differentiate types of expired if they have a reason.  =
Nothing here prevents that.
>
> -- 4.2.1.4, para 9: "... including the reduction percentage..."
>
> I suggest "... including, for example, the reduction percentage..."
SRD> OK.
>
> -- 4.2.1.4, para 11: " ... MUST update the sequence number ..."
>
> I suggest s / update / increment
SRD> OK.
>
> -- 4.2.2, 2nd to last para:
>
>   I think we need something a bit stronger here. The endpoint needs to ta=
ke some action that makes sense for the application. The details of that ar=
e beyond our scope, but the general need is not.
SRD> We cannot enforce application behavior in a Diameter
specification.   I don't see the need for anything more .  Do you have=20
suggested wording?
>
> -- 4.2.3, para 2:
>
> Doesn't this also need to match the scope for the request type? E.g. Dest=
ination realm or destination host? For example, a host report for host A wo=
uld not match OCS for host B, even though both had the same report type and=
 application id.
SRD> I guess this matters when an agent is the reporting node.
>
> -- 4.2.3, paras 8 and 9:
>
> We put the currently less favored approach first, with the favored approa=
ch in the following paragraph. I suggest we put the more favored approach f=
irst.
SRD> OK.
>
>
> -- 4.2.3, last para:
>
> An example of what we have in mind could be helpful here.
SRD> I'm open to suggested wording...
>
>
> -- 4.3, para 4:
>
> We should clarify that this is talking about mandatory to understand for =
DOIC, but not for the enclosing transaction.
SRD> i'm not clear on what you are suggesting.  Do you have suggested
wording?
>
> -- 4.3, para 5:
>
> Why is it different depending on whether the feature is an algorithm or n=
ot? Also, isn't this mostly redundant to the paragraph about new normative =
behavior?
SRD> I agree, this paragraph can be removed.
>
> -- 4.3, para 6, last sentence
>
> This is redundant to earlier normative language in the section=20
> (assuming a new report type will always involve new normative=20
> behavior.)
SRD> I agree, the last sentence can be removed.
>
> -- 4.3, para 7, last sentence
>
> Also redundant
SRD> Agreed.
>
> -- 4.3, last para, last sentence:
>
> It's not clear if this means section 8 of this doc, or 6733. I suggest pu=
tting this sentence before the subsequent one.
SRD> OK.
>
> -- 5.1, para 4:
>
> Convoluted paragraph. How about "How about "reporting nodes request the s=
tateless reduction of the number of requests by an indicated percentage."
SRD> Ok.
>
> We should also clarify that this reduction is in comparison to what the r=
eacting node otherwise would have sent, rather than what it may have previo=
usly sent.
SRD> Isn't this already covered?  Do you have suggested wording?
>
> -- 5.3, para 5:
>
> Needs a sentence or paragraph to describe the 100% issue before describin=
g how to back down from it.
SRD> It's discussed earlier in the document.  I'm ok with adding it
again.  Do you have suggested wording?
>
> "... following concerns are RECOMMENDED ..."
>
> following procedures...?
SRD> OK.
>
> -- 5.3, para 6: "... does not receive an OLR in messages sent to the form=
erly overloaded node..."
>
> Do we mean "... does not receive an OLR in answers received from the form=
erly overloaded node..."?
SRD> Agreed.
>
> -- para 6, last paragraph
>
> Paragraph is off topic for section. It probably belongs in the extensibil=
ity section, or at least somewhere other than here.
SRD> Do you mean section 6? This isn't about extensibility but about how
Diameter applications integrate DOIC.  It probably belongs in the intro or =
overview sections.
>
> -- 6.1, last para:
>
> I think we moved this to 6.2, but forgot to delete it here.
SRD> Yup, already addressed as part of Ulrich's comments.
>
> -- 6.2:
>
> Why did the AVP code jump to TBD6? (Also seems out of order in the=20
> table.)
SRD> Historical reasons.  Doesn't matter, the real values will be filled
in eventually.
>
> Is it to late to rename the value to OLR_LOSS_ALGO?
SRD> Yes. :-)
>
> -- 9.4, para 2: "A node MUST not..."
>
> "A node MUST _NOT_ ..."
SRD> Ok.
>
> -- References:
>
> 5905 and 5729 are not cited in the document.
SRD> Ok.
>
> draft-ietf-dime-e2e-sec-req-00: Outdated version.
SRD> Ok.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 13:54:48 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 341981A87BC for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 13:54:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T6Iefp8Cdt34 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 13:54:33 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpida-esg-02.alcatel-lucent.com [135.245.210.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7403F1A87B1 for <dime@ietf.org>; Mon, 22 Dec 2014 13:54:33 -0800 (PST)
Received: from fr712usmtp2.zeu.alcatel-lucent.com (unknown [135.239.2.42]) by Websense Email Security Gateway with ESMTPS id C60B3F139ECF8; Mon, 22 Dec 2014 21:54:26 +0000 (GMT)
Received: from FR711WXCHHUB01.zeu.alcatel-lucent.com (fr711wxchhub01.zeu.alcatel-lucent.com [135.239.2.111]) by fr712usmtp2.zeu.alcatel-lucent.com (GMO) with ESMTP id sBMLsUwc032641 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 22 Dec 2014 22:54:31 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR711WXCHHUB01.zeu.alcatel-lucent.com ([135.239.2.111]) with mapi id 14.03.0195.001; Mon, 22 Dec 2014 22:54:30 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: Steve Donovan <srdonovan@usdonovans.com>, "dime@ietf.org" <dime@ietf.org>
Thread-Topic: [Dime] DOIC WGLC: loss algorithm behavior with expiring OLRs
Thread-Index: AQHQGbdrUj+bYvNyikSS1OtMbZBuSZyTzAwAgAhjEGA=
Date: Mon, 22 Dec 2014 21:54:29 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F4608@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <94CD92E2-B801-4EC4-BECE-5C2B0788B361@nostrum.com> <54919712.6040007@usdonovans.com>
In-Reply-To: <54919712.6040007@usdonovans.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.40]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/H7lnjZba-uWpLOKny3DAMhiU8tY
Subject: Re: [Dime] DOIC WGLC: loss algorithm behavior with expiring OLRs
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 21:54:39 -0000

Dear all

I think good to give guidance, so I ma not in favor to strike out the indic=
ated text.=20

I suggest to keep paragraphs but to re-structure them  by starting with a g=
eneral statement.
Proposal:=20

   When an active overload report expires, it is suggested that the
   reacting node progressively decrease the amount of traffic given
   abatement treatment, until the reduction is completely removed and no
   traffic is given abatement treatment.

      The goal of this behavior is to reduce the probability of overload
      condition thrashing where an immediate transition from 100%a high per=
centage
      reduction to 0% reduction results in the reporting node moving
      quickly back into an overload condition, so creating an oscillation

   If reacting node comes out of the 100 percent traffic reduction as a
   result of the overload report timing out, the following concerns are
   RECOMMENDED to be applied.  The reacting node sending the traffic
   should be conservative and, for example, first send "probe" messages
   to learn the overload condition of the overloaded node before
   converging to any traffic amount/rate decided by the sender.  Similar
   concerns apply in all cases when the overload report times out unless
   the previous overload report stated 0 percent reduction.

Best regards

JJacques=20

-----Message d'origine-----
De=A0: DiME [mailto:dime-bounces@ietf.org] De la part de Steve Donovan
Envoy=E9=A0: mercredi 17 d=E9cembre 2014 15:46
=C0=A0: dime@ietf.org
Objet=A0: Re: [Dime] DOIC WGLC: loss algorithm behavior with expiring OLRs

I agree.  In addition, the explanatory paragraph that follows should be mov=
ed to after the paragraph that discusses behavior after 100% reduction.

Steve

On 12/16/14, 11:07 PM, Ben Campbell wrote:
> Section 5.3 (paragraph 7) says that, for the loss algorithm, a reacting n=
ode should slowly ramp back up if an OLR expires. This seems to be for the =
general case of expiring loss-algorithm OLRs, since the case of expiring 10=
0% reduction OLRs was dealt with in the preceding paragraphs.
>
> We have guidance elsewhere that a _reporting_node_ should end an overload=
 condition in a controlled fashion. If both the reacting node and reporting=
 node are trying to do this, you may get unexpected behavior. It makes sens=
e for the reacting node to ramp up slowly from 100% reduction, since the re=
porting node could not update the reduction percentage until expired. But f=
or an percentage reduction that still allows non-trivial traffic, the repor=
ting node should be gradually ramping down the reduction.
>
> I propose we strike the entire paragraph from section 5.3.
>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 13:54:49 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 476531A87B1 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 13:54:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4at24OE9rTfo for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 13:54:39 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpgre-esg-01.alcatel-lucent.com [135.245.210.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F6831A87B9 for <dime@ietf.org>; Mon, 22 Dec 2014 13:54:39 -0800 (PST)
Received: from fr711usmtp1.zeu.alcatel-lucent.com (unknown [135.239.2.122]) by Websense Email Security Gateway with ESMTPS id 6E36F395BD343; Mon, 22 Dec 2014 21:54:34 +0000 (GMT)
Received: from FR711WXCHHUB02.zeu.alcatel-lucent.com (fr711wxchhub02.zeu.alcatel-lucent.com [135.239.2.112]) by fr711usmtp1.zeu.alcatel-lucent.com (GMO) with ESMTP id sBMLsa5U026710 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 22 Dec 2014 22:54:37 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR711WXCHHUB02.zeu.alcatel-lucent.com ([135.239.2.112]) with mapi id 14.03.0195.001; Mon, 22 Dec 2014 22:54:36 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: Ben Campbell <ben@nostrum.com>, "dime@ietf.org list" <dime@ietf.org>, "draft-ietf-dime-ovli@tools.ietf.org" <draft-ietf-dime-ovli@tools.ietf.org>
Thread-Topic: [Dime] DOIC WGLC: Implicit values for OC-OLR
Thread-Index: AQHQGbf2bZ2gL/fZykiN9F7smW2hfpyTSssAgAjh18A=
Date: Mon, 22 Dec 2014 21:54:36 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F460F@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <93DEBE9A-62A4-4637-9BF8-FFCD4195B115@nostrum.com> <54912AA6.2080706@gmail.com>
In-Reply-To: <54912AA6.2080706@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.40]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/iqvM9wShYpocHSGynP2TEj6rR6Q
Subject: Re: [Dime] DOIC WGLC: Implicit values for OC-OLR
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 21:54:42 -0000

Hi

I think we can keep the current text as a general statement. This  does not=
 prevmrt from indicating  more explicit meaning in future extensions if nee=
ded.

Best regards

JJacques=20

-----Message d'origine-----
De=A0: DiME [mailto:dime-bounces@ietf.org] De la part de Jouni Korhonen
Envoy=E9=A0: mercredi 17 d=E9cembre 2014 08:03
=C0=A0: Ben Campbell; dime@ietf.org list; draft-ietf-dime-ovli@tools.ietf.o=
rg
Objet=A0: Re: [Dime] DOIC WGLC: Implicit values for OC-OLR

OK with me.

- Jouni

12/17/2014 7:11 AM, Ben Campbell kirjoitti:
> (No, this is not the general rant on implicit values you from me :-)  )
>
> In section 6.3, paragraph 1, we have the following sentence:
>
> " The OC-OLR AVP does not explicitly contain all information needed by th=
e reacting node to decide whether a subsequent request must undergo abateme=
nt using the received reduction percentage."
>
> I think this may vary by report type. For example, peer reports might nee=
d to include at least  some things explicitly that are implicit for host an=
d realm reports. It's even different between host and realm reports. Theref=
ore, I think we should remove it from this section, and put the specifics i=
n the description of each report type.
>
>
>
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 13:59:41 2014
Return-Path: <jean-jacques.trottin@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DF831A8786 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 13:59:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z5A51FShQXYW for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 13:59:33 -0800 (PST)
Received: from smtp-fr.alcatel-lucent.com (fr-hpgre-esg-01.alcatel-lucent.com [135.245.210.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DF8C1A87D0 for <dime@ietf.org>; Mon, 22 Dec 2014 13:59:32 -0800 (PST)
Received: from fr711usmtp1.zeu.alcatel-lucent.com (unknown [135.239.2.122]) by Websense Email Security Gateway with ESMTPS id BBA018AD694AF; Mon, 22 Dec 2014 21:59:27 +0000 (GMT)
Received: from FR712WXCHHUB03.zeu.alcatel-lucent.com (fr712wxchhub03.zeu.alcatel-lucent.com [135.239.2.74]) by fr711usmtp1.zeu.alcatel-lucent.com (GMO) with ESMTP id sBMLxUgY028542 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 22 Dec 2014 22:59:30 +0100
Received: from FR712WXCHMBA12.zeu.alcatel-lucent.com ([169.254.8.50]) by FR712WXCHHUB03.zeu.alcatel-lucent.com ([135.239.2.74]) with mapi id 14.03.0195.001; Mon, 22 Dec 2014 22:59:30 +0100
From: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>
To: Ben Campbell <ben@nostrum.com>, "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
Thread-Topic: [Dime] DOIC WGLC: duration unit
Thread-Index: AQHQGbXE0uLPAUv+M0uSCJqeZtsDhJyTyBAAgAAhXYCAAAObgIAADKaAgAAUDACAAAZ5AIAAQlCAgAABzgCAAS7BAIAAbpoAgAYxImA=
Date: Mon, 22 Dec 2014 21:59:30 +0000
Message-ID: <E194C2E18676714DACA9C3A2516265D2026F462A@FR712WXCHMBA12.zeu.alcatel-lucent.com>
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com> <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com> <54920B37.4060201@gmail.com> <2BE199F8-262D-40AB-A567-A857E94B3A6A@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235C94@DEMUMBX014.nsn-intra.net> <EF4A3B0F-1FA2-49C4-BA33-45C6EFFBAACA@nostrum.com>
In-Reply-To: <EF4A3B0F-1FA2-49C4-BA33-45C6EFFBAACA@nostrum.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.239.27.40]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/o74FMWxB2EBinBwATXVyFt2aBrI
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 21:59:38 -0000

Dear all

I am also ,in favor  to take the second as unit (according to Ben 's argume=
nts), and also to have a upper limit. The limit that Ben gives is about 50 =
days. Is 24 hours too short? =20

Best regards

JJacques=20

-----Message d'origine-----
De=A0: DiME [mailto:dime-bounces@ietf.org] De la part de Ben Campbell
Envoy=E9=A0: vendredi 19 d=E9cembre 2014 00:47
=C0=A0: Wiehe, Ulrich (NSN - DE/Munich)
Cc=A0: dime@ietf.org
Objet=A0: Re: [Dime] DOIC WGLC: duration unit

Hi Ulrich,

You bring up a good point that we need to document the limits, or at least =
describe the implications of choosing to long or short of a duration either=
 way. I suspect 1s is still too short for most situations, and  ( 2^32 - 1 =
/ 1000 )s is probably still too long.

(Don't get me wrong; I still think millisecond resolution for this is silly=
.)

Thanks!

Ben.

> On Dec 18, 2014, at 11:11 AM, Wiehe, Ulrich (NSN - DE/Munich) <ulrich.wie=
he@nsn.com> wrote:
>=20
> Ben,
>=20
> my inclination is to change back to seconds. However, seconds allow a max=
imum value that is 1000 times higher and may be regarded unreasonably high.=
 In a previous version of the draft we had an upper limit, and maybe when g=
oing back to seconds we should re-introduce an upper limit so that the prot=
ocol does not allow unreasonably long durations.
>=20
> Ulrich
>=20
>=20
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
> Sent: Thursday, December 18, 2014 12:08 AM
> To: Jouni Korhonen
> Cc: dime@ietf.org
> Subject: Re: [Dime] DOIC WGLC: duration unit
>=20
>=20
>> On Dec 17, 2014, at 5:01 PM, Jouni Korhonen <jouni.nospam@gmail.com> wro=
te:
>>=20
>> [snip]
>>=20
>>>> I'll step out of the argument and let someone else be champion for mil=
lisecond granularity.
>>>=20
>>> Any other takers? Are there real use cases for sub-second precision?
>>=20
>> I do not really care. We changed that from seconds to milliseconds for s=
ome reason.. but no not see a reason to change it back either.
>=20
> I'd argue that we should make it the "right thing", regardless of whether=
 we changed it before. (Although remembering why might go far to answering =
my last question below.)
>=20
> I've describe why I think it is false precision, and can become harmful. =
To rephrase it, choosing too small of durations will cause harm by forcing =
rapid OLR updates (as in many per second.) These updates cause work for bot=
h reporting nodes and reacting nodes.=20
>=20
> We could offer guidance of how to avoid that harm. Or we could choose a r=
esolution that makes it harder to cause such harm in the first place. I thi=
nk good protocol design favors the later.
>=20
> Do you disagree with the potential for harm? Or do you see some use case =
for sub-second precision that I've missed?
>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 16:11:22 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C990E1A88DD for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 16:11:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xlEZbTCgi1Ls for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 16:11:19 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD6A11A1B8B for <dime@ietf.org>; Mon, 22 Dec 2014 16:11:18 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBN0BHJu072345 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Dec 2014 18:11:18 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54984D31.5000201@usdonovans.com>
Date: Mon, 22 Dec 2014 18:11:17 -0600
X-Mao-Original-Outgoing-Id: 440986277.247434-92feb2b001fbde5684433a64d3f3d8e7
Content-Transfer-Encoding: quoted-printable
Message-Id: <00328701-E938-444C-B8BC-ADBE05B201CB@nostrum.com>
References: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com> <5491AEC7.8070307@usdonovans.com> <ECEC60E8-3E83-46F6-834D-D5D615660E4E@nostrum.com> <54984D31.5000201@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ny1NK4Q85rBsUVNa3ENX6Tcqw6A
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 00:11:21 -0000

Hi, I've removed sections that seem to need no further discussion, where =
you've suggested moving to separate threads, or where I'm just gonna =
roll over :-)

> On Dec 22, 2014, at 10:56 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:

[...]
>>>> -- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:
>>>>=20
>>>> This is also true if it needs to announce some other feature that =
needs to be indicated.
>>> SRD> This paragraph is talking specifically about algorithms and is =
needed because the AVP is optional.  Are you suggesting another =
sentence, another paragraph?  I'm guessing that the case you talk about =
is already covered elsewhere.
>> We say this in 4.1.1 on reacting node behavior. We should make the =
same statement for reporting node behavior. This is the definitive =
section on reporting node behavior. If it's repeated elsewhere, we =
should consider whether _that_ text is redundant.
> SRD> Again, this paragraph is dealing specifically with rules around =
which the algorithms supported by the reporting node interact with the =
OC-Features-Vector AVP.  The statement on other features is three =
paragraphs later.

If you mean this paragraph:

"  The reporting node SHOULD indicate support for other DOIC features
   defined in extension drafts that it supports and that apply to the
   transaction."

Nothing in that (3 paragraphs later) paragraph says you MUST include =
OC-Features-Vector to do that. It's left for the reader to infer. We do =
explicitly say that for reacting nodes in 4.1.1.

[...]



From nobody Mon Dec 22 16:16:00 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D17C1A88A3 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 16:15:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TC-mPFdpl8JH for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 16:15:58 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 734C81A8935 for <dime@ietf.org>; Mon, 22 Dec 2014 16:15:51 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBN0Fohs072712 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Dec 2014 18:15:51 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <54984D7E.3010405@usdonovans.com>
Date: Mon, 22 Dec 2014 18:15:50 -0600
X-Mao-Original-Outgoing-Id: 440986549.9985-4e70048062e57898dc336c46a740612e
Content-Transfer-Encoding: quoted-printable
Message-Id: <C56EB464-8F5A-40D5-911F-D87F7B707A1F@nostrum.com>
References: <54984D7E.3010405@usdonovans.com>
To: Steve Donovan <srdonovan@usdonovans.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/71J5ylbLiAORp10DtIxJsRf9iJk
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Handling of mandatory sub-avps
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 00:15:59 -0000

My opinion is that any DOIC error (i.e. something wrong in OC-S-F or =
OC-OLR) should never cause an error or other failure of the enclosing =
transaction. Normally the only way DOIC should affect a transaction is =
via abatement.

I would grudgingly accept the ability for a Diameter application spec to =
say that the application must not be used without DOIC (and potentially =
certain DOIC features.), as long as such a requirement was explicit =
(including explicit on _how_ it should fail), but I think that's a =
different use case.

> On Dec 22, 2014, at 10:57 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>=20
> All,
>=20
> The following is an open issue from Ben's suggested editorial changes =
that still needs to be addressed.
>=20
> Regards,
>=20
> Steve
>>> -- 4.3, para 4:
>>>=20
>>> We should clarify that this is talking about mandatory to understand =
for DOIC, but not for the enclosing transaction.
>> SRD> i'm not clear on what you are suggesting.
>=20
> We need to be clear that receiving a DOIC avp with a mandatory AVP =
that you don't understand means you ignore the DOIC AVPs, but does not =
cause the Diameter transaction to fail. Or was it your intent to allow =
an application to say that if you get a DOIC avp that you can't process, =
you have to fail the Diameter transaction?
>=20
>>  Do you have suggested wording?
>=20
> Depends on the answer to the question above.
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 18:34:11 2014
Return-Path: <md3135@att.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 694C51ACD22 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 18:34:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ks7epj51lt4I for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 18:34:08 -0800 (PST)
Received: from nbfkord-smmo07.seg.att.com (nbfkord-smmo07.seg.att.com [209.65.160.93]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 481A41ACC8A for <dime@ietf.org>; Mon, 22 Dec 2014 18:34:08 -0800 (PST)
Received: from unknown [144.160.229.24] (EHLO alpi155.enaf.aldc.att.com) by nbfkord-smmo07.seg.att.com(mxl_mta-7.2.2-0) over TLS secured channel with ESMTP id f94d8945.0.6965957.00-2260.19525020.nbfkord-smmo07.seg.att.com (envelope-from <md3135@att.com>);  Tue, 23 Dec 2014 02:34:08 +0000 (UTC)
X-MXL-Hash: 5498d4a01cc9e377-260d4d7d4d30b7c23bde123c6d683dcc46b972ac
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id sBN2Y67L008099; Mon, 22 Dec 2014 21:34:07 -0500
Received: from mlpi409.sfdc.sbc.com (mlpi409.sfdc.sbc.com [130.9.128.241]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id sBN2Xx9T008074 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 22 Dec 2014 21:34:02 -0500
Received: from MISOUT7MSGHUBAC.ITServices.sbc.com (MISOUT7MSGHUBAC.itservices.sbc.com [130.9.129.147]) by mlpi409.sfdc.sbc.com (RSA Interceptor); Tue, 23 Dec 2014 02:33:42 GMT
Received: from MISOUT7MSGUSRDB.ITServices.sbc.com ([169.254.2.24]) by MISOUT7MSGHUBAC.ITServices.sbc.com ([130.9.129.147]) with mapi id 14.03.0195.001; Mon, 22 Dec 2014 21:33:42 -0500
From: "DOLLY, MARTIN C" <md3135@att.com>
To: Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Handling of mandatory sub-avps
Thread-Index: AQHQHkWm1Hzyl/BwKEaPle6SD7NOQJycdRdQ
Date: Tue, 23 Dec 2014 02:33:41 +0000
Message-ID: <E42CCDDA6722744CB241677169E83656033813A1@MISOUT7MSGUSRDB.ITServices.sbc.com>
References: <54984D7E.3010405@usdonovans.com> <C56EB464-8F5A-40D5-911F-D87F7B707A1F@nostrum.com>
In-Reply-To: <C56EB464-8F5A-40D5-911F-D87F7B707A1F@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.70.83.201]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-AnalysisOut: [v=2.0 cv=PLW4D4WC c=1 sm=1 a=dhB6nF3YHL5t/Ixux6cINA==:17 a]
X-AnalysisOut: [=TS_NFkrObDAA:10 a=BLceEmwcHowA:10 a=kj9zAlcOel0A:10 a=zQP]
X-AnalysisOut: [7CpKOAAAA:8 a=XIqpo32RAAAA:8 a=A92cGCtB03wA:10 a=48vgC7mUA]
X-AnalysisOut: [AAA:8 a=yakATiurAAAA:8 a=RzrZFk0ni7BOwH-jkGoA:9 a=CjuIK1q_]
X-AnalysisOut: [8ugA:10]
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2014051901)]
X-MAIL-FROM: <md3135@att.com>
X-SOURCE-IP: [144.160.229.24]
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/VExBJTEiAWMXJdI7Y-XsBVyEPYg
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Handling of mandatory sub-avps
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 02:34:10 -0000

NO, WRONG

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Ben Campbell
Sent: Monday, December 22, 2014 7:16 PM
To: Steve Donovan
Cc: dime@ietf.org
Subject: Re: [Dime] Handling of mandatory sub-avps

My opinion is that any DOIC error (i.e. something wrong in OC-S-F or OC-OLR=
) should never cause an error or other failure of the enclosing transaction=
. Normally the only way DOIC should affect a transaction is via abatement.

I would grudgingly accept the ability for a Diameter application spec to sa=
y that the application must not be used without DOIC (and potentially certa=
in DOIC features.), as long as such a requirement was explicit (including e=
xplicit on _how_ it should fail), but I think that's a different use case.

> On Dec 22, 2014, at 10:57 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>=20
> All,
>=20
> The following is an open issue from Ben's suggested editorial changes tha=
t still needs to be addressed.
>=20
> Regards,
>=20
> Steve
>>> -- 4.3, para 4:
>>>=20
>>> We should clarify that this is talking about mandatory to understand fo=
r DOIC, but not for the enclosing transaction.
>> SRD> i'm not clear on what you are suggesting.
>=20
> We need to be clear that receiving a DOIC avp with a mandatory AVP that y=
ou don't understand means you ignore the DOIC AVPs, but does not cause the =
Diameter transaction to fail. Or was it your intent to allow an application=
 to say that if you get a DOIC avp that you can't process, you have to fail=
 the Diameter transaction?
>=20
>>  Do you have suggested wording?
>=20
> Depends on the answer to the question above.
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 18:42:36 2014
Return-Path: <md3135@att.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30E271ACD2F for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 18:42:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c6bjcj_6vxwn for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 18:42:32 -0800 (PST)
Received: from nbfkord-smmo05.seg.att.com (nbfkord-smmo05.seg.att.com [209.65.160.92]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21FD41ACD23 for <dime@ietf.org>; Mon, 22 Dec 2014 18:42:32 -0800 (PST)
Received: from unknown [144.160.229.24] (EHLO alpi155.enaf.aldc.att.com) by nbfkord-smmo05.seg.att.com(mxl_mta-7.2.4-2) over TLS secured channel with ESMTP id 696d8945.0.6890541.00-2386.19291247.nbfkord-smmo05.seg.att.com (envelope-from <md3135@att.com>);  Tue, 23 Dec 2014 02:42:32 +0000 (UTC)
X-MXL-Hash: 5498d6984fa580a6-56703f8a08fb005ddedc195aecee6460442fb586
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id sBN2gUwq012353; Mon, 22 Dec 2014 21:42:30 -0500
Received: from mlpi408.sfdc.sbc.com (mlpi408.sfdc.sbc.com [130.9.128.240]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id sBN2gMv4012323 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 22 Dec 2014 21:42:23 -0500
Received: from MISOUT7MSGHUBAC.ITServices.sbc.com (MISOUT7MSGHUBAC.itservices.sbc.com [130.9.129.147]) by mlpi408.sfdc.sbc.com (RSA Interceptor); Tue, 23 Dec 2014 02:42:15 GMT
Received: from MISOUT7MSGUSRDB.ITServices.sbc.com ([169.254.2.24]) by MISOUT7MSGHUBAC.ITServices.sbc.com ([130.9.129.147]) with mapi id 14.03.0195.001; Mon, 22 Dec 2014 21:42:15 -0500
From: "DOLLY, MARTIN C" <md3135@att.com>
To: Ben Campbell <ben@nostrum.com>, Steve Donovan <srdonovan@usdonovans.com>
Thread-Topic: [Dime] Handling of mandatory sub-avps
Thread-Index: AQHQHkWm1Hzyl/BwKEaPle6SD7NOQJycdRdQgAACEqA=
Date: Tue, 23 Dec 2014 02:42:14 +0000
Message-ID: <E42CCDDA6722744CB241677169E83656033813F2@MISOUT7MSGUSRDB.ITServices.sbc.com>
References: <54984D7E.3010405@usdonovans.com> <C56EB464-8F5A-40D5-911F-D87F7B707A1F@nostrum.com> <E42CCDDA6722744CB241677169E83656033813A1@MISOUT7MSGUSRDB.ITServices.sbc.com>
In-Reply-To: <E42CCDDA6722744CB241677169E83656033813A1@MISOUT7MSGUSRDB.ITServices.sbc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.70.83.201]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-AnalysisOut: [v=2.0 cv=Mu/lHRme c=1 sm=1 a=dhB6nF3YHL5t/Ixux6cINA==:17 a]
X-AnalysisOut: [=TS_NFkrObDAA:10 a=BLceEmwcHowA:10 a=kj9zAlcOel0A:10 a=zQP]
X-AnalysisOut: [7CpKOAAAA:8 a=XIqpo32RAAAA:8 a=A92cGCtB03wA:10 a=48vgC7mUA]
X-AnalysisOut: [AAA:8 a=yakATiurAAAA:8 a=uyiPKUS2nzlFUDwHSoQA:9 a=CjuIK1q_]
X-AnalysisOut: [8ugA:10 a=2TSDkfqdCjIA:10 a=XNiWMx5388f8oGVo:21 a=R2NCGlxD]
X-AnalysisOut: [FCkZQmKr:21]
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2014051901)]
X-MAIL-FROM: <md3135@att.com>
X-SOURCE-IP: [144.160.229.24]
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/GfynZRiHRfmdHqEvYElpyzmD_tA
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Handling of mandatory sub-avps
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 02:42:34 -0000

To be clear, ignore what one does not understand.

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of DOLLY, MARTIN C
Sent: Monday, December 22, 2014 9:34 PM
To: Ben Campbell; Steve Donovan
Cc: dime@ietf.org
Subject: Re: [Dime] Handling of mandatory sub-avps

*** Security Advisory: This Message Originated Outside of AT&T ***.
Reference http://cso.att.com/EmailSecurity/IDSP.html for more information.

NO, WRONG

-----Original Message-----
From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Ben Campbell
Sent: Monday, December 22, 2014 7:16 PM
To: Steve Donovan
Cc: dime@ietf.org
Subject: Re: [Dime] Handling of mandatory sub-avps

My opinion is that any DOIC error (i.e. something wrong in OC-S-F or OC-OLR=
) should never cause an error or other failure of the enclosing transaction=
. Normally the only way DOIC should affect a transaction is via abatement.

I would grudgingly accept the ability for a Diameter application spec to sa=
y that the application must not be used without DOIC (and potentially certa=
in DOIC features.), as long as such a requirement was explicit (including e=
xplicit on _how_ it should fail), but I think that's a different use case.

> On Dec 22, 2014, at 10:57 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>=20
> All,
>=20
> The following is an open issue from Ben's suggested editorial changes tha=
t still needs to be addressed.
>=20
> Regards,
>=20
> Steve
>>> -- 4.3, para 4:
>>>=20
>>> We should clarify that this is talking about mandatory to understand fo=
r DOIC, but not for the enclosing transaction.
>> SRD> i'm not clear on what you are suggesting.
>=20
> We need to be clear that receiving a DOIC avp with a mandatory AVP that y=
ou don't understand means you ignore the DOIC AVPs, but does not cause the =
Diameter transaction to fail. Or was it your intent to allow an application=
 to say that if you get a DOIC avp that you can't process, you have to fail=
 the Diameter transaction?
>=20
>>  Do you have suggested wording?
>=20
> Depends on the answer to the question above.
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime

_______________________________________________
DiME mailing list
DiME@ietf.org
https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 22 20:34:31 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B6F81A0087 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 20:34:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A5-tsmZyDlwl for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 20:34:27 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23FFF1A008A for <dime@ietf.org>; Mon, 22 Dec 2014 20:34:27 -0800 (PST)
Received: from [10.0.1.29] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBN4YKbF093046 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Dec 2014 22:34:24 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.29]
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (1.0)
From: Ben Campbell <ben@nostrum.com>
X-Mailer: iPad Mail (12B440)
In-Reply-To: <E42CCDDA6722744CB241677169E83656033813F2@MISOUT7MSGUSRDB.ITServices.sbc.com>
Date: Mon, 22 Dec 2014 22:34:22 -0600
Content-Transfer-Encoding: quoted-printable
Message-Id: <26D1E2EC-3DF6-487C-980F-F6DBE6EFDF39@nostrum.com>
References: <54984D7E.3010405@usdonovans.com> <C56EB464-8F5A-40D5-911F-D87F7B707A1F@nostrum.com> <E42CCDDA6722744CB241677169E83656033813A1@MISOUT7MSGUSRDB.ITServices.sbc.com> <E42CCDDA6722744CB241677169E83656033813F2@MISOUT7MSGUSRDB.ITServices.sbc.com>
To: "DOLLY, MARTIN C" <md3135@att.com>
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/jEOy0H1_Dlkip4gPqWX9_SKLs48
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Handling of mandatory sub-avps
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 04:34:29 -0000

Martin, I think we are violently agreeing. A DOIC "failure" doesn't impact t=
he Diameter transaction.


> On Dec 22, 2014, at 8:42 PM, DOLLY, MARTIN C <md3135@att.com> wrote:
>=20
> To be clear, ignore what one does not understand.
>=20
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of DOLLY, MARTIN C
> Sent: Monday, December 22, 2014 9:34 PM
> To: Ben Campbell; Steve Donovan
> Cc: dime@ietf.org
> Subject: Re: [Dime] Handling of mandatory sub-avps
>=20
> *** Security Advisory: This Message Originated Outside of AT&T ***.
> Reference http://cso.att.com/EmailSecurity/IDSP.html for more information.=

>=20
> NO, WRONG
>=20
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Ben Campbell
> Sent: Monday, December 22, 2014 7:16 PM
> To: Steve Donovan
> Cc: dime@ietf.org
> Subject: Re: [Dime] Handling of mandatory sub-avps
>=20
> My opinion is that any DOIC error (i.e. something wrong in OC-S-F or OC-OL=
R) should never cause an error or other failure of the enclosing transaction=
. Normally the only way DOIC should affect a transaction is via abatement.
>=20
> I would grudgingly accept the ability for a Diameter application spec to s=
ay that the application must not be used without DOIC (and potentially certa=
in DOIC features.), as long as such a requirement was explicit (including ex=
plicit on _how_ it should fail), but I think that's a different use case.
>=20
>> On Dec 22, 2014, at 10:57 AM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>=20
>> All,
>>=20
>> The following is an open issue from Ben's suggested editorial changes tha=
t still needs to be addressed.
>>=20
>> Regards,
>>=20
>> Steve
>>>> -- 4.3, para 4:
>>>>=20
>>>> We should clarify that this is talking about mandatory to understand fo=
r DOIC, but not for the enclosing transaction.
>>> SRD> i'm not clear on what you are suggesting.
>>=20
>> We need to be clear that receiving a DOIC avp with a mandatory AVP that y=
ou don't understand means you ignore the DOIC AVPs, but does not cause the D=
iameter transaction to fail. Or was it your intent to allow an application t=
o say that if you get a DOIC avp that you can't process, you have to fail th=
e Diameter transaction?
>>=20
>>> Do you have suggested wording?
>>=20
>> Depends on the answer to the question above.
>>=20
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Tue Dec 23 04:36:24 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1662A1ACE71 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 04:36:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJJGpwXCGCqb for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 04:36:13 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F56B1ACE03 for <dime@ietf.org>; Tue, 23 Dec 2014 04:30:43 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBNCUeKV012917 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 23 Dec 2014 12:30:40 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBNCUcvt029842 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 23 Dec 2014 13:30:38 +0100
Received: from DEMUHTC012.nsn-intra.net (10.159.42.43) by DEMUHTC001.nsn-intra.net (10.159.42.32) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 23 Dec 2014 13:30:38 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.60]) by DEMUHTC012.nsn-intra.net ([10.159.42.43]) with mapi id 14.03.0195.001; Tue, 23 Dec 2014 13:30:38 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Steve Donovan <srdonovan@usdonovans.com>, Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAL2Z7uAAD8mAIAACZWAgAY/jwCAAU9ggIABPegggAglTQCAAYF28A==
Date: Tue, 23 Dec 2014 12:30:37 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net> <549826C8.1090809@usdonovans.com>
In-Reply-To: <549826C8.1090809@usdonovans.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.124]
Content-Type: multipart/alternative; boundary="_000_5BCBA1FC2B7F0B4C9D935572D900066815239CB6DEMUMBX014nsnin_"
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 24590
X-purgate-ID: 151667::1419337840-00002DC5-73ECAE05/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/KN8LPGOAKXb5snPQ1-aHgtNYQjg
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 12:36:20 -0000

--_000_5BCBA1FC2B7F0B4C9D935572D900066815239CB6DEMUMBX014nsnin_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

No, that was not what I'm after.

Imagine the (unlikely) case where an answer message contains hundreds of OC=
-OLR AVPs.

In this case I want the reacting node to be allowed

-          Not to scan through all the OC-OLR AVPs to see whether there is =
a supported  and not duplicated OLR

-          To ignore the complete set of OC-OLR AVPs if at least one of the=
 OLR contains an unsupported report-type or at least two of the OLRs contai=
n  the same report type.

As soon as the reacting node detects that there is something wrong with the=
 set of OLRs it may ignore the complete set of OLRs.

Regards
Ulrich

From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
Sent: Monday, December 22, 2014 3:12 PM
To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
Cc: dime@ietf.org
Subject: Re: [Dime] Ulrich's suggested change #15

I have added the following statements:

   When receiving an answer message with multiple OLRs and multiple of

   the OLRs are of the same supported report types, a reporting node

   SHOULD ignore the duplicated OLRs.



   A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP

   that contains an unrecognized value.
Regards,

Steve
On 12/17/14 2:49 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:

Yes please.



-----Original Message-----

From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]

Sent: Tuesday, December 16, 2014 3:51 PM

To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell

Cc: dime@ietf.org<mailto:dime@ietf.org>

Subject: Re: [Dime] Ulrich's suggested change #15



I'll delete the paragraph.



Do we need explicit statements for the two conditions below?



Steve





On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:

Steve, Ben,



I'm fine with deleting the paragraph.

But for my clarification please confirm that ignoring the complete set of O=
LRs is allowed when one of these OLRs contains a report type that was not a=
dvertized, or two of the OLRs contain the same report type.



Regards

Ulrich







-----Original Message-----

From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]

Sent: Thursday, December 11, 2014 8:26 PM

To: Ben Campbell

Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org<mailto:dime@ietf.org>

Subject: Re: [Dime] Ulrich's suggested change #15





On 12/11/14, 12:51 PM, Ben Campbell wrote:

On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com><mailt=
o:srdonovan@usdonovans.com> wrote:



I thought this paragraph was covering unrecognized values for all AVPs.

I agree that's what it covered. But I think we failed to cover the unrecogn=
ized AVP case. If we don't have anything to say beyond what 6733 says, then=
 it might not be strictly necessary, but it might still be worth saying tha=
t "unrecognized sub-AVPs are treated as per RFC6733".

That is probably worth saying.

   Maybe it is better to remove the paragraph entirely and make sure that t=
he definition of each AVP addresses what is done with unrecognized values.

Possibly. There are AVPs where there's no such thing as an unrecognized val=
ue. There may be AVPs where the allowed values vary by algorithm. If we do =
take that route, we probably need language here that says unrecognized valu=
es are handled as described by the AVP definition or the algorithm.

Agreed.

Steve



On 12/10/14, 5:26 PM, Ben Campbell wrote:

On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com><mailt=
o:srdonovan@usdonovans.com> wrote:



Ulrich,



Actually, the wording you suggested wasn't quite right.  It should be:



    When receiving an OC-OLR AVP with unknown values, the overload report

    SHOULD be silently discarded by reacting nodes and the event SHOULD

    be logged.



It's not just about report type values but unknown values for any of the AV=
Ps in the OLR.



This seems like a good requirement to include in the specification to ensur=
e common behavior in reacting nodes.  I don't feel strongly about this but =
I would like to hear other opinions.

I think this is still not quite complete.



If you receive a sub-AVP that you don't understand, then you should ignore =
that sub-avp, not the whole OC-OLR AVP.  (Unless of course the unknown AVP =
has the m-bit set.) If you receive a known sub-AVP, with a value you don't =
understand, the behavior should be AVP specific. For Report-Type, that mean=
s ignore the whole OLR.



It's not clear to me whether the original text was about arbitrary avps, or=
 Report-Type.



Steve



On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:

Hi Steve,



I think it was pointed out by Ben that we do not specify behaviour of a nod=
e for cases where it detects that another node is breaking the rule.

The rule is:

     A reporting node MUST NOT send overload reports of a type that has

     not been advertised as supported by the reacting node.

See section 4.2.3.



Regards

Ulrich



    From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve Donova=
n

Sent: Tuesday, December 09, 2014 2:52 PM

To: dime@ietf.org<mailto:dime@ietf.org>

Subject: [Dime] Ulrich's suggested change #15



Ulrich,



For your suggested change #15:

Section 4.2.1.3, 4th paragraph:

Existing text:

     When receiving an OC-OLR AVPs with unknown values, a reacting node

     SHOULD be silently discarded by reacting nodes and the event SHOULD

     be logged.

Comment: text is confusing. Maybe the intention was to say:

     When receiving an OC-OLR AVPs with an unsupported report type value, a=
 reacting node

     SHOULD silently discarded the OC-OLR AVP and the event SHOULD

     be logged.

But even that is not correct.

Proposal: Remove the paragraph.

The intent was that an OC-OLR that contains unknown values should be discar=
ded.  I agree that the wording needs to be changes as you suggested.  I don=
't agree with removing the paragraph.  Can you elaborate on why you think i=
t is not correct when changed as you suggested?



Regards,



Steve



_______________________________________________

DiME mailing list

DiME@ietf.org<mailto:DiME@ietf.org>

https://www.ietf.org/mailman/listinfo/dime








--_000_5BCBA1FC2B7F0B4C9D935572D900066815239CB6DEMUMBX014nsnin_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1451626621;
	mso-list-type:hybrid;
	mso-list-template-ids:2069535036 1398180758 67567619 67567621 67567617 675=
67619 67567621 67567617 67567619 67567621;}
@list l0:level1
	{mso-level-start-at:4;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:Arial;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"DE" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">No, that w=
as not what I&#8217;m after.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Imagine th=
e (unlikely) case where an answer message contains hundreds of OC-OLR AVPs.=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">In this ca=
se I want the reacting node to be allowed<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0p=
t;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><sp=
an style=3D"mso-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">No=
t to scan through all the OC-OLR AVPs to see whether there is a supported&n=
bsp; and not duplicated OLR<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span lang=3D"EN-US" style=3D"font-size:11.0p=
t;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><sp=
an style=3D"mso-list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US" style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">To=
 ignore the complete set of OC-OLR AVPs if at least one of the OLR contains=
 an unsupported report-type or at least two of the OLRs
 contain &nbsp;the same report type.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">As soon as=
 the reacting node detects that there is something wrong with the set of OL=
Rs it may ignore the complete set of OLRs.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Ulrich<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:=
</span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext"> ext Steve Donovan [=
mailto:srdonovan@usdonovans.com]
<br>
<b>Sent:</b> Monday, December 22, 2014 3:12 PM<br>
<b>To:</b> Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell<br>
<b>Cc:</b> dime@ietf.org<br>
<b>Subject:</b> Re: [Dime] Ulrich's suggested change #15<o:p></o:p></span><=
/p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I have added the foll=
owing statements:<o:p></o:p></p>
<pre>&nbsp;&nbsp; When receiving an answer message with multiple OLRs and m=
ultiple of<o:p></o:p></pre>
<pre>&nbsp;&nbsp; the OLRs are of the same supported report types, a report=
ing node<o:p></o:p></pre>
<pre>&nbsp;&nbsp; SHOULD ignore the duplicated OLRs.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp; A reacting node SHOULD ignore an OC-OLR with a OC-Report-=
Type AVP<o:p></o:p></pre>
<pre>&nbsp;&nbsp; that contains an unrecognized value.<o:p></o:p></pre>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Regards,<br>
<br>
Steve<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">On 12/17/14 2:49 AM, Wiehe, Ulrich (NSN - DE/Munich)=
 wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Yes please.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-----Original Message-----<o:p></o:p></pre>
<pre>From: ext Steve Donovan [<a href=3D"mailto:srdonovan@usdonovans.com">m=
ailto:srdonovan@usdonovans.com</a>] <o:p></o:p></pre>
<pre>Sent: Tuesday, December 16, 2014 3:51 PM<o:p></o:p></pre>
<pre>To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell<o:p></o:p></pre>
<pre>Cc: <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><o:p></o:p></pre=
>
<pre>Subject: Re: [Dime] Ulrich's suggested change #15<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I'll delete the paragraph.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Do we need explicit statements for the two conditions below?<o:p></o:p=
></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:<o:p></o:=
p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Steve, Ben,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I'm fine with deleting the paragraph.<o:p></o:p></pre>
<pre>But for my clarification please confirm that ignoring the complete set=
 of OLRs is allowed when one of these OLRs contains a report type that was =
not advertized, or two of the OLRs contain the same report type.<o:p></o:p>=
</pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards<o:p></o:p></pre>
<pre>Ulrich<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-----Original Message-----<o:p></o:p></pre>
<pre>From: ext Steve Donovan [<a href=3D"mailto:srdonovan@usdonovans.com">m=
ailto:srdonovan@usdonovans.com</a>]<o:p></o:p></pre>
<pre>Sent: Thursday, December 11, 2014 8:26 PM<o:p></o:p></pre>
<pre>To: Ben Campbell<o:p></o:p></pre>
<pre>Cc: Wiehe, Ulrich (NSN - DE/Munich); <a href=3D"mailto:dime@ietf.org">=
dime@ietf.org</a><o:p></o:p></pre>
<pre>Subject: Re: [Dime] Ulrich's suggested change #15<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 12/11/14, 12:51 PM, Ben Campbell wrote:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On Dec 11, 2014, at 8:05 AM, Steve Donovan <a href=3D"mailto:srdonovan=
@usdonovans.com">&lt;srdonovan@usdonovans.com&gt;</a> wrote:<o:p></o:p></pr=
e>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I thought this paragraph was covering unrecognized values for all AVPs=
.<o:p></o:p></pre>
</blockquote>
<pre>I agree that's what it covered. But I think we failed to cover the unr=
ecognized AVP case. If we don't have anything to say beyond what 6733 says,=
 then it might not be strictly necessary, but it might still be worth sayin=
g that &quot;unrecognized sub-AVPs are treated as per RFC6733&quot;.<o:p></=
o:p></pre>
</blockquote>
<pre>That is probably worth saying.<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>&nbsp;&nbsp; Maybe it is better to remove the paragraph entirely and m=
ake sure that the definition of each AVP addresses what is done with unreco=
gnized values.<o:p></o:p></pre>
</blockquote>
<pre>Possibly. There are AVPs where there's no such thing as an unrecognize=
d value. There may be AVPs where the allowed values vary by algorithm. If w=
e do take that route, we probably need language here that says unrecognized=
 values are handled as described by the AVP definition or the algorithm.<o:=
p></o:p></pre>
</blockquote>
<pre>Agreed.<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 12/10/14, 5:26 PM, Ben Campbell wrote:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>On Dec 10, 2014, at 6:48 AM, Steve Donovan <a href=3D"mailto:srdonovan=
@usdonovans.com">&lt;srdonovan@usdonovans.com&gt;</a> wrote:<o:p></o:p></pr=
e>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ulrich,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Actually, the wording you suggested wasn't quite right.&nbsp; It shoul=
d be:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp; When receiving an OC-OLR AVP with unknown values, t=
he overload report<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp; SHOULD be silently discarded by reacting nodes and =
the event SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp; be logged.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>It's not just about report type values but unknown values for any of t=
he AVPs in the OLR.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>This seems like a good requirement to include in the specification to =
ensure common behavior in reacting nodes.&nbsp; I don't feel strongly about=
 this but I would like to hear other opinions.<o:p></o:p></pre>
</blockquote>
<pre>I think this is still not quite complete.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>If you receive a sub-AVP that you don't understand, then you should ig=
nore that sub-avp, not the whole OC-OLR AVP.&nbsp; (Unless of course the un=
known AVP has the m-bit set.) If you receive a known sub-AVP, with a value =
you don't understand, the behavior should be AVP specific. For Report-Type,=
 that means ignore the whole OLR.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>It's not clear to me whether the original text was about arbitrary avp=
s, or Report-Type.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:<o:p></o:p=
></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Hi Steve,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I think it was pointed out by Ben that we do not specify behaviour of =
a node for cases where it detects that another node is breaking the rule.<o=
:p></o:p></pre>
<pre>The rule is:<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; A reporting node MUST NOT send overload repor=
ts of a type that has<o:p></o:p></pre>
<pre>&nbsp; &nbsp;&nbsp;&nbsp;not been advertised as supported by the react=
ing node.<o:p></o:p></pre>
<pre>See section 4.2.3.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards<o:p></o:p></pre>
<pre>Ulrich<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>&nbsp;&nbsp;&nbsp; From: DiME [<a href=3D"mailto:dime-bounces@ietf.org=
">mailto:dime-bounces@ietf.org</a>] On Behalf Of ext Steve Donovan<o:p></o:=
p></pre>
<pre>Sent: Tuesday, December 09, 2014 2:52 PM<o:p></o:p></pre>
<pre>To: <a href=3D"mailto:dime@ietf.org">dime@ietf.org</a><o:p></o:p></pre=
>
<pre>Subject: [Dime] Ulrich's suggested change #15<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Ulrich,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>For your suggested change #15:<o:p></o:p></pre>
<pre>Section 4.2.1.3, 4th paragraph:<o:p></o:p></pre>
<pre>Existing text:<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; When receiving an OC-OLR AVPs with unknown va=
lues, a reacting node<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; SHOULD be silently discarded by reacting node=
s and the event SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; be logged.<o:p></o:p></pre>
<pre>Comment: text is confusing. Maybe the intention was to say:<o:p></o:p>=
</pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; When receiving an OC-OLR AVPs with an unsuppo=
rted report type value, a reacting node<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; SHOULD silently discarded the OC-OLR AVP and =
the event SHOULD<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; be logged.<o:p></o:p></pre>
<pre>But even that is not correct.<o:p></o:p></pre>
<pre>Proposal: Remove the paragraph.<o:p></o:p></pre>
<pre>The intent was that an OC-OLR that contains unknown values should be d=
iscarded.&nbsp; I agree that the wording needs to be changes as you suggest=
ed.&nbsp; I don't agree with removing the paragraph.&nbsp; Can you elaborat=
e on why you think it is not correct when changed as you suggested?<o:p></o=
:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Regards,<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Steve<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>DiME mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:DiME@ietf.org">DiME@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/dime">https://www.iet=
f.org/mailman/listinfo/dime</a><o:p></o:p></pre>
</blockquote>
</blockquote>
</blockquote>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
</blockquote>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_5BCBA1FC2B7F0B4C9D935572D900066815239CB6DEMUMBX014nsnin_--


From nobody Tue Dec 23 07:06:00 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F41631ACF24 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 07:05:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5JodAO1r63uQ for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 07:05:55 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF9B01ACF58 for <dime@ietf.org>; Tue, 23 Dec 2014 07:05:53 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBNF5pnv052293 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 23 Dec 2014 09:05:52 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net>
Date: Tue, 23 Dec 2014 09:05:50 -0600
X-Mao-Original-Outgoing-Id: 441039949.602184-8e2b06cd155b65d43edcd75540cb8e30
Content-Transfer-Encoding: quoted-printable
Message-Id: <1FC86658-AB09-4C11-9ED1-0C7FAFC542BE@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net> <549826C8.1090809@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/c-zfVKEeOkaJt5TVPelh1jhS8_w
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 15:05:58 -0000

I don't object to allowing that behavior. But thinking of a less extreme =
case, where you have two OC-OLRs and only recognize one, I think it =
would be poor design to ignore the one you do recognize. OTOH, it's not =
the IETF's job to prevent bad design, as long as it's interoperable and =
doesn't break everyone else (and the network.)

But we might want to consider the fact that this puts the work upon the =
overloaded reporting node to make things right, rather than on the =
reacting node to figure it out. For example, the use cases I've describe =
in a separate thread, where you have multiple reacting nodes with =
different capabilities, might could be mitigated by allowing (not =
requiring) the reporting node put the OC-OLRs for both in each answer. =
We don't currently allow that unless they are different types, but I =
wonder if we should think about relaxing that.

> On Dec 23, 2014, at 6:30 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> No, that was not what I=E2=80=99m after.
> =20
> Imagine the (unlikely) case where an answer message contains hundreds =
of OC-OLR AVPs.
> =20
> In this case I want the reacting node to be allowed
> -          Not to scan through all the OC-OLR AVPs to see whether =
there is a supported  and not duplicated OLR
> -          To ignore the complete set of OC-OLR AVPs if at least one =
of the OLR contains an unsupported report-type or at least two of the =
OLRs contain  the same report type.
> =20
> As soon as the reacting node detects that there is something wrong =
with the set of OLRs it may ignore the complete set of OLRs.
> =20
> Regards
> Ulrich
> =20
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
> Sent: Monday, December 22, 2014 3:12 PM
> To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
> Cc: dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
> =20
> I have added the following statements:
>=20
>    When receiving an answer message with multiple OLRs and multiple of
>    the OLRs are of the same supported report types, a reporting node
>    SHOULD ignore the duplicated OLRs.
> =20
>    A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP
>    that contains an unrecognized value.
> Regards,
>=20
> Steve
>=20
> On 12/17/14 2:49 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Yes please.
> =20
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
> Sent: Tuesday, December 16, 2014 3:51 PM
> To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
> Cc: dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
> =20
> I'll delete the paragraph.
> =20
> Do we need explicit statements for the two conditions below?
> =20
> Steve
> =20
> =20
> On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Steve, Ben,
> =20
> I'm fine with deleting the paragraph.
> But for my clarification please confirm that ignoring the complete set =
of OLRs is allowed when one of these OLRs contains a report type that =
was not advertized, or two of the OLRs contain the same report type.
> =20
> Regards
> Ulrich
> =20
> =20
> =20
> -----Original Message-----
> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
> Sent: Thursday, December 11, 2014 8:26 PM
> To: Ben Campbell
> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
> =20
> =20
> On 12/11/14, 12:51 PM, Ben Campbell wrote:
> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
> =20
> I thought this paragraph was covering unrecognized values for all =
AVPs.
> I agree that's what it covered. But I think we failed to cover the =
unrecognized AVP case. If we don't have anything to say beyond what 6733 =
says, then it might not be strictly necessary, but it might still be =
worth saying that "unrecognized sub-AVPs are treated as per RFC6733".
> That is probably worth saying.
>    Maybe it is better to remove the paragraph entirely and make sure =
that the definition of each AVP addresses what is done with unrecognized =
values.
> Possibly. There are AVPs where there's no such thing as an =
unrecognized value. There may be AVPs where the allowed values vary by =
algorithm. If we do take that route, we probably need language here that =
says unrecognized values are handled as described by the AVP definition =
or the algorithm.
> Agreed.
> Steve
> =20
> On 12/10/14, 5:26 PM, Ben Campbell wrote:
> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
> =20
> Ulrich,
> =20
> Actually, the wording you suggested wasn't quite right.  It should be:
> =20
>     When receiving an OC-OLR AVP with unknown values, the overload =
report
>     SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>     be logged.
> =20
> It's not just about report type values but unknown values for any of =
the AVPs in the OLR.
> =20
> This seems like a good requirement to include in the specification to =
ensure common behavior in reacting nodes.  I don't feel strongly about =
this but I would like to hear other opinions.
> I think this is still not quite complete.
> =20
> If you receive a sub-AVP that you don't understand, then you should =
ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the =
unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a =
value you don't understand, the behavior should be AVP specific. For =
Report-Type, that means ignore the whole OLR.
> =20
> It's not clear to me whether the original text was about arbitrary =
avps, or Report-Type.
> =20
> Steve
> =20
> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
> Hi Steve,
> =20
> I think it was pointed out by Ben that we do not specify behaviour of =
a node for cases where it detects that another node is breaking the =
rule.
> The rule is:
>      A reporting node MUST NOT send overload reports of a type that =
has
>      not been advertised as supported by the reacting node.
> See section 4.2.3.
> =20
> Regards
> Ulrich
> =20
>     From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
> Sent: Tuesday, December 09, 2014 2:52 PM
> To: dime@ietf.org
> Subject: [Dime] Ulrich's suggested change #15
> =20
> Ulrich,
> =20
> For your suggested change #15:
> Section 4.2.1.3, 4th paragraph:
> Existing text:
>      When receiving an OC-OLR AVPs with unknown values, a reacting =
node
>      SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>      be logged.
> Comment: text is confusing. Maybe the intention was to say:
>      When receiving an OC-OLR AVPs with an unsupported report type =
value, a reacting node
>      SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>      be logged.
> But even that is not correct.
> Proposal: Remove the paragraph.
> The intent was that an OC-OLR that contains unknown values should be =
discarded.  I agree that the wording needs to be changes as you =
suggested.  I don't agree with removing the paragraph.  Can you =
elaborate on why you think it is not correct when changed as you =
suggested?
> =20
> Regards,
> =20
> Steve
> =20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
> =20
> =20
> =20
> =20


From nobody Tue Dec 23 07:55:37 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 132DD1A90CF for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 07:55:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qKLwtnk0Q93n for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 07:55:31 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68E2A1A19EC for <dime@ietf.org>; Tue, 23 Dec 2014 07:55:31 -0800 (PST)
Received: from demuprx016.emea.nsn-intra.net ([10.150.129.55]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBNFtSqA014769 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 23 Dec 2014 15:55:28 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx016.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBNFtRWh029281 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 23 Dec 2014 16:55:27 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.60]) by DEMUHTC001.nsn-intra.net ([10.159.42.32]) with mapi id 14.03.0195.001; Tue, 23 Dec 2014 16:55:27 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAL2Z7uAAD8mAIAACZWAgAY/jwCAAU9ggIABPegggAglTQCAAYF28IAAH80AgAAaZ9A=
Date: Tue, 23 Dec 2014 15:55:26 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D90006681523ACF5@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net> <549826C8.1090809@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net> <1FC86658-AB09-4C11-9ED1-0C7FAFC542BE@nostrum.com>
In-Reply-To: <1FC86658-AB09-4C11-9ED1-0C7FAFC542BE@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.111]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 10704
X-purgate-ID: 151667::1419350129-00001177-58E489EB/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/oza-xa7HTlJMRpTK8484Os5QfYU
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 15:55:36 -0000
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From nobody Tue Dec 23 08:40:45 2014
Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED3321A0E10 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 08:40:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MzskiVcka3ta for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 08:40:41 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F7C41ACFA3 for <dime@ietf.org>; Tue, 23 Dec 2014 08:40:41 -0800 (PST)
Received: from [10.0.1.23] (cpe-173-172-146-58.tx.res.rr.com [173.172.146.58]) (authenticated bits=0) by nostrum.com (8.14.9/8.14.7) with ESMTP id sBNGedkA060130 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 23 Dec 2014 10:40:40 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-173-172-146-58.tx.res.rr.com [173.172.146.58] claimed to be [10.0.1.23]
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D90006681523ACF5@DEMUMBX014.nsn-intra.net>
Date: Tue, 23 Dec 2014 10:40:39 -0600
X-Mao-Original-Outgoing-Id: 441045638.876306-11faa0b53a9b76c05dc78aa981721710
Content-Transfer-Encoding: quoted-printable
Message-Id: <E0B4F8BD-3FC6-4133-B363-6E8B5A216789@nostrum.com>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net> <549826C8.1090809@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net> <1FC86658-AB09-4C11-9ED1-0C7FAFC542BE@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D90006681523ACF5@DEMUMBX014.nsn-intra.net>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/U88a7JSWxXD-XsZxG4zsvA14Zl8
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 16:40:44 -0000

> On Dec 23, 2014, at 9:55 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>=20
> When the reporting node is doing things wrong, i.e. sends an OLR of a =
type that was not advertized (implicitly or explicitly), or sends two =
OLRs of same type, although the spec says "MUST NOT do so", we cannot =
expect the reacting node to sort things out.

Given the current MUST NOT, I agree. As I've mentioned in the past, we =
don't need to specify behavior on what you do when the peer violates the =
protocol. If a reacting node receives an answer with two OLRs of the =
same type, or with an OLR of a type it doesn't recognize, what it does =
is local policy. It could ignore all further DOIC information from that =
reacting node, and treat it like a non-supporting node. It could ignore =
all the OLRs in the message, but continue to exchange OC-S-Fs. It could =
process some (or one) of the OLRs and ignore the rest. It's up to the =
implementors to decide.

BTW, we don't need text to say that, unless we want to actually favor =
one strategy over another.

> I do not agree to relax the "MUST NOT do so" requirement for the =
reporting node.
>=20

I did not seriously expect us to. I just tossed it out as something to =
think about.

>=20
> -----Original Message-----
> From: ext Ben Campbell [mailto:ben@nostrum.com]=20
> Sent: Tuesday, December 23, 2014 4:06 PM
> To: Wiehe, Ulrich (NSN - DE/Munich)
> Cc: ext Steve Donovan; dime@ietf.org
> Subject: Re: [Dime] Ulrich's suggested change #15
>=20
> I don't object to allowing that behavior. But thinking of a less =
extreme case, where you have two OC-OLRs and only recognize one, I think =
it would be poor design to ignore the one you do recognize. OTOH, it's =
not the IETF's job to prevent bad design, as long as it's interoperable =
and doesn't break everyone else (and the network.)
>=20
> But we might want to consider the fact that this puts the work upon =
the overloaded reporting node to make things right, rather than on the =
reacting node to figure it out. For example, the use cases I've describe =
in a separate thread, where you have multiple reacting nodes with =
different capabilities, might could be mitigated by allowing (not =
requiring) the reporting node put the OC-OLRs for both in each answer. =
We don't currently allow that unless they are different types, but I =
wonder if we should think about relaxing that.
>=20
>> On Dec 23, 2014, at 6:30 AM, Wiehe, Ulrich (NSN - DE/Munich) =
<ulrich.wiehe@nsn.com> wrote:
>>=20
>> No, that was not what I=E2=80=99m after.
>>=20
>> Imagine the (unlikely) case where an answer message contains hundreds =
of OC-OLR AVPs.
>>=20
>> In this case I want the reacting node to be allowed
>> -          Not to scan through all the OC-OLR AVPs to see whether =
there is a supported  and not duplicated OLR
>> -          To ignore the complete set of OC-OLR AVPs if at least one =
of the OLR contains an unsupported report-type or at least two of the =
OLRs contain  the same report type.
>>=20
>> As soon as the reacting node detects that there is something wrong =
with the set of OLRs it may ignore the complete set of OLRs.
>>=20
>> Regards
>> Ulrich
>>=20
>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
>> Sent: Monday, December 22, 2014 3:12 PM
>> To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
>> Cc: dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change #15
>>=20
>> I have added the following statements:
>>=20
>>   When receiving an answer message with multiple OLRs and multiple of
>>   the OLRs are of the same supported report types, a reporting node
>>   SHOULD ignore the duplicated OLRs.
>>=20
>>   A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP
>>   that contains an unrecognized value.
>> Regards,
>>=20
>> Steve
>>=20
>> On 12/17/14 2:49 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Yes please.
>>=20
>> -----Original Message-----
>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]=20
>> Sent: Tuesday, December 16, 2014 3:51 PM
>> To: Wiehe, Ulrich (NSN - DE/Munich); Ben Campbell
>> Cc: dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change #15
>>=20
>> I'll delete the paragraph.
>>=20
>> Do we need explicit statements for the two conditions below?
>>=20
>> Steve
>>=20
>>=20
>> On 12/15/14, 11:56 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Steve, Ben,
>>=20
>> I'm fine with deleting the paragraph.
>> But for my clarification please confirm that ignoring the complete =
set of OLRs is allowed when one of these OLRs contains a report type =
that was not advertized, or two of the OLRs contain the same report =
type.
>>=20
>> Regards
>> Ulrich
>>=20
>>=20
>>=20
>> -----Original Message-----
>> From: ext Steve Donovan [mailto:srdonovan@usdonovans.com]
>> Sent: Thursday, December 11, 2014 8:26 PM
>> To: Ben Campbell
>> Cc: Wiehe, Ulrich (NSN - DE/Munich); dime@ietf.org
>> Subject: Re: [Dime] Ulrich's suggested change #15
>>=20
>>=20
>> On 12/11/14, 12:51 PM, Ben Campbell wrote:
>> On Dec 11, 2014, at 8:05 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>=20
>> I thought this paragraph was covering unrecognized values for all =
AVPs.
>> I agree that's what it covered. But I think we failed to cover the =
unrecognized AVP case. If we don't have anything to say beyond what 6733 =
says, then it might not be strictly necessary, but it might still be =
worth saying that "unrecognized sub-AVPs are treated as per RFC6733".
>> That is probably worth saying.
>>   Maybe it is better to remove the paragraph entirely and make sure =
that the definition of each AVP addresses what is done with unrecognized =
values.
>> Possibly. There are AVPs where there's no such thing as an =
unrecognized value. There may be AVPs where the allowed values vary by =
algorithm. If we do take that route, we probably need language here that =
says unrecognized values are handled as described by the AVP definition =
or the algorithm.
>> Agreed.
>> Steve
>>=20
>> On 12/10/14, 5:26 PM, Ben Campbell wrote:
>> On Dec 10, 2014, at 6:48 AM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>=20
>> Ulrich,
>>=20
>> Actually, the wording you suggested wasn't quite right.  It should =
be:
>>=20
>>    When receiving an OC-OLR AVP with unknown values, the overload =
report
>>    SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>>    be logged.
>>=20
>> It's not just about report type values but unknown values for any of =
the AVPs in the OLR.
>>=20
>> This seems like a good requirement to include in the specification to =
ensure common behavior in reacting nodes.  I don't feel strongly about =
this but I would like to hear other opinions.
>> I think this is still not quite complete.
>>=20
>> If you receive a sub-AVP that you don't understand, then you should =
ignore that sub-avp, not the whole OC-OLR AVP.  (Unless of course the =
unknown AVP has the m-bit set.) If you receive a known sub-AVP, with a =
value you don't understand, the behavior should be AVP specific. For =
Report-Type, that means ignore the whole OLR.
>>=20
>> It's not clear to me whether the original text was about arbitrary =
avps, or Report-Type.
>>=20
>> Steve
>>=20
>> On 12/9/14, 11:04 AM, Wiehe, Ulrich (NSN - DE/Munich) wrote:
>> Hi Steve,
>>=20
>> I think it was pointed out by Ben that we do not specify behaviour of =
a node for cases where it detects that another node is breaking the =
rule.
>> The rule is:
>>     A reporting node MUST NOT send overload reports of a type that =
has
>>     not been advertised as supported by the reacting node.
>> See section 4.2.3.
>>=20
>> Regards
>> Ulrich
>>=20
>>    From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Steve =
Donovan
>> Sent: Tuesday, December 09, 2014 2:52 PM
>> To: dime@ietf.org
>> Subject: [Dime] Ulrich's suggested change #15
>>=20
>> Ulrich,
>>=20
>> For your suggested change #15:
>> Section 4.2.1.3, 4th paragraph:
>> Existing text:
>>     When receiving an OC-OLR AVPs with unknown values, a reacting =
node
>>     SHOULD be silently discarded by reacting nodes and the event =
SHOULD
>>     be logged.
>> Comment: text is confusing. Maybe the intention was to say:
>>     When receiving an OC-OLR AVPs with an unsupported report type =
value, a reacting node
>>     SHOULD silently discarded the OC-OLR AVP and the event SHOULD
>>     be logged.
>> But even that is not correct.
>> Proposal: Remove the paragraph.
>> The intent was that an OC-OLR that contains unknown values should be =
discarded.  I agree that the wording needs to be changes as you =
suggested.  I don't agree with removing the paragraph.  Can you =
elaborate on why you think it is not correct when changed as you =
suggested?
>>=20
>> Regards,
>>=20
>> Steve
>>=20
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>=20
>>=20
>>=20
>>=20
>=20


From nobody Tue Dec 23 08:54:49 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54F741A09C9 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 08:54:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AqgvbgWPQGdV for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 08:54:30 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC8591A1A74 for <dime@ietf.org>; Tue, 23 Dec 2014 08:54:23 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBNGsLXu004745 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 23 Dec 2014 16:54:21 GMT
Received: from DEMUHTC001.nsn-intra.net ([10.159.42.32]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBNGsLCD022246 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 23 Dec 2014 17:54:21 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.60]) by DEMUHTC001.nsn-intra.net ([10.159.42.32]) with mapi id 14.03.0195.001; Tue, 23 Dec 2014 17:54:20 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAL2Z7uAAD8mAIAACZWAgAY/jwCAAU9ggIABPegggAglTQCAAYF28IAAH80AgAAaZ9CAAAAWgIAAFGEA
Date: Tue, 23 Dec 2014 16:54:19 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D90006681523AD21@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net> <549826C8.1090809@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net> <1FC86658-AB09-4C11-9ED1-0C7FAFC542BE@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D90006681523ACF5@DEMUMBX014.nsn-intra.net> <E0B4F8BD-3FC6-4133-B363-6E8B5A216789@nostrum.com>
In-Reply-To: <E0B4F8BD-3FC6-4133-B363-6E8B5A216789@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.111]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 12472
X-purgate-ID: 151667::1419353661-00002DC5-FB468725/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/BSBFL5mnWRl_QBRlO6RowKGtByk
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 16:54:38 -0000
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=


From nobody Tue Dec 23 08:57:36 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77B181ACFE1 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 08:57:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Nb0Ve7sy1Z59 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 08:57:28 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92DC71ACFE3 for <dime@ietf.org>; Tue, 23 Dec 2014 08:57:27 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBNGvPnF010361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 23 Dec 2014 16:57:25 GMT
Received: from DEMUHTC003.nsn-intra.net ([10.159.42.34]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBNGvO6A026212 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 23 Dec 2014 17:57:25 +0100
Received: from DEMUHTC006.nsn-intra.net (10.159.42.37) by DEMUHTC003.nsn-intra.net (10.159.42.34) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 23 Dec 2014 17:57:23 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.60]) by DEMUHTC006.nsn-intra.net ([10.159.42.37]) with mapi id 14.03.0195.001; Tue, 23 Dec 2014 17:57:24 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] DOIC WGLC: Changing Algorithms
Thread-Index: AQHQGbTAD7bF1y5nZ0Ktqi3JfsBjdJyTTUsAgAB56ICAACGtgIAAEAyAgAAEZQCAAA7IgIAABxKAgAAra4CAAAU7AIAACEAAgAAEPQCAAU0+QIABqogAgAYWTfA=
Date: Tue, 23 Dec 2014 16:57:23 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D90006681523AD33@DEMUMBX014.nsn-intra.net>
References: <EAF2EB26-32EC-48D5-B622-64EC194C3880@nostrum.com> <54912CBA.8080701@gmail.com> <549192FD.7060403@usdonovans.com> <E37D500E-22AB-487A-90B7-6495EA4E497E@nostrum.com> <5491BCB3.30608@usdonovans.com> <0EEB7B88-CEEF-4A33-BD61-E4378F0D054D@nostrum.com> <5491CCC9.3090809@usdonovans.com> <4586B22E-3CDD-462E-8246-D55F25F4365C@nostrum.com> <5491F723.6080203@usdonovans.com> <CBE26329-5CF8-4CFA-8D6C-0B18793606C8@nostrum.com> <54920272.80508@usdonovans.com> <52901958-73B6-49FE-8DA4-A8D2F8276DD0@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235CCD@DEMUMBX014.nsn-intra.net> <8FB9C2A7-7D61-4D46-9808-AD17DB61B8CE@nostrum.com>
In-Reply-To: <8FB9C2A7-7D61-4D46-9808-AD17DB61B8CE@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.111]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 15042
X-purgate-ID: 151667::1419353845-00002DC5-55EE498B/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/oKjo6UUJrxagmfFCPYH6KzdPh4s
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 16:57:32 -0000

Ben, Steve,
I do not agree.

Assume the following example:
A reporting node S supports 3 algorithms: Loss, AlgoA, and AlgoB.
For a given reacting node C this results in 4 possible cases of commonly su=
pported algorithms:
Case a) only Loss is commonly supported by S and C
Case b) Loss and AlgoA are the only commonly supported algorithms by S an C=
,
Case c) Loss and AlgoB are the only commonly supported algorithms by S and =
C,
Case d) Loss, AlgoA, and AlgoB are the only commonly supported algorithms b=
y S and C.

Now S may be configured to select Loss in case a), AlgoA in case b), AlgoB =
in case c), and AlgoA in case d).
(Actually a modification of this configuration is regarded a change of algo=
rithm and must not be done while in an overload condition)

When entering an overload condition, S has to create and maintain 3 OCSs, o=
ne for Loss, one for AlgoA, and one for AlgoB.

When receiving a request from a reacting node Ca (case a)), S returns the O=
LR that corresponds to the Loss OCS.
When receiving a request from a reacting node Cb (case b)), S returns the O=
LR that corresponds to the AlgoA OCS.
When receiving a request from a reacting node Cc (case c)), S returns the O=
LR that corresponds to the AlgoB OCS.
When receiving a request from a reacting node Cd (case d)), S returns the O=
LR that corresponds to the AlgoA OCS.

Let's focus on reacting node Cc. It advertizes Loss and AlgoB (and possibly=
 additional algorithms that are not supported by S). Assume this reacting n=
ode now also supports AlgoA. Why would the reacting node not be allowed to =
immediately return the OLR that corresponds to the AlgoA OCS?
Keeping sending of OLRs that correspond to the AlgoB OSC would require the =
reporting node to keep state. (the actual case is case d) (as can be determ=
ined from the received request) while the case when the first request from =
Cc was received after entering the overload condition was case c) (can only=
 be determined from a stored state).

In summary: the reporting node should be allowed to change algorithm simply=
 because the reacting node advertises other algorithms in addition to one c=
urrently in use.

Now let's focus on node Cb. It advertizes Loss and AlgoA. Why would it not =
be allowed for Cb to stopp advertizing AlgoA? S would immediately return th=
e OLR that corresponds to the Loss OCS. S would not even be required to be =
aware of the change. S just bases its action on the content of the received=
 request, no need to maintain a node-specific state.

In summary the reporting node is allowed to change the set of advertized al=
gorithms at any time, as long as it is prepared to accept the consequences.

The real requirement for not changing algorithm during overload is for the =
reporting node: The reporting node MUST NOT change the selected algorithm w=
hile the reacting node did not change the set of advertized algorithms.

This requirement can be met without keeping reacting-node-specific state.

Ulrich



-----Original Message-----
From: ext Ben Campbell [mailto:ben@nostrum.com]=20
Sent: Friday, December 19, 2014 8:58 PM
To: Wiehe, Ulrich (NSN - DE/Munich)
Cc: Steve Donovan; dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Changing Algorithms

Steve and I had an offline discussion, and I think we agree that the report=
ing node can be forced to change algorithms during an active overload condi=
tion, if it gets a request that doesn't advertise support for the active al=
gorithm.

We currently have text forbidding the reporting node from changing algorith=
ms during an active overload condition, without making this exception. We a=
ssume that we still want to otherwise keep the limitation on algorithm chan=
ges during overload. Here's a concrete proposal:

In 4.1.2:

Old:

For an ongoing overload condition, a reporting node MUST NOT change the sel=
ected algorithm during the period of time that it is in an overload conditi=
on and, as a result, is sending OC-OLR AVPs in answer messages.

New:

For an ongoing overload condition, a reporting node MUST NOT initiate a cha=
nge to the selected algorithm during the period of time that it is in an ov=
erload condition and, as a result, is sending OC-OLR AVPs in answer message=
s. This rule does not affect the case where the OC-Supported-Features in a =
new request matching the OLR does not advertise support for the current alg=
orithm, in which case the reporting node would be forced to change algorith=
ms. However, this rule does constrain the reporting node from changing algo=
rithms simply because the reacting node advertises other algorithms in addi=
tion to one currently in use.

Added text in 4.1.1:

If a reacting node is using an abatement algorithm to abate traffic due to =
an active OLR from a reporting node, the reacting node SHOULD continue to a=
dvertise support for that algorithm in future requests that match the OLR, =
until the overload condition is terminated.


> On Dec 18, 2014, at 11:46 AM, Wiehe, Ulrich (NSN - DE/Munich) <ulrich.wie=
he@nsn.com> wrote:
>=20
> Ben, Steve,
>=20
> Section 4.2.1.2 says:
>   A reporting node SHOULD maintain OCS entries per supported Diameter
>   application, per supported (and eventually selected) Abatement
>   Algorithm and per report-type.
>=20
> For example, an HSS would maintain two OCSs for S6a host-type reports, on=
e for loss and one for rate. When receiving a request that advertises only =
loss, the returned OLR would be the one according to the loss-OCS; When rec=
eiving a request that advertises loss and rate, the HSS has two returned OL=
R would be the one according to the rate-OCS.
>=20
> I don't see a problem when algorithm is changed at the reacting node.
>=20
> Ulrich
>=20
>=20
>=20
> -----Original Message-----
> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
> Sent: Wednesday, December 17, 2014 11:39 PM
> To: Steve Donovan
> Cc: dime@ietf.org
> Subject: Re: [Dime] DOIC WGLC: Changing Algorithms
>=20
>=20
>> On Dec 17, 2014, at 4:23 PM, Steve Donovan <srdonovan@usdonovans.com> wr=
ote:
>>=20
>>=20
>> On 12/17/14 3:54 PM, Ben Campbell wrote:
>>>> On Dec 17, 2014, at 3:35 PM, Steve Donovan <srdonovan@usdonovans.com> =
wrote:
>>>>=20
>>>>=20
>>>> On 12/17/14 1:00 PM, Ben Campbell wrote:
>>>>>> On Dec 17, 2014, at 12:34 PM, Steve Donovan <srdonovan@usdonovans.co=
m> wrote:
>>>>>>=20
>>>>>>> Okay, new picture:
>>>>>>>=20
>>>>>>>=20
>>>>>>>> On Dec 17, 2014, at 11:26 AM, Steve Donovan <srdonovan@usdonovans.=
com>
>>>>>>>> wrote:
>>>>>>>>=20
>>>>>>>> Ben,
>>>>>>>>=20
>>>>>>>> The value of the Origin-Host matters greatly here.  In both cases,=
 what S needs to know is if there is a reacting node for traffic coming fro=
m C1 and if there is a reacting node for traffic coming from C2.
>>>>>>>>=20
>>>>>>> There is no assumption in the draft right now that we have a correl=
ation between reacting nodes and clients. That might be required for client=
-targed OLRs, but we don't have those yet.
>>>>>>>=20
>>>>>>> Consider a different picture. In this case, C never supports DOIC. =
the reacting node role happens either at A1/A2 or at A3, depending on which=
 flow you look at.
>>>>>>>=20
>>>>>>>        A1---
>>>>>>>       /         \
>>>>>>> C --             -------A3------S
>>>>>>>       \         /
>>>>>>>         A2---
>>>>>>>=20
>>>>>>> Now, assume the same flows, but substitute A1 for C1, A2, for C2, a=
nd A3 for A. All requests now have the same origin-host.
>>>>>>>=20
>>>>>>> Before you say this is unrealistic: The issue is the same for any s=
ituation where one client can send traffic across multiple agents to the sa=
me destination. It doesn't matter if there is one or a million.
>>>>>>>=20
>>>>>> SRD> Yes, this is nasty.  With attribution S can detect the scenario=
.  I'm not sure what it does once it selects it.  This can be addressed to =
some degree by adding a deployment recommendation that  all agents taking o=
n reacting node functionality for a single endpoint  select the same algori=
thm.
>>>>> I think some sort of attribution is the long-term solution. Another o=
ption might be some sort of DCA state identifier, or a combination of the t=
wo. (e.g. multiple "virtual" reacting node at the same physical node.) The =
details will be non-trivial to figure out.
>>>>>=20
>>>>> But to close the loop, I think the _short_ term solution is to say th=
at, while a reporting node should not _initiate_ a change in algorithms dur=
ing an overload condition, it must still handle the situation where the rea=
cting node forces a change. We could go further to say that reacting node a=
lso should not initiate such a change, but we would have to recognize that =
there are scenarios where that guidance cannot be enforced, and the reporti=
ng node still has to handle them.
>>>>>=20
>>>>> We might need to think about what it means from an OCS perspective fo=
r a reporting node to send OLRs with different algorithms (or potentially o=
ther capability parameters) for the "same" overload event.
>>>> SRD> I think it is a better solution to stay with what we have now.  T=
he reporting node MUST NOT change the algorithm during an active overload c=
ondition.  If a reacting node advertises support for it, the reacting node =
is saying it will support that algorithm for the duration of any overload c=
ondition that happens prior to the reacting node changing the advertised al=
gorithm.  The change in advertised algorithm will take effect after the ove=
rload condition goes away.
>>>>=20
>>> I disagree. I don't think we want to allow the reporting node to ever i=
ndicate an algorithm that was not advertised in the request. That violates =
normative language earlier in the section that says the selected algorithm =
MUST be one of the ones advertised in the request. It can also cause proble=
ms for reacting nodes, where they get OLRs for an algorithm they don't unde=
rstand.
>> SRD> They clearly do understand the algorithm.  They advertised it befor=
e the overload report started.  We can change the normative language to cov=
er this exception.
>=20
> In my first scenario, this is not true. C2 (or A2)  _never_ understood th=
e rate algorithm, and never advertised support for it.
>=20
> The whole point of this exercise was to show that the reporting node cann=
ot, in the general case, distinguish between multiple reacting nodes with d=
ifferent capabilities, and a single reacting node that changes capabilities=
.
>=20
> By "general case", I mean no assumption that the reacting nodes are peers=
 with the reporting nodes, and no assumption that you can correlate origin-=
host values (in requests) to reacting-nodes.=20
>=20
>=20
>> I think the principle of minimizing work on an overloaded reporting node=
 is the more important principle here.  If the reacting node changes the ad=
vertised set of algorithms during an active overload condition then the ove=
rloaded reporting node will be required to send end-of-overload OLRs for th=
e previous algorithm and then send start-of-overload OLRs for the new algor=
ithm.  This seems complex at a time the overloaded node should be focusing =
on getting out of the overload condition.
>=20
> Sending an OLR that the reacting node does not understand will not help y=
ou get out of overload.
>=20
> I don't see how this is any more complex that if you simply have multiple=
 reacting nodes with different capabilities--and I don't see how to avoid s=
upporting that case.
>=20
>>>=20
>>> I think that's considerably more important that restricting the reporti=
ng node from changing algorithms (Which, btw, does no harm with the only al=
gorithms that we are seriously contemplating.We speculate that it might cau=
se harm for some future algorithm.)
>> SRD> We already have the restriction on the reporting node.
>=20
> We already have both restrictions, and they contradict. I believe the _ex=
isting_ restriction to not select an algorithm that is not advertised in th=
e request is more important than the _existing_ restriction to not change a=
lgorithms during an overload condition.
>=20
>=20
>>>=20
>>> Remember, this is not just about a single reacting node changing it's c=
apabilities, it's also about multiple reacting nodes with different capabil=
ities. We can't disallow one without disallowing the other.
>> SRD> Multiple reacting nodes with different capabilities is all the more=
 reason to hold things constant during an overload condition.
>=20
> I don't follow that. You seem to be pushing towards using the same algori=
thm for all reacting nodes once an overload condition starts. Is that your =
intent?  (Given the possibility that some future reacting node will only su=
pport "loss", that "same algorithm" would pretty much always need to be los=
s.)
>=20
>> I'm not proposing disallowing reacting nodes from changing the set of ca=
pabilities, I'm proposing that these changes don't take effect while there =
is an active overload condition.
>=20
> The problem exists even if no reacting node ever changes its capabilities=
.
>=20
>>>=20
>>>=20
>>>> SRD> I don't think we need to update the OCS in this document to handl=
e multiple algorithms.  This can be done in the extension drafts.  We might=
 want to make it clear, as it appears it isn't already, that a reacting nod=
e might need to support multiple algorithms at the same time.
>>> Do you mean reacting or reporting node in the last sentence? Assuming y=
ou mean it as written, the problem is not that a reacting node may need to =
support multiple algorithms at the same time. It's that it may get OLRs tha=
t it cannot act upon because it doesn't support the algorithm.
>> SRD> I meant reporting nodes.
>>>=20
>>> If, otoh, you meant reporting node, I don't understand how a reporting =
node can have multiple algorithms for the same overload event, without refl=
ecting that possibility in the OCS.
>> SRD> Yes, it will need to be reflected in the OCS.  We don't have multip=
le algorithms now so it isn't needed now.  I'm saying we might want to say =
it might me needed in the future.
>=20
> I'd rather not make each new algorithm redefine the basic structure of OC=
S.
>=20
> But, if you recall, my point was to say we need to _think_ about how this=
 impacts OCS, not that we necessarily need to change anything. Are you oppo=
sed to thinking about it? (And no, I don't think this short exchange quite =
counts as that.)
>=20
>>>=20
>>>=20
>>>=20
>>>>>=20
>>>=20
>>=20
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>=20
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime


From nobody Tue Dec 23 10:54:49 2014
Return-Path: <ulrich.wiehe@nsn.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D8F41A1AB9 for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 10:54:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ySEMrhnznxho for <dime@ietfa.amsl.com>; Tue, 23 Dec 2014 10:54:41 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47DC71A1AC3 for <dime@ietf.org>; Tue, 23 Dec 2014 10:54:41 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.14.3/8.14.3) with ESMTP id sBNIsbSP030404 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 23 Dec 2014 18:54:38 GMT
Received: from DEMUHTC004.nsn-intra.net ([10.159.42.35]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id sBNIsZnk008009 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 23 Dec 2014 19:54:37 +0100
Received: from DEMUHTC013.nsn-intra.net (10.159.42.44) by DEMUHTC004.nsn-intra.net (10.159.42.35) with Microsoft SMTP Server (TLS) id 14.3.195.1; Tue, 23 Dec 2014 19:54:34 +0100
Received: from DEMUMBX014.nsn-intra.net ([169.254.14.60]) by DEMUHTC013.nsn-intra.net ([10.159.42.44]) with mapi id 14.03.0195.001; Tue, 23 Dec 2014 19:54:34 +0100
From: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>
To: "Wiehe, Ulrich (NSN - DE/Munich)" <ulrich.wiehe@nsn.com>, ext Ben Campbell <ben@nostrum.com>
Thread-Topic: [Dime] Ulrich's suggested change #15
Thread-Index: AQHQE7dJhQB5e1nbwEev114RSsJu35yHeSWggAL2Z7uAAD8mAIAACZWAgAY/jwCAAU9ggIABPegggAglTQCAAYF28IAAH80AgAAaZ9CAAAAWgIAAFGEAgAAhJyA=
Date: Tue, 23 Dec 2014 18:54:34 +0000
Message-ID: <5BCBA1FC2B7F0B4C9D935572D90006681523AD55@DEMUMBX014.nsn-intra.net>
References: <5486FE71.70205@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235215@DEMUMBX014.nsn-intra.net> <54884137.4050209@usdonovans.com> <5AB8BAC5-3CBD-432E-9631-74DF40795844@nostrum.com> <5489A498.5070203@usdonovans.com> <B74498A5-D8BE-4064-925F-5943F0D79CDC@nostrum.com> <5489EFAF.8010702@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D9000668152358E0@DEMUMBX014.nsn-intra.net> <549046D3.3090104@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815235AB9@DEMUMBX014.nsn-intra.net> <549826C8.1090809@usdonovans.com> <5BCBA1FC2B7F0B4C9D935572D900066815239CB6@DEMUMBX014.nsn-intra.net> <1FC86658-AB09-4C11-9ED1-0C7FAFC542BE@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D90006681523ACF5@DEMUMBX014.nsn-intra.net> <E0B4F8BD-3FC6-4133-B363-6E8B5A216789@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D90006681523AD21@DEMUMBX014.nsn-intra.net>
In-Reply-To: <5BCBA1FC2B7F0B4C9D935572D90006681523AD21@DEMUMBX014.nsn-intra.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.159.42.109]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 13170
X-purgate-ID: 151667::1419360878-00001177-94CABB9B/0/0
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/qumYts73QLWLrYuUb87h3WkP5-8
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Ulrich's suggested change #15
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Dec 2014 18:54:46 -0000
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=


From nobody Wed Dec 24 09:59:45 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F3AB1A1B14 for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 09:04:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.747
X-Spam-Level: **
X-Spam-Status: No, score=2.747 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, HTML_TAG_BALANCE_BODY=1.157, SPF_NEUTRAL=0.779, T_HTML_ATTACH=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X43eWfERLbKl for <dime@ietfa.amsl.com>; Mon, 22 Dec 2014 09:04:27 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [23.235.209.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64DA61A1B0A for <dime@ietf.org>; Mon, 22 Dec 2014 09:04:27 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:64596 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y36P9-0006bs-8P for dime@ietf.org; Mon, 22 Dec 2014 09:04:26 -0800
Message-ID: <54984F17.6020406@usdonovans.com>
Date: Mon, 22 Dec 2014 11:04:23 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "dime@ietf.org" <dime@ietf.org>
Content-Type: multipart/mixed; boundary="------------000005080501070401070001"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/jYfADh8cAVRqU1CZ6VTKcOV60TM
X-Mailman-Approved-At: Wed, 24 Dec 2014 09:59:41 -0800
Subject: [Dime] Updated DOIC-06
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Dec 2014 17:04:47 -0000

This is a multi-part message in MIME format.
--------------000005080501070401070001
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit

All,

I've updated DOIC-06.  The changes and open issues are recorded below.

I've attached the diff and the latest -06 draft.

Regards,

Steve

-----


Ulrich's suggested changes:

1, 9, 10, 15, 16

Still open:

12

Ben's suggested changes:

Most of Ben's editorial changes.
DOIC WGLC: OC-Reduction-Percentage default value
DOIC WGLC: Implicit values for OC-OLR
DOIC WGLC: loss algorithm behavior with expiring OLRs
DOIC WGLC: Requirement for OC-Feature-Vector values
DOIC WGLC: Sequence Number uniqueness

Ben's comments unresolved:

DOIC WGLC: duration unit
DOIC WGLC: Changing Algorithms
OCS Handling
Mandatory sub-avp handling

--------------000005080501070401070001
Content-Type: text/plain; charset=UTF-8;
 name="draft-ietf-dime-ovli-06.txt"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
 filename="draft-ietf-dime-ovli-06.txt"





Diameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.
Internet-Draft                                                  Broadcom
Intended status: Standards Track                         S. Donovan, Ed.
Expires: June 25, 2015                                       B. Campbell
                                                                  Oracle
                                                               L. Morand
                                                             Orange Labs
                                                       December 22, 2014


                Diameter Overload Indication Conveyance
                      draft-ietf-dime-ovli-06.txt

Abstract

   This specification defines a base solution for Diameter overload
   control, referred to as Diameter Overload Indication Conveyance
   (DOIC).

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on June 25, 2015.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of



Korhonen, et al.          Expires June 25, 2015                 [Page 1]

Internet-Draft                    DOIC                     December 2014


   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4
   3.  Conventions Used in This Document . . . . . . . . . . . . . .   5
   4.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5
     4.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7
     4.2.  DOIC Capability Announcement  . . . . . . . . . . . . . .   7
     4.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9
     4.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11
     4.5.  Simplified Example Architecture . . . . . . . . . . . . .  11
   5.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  12
     5.1.  Capability Announcement . . . . . . . . . . . . . . . . .  12
       5.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  12
       5.1.2.  Reporting Node Behavior . . . . . . . . . . . . . . .  13
       5.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14
     5.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15
       5.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15
       5.2.2.  Reacting Node Behavior  . . . . . . . . . . . . . . .  19
       5.2.3.  Reporting Node Behavior . . . . . . . . . . . . . . .  20
     5.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . .  21
   6.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22
     6.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  22
     6.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23
     6.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  23
   7.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  24
     7.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  24
     7.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25
     7.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  25
     7.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26
     7.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  26
     7.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  26
     7.7.  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  26
     7.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  27
   8.  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  27
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  28
     9.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  28
     9.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  28
   10. Security Considerations . . . . . . . . . . . . . . . . . . .  29
     10.1.  Potential Threat Modes . . . . . . . . . . . . . . . . .  29
     10.2.  Denial of Service Attacks  . . . . . . . . . . . . . . .  30
     10.3.  Non-Compliant Nodes  . . . . . . . . . . . . . . . . . .  31
     10.4.  End-to End-Security Issues . . . . . . . . . . . . . . .  31
   11. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  32
   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .  33



Korhonen, et al.          Expires June 25, 2015                 [Page 2]

Internet-Draft                    DOIC                     December 2014


     12.1.  Normative References . . . . . . . . . . . . . . . . . .  33
     12.2.  Informative References . . . . . . . . . . . . . . . . .  33
   Appendix A.  Issues left for future specifications  . . . . . . .  33
     A.1.  Additional traffic abatement algorithms . . . . . . . . .  33
     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  34
     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  34
   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  34
   Appendix C.  Requirements Conformance Analysis  . . . . . . . . .  34
     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  34
     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  35
     C.3.  Implicit Application Indication . . . . . . . . . . . . .  35
     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  35
     C.5.  No New Vulnerabilities  . . . . . . . . . . . . . . . . .  36
     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  36
       C.6.1.  General . . . . . . . . . . . . . . . . . . . . . . .  36
       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  37
       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  40
       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  41
       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  42
       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  43
       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  44
   Appendix D.  Considerations for Applications Integrating the DOIC
                Solution . . . . . . . . . . . . . . . . . . . . . .  45
     D.1.  Application Classification  . . . . . . . . . . . . . . .  45
     D.2.  Application Type Overload Implications  . . . . . . . . .  46
     D.3.  Request Transaction Classification  . . . . . . . . . . .  47
     D.4.  Request Type Overload Implications  . . . . . . . . . . .  48
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  50

1.  Introduction

   This specification defines a base solution for Diameter overload
   control, referred to as Diameter Overload Indication Conveyance
   (DOIC), based on the requirements identified in [RFC7068].

   This specification addresses Diameter overload control between
   Diameter nodes that support the DOIC solution.  The solution, which
   is designed to apply to existing and future Diameter applications,
   requires no changes to the Diameter base protocol [RFC6733] and is
   deployable in environments where some Diameter nodes do not implement
   the Diameter overload control solution defined in this specification.

   A new application specification can incorporate the overload control
   mechanism specified in this document by making it mandatory to
   implement for the application and referencing this specification
   normatively.  It is the responsibility of the Diameter application
   designers to define how overload control mechanisms works on that
   application.



Korhonen, et al.          Expires June 25, 2015                 [Page 3]

Internet-Draft                    DOIC                     December 2014


   Note that the overload control solution defined in this specification
   does not address all the requirements listed in [RFC7068].  A number
   of overload control related features are left for future
   specifications.  See Appendix A for a list of extensions that are
   currently being considered.  See Appendix C for an analysis of
   conformance to the requirements specified in [RFC7068].

2.  Terminology and Abbreviations

   Abatement

      Reaction to receipt of an overload report resulting in a reduction
      in traffic sent to the reporting node.  Abatement actions include
      diversion and throttling.

   Abatement Algorithm

      An extensible mechanism requested by reporting nodes and used by
      reacting nodes to reduce the amount of traffic sent during an
      occurrence of overload control.

   Diversion

      An overload abatement mechanism, where the reacting node selects
      alternate destinations or paths for for requests.

   Host-Routed Requests

      Requests that a reacting node knows will be served by a particular
      host, either due to the presence of a Destination-Host AVP, or by
      some other local knowledge on the part of the reacting node.

   Overload Control State (OCS)

      Internal state maintained by a reporting or reacting node
      describing occurrences of overload control.

   Overload Report (OLR)

      Overload control information for a particular overload occurrence
      sent by a reporting node.

   Reacting Node

      A Diameter node that acts upon an overload report.

   Realm-Routed Requests




Korhonen, et al.          Expires June 25, 2015                 [Page 4]

Internet-Draft                    DOIC                     December 2014


      Requests that a reacting node does not know which host will
      service the request.

   Reporting Node

      A Diameter node that generates an overload report.  (This may or
      may not be the overloaded node.)

   Throttling

      A mechanism for overload abatement that limits the number of
      requests sent by the DIOC reacting node.  Throttling can include a
      Diameter Client choosing to not send requests, or a Diameter Agent
      or Server rejecting requests with appropriate error responses.  In
      both cases the result of the throttling is a permanent rejection
      of the transaction.



3.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

4.  Solution Overview

   The Diameter Overload Information Conveyance (DOIC) solution allows
   Diameter nodes to request other Diameter nodes to perform overload
   abatement actions, that is, actions to reduce the load offered to the
   overloaded node or realm.

   A Diameter node that supports DOIC is known as a "DOIC node".  Any
   Diameter node can act as a DOIC node, including Diameter Clients,
   Diameter Servers, and Diameter Agents.  DOIC nodes are further
   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting
   node requests overload abatement by sending Overload Reports (OLR).

   A reacting node acts upon OLRs, and performs whatever actions are
   needed to fulfill the abatement requests included in the OLRs.  A
   Reporting node may report overload on its own behalf, or on behalf of
   other nodes.  Likewise, a reacting node may perform overload
   abatement on its own behalf, or on behalf of other nodes.

   A Diameter node's role as a DOIC node is independent of its Diameter
   role.  For example, Diameter Agents may act as DOIC nodes, even
   though they are not endpoints in the Diameter sense.  Since Diameter
   enables bi-directional applications, where Diameter Servers can send



Korhonen, et al.          Expires June 25, 2015                 [Page 5]

Internet-Draft                    DOIC                     December 2014


   requests towards Diameter Clients, a given Diameter node can
   simultaneously act as both a reporting node and a reacting node.

   Likewise, a Diameter Agent may act as a reacting node from the
   perspective of upstream nodes, and a reporting node from the
   perspective of downstream nodes.

   DOIC nodes do not generate new messages to carry DOIC related
   information.  Rather, they "piggyback" DOIC information over existing
   Diameter messages by inserting new AVPs into existing Diameter
   requests and responses.  Nodes indicate support for DOIC, and any
   needed DOIC parameters, by inserting an OC-Supported-Features AVP
   (Section 7.2) into existing requests and responses.  Reporting nodes
   send OLRs by inserting OC-OLR AVPs (Section 7.3).

   A given OLR applies to the Diameter realm and application of the
   Diameter message that carries it.  If a reporting node supports more
   than one realm and/or application, it reports independently for each
   combination of realm and application.  Similarly, the OC-Supported-
   Features AVP applies to the realm and application of the enclosing
   message.  This implies that a node may support DOIC for one
   application and/or realm, but not another, and may indicate different
   DOIC parameters for each application and realm for which it supports
   DOIC.

   Reacting nodes perform overload abatement according to an agreed-upon
   abatement algorithm.  An abatement algorithm defines the meaning of
   some of the parameters of an OLR and the procedures required for
   overload abatement.  An overload abatement algorithm separates
   Diameter requests into two sets.  The first set contains the requests
   that are to undergo overload abatement treatment of either throttling
   or diversion.  The second set contains the requests that are to be
   given normal routing treatment.  This document specifies a single
   must-support algorithm, namely the "loss" algorithm (Section 6).
   Future specifications may introduce new algorithms.

   Overload conditions may vary in scope.  For example, a single
   Diameter node may be overloaded, in which case reacting nodes may
   attempt to send requests to other destinations.  On the other hand,
   an entire Diameter realm may be overloaded, in which case such
   attempts would do harm.  DOIC OLRs have a concept of "report type"
   (Section 7.6), where the type defines such behaviors.  Report types
   are extensible.  This document defines report types for overload of a
   specific host, and for overload of an entire realm.

   DOIC works through non supporting Diameter Agents that properly pass
   unknown AVPs unchanged.




Korhonen, et al.          Expires June 25, 2015                 [Page 6]

Internet-Draft                    DOIC                     December 2014


4.1.  Piggybacking

   There is no new Diameter application defined to carry overload
   related AVPs.  The overload control AVPs defined in this
   specification have been designed to be piggybacked on top of existing
   application messages.  This is made possible by adding the optional
   overload control AVPs OC-OLR and OC-Supported-Features into existing
   commands.

   Reacting nodes indicate support for DOIC by including the OC-
   Supported-Features AVP in all request messages originated or relayed
   by the reacting node.

   Reporting nodes indicate support for DOIC by including the OC-
   Supported-Features AVP in all answer messages originated or relayed
   by the reporting node that are in response to a request that
   contained the OC-Supported-Features AVP.  Reporting nodes may include
   overload reports using the OC-OLR AVP in answer messages.

   Note that the overload control solution does not have fixed server
   and client roles.  The DOIC node role is determined based on the
   message type: whether the message is a request (i.e. sent by a
   "reacting node") or an answer (i.e. sent by a "reporting node").
   Therefore, in a typical "client-server" deployment, the Diameter
   Client may report its overload condition to the Diameter Server for
   any Diameter Server initiated message exchange.  An example of such
   is the Diameter Server requesting a re-authentication from a Diameter
   Client.

4.2.  DOIC Capability Announcement

   The DOIC solution supports the ability for Diameter nodes to
   determine if other nodes in the path of a request support the
   solution.  This capability is referred to as DOIC Capability
   Announcement (DCA) and is separate from Diameter Capability Exchange.

   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the
   Diameter overload features supported.

   The first node in the path of a Diameter request that supports the
   DOIC solution inserts the OC-Supported-Features AVP in the request
   message.

   The individual features supported by the DOIC nodes are indicated in
   the OC-Feature-Vector AVP.  Any semantics associated with the
   features will be defined in extension specifications that introduce
   the features.




Korhonen, et al.          Expires June 25, 2015                 [Page 7]

Internet-Draft                    DOIC                     December 2014


      Note: As discussed elsewhere in the document, agents in the path
      of the request can modify the OC-Supported-Features AVP.

      Note: The DOIC solution must support deployments where Diameter
      Clients and/or Diameter Servers do not support the DOIC solution.
      In this scenario, Diameter Agents that support the DOIC solution
      may handle overload abatement for the non supporting Diameter
      nodes.  In this case the DOIC agent will insert the OC-Supported-
      Features AVP in requests that do not already contain one, telling
      the reporting node that there is a DOIC node that will handle
      overload abatement.  For transactions where there was an OC-
      Supporting-Features AVP in the request, the agent will insert the
      OC-Supported-Features AVP in answers, telling the reacting node
      that there is a reporting node.

   The OC-Feature-Vector AVP will always contain an indication of
   support for the loss overload abatement algorithm defined in this
   specification (see Section 6).  This ensures that a reporting node
   always supports at least one of the advertized abatement algorithms
   received in a request messages.

   The reporting node inserts the OC-Supported-Features AVP in all
   answer messages to requests that contained the OC-Supported-Features
   AVP.  The contents of the reporting node's OC-Supported-Features AVP
   indicate the set of Diameter overload features supported by the
   reporting node.  This specification defines one exception - the
   reporting node only includes an indication of support for one
   overload abatement algorithm, independent of the number of overload
   abatement algorithms actually supported by the reacting node.  The
   overload abatement algorithm indicated is the algorithm that the
   reporting node intends to use should it enter an overload condition.
   Reacting nodes can use the indicated overload abatement algorithm to
   prepare for possible overload reports and must use the indicated
   overload abatement algorithm if traffic reduction is actually
   requested.

      Note that the loss algorithm defined in this document is a
      stateless abatement algorithm.  As a result it does not require
      any actions by reacting nodes prior to the receipt of an overload
      report.  Stateful abatement algorithms that base the abatement
      logic on a history of request messages sent might require reacting
      nodes to maintain state in advance of receiving an overload report
      to ensure that the overload reports can be properly handled.

   Reporting nodes can change the overload abatement algorithm indicated
   in the OC-Feature-Vector AVP if the reporting node is not currently
   in an overload condition and sending overload reports.  The reporting




Korhonen, et al.          Expires June 25, 2015                 [Page 8]

Internet-Draft                    DOIC                     December 2014


   node is not allowed to change the overload abatement algorithm while
   the reporting node is in an overload condition.

   The DCA mechanism must also allow the scenario where the set of
   features supported by the sender of a request and by agents in the
   path of a request differ.  In this case, the agent can update the OC-
   Supported-Features AVP to reflect the mixture of the two sets of
   supported features.

      Note: The logic to determine if the content of the OC-Supported-
      Features AVP should be changed is out-of-scope for this document,
      as is the logic to determine the content of a modified OC-
      Supported-Features AVP.  These are left to implementation
      decisions.  Care must be taken not to introduce interoperability
      issues for downstream or upstream DOIC nodes.

4.3.  DOIC Overload Condition Reporting

   As with DOIC capability announcement, overload condition reporting
   uses new AVPs (Section 7.3) to indicate an overload condition.

   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP
   includes the type of report, a sequence number, the length of time
   that the report is valid and abatement algorithm specific AVPs.

   Two types of overload reports are defined in this document: host
   reports and realm reports.

   A report of type "HOST_REPORT" is sent to indicate the overload of a
   specific Diameter node for the application-id indicated in the
   transaction.  When receiving an OLR of type host, a reacting node
   applies overload abatement to what is referred to in this document as
   host-routed requests.  The reacting node applies overload abatement
   on those host-routed requests which the reacting node knows will be
   served by the server that matches the Origin-Host AVP of the received
   message that contained the received OLR of type host.

   A report of type "REALM_REPORT" is sent to indicate the overload of
   all Diameter nodes within a realm for the application-id indicated in
   the transaction.  When receiving an OLR of type realm, a reacting
   node applies overload abatement to what is referred to in this
   document as realm-routed requests.  The reacting node applies
   overload abatement on those realm-routed requests which contain a
   Destination-Realm AVP that matches the Origin-Realm AVP of the
   received message that contained the received OLR of type realm.

   This document assumes that there is a single source for realm-reports
   for a given realm, or that if multiple nodes can send realm reports,



Korhonen, et al.          Expires June 25, 2015                 [Page 9]

Internet-Draft                    DOIC                     December 2014


   that each such node has full knowledge of the overload state of the
   entire realm.  A reacting node cannot distinguish between receiving
   realm-reports from a single node, or from multiple nodes.

      Note: Known issues exist if multiple sources for overload reports
      which apply to the same Diameter entity exist.  Reacting nodes
      have no way of determining the source and, as such, will treat
      them as coming from a single source.  Variance in sequence numbers
      between the two sources can then cause incorrect overload
      abatement treatment to be applied for indeterminate periods of
      time.

   Reporting nodes are responsible for determining the need for a
   reduction of traffic.  The method for making this determination is
   implementation specific and depend on the type of overload report
   being generated.  A host-report might be generated by tracking use of
   resources required by the host to handle transactions for the
   Diameter application.  A realm-report generally impacts the traffic
   sent to multiple hosts and, as such, requires tracking the capacity
   of all servers able to handle realm- routed requests for the
   application and realm.

   Once a reporting node determines the need for a reduction in traffic,
   it uses the DOIC defined AVPs to report on the condition.  These AVPs
   are included in answer messages sent or relayed by the reporting
   node.  The reporting node indicates the overload abatement algorithm
   that is to be used to handle the traffic reduction in the OC-
   Supported-Features AVP.  The OC-OLR AVP is used to communicate
   information about the requested reduction.

   Reacting nodes, upon receipt of an overload report, applying the
   overload abatement algorithm to traffic impacted by the overload
   report.  The method used to determine the requests that are to
   receive overload abatement treatment is dependent on the abatement
   algorithm.  The loss abatement algorithm is defined in this document
   (Section 6).  Other abatement algorithms can be defined in extensions
   to the DOIC solutions.

   Two types of overload abatement treatment are defined, diversion and
   throttling.  Reacting nodes are responsible for determining which
   treatment is appropriate for individual requests.

   As the conditions that lead to the generation of the overload report
   change the reporting node can send new overload reports requesting
   greater reduction if the condition gets worse or less reduction if
   the condition improves.  The reporting node sends an overload report
   with a duration of zero to indicate that the overload condition has
   ended and abatement is no longer needed.



Korhonen, et al.          Expires June 25, 2015                [Page 10]

Internet-Draft                    DOIC                     December 2014


   The reacting node also determines when the overload report expires
   based on the OC-Validity-Duration AVP in the overload report and
   stops applying the abatement algorithm when the report expires.

4.4.  DOIC Extensibility

   The DOIC solution is designed to be extensible.  This extensibility
   is based on existing Diameter based extensibility mechanisms, along
   with the DOIC capability announcement mechanism.

   There are multiple categories of extensions that are expected.  This
   includes the definition of new overload abatement algorithms, the
   definition of new report types and the definition of new scopes of
   messages impacted by an overload report.

   A DOIC node communicates supported features by including them in the
   OC-Feature-Vector AVP, as a sub-AVP of OC-Supported-Features.  Any
   non-backwards compatible DOIC extensions define new values for the
   OC-Feature-Vector AVP.  DOIC extensions also have the ability to add
   new AVPs to the OC-Supported-Features AVP, if additional information
   about the new feature is required.

   Overload reports can be also extended by adding new sub-AVPs to the
   OC-OLR AVP, allowing reporting nodes to communicate additional
   information about handling an overload condition.

   If necessary, new extensions can also define new AVPs that are not
   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,
   however, recommended that DOIC extensions use the OC-Supported-
   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.

4.5.  Simplified Example Architecture

   Figure 1 illustrates the simplified architecture for Diameter
   overload information conveyance.
















Korhonen, et al.          Expires June 25, 2015                [Page 11]

Internet-Draft                    DOIC                     December 2014


    Realm X                                  Same or other Realms
   <--------------------------------------> <---------------------->


      +--^-----+                 : (optional) :
      |Diameter|                 :            :
      |Server A|--+     .--.     : +---^----+ :     .--.
      +--------+  |   _(    `.   : |Diameter| :   _(    `.   +---^----+
                  +--(        )--:-|  Agent |-:--(        )--|Diameter|
      +--------+  | ( `  .  )  ) : +-----^--+ : ( `  .  )  ) | Client |
      |Diameter|--+  `--(___.-'  :            :  `--(___.-'  +-----^--+
      |Server B|                 :            :
      +---^----+                 :            :

                          End-to-end Overload Indication
             1)  <----------------------------------------------->
                             Diameter Application Y

                  Overload Indication A    Overload Indication A'
             2)  <----------------------> <---------------------->
                 Diameter Application Y   Diameter Application Y



     Figure 1: Simplified architecture choices for overload indication
                                 delivery

   In Figure 1, the Diameter overload indication can be conveyed (1)
   end-to-end between servers and clients or (2) between servers and
   Diameter agent inside the realm and then between the Diameter agent
   and the clients.

5.  Solution Procedures

   This section outlines the normative behavior for the DOIC solution.

5.1.  Capability Announcement

   This section defines DOIC Capability Announcement (DCA) behavior.

5.1.1.  Reacting Node Behavior

   A reacting node MUST include the OC-Supported-Features AVP in all
   requests.  It MAY include the OC-Feature-Vector AVP, as a sub-avp of
   OC-Supported-Features.  If it does so, it MUST indicate support for
   the "loss" algorithm.  If the reacting node is configured to support
   features (including other algorithms) in addition to the loss
   algorithm, it MUST indicate such support in an OC-Feature-Vector AVP.



Korhonen, et al.          Expires June 25, 2015                [Page 12]

Internet-Draft                    DOIC                     December 2014


   An OC-Supported-Features AVP in answer messages indicates there is a
   reporting node for the transaction.  The reacting node MAY take
   action, for example creating state for some stateful abatement
   algorithm, based on the features indicated in the OC-Feature-Vector
   AVP.

      Note: The loss abatement algorithm does not require stateful
      behavior when there is no active overload report.

5.1.2.  Reporting Node Behavior

   Upon receipt of a request message, a reporting node determines if
   there is a reacting node for the transaction based on the presence of
   the OC-Supported-Features AVP in the request message.

   If the request message contains an OC-Supported-Features AVP then a
   reporting node MUST include the OC-Supported-Features AVP in the
   answer message for that transaction.

   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-
   OLR AVP or any other overload control AVPs defined in extension
   drafts in response messages for transactions where the request
   message does not include the OC-Supported-Features AVP.  Lack of the
   OC-Supported-Features AVP in the request message indicates that there
   is no reacting node for the transaction.

   A reporting node knows what overload control functionality is
   supported by the reacting node based on the content or absence of the
   OC-Feature-Vector AVP within the OC-Supported-Features AVP in the
   request message.

   A reporting node MUST indicate support for one and only one abatement
   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm
   selected MUST indicate the abatement algorithm the reporting node
   wants the reacting node to use when the reporting node enters an
   overload condition.

   The abatement algorithm selected MUST be from the set of abatement
   algorithms contained in the request message's OC-Feature-Vector AVP.

   A reporting node that selects the loss algorithm may do so by
   including the OC-Feature-Vector AVP with an explicit indication of
   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects
   a different algorithm, it MUST include the OC-Feature-Vector AVP with
   an explicit indication of the selected algorithm.






Korhonen, et al.          Expires June 25, 2015                [Page 13]

Internet-Draft                    DOIC                     December 2014


   A reporting node MUST NOT change the selected algorithm during the
   period of time that starts when entering an overload condition and
   ends when the associated OCS becomes invalid in all reacting nodes.

   The reporting node MAY change the overload abatement algorithm
   indicated in the OC-Supported-Features AVP at any time as long as no
   previously sent OLRs may be active.

   The reporting node SHOULD indicate support for other DOIC features
   defined in extension drafts that it supports and that apply to the
   transaction.

      Note: Not all DOIC features will apply to all Diameter
      applications or deployment scenarios.  The features included in
      the OC-Feature-Vector AVP are based on local reporting node
      policy.

5.1.3.  Agent Behavior

   Diameter Agents that support DOIC MAY ensure that all messages
   relayed by the agent contain the OC-Supported-Features AVP.

   A Diameter Agent SHOULD take on reacting node behavior for Diameter
   endpoints that do not support the DOIC solution.  A Diameter Agent
   detects that a Diameter endpoint does not support DOIC reacting node
   behavior when there is no OC-Supported-Features AVP in a request
   message.

   For a Diameter Agent to be a reacting node for a non supporting
   Diameter endpoint, the Diameter Agent MUST include the OC-Supported-
   Features AVP in request messages it relays that do not contain the
   OC-Supported-Features AVP.

   A Diameter Agent MAY take on reporting node behavior for Diameter
   endpoints that do not support the DOIC solution.  The Diameter Agent
   MUST have visibility to all traffic destined for the non supporting
   host in order to become the reporting node for the Diameter endpoint.
   A Diameter Agent detects that a Diameter endpoint does not support
   DOIC reporting node behavior when there is no OC-Supported-Features
   AVP in an answer message for a transaction that contained the OC-
   Supported-Features AVP in the request message.

   If a request already has the OC-Supported-Features AVP, a Diameter
   agent MAY modify it to reflect the features appropriate for the
   transaction.  Otherwise, the agent relays the OC-Supported-Features
   AVP without change.





Korhonen, et al.          Expires June 25, 2015                [Page 14]

Internet-Draft                    DOIC                     December 2014


      For instance, if the agent supports a superset of the features
      reported by the reacting node then the agent might choose, based
      on local policy, to advertise that superset of features to the
      reporting node.

   If the Diameter Agent changes the OC-Supported-Features AVP in a
   request message then it is likely it will also need to modify the OC-
   Supported-Features AVP in the answer message for the transaction.  A
   Diameter Agent MAY modify the OC-Supported-Features AVP carried in
   answer messages.

   When making changes to the OC-Supported-Features AVP the Diameter
   Agent needs to ensure that it does not introduce incorrect behavior
   for either the upstream or downstream DOIC nodes..

5.2.  Overload Report Processing

5.2.1.  Overload Control State

   Both reacting and reporting nodes maintain Overload Control State
   (OCS) for active overload conditions.  The following sections define
   behavior associated with that OCS.

5.2.1.1.  Overload Control State for Reacting Nodes

   A reacting node SHOULD maintain the following OCS per supported
   Diameter application:

   o  A host-type OCS entry for each Destination-Host to which it sends
      host-type requests and

   o  A realm-type OCS entry for each Destination-Realm to which it
      sends realm-type requests.

   A host-type OCS entry is identified by the pair of application-id and
   the node's DiameterIdentity.

   A realm-type OCS entry is identified by the pair of application-id
   and realm.

   The host-type and realm-type OCS entries MAY include the following
   information (the actual information stored is an implementation
   decision):

   o  Sequence number (as received in OC-OLR)






Korhonen, et al.          Expires June 25, 2015                [Page 15]

Internet-Draft                    DOIC                     December 2014


   o  Time of expiry (derived from OC-Validity-Duration AVP received in
      the OC-OLR AVP and time of reception of the message carrying OC-
      OLR AVP)

   o  Selected Abatement Algorithm (as received in the OC-Supported-
      Features AVP)

   o  Abatement Algorithm specific input data (as received in the OC-OLR
      AVP, for example, OC-Reduction-Percentage for the Loss abatement
      algorithm)

5.2.1.2.  Overload Control State for Reporting Nodes

   A reporting node SHOULD maintain OCS entries per supported Diameter
   application, per supported (and eventually selected) Abatement
   Algorithm and per report-type.

   An OCS entry is identified by the tuple of Application-Id, Report-
   Type and Abatement Algorithm and MAY include the following
   information (the actual information stored is an implementation
   decision):

   o  Sequence number

   o  Validity Duration

   o  Expiration Time

   o  Algorithm specific input data (for example, the Reduction
      Percentage for the Loss Abatement Algorithm)

5.2.1.3.  Reacting Node Maintenance of Overload Control State

   When a reacting node receives an OC-OLR AVP, it MUST determine if it
   is for an existing or new overload condition.

      Note: For the remainder of this section the term OLR refers to the
      combination of the contents of the received OC-OLR AVP and the
      abatement algorithm indicated in the received OC-Supported-
      Features AVP.

   When receiving an answer message with multiple OLRs of different
   supported report types, a reacting node MUST process each received
   OLR.

   When receiving an answer message with multiple OLRs and multiple of
   the OLRs are of the same supported report types, a reacting node
   SHOULD ignore the duplicated OLRs.



Korhonen, et al.          Expires June 25, 2015                [Page 16]

Internet-Draft                    DOIC                     December 2014


   A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP
   that contains an unrecognized value.

   The OLR is for an existing overload condition if a reacting node has
   an OCS that matches the received OLR.

   For a host-report this means it matches the application-id and the
   host's DiameterIdentity in an existing host OCS entry.

   For a realm-report this means it matches the application-id and the
   realm in an existing realm OCS entry.

   If the OLR is for an existing overload condition then a reacting node
   MUST determine if the OLR is a retransmission or an update to the
   existing OLR.

   If the sequence number for the received OLR is greater than the
   sequence number stored in the matching OCS entry then a reacting node
   MUST update the matching OCS entry.

   If the sequence number for the received OLR is less than or equal to
   the sequence number in the matching OCS entry then a reacting node
   MUST silently ignore the received OLR.  The matching OCS MUST NOT be
   updated in this case.

   If the received OLR is for a new overload condition then a reacting
   node MUST generate a new OCS entry for the overload condition.

   For a host-report this means a reacting node creates on OCS entry
   with the application-id in the received message and DiameterIdentity
   of the Origin-Host in the received message.

      Note: This solution assumes that the Origin-Host AVP in the answer
      message included by the reporting node is not changed along the
      path to the reacting node.

   For a realm-report this means a reacting node creates on OCS entry
   with the application-id in the received message and realm of the
   Origin-Realm in the received message.

   If the received OLR contains a validity duration of zero ("0") then a
   reacting node MUST update the OCS entry as being expired.

      Note: It is not necessarily appropriate to delete the OCS entry,
      as there is recommended behavior that the reacting node slowly
      returns to full traffic when ending an overload abatement period.





Korhonen, et al.          Expires June 25, 2015                [Page 17]

Internet-Draft                    DOIC                     December 2014


   The reacting node does not delete an OCS when receiving an answer
   message that does not contain an OC-OLR AVP (i.e. absence of OLR
   means "no change").

5.2.1.4.  Reporting Node Maintenance of Overload Control State

   A reporting node SHOULD create a new OCS entry when entering an
   overload condition.

      Note: If a reporting node knows through absence of the OC-
      Supported-Features AVP in received messages that there are no
      reacting nodes supporting DOIC then the reporting node can choose
      to not create OCS entries.

   When generating a new OCS entry the sequence number SHOULD be set to
   zero ("0").

   When generating sequence numbers for new overload conditions, the new
   sequence number MUST be greater than any sequence number in an active
   (unexpired) overload report for the same application and report-type
   previously sent by the reporting node.  This property MUST hold over
   a reboot of the reporting node.

      Note: One way of addressing this over a reboot of a reporting node
      is to use a time stamp for the first overload condition that
      occurs after the report and to start using sequence numbers of
      zero for subsequent overload conditions.

   A reporting node MUST update an OCS entry when it needs to adjust the
   validity duration of the overload condition at reacting nodes.

      For instance, if a reporting node wishes to instruct reacting
      nodes to continue overload abatement for a longer period of time
      than originally communicated.  This also applies if the reporting
      node wishes to shorten the period of time that overload abatement
      is to continue.

   A reporting node MUST NOT update the abatement algorithm in an active
   OCS entry.

   A reporting node MUST update an OCS entry when it wishes to adjust
   any abatement algorithm specific parameters, including, for example,
   the reduction percentage used for the Loss abatement algorithm.

      For instance, if a reporting node wishes to change the reduction
      percentage either higher, if the overload condition has worsened,
      or lower, if the overload condition has improved, then the
      reporting node would update the appropriate OCS entry.



Korhonen, et al.          Expires June 25, 2015                [Page 18]

Internet-Draft                    DOIC                     December 2014


   A reporting node MUST increment the sequence number associated with
   the OCS entry anytime the contents of the OCS entry are changed.
   This will result in a new sequence number being sent to reacting
   nodes, instructing reacting nodes to process the OC-OLR AVP.

   A reporting node SHOULD update an OCS entry with a validity duration
   of zero ("0") when the overload condition ends.

      Note: If a reporting node knows that the OCS entries in the
      reacting nodes are near expiration then the reporting node might
      decide not to send an OLR with a validity duration of zero.

   A reporting node MUST keep an OCS entry with a validity duration of
   zero ("0") for a period of time long enough to ensure that any non-
   expired reacting node's OCS entry created as a result of the overload
   condition in the reporting node is deleted.

5.2.2.  Reacting Node Behavior

   When a reacting node sends a request it MUST determine if that
   request matches an active OCS.

   If the request matches an active OCS then the reacting node MUST use
   the overload abatement algorithm indicated in the OCS to determine if
   the request is to receive overload abatement treatment.

   For the Loss abatement algorithm defined in this specification, see
   Section 6 for the overload abatement algorithm logic applied.

   If the overload abatement algorithm selects the request for overload
   abatement treatment then the reacting node MUST apply overload
   abatement treatment on the request.  The abatement treatment applied
   depends on the context of the request.

   If diversion abatement treatment is possible (i.e. a different path
   for the request can be selected where the overloaded node is not part
   of the different path), then the reacting node SHOULD apply diversion
   abatement treatment to the request.  Otherwise the reacting node
   SHOULD apply throttling abatement treatment to the request.

   If the overload abatement treatment results in throttling of the
   request and if the reacting node is an agent then the agent MUST send
   an appropriate error as defined in Section 8.

   Diameter endpoints that throttle requests need to do so according to
   the rules of the client application.  Those rules will vary by
   application, and are beyond the scope of this document.




Korhonen, et al.          Expires June 25, 2015                [Page 19]

Internet-Draft                    DOIC                     December 2014


   In the case that the OCS entry indicated no traffic was to be sent to
   the overloaded entity and the validity duration expires then overload
   abatement associated with the overload report MUST be ended in a
   controlled fashion.

5.2.3.  Reporting Node Behavior

   If there is an active OCS entry then a reporting node SHOULD include
   the OC-OLR AVP in all answers to requests that contain the OC-
   Supported-Features AVP and that match the active OCS entry.

      Note: A request matches if the application-id in the request
      matches the application-id in any active OCS entry and if the
      report-type in the OCS entry matches a report-type supported by
      the reporting node as indicated in the OC-Supported-Features AVP.

   The contents of the OC-OLR AVP depend on the selected algorithm.

   A reporting node MAY choose to not resend an overload report to a
   reacting node if it can guarantee that this overload report is
   already active in the reacting node.

      Note: In some cases (e.g. when there are one or more agents in the
      path between reporting and reacting nodes, or when overload
      reports are discarded by reacting nodes) a reporting node may not
      be able to guarantee that the reacting node has received the
      report.

   A reporting node MUST NOT send overload reports of a type that has
   not been advertised as supported by the reacting node.

      Note: A reacting node implicitly advertises support for the host
      and realm report types by including the OC-Supported-Features AVP
      in the request.  Support for other report types will be explicitly
      indicated by new feature bits in the OC-Feature-Vector AVP.

   A reporting node SHOULD explicitly indicate the end of an overload
   occurrence by sending a new OLR with OC-Validity-Duration set to a
   value of zero ("0").  The reporting node SHOULD ensure that all
   reacting nodes receive the updated overload report.

   A reporting node MAY rely on the OC-Validity-Duration AVP values for
   the implicit overload control state cleanup on the reacting node.

      Note: All OLRs sent have an expiration time calculated by adding
      the validity-duration contained in the OLR to the time the message
      was sent.  Transit time for the OLR can be safely ignored.  The
      reporting node can ensure that all reacting nodes have received



Korhonen, et al.          Expires June 25, 2015                [Page 20]

Internet-Draft                    DOIC                     December 2014


      the OLR by continuing to send it in answer messages until the
      expiration time for all OLRs sent for that overload condition have
      expired.

   When a reporting node sends an OLR, it effectively delegates any
   necessary throttling to downstream nodes.  If the reporting node also
   locally throttles the same set of messages, the overall number of
   throttled requests may be higher than intended.  Therefore, before
   applying local message throttling, a reporting node needs to check if
   these messages match existing OCS entries, indicating that these
   messages have survived throttling applied by downstream nodes that
   have received the related OLR.

   However, even if the set of messages match existing OCS entries, the
   reporting node can still apply other abatement methods such as
   diversion.  The reporting node might also need to throttle requests
   for reasons other than overload.  For example, an agent or server
   might have a configured rate limit for each client, and throttle
   requests that exceed that limit, even if such requests had already
   been candidates for throttling by downstream nodes.  The reporting
   node also has the option to send new OLRs requesting greater
   reductions in traffic, reducing the need for local throttling.

   A reporting node SHOULD decrease requested overload abatement
   treatment in a controlled fashion to avoid oscillations in traffic.

      For example, it might wait some period of time after overload ends
      before terminating the OLR, or it might send a series of OLRs
      indicating progressively less overload severity.

5.3.  Protocol Extensibility

   The DOIC solution can be extended.  Types of potential extensions
   include new traffic abatement algorithms, new report types or other
   new functionality.

   When defining a new extension that requires new normative behavior,
   the specification MUST define a new feature for the OC-Feature-
   Vector.  This feature bit is used to communicate support for the new
   feature.

   The extension MAY define new AVPs for use in DOIC Capability
   Announcement and for use in DOIC Overload reporting.  These new AVPs
   SHOULD be defined to be extensions to the OC-Supported-Features or
   OC-OLR AVPs defined in this document.






Korhonen, et al.          Expires June 25, 2015                [Page 21]

Internet-Draft                    DOIC                     December 2014


   [RFC6733] defined Grouped AVP extension mechanisms apply.  This
   allows, for example, defining a new feature that is mandatory to be
   understood even when piggybacked on an existing application.

   When defining new report type values, the corresponding specification
   MUST define the semantics of the new report types and how they affect
   the OC-OLR AVP handling.

   The OC-OLR AVP can be expanded with optional sub-AVPs only if a
   legacy DOIC implementation can safely ignore them without breaking
   backward compatibility for the given OC-Report-Type AVP value.

   Documents that introduce new report types MUST describe any
   limitations on their use across non-supporting agents.

   As with any Diameter specification, RFC6733 requires all new AVPs to
   be registered with IANA.  See Section 9 for the required procedures.
   New features (feature bits in the OC-Feature-Vector AVP) and report
   types (in the OC-Report-Type AVP) MUST be registered with IANA.

6.  Loss Algorithm

   This section documents the Diameter overload loss abatement
   algorithm.

6.1.  Overview

   The DOIC specification supports the ability for multiple overload
   abatement algorithms to be specified.  The abatement algorithm used
   for any instance of overload is determined by the Diameter Overload
   Capability Announcement process documented in Section 5.1.

   The loss algorithm described in this section is the default algorithm
   that must be supported by all Diameter nodes that support DOIC.

   The loss algorithm is designed to be a straightforward and stateless
   overload abatement algorithm.  It is used by reporting nodes to
   request a percentage reduction in the amount of traffic sent.  The
   traffic impacted by the requested reduction depends on the type of
   overload report.

   Reporting nodes request the stateless reduction of the number of
   requests by an indicated percentage.  This percentage reduction is in
   comparison to the number of messages the node otherwise would send,
   regardless of how many requests the node might have sent in the past.

   From a conceptual level, the logic at the reacting node could be
   outlined as follows.



Korhonen, et al.          Expires June 25, 2015                [Page 22]

Internet-Draft                    DOIC                     December 2014


   1.  An overload report is received and the associated OCS is either
       saved or updated (if required) by the reacting node.

   2.  A new Diameter request is generated by the application running on
       the reacting node.

   3.  The reacting node determines that an active overload report
       applies to the request, as indicated by the corresponding OCS
       entry.

   4.  The reacting node determines if overload abatement treatment
       should be applied to the request.  One approach that could be
       taken for each request is to select a random number between 1 and
       100.  If the random number is less than or equal to the indicated
       reduction percentage then the request is given abatement
       treatment, otherwise the request is given normal routing
       treatment.

6.2.  Reporting Node Behavior

   The method a reporting node uses to determine the amount of traffic
   reduction required to address an overload condition is an
   implementation decision.

   When a reporting node that has selected the loss abatement algorithm
   determines the need to request a reduction in traffic, it includes an
   OC-OLR AVP in answer messages as described in Section 5.2.3.

   When sending the OC-OLR AVP, the reporting node MUST indicate a
   percentage reduction in the OC-Reduction-Percentage AVP.

   The reporting node MAY change the reduction percentage in subsequent
   overload reports.  When doing so the reporting node must conform to
   overload report handing specified in Section 5.2.3.

6.3.  Reacting Node Behavior

   The method a reacting node uses to determine which request messages
   are given abatement treatment is an implementation decision.

   When receiving an OC-OLR in an answer message where the algorithm
   indicated in the OC-Supported-Features AVP is the loss algorithm, the
   reacting node MUST apply abatement treatment to the requested
   percentage of request messages sent.

      Note: The loss algorithm is a stateless algorithm.  As a result,
      the reacting node does not guarantee that there will be an
      absolute reduction in traffic sent.  Rather, it guarantees that



Korhonen, et al.          Expires June 25, 2015                [Page 23]

Internet-Draft                    DOIC                     December 2014


      the requested percentage of new requests will be given abatement
      treatment.

   When applying overload abatement treatment for the loss abatement
   algorithm, the reacting node MUST abate the requested percentage of
   requests that would have otherwise been sent to the reporting host or
   realm.

   If reacting node comes out of the 100 percent traffic reduction as a
   result of the overload report timing out, the following procedures
   are RECOMMENDED to be applied.  The reacting node sending the traffic
   should be conservative and, for example, first send "probe" messages
   to learn the overload condition of the overloaded node before
   converging to any traffic amount/rate decided by the sender.  Similar
   concerns apply in all cases when the overload report times out unless
   the previous overload report stated 0 percent reduction.

      The goal of this behavior is to reduce the probability of overload
      condition thrashing where an immediate transition from 100%
      reduction to 0% reduction results in the reporting node moving
      quickly back into an overload condition.

   If the reacting node does not receive an OLR in answers received from
   the formerly overloaded node then the reacting node SHOULD slowly
   increase the rate of traffic sent to the overloaded node.

7.  Attribute Value Pairs

   This section describes the encoding and semantics of the Diameter
   Overload Indication Attribute Value Pairs (AVPs) defined in this
   document.

7.1.  OC-Supported-Features AVP

   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and
   serves two purposes.  First, it announces a node's support for the
   DOIC solution in general.  Second, it contains the description of the
   supported DOIC features of the sending node.  The OC-Supported-
   Features AVP MUST be included in every Diameter request message a
   DOIC supporting node sends.

      OC-Supported-Features ::= < AVP Header: TBD1 >
                                [ OC-Feature-Vector ]
                              * [ AVP ]







Korhonen, et al.          Expires June 25, 2015                [Page 24]

Internet-Draft                    DOIC                     December 2014


7.2.  OC-Feature-Vector AVP

   The OC-Feature-Vector AVP (AVP code TBD2) is of type Unsigned64 and
   contains a 64 bit flags field of announced capabilities of a DOIC
   node.  The value of zero (0) is reserved.

   The OC-Feature-Vector sub-AVP is used to announce the DOIC features
   supported by the DOIC node, in the form of a flag-bits field in which
   each bit announces one feature or capability supported by the node.
   The absence of the OC-Feature-Vector AVP in request messages
   indicates that only the default traffic abatement algorithm described
   in this specification is supported.  The absence of the OC- Feature-
   Vector AVP in answer messages indicates that the default traffic
   abatement algorithm described in this specification is selected
   (while other traffic abatement algorithms may be supported), and no
   features other than abatement algorithms are supported.

   The following capabilities are defined in this document:

   OLR_DEFAULT_ALGO (0x0000000000000001)

      When this flag is set by the a DOIC reacting node it means that
      the default traffic abatement (loss) algorithm is supported.  When
      this flag is set by a DOIC reporting node it means that the loss
      algorithm will be used for requested overload abatement.

7.3.  OC-OLR AVP

   The OC-OLR AVP (AVP code TBD3) is of type Grouped and contains the
   information necessary to convey an overload report on an overload
   condition at the reporting node.  The application the OC-OLR AVP
   applies to is the same as the Application-Id found in the Diameter
   message header.  The host or realm the OC-OLR AVP concerns is
   determined from the Origin-Host AVP and/or Origin-Realm AVP found in
   the encapsulating Diameter command.  The OC-OLR AVP is intended to be
   sent only by a reporting node.

      OC-OLR ::= < AVP Header: TBD2 >
                 < OC-Sequence-Number >
                 < OC-Report-Type >
                 [ OC-Reduction-Percentage ]
                 [ OC-Validity-Duration ]
               * [ AVP ]








Korhonen, et al.          Expires June 25, 2015                [Page 25]

Internet-Draft                    DOIC                     December 2014


7.4.  OC-Sequence-Number AVP

   The OC-Sequence-Number AVP (AVP code TBD4) is of type Unsigned64.
   Its usage in the context of overload control is described in
   Section 5.2.

   From the functionality point of view, the OC-Sequence-Number AVP is
   used as a non-volatile increasing counter for a sequence of overload
   reports between two DOIC nodes for the same overload occurrence.
   Sequence numbers are treated in a uni-directional manner, i.e. two
   sequence numbers on each direction between two DOIC nodes are not
   related or correlated.

7.5.  OC-Validity-Duration AVP

   The OC-Validity-Duration AVP (AVP code TBD5) is of type Unsigned32
   and indicates in milliseconds the validity time of the overload
   report.  The number of milliseconds is measured after reception of
   the first OC-OLR AVP with a given value of OC-Sequence-Number AVP.
   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30
   seconds).  When the OC-Validity-Duration AVP is not present in the
   OC-OLR AVP, the default value applies.

7.6.  OC-Report-Type AVP

   The OC-Report-Type AVP (AVP code TBD6) is of type Enumerated.  The
   value of the AVP describes what the overload report concerns.  The
   following values are initially defined:

   HOST_REPORT 0  The overload report is for a host.  Overload abatement
      treatment applies to host-routed requests.

   REALM_REPORT 1  The overload report is for a realm.  Overload
      abatement treatment applies to realm-routed requests.

7.7.  OC-Reduction-Percentage AVP

   The OC-Reduction-Percentage AVP (AVP code TBD7) is of type Unsigned32
   and describes the percentage of the traffic that the sender is
   requested to reduce, compared to what it otherwise would send.  The
   OC-Reduction-Percentage AVP applies to the default (loss) algorithm
   specified in this specification.  However, the AVP can be reused for
   future abatement algorithms, if its semantics fit into the new
   algorithm.

   The value of the Reduction-Percentage AVP is between zero (0) and one
   hundred (100).  Values greater than 100 are ignored.  The value of
   100 means that all traffic is to be throttled, i.e. the reporting



Korhonen, et al.          Expires June 25, 2015                [Page 26]

Internet-Draft                    DOIC                     December 2014


   node is under a severe load and ceases to process any new messages.
   The value of 0 means that the reporting node is in a stable state and
   has no need for the reacting node to apply any traffic abatement.

7.8.  Attribute Value Pair flag rules

                                                         +---------+
                                                         |AVP flag |
                                                         |rules    |
                                                         +----+----+
                              AVP   Section              |    |MUST|
       Attribute Name         Code  Defined  Value Type  |MUST| NOT|
      +--------------------------------------------------+----+----+
      |OC-Supported-Features  TBD1  6.1      Grouped     |    | V  |
      +--------------------------------------------------+----+----+
      |OC-Feature-Vector      TBD2  6.2      Unsigned64  |    | V  |
      +--------------------------------------------------+----+----+
      |OC-OLR                 TBD3  6.3      Grouped     |    | V  |
      +--------------------------------------------------+----+----+
      |OC-Sequence-Number     TBD4  6.4      Unsigned64  |    | V  |
      +--------------------------------------------------+----+----+
      |OC-Validity-Duration   TBD5  6.5      Unsigned32  |    | V  |
      +--------------------------------------------------+----+----+
      |OC-Report-Type         TBD6  6.6      Enumerated  |    | V  |
      +--------------------------------------------------+----+----+
      |OC-Reduction                                      |    |    |
      |  -Percentage          TBD7  6.7      Unsigned32  |    | V  |
      +--------------------------------------------------+----+----+


   As described in the Diameter base protocol [RFC6733], the M-bit usage
   for a given AVP in a given command may be defined by the application.

8.  Error Response Codes

   When a DOIC node rejects a Diameter request due to overload, the DOIC
   node MUST select an appropriate error response code.  This
   determination is made based on the probability of the request
   succeeding if retried on a different path.

   A reporting node rejecting a Diameter request due to an overload
   condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can
   assume that the same request may succeed on a different path.

   If a reporting node knows or assumes that the same request will not
   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response
   SHOULD be used.  Retrying would consume valuable resources during an
   occurrence of overload.



Korhonen, et al.          Expires June 25, 2015                [Page 27]

Internet-Draft                    DOIC                     December 2014


      For instance, if the request arrived at the reporting node without
      a Destination-Host AVP then the reporting node might determine
      that there is an alternative Diameter node that could successfully
      process the request and that retrying the transaction would not
      negatively impact the reporting node.  DIAMETER_TOO_BUSY would be
      sent in this case.

      If the request arrived at the reporting node with a Destination-
      Host AVP populated with its own Diameter identity then the
      reporting node can assume that retrying the request would result
      in it coming to the same reporting node.
      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.

      A second example is when an agent that supports the DOIC solution
      is performing the role of a reacting node for a non supporting
      client.  Requests that are rejected as a result of DOIC throttling
      by the agent in this scenario would generally be rejected with a
      DIAMETER_UNABLE_TO_COMPLY response code.

9.  IANA Considerations

9.1.  AVP codes

   New AVPs defined by this specification are listed in Section 7.  All
   AVP codes are allocated from the 'Authentication, Authorization, and
   Accounting (AAA) Parameters' AVP Codes registry.

9.2.  New registries

   Two new registries are needed under the 'Authentication,
   Authorization, and Accounting (AAA) Parameters' registry.

   A new "Overload Control Feature Vector" registry is required.  The
   registry must contain the following:

      Feature Vector Value

      Specification - the specification that defines the new value.

   See Section 7.2 for the initial Feature Vector Value in the registry.
   This specification is the specification defining the value.  New
   values can be added into the registry using the Specification
   Required policy.  [RFC5226].

   A new "Overload Report Type" registry is required.  The registry must
   contain the following:

      Report Type Value



Korhonen, et al.          Expires June 25, 2015                [Page 28]

Internet-Draft                    DOIC                     December 2014


      Specification - the specification that defines the new value.

   See Section 7.6 for the initial assignment in the registry.  New
   types can be added using the Specification Required policy [RFC5226].

10.  Security Considerations

   DOIC gives Diameter nodes the ability to request that downstream
   nodes send fewer Diameter requests.  Nodes do this by exchanging
   overload reports that directly effect this reduction.  This exchange
   is potentially subject to multiple methods of attack, and has the
   potential to be used as a Denial-of-Service (DoS) attack vector.

   Overload reports may contain information about the topology and
   current status of a Diameter network.  This information is
   potentially sensitive.  Network operators may wish to control
   disclosure of overload reports to unauthorized parties to avoid its
   use for competitive intelligence or to target attacks.

   Diameter does not include features to provide end-to-end
   authentication, integrity protection, or confidentiality.  This may
   cause complications when sending overload reports between non-
   adjacent nodes.

10.1.  Potential Threat Modes

   The Diameter protocol involves transactions in the form of requests
   and answers exchanged between clients and servers.  These clients and
   servers may be peers, that is, they may share a direct transport
   (e.g.  TCP or SCTP) connection, or the messages may traverse one or
   more intermediaries, known as Diameter Agents.  Diameter nodes use
   TLS, DTLS, or IPsec to authenticate peers, and to provide
   confidentiality and integrity protection of traffic between peers.
   Nodes can make authorization decisions based on the peer identities
   authenticated at the transport layer.

   When agents are involved, this presents an effectively transitive
   trust model.  That is, a Diameter client or server can authorize an
   agent for certain actions, but it must trust that agent to make
   appropriate authorization decisions about its peers, and so on.
   Since confidentiality and integrity protection occurs at the
   transport layer, agents can read, and perhaps modify, any part of a
   Diameter message, including an overload report.

   There are several ways an attacker might attempt to exploit the
   overload control mechanism.  An unauthorized third party might inject
   an overload report into the network.  If this third party is upstream
   of an agent, and that agent fails to apply proper authorization



Korhonen, et al.          Expires June 25, 2015                [Page 29]

Internet-Draft                    DOIC                     December 2014


   policies, downstream nodes may mistakenly trust the report.  This
   attack is at least partially mitigated by the assumption that nodes
   include overload reports in Diameter answers but not in requests.
   This requires an attacker to have knowledge of the original request
   in order to construct an answer.  Such an answer would also need to
   arrive at a Diameter node via a protected transport connection.
   Therefore, implementations MUST validate that an answer containing an
   overload report is a properly constructed response to a pending
   request prior to acting on the overload report, and that the answer
   was received via an appropriate transport connection.

   A similar attack involves a compromised but otherwise authorized node
   that sends an inappropriate overload report.  For example, a server
   for the realm "example.com" might send an overload report indicating
   that a competitor's realm "example.net" is overloaded.  If other
   nodes act on the report, they may falsely believe that "example.net"
   is overloaded, effectively reducing that realm's capacity.
   Therefore, it's critical that nodes validate that an overload report
   received from a peer actually falls within that peer's responsibility
   before acting on the report or forwarding the report to other peers.
   For example, an overload report from a peer that applies to a realm
   not handled by that peer is suspect.

      This attack is partially mitigated by the fact that the
      application, as well as host and realm, for a given OLR is
      determined implicitly by respective AVPs in the enclosing answer.
      If a reporting node modifies any of those AVPs, the enclosing
      transaction will also be affected.

10.2.  Denial of Service Attacks

   Diameter overload reports, especially realm-reports, can cause a node
   to cease sending some or all Diameter requests for an extended
   period.  This makes them a tempting vector for DoS attacks.
   Furthermore, since Diameter is almost always used in support of other
   protocols, a DoS attack on Diameter is likely to impact those
   protocols as well.  Therefore, Diameter nodes MUST NOT honor or
   forward OLRs received from peers that are not trusted to send them.

   An attacker might use the information in an OLR to assist in DoS
   attacks.  For example, an attacker could use information about
   current overload conditions to time an attack for maximum effect, or
   use subsequent overload reports as a feedback mechanism to learn the
   results of a previous or ongoing attack.  Operators need the ability
   to ensure that OLRs are not leaked to untrusted parties.






Korhonen, et al.          Expires June 25, 2015                [Page 30]

Internet-Draft                    DOIC                     December 2014


10.3.  Non-Compliant Nodes

   In the absence of an overload control mechanism, Diameter nodes need
   to implement strategies to protect themselves from floods of
   requests, and to make sure that a disproportionate load from one
   source does not prevent other sources from receiving service.  For
   example, a Diameter server might throttle a certain percentage of
   requests from sources that exceed certain limits.  Overload control
   can be thought of as an optimization for such strategies, where
   downstream nodes never send the excess requests in the first place.
   However, the presence of an overload control mechanism does not
   remove the need for these other protection strategies.

   When a Diameter node sends an overload report, it cannot assume that
   all nodes will comply, even if they indicate support for DOIC.  A
   non-compliant node might continue to send requests with no reduction
   in load.  Such non-compliance could be done accidentally, or
   maliciously to gain an unfair advantage over compliant nodes.
   Requirement 28 [RFC7068] indicates that the overload control solution
   cannot assume that all Diameter nodes in a network are trusted, and
   that malicious nodes not be allowed to take advantage of the overload
   control mechanism to get more than their fair share of service.

10.4.  End-to End-Security Issues

   The lack of end-to-end integrity features makes it difficult to
   establish trust in overload reports received from non-adjacent nodes.
   Any agents in the message path may insert or modify overload reports.
   Nodes must trust that their adjacent peers perform proper checks on
   overload reports from their peers, and so on, creating a transitive-
   trust requirement extending for potentially long chains of nodes.
   Network operators must determine if this transitive trust requirement
   is acceptable for their deployments.  Nodes supporting Diameter
   overload control MUST give operators the ability to select which
   peers are trusted to deliver overload reports, and whether they are
   trusted to forward overload reports from non-adjacent nodes.  DOIC
   nodes MUST strip DOIC AVPs from messages received from peers that are
   not trusted for DOIC purposes.

   The lack of end-to-end confidentiality protection means that any
   Diameter agent in the path of an overload report can view the
   contents of that report.  In addition to the requirement to select
   which peers are trusted to send overload reports, operators MUST be
   able to select which peers are authorized to receive reports.  A node
   MUST NOT send an overload report to a peer not authorized to receive
   it.  Furthermore, an agent MUST remove any overload reports that
   might have been inserted by other nodes before forwarding a Diameter
   message to a peer that is not authorized to receive overload reports.



Korhonen, et al.          Expires June 25, 2015                [Page 31]

Internet-Draft                    DOIC                     December 2014


      A DOIC node cannot always automatically detect that a peer also
      supports DOIC.  For example, a node might have a peer that is a
      non-supporting agent.  If nodes on the other side of that agent
      send OC-Supported-Features AVPs, the agent is likely to forward
      them as unknown AVPs.  Messages received across the non-supporting
      agent may be indistinguishable from messages received across a
      DOIC supporting agent, giving the false impression that the non-
      supporting agent actually supports DOIC.  This complicates the
      transitive-trust nature of DOIC.  Operators need to be careful to
      avoid situations where a non-supporting agent is mistakenly
      trusted to enforce DOIC related authorization policies.

   At the time of this writing, the DIME working group is studying
   requirements for adding end-to-end security features
   [I-D.ietf-dime-e2e-sec-req] to Diameter.  These features, when they
   become available, might make it easier to establish trust in non-
   adjacent nodes for overload control purposes.  Readers should be
   reminded, however, that the overload control mechanism encourages
   Diameter agents to modify AVPs in, or insert additional AVPs into,
   existing messages that are originated by other nodes.  If end-to-end
   security is enabled, there is a risk that such modification could
   violate integrity protection.  The details of using any future
   Diameter end-to-end security mechanism with overload control will
   require careful consideration, and are beyond the scope of this
   document.

11.  Contributors

   The following people contributed substantial ideas, feedback, and
   discussion to this document:

   o  Eric McMurry

   o  Hannes Tschofenig

   o  Ulrich Wiehe

   o  Jean-Jacques Trottin

   o  Maria Cruz Bartolome

   o  Martin Dolly

   o  Nirav Salot

   o  Susan Shishufeng





Korhonen, et al.          Expires June 25, 2015                [Page 32]

Internet-Draft                    DOIC                     December 2014


12.  References

12.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 5226,
              May 2008.

   [RFC6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,
              "Diameter Base Protocol", RFC 6733, October 2012.

12.2.  Informative References

   [Cx]       3GPP, , "ETSI TS 129 229 V11.4.0", August 2013.

   [I-D.ietf-dime-e2e-sec-req]
              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,
              "Diameter AVP Level Security: Scenarios and Requirements",
              draft-ietf-dime-e2e-sec-req-01 (work in progress), October
              2013.

   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.

   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.
              Loughney, "Diameter Credit-Control Application", RFC 4006,
              August 2005.

   [RFC7068]  McMurry, E. and B. Campbell, "Diameter Overload Control
              Requirements", RFC 7068, November 2013.

   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.

Appendix A.  Issues left for future specifications

   The base solution for the overload control does not cover all
   possible use cases.  A number of solution aspects were intentionally
   left for future specification and protocol work.  The following sub-
   sections define some of the potential extensions to the DOIC
   solution.

A.1.  Additional traffic abatement algorithms

   This specification describes only means for a simple loss based
   algorithm.  Future algorithms can be added using the designed
   solution extension mechanism.  The new algorithms need to be



Korhonen, et al.          Expires June 25, 2015                [Page 33]

Internet-Draft                    DOIC                     December 2014


   registered with IANA.  See Sections 7.1 and 9 for the required IANA
   steps.

A.2.  Agent Overload

   This specification focuses on Diameter endpoint (server or client)
   overload.  A separate extension will be required to outline the
   handling of the case of agent overload.

A.3.  New Error Diagnostic AVP

   This specification indicates the use of existing error messages when
   nodes reject requests due to overload.  The DIME working group is
   considering defining additional error codes or AVPs to indicate that
   overload was the reason for the rejection of the message.

Appendix B.  Deployment Considerations

   Non Supporting Agents

      Due to the way that realm-routed requests are handled in Diameter
      networks with the server selection for the request done by an
      agent, network operators should enable DOIC at agents that perform
      server selection first.

   Topology Hiding Interactions

      There exist proxies that implement what is referred to as Topology
      Hiding.  This can include cases where the agent modifies the
      Origin-Host in answer messages.  The behavior of the DOIC solution
      is not well understood when this happens.  As such, the DOIC
      solution does not address this scenario.

Appendix C.  Requirements Conformance Analysis

   This section contains the result of an analysis of the DOIC solutions
   conformance to the requirements defined in [RFC7068].

C.1.  Deferred Requirements

   The 3GPP has adopted an early version of this document as normative
   references in various Diameter related specifications to support the
   overload control mechanism in their release 12 framework.  The DIME
   working group has therefore decided to defer certain requirements in
   order to complete the design of an extensible, generic solution
   before the deadline scheduled by the 3GPP for the completion of the
   release 12 protocol work by the end of 2014.  The deferred work
   includes the following:



Korhonen, et al.          Expires June 25, 2015                [Page 34]

Internet-Draft                    DOIC                     December 2014


   o  Agent Overload - The ability for an agent to report an overload
      condition of the agent itself.

   o  Load Information - The ability for a node to report its load level
      when not overloaded.

   At the time of this writing, DIME has begun separate work efforts for
   these requirements.

C.2.  Detection of non-supporting Intermediaries

   The DOIC mechanism as currently defined does not allow supporting
   nodes to automatically determine whether OC-Supported-Features or OC-
   OLR AVPs are originated by a peer node, or by a non-peer node and
   sent across a non-supporting peer.  This makes it impossible to
   detect the presence of non-supporting nodes between supporting nodes,
   except by configuration.  The working group determined that such a
   configuration requirement is acceptable.

   This limits full compliance with certain requirements related to the
   limitation of new configuration, deployment in environments with
   mixed support, operating across non-supporting agents, and
   authorization.

C.3.  Implicit Application Indication

   The working group elected to determine the application for an
   overload report from that of the enclosing message.  This prevents
   sending an OLR for an application when there are no transactions for
   that application.

   As a consequence, DOIC does not comply with the requirement to be
   able to report overload information across quiescent connections.
   DOIC does not fully comply with requirements to operate on up-to-date
   information, since if an OLR causes all transactions to stop for an
   application, the only way traffic will resume is for the OLR to
   expire.

C.4.  Stateless Operation

   RFC7068 explicitly discourages the sending of OLRs in every answer
   message, as part of the requirement to avoid additional work for
   overloaded nodes.  DOIC recommends exactly that behavior during
   active overload conditions.  The working group determined that doing
   otherwise would reduce reliability and increase statefulness.  (Note
   that DOIC does allow nodes to avoid sending OLRs in every answer if
   they have some other method of ensuring that OLRs get to all relevant
   reacting nodes.)



Korhonen, et al.          Expires June 25, 2015                [Page 35]

Internet-Draft                    DOIC                     December 2014


C.5.  No New Vulnerabilities

   The working group believes that DOIC is compliant with the
   requirement to avoid introducing new vulnerabilities.  However, this
   requirement may warrant an early security expert review.

C.6.  Detailed Requirements

   [RFC Editor: Please remove this section and subsections prior to
   publication as an RFC.]

C.6.1.  General

   REQ 1:  The solution MUST provide a communication method for Diameter
           nodes to exchange load and overload information.

           *Partially Compliant*. The mechanism uses new AVPs
           piggybacked on existing Diameter messages to exchange
           overload information.  It does not currently support "load"
           information or the ability to report overload of an agent.
           These have been left for future extensions.



   REQ 2:  The solution MUST allow Diameter nodes to support overload
           control regardless of which Diameter applications they
           support.  Diameter clients and agents must be able to use the
           received load and overload information to support graceful
           behavior during an overload condition.  Graceful behavior
           under overload conditions is best described by REQ 3.

           *Partially Compliant*. The DOIC AVPs can be used in any
           application that allows the extension of AVPs.  However,
           "load" information is not currently supported.



   REQ 3:  The solution MUST limit the impact of overload on the overall
           useful throughput of a Diameter server, even when the
           incoming load on the network is far in excess of its
           capacity.  The overall useful throughput under load is the
           ultimate measure of the value of a solution.

           *Compliant*. DOIC provides information that nodes can use to
           reduce the impact of overload.






Korhonen, et al.          Expires June 25, 2015                [Page 36]

Internet-Draft                    DOIC                     December 2014


   REQ 4:  Diameter allows requests to be sent from either side of a
           connection, and either side of a connection may have need to
           provide its overload status.  The solution MUST allow each
           side of a connection to independently inform the other of its
           overload status.

           *Compliant*. DOIC AVPs can be included regardless of
           transaction "direction"



   REQ 5:  Diameter allows nodes to determine their peers via dynamic
           discovery or manual configuration.  The solution MUST work
           consistently without regard to how peers are determined.

           *Compliant*. DOIC contains no assumptions about how peers are
           discovered.



   REQ 6:  The solution designers SHOULD seek to minimize the amount of
           new configuration required in order to work.  For example, it
           is better to allow peers to advertise or negotiate support
           for the solution, rather than to require that this knowledge
           to be configured at each node.

           *Partially Compliant*. Most DOIC parameters are advertised
           using the DOIC capability announcement mechanism.  However,
           there are some situations where configuration is required.
           For example, a DOIC node detect the fact that a peer may not
           support DOIC when nodes on the other side of the non-
           supporting node do support DOIC without configuration.



C.6.2.  Performance

   REQ 7:  The solution and any associated default algorithm(s) MUST
           ensure that the system remains stable.  At some point after
           an overload condition has ended, the solution MUST enable
           capacity to stabilize and become equal to what it would be in
           the absence of an overload condition.  Note that this also
           requires that the solution MUST allow nodes to shed load
           without introducing non-converging oscillations during or
           after an overload condition.

           *Compliant*. The specification offers guidance that
           implementations should apply hysteresis when recovering from



Korhonen, et al.          Expires June 25, 2015                [Page 37]

Internet-Draft                    DOIC                     December 2014


           overload, and avoid sudden ramp ups in offered load when
           recovering.



   REQ 8:  Supporting nodes MUST be able to distinguish current overload
           information from stale information.

           *Partially Compliant*. DOIC overload reports are "soft
           state", that is they expire after an indicated period.  DOIC
           nodes may also send reports that end existing overload
           conditions.  DOIC requires reporting nodes to ensure that all
           relevant reacting nodes receive overload reports.

           However, since DOIC does not allow reporting nodes to send
           OLRs in watchdog messages, if an overload condition results
           in zero offered load, the reporting node cannot update the
           condition until the expiration of the original OLR.



   REQ 9:  The solution MUST function across fully loaded as well as
           quiescent transport connections.  This is partially derived
           from the requirement for stability in REQ 7.

           *Not Compliant*. DOIC does not allow OLRs to be sent over
           quiescent transport connections.  This is due to the fact
           that OLRs cannot be sent outside of the application to which
           they apply.



   REQ 10: Consumers of overload information MUST be able to determine
           when the overload condition improves or ends.

           *Partially Compliant*. (See response to previous two
           requirements.)



   REQ 11: The solution MUST be able to operate in networks of different
           sizes.

           *Compliant*. DOIC makes no assumptions about the size of the
           network.  DOIC can operate purely between clients and
           servers, or across agents.





Korhonen, et al.          Expires June 25, 2015                [Page 38]

Internet-Draft                    DOIC                     December 2014


   REQ 12: When a single network node fails, goes into overload, or
           suffers from reduced processing capacity, the solution MUST
           make it possible to limit the impact of the affected node on
           other nodes in the network.  This helps to prevent a small-
           scale failure from becoming a widespread outage.

           *Partially Compliant*. DOIC allows overload reports for an
           entire realm, where abated traffic will not be redirected
           towards another server.  But in situations where nodes choose
           to divert traffic to other nodes, DOIC offers no way of
           knowing whether the new recipients can handle the traffic if
           they have not already indicated overload.  This may be
           mitigated with the use of a future "load" extension, or with
           the use of proprietary dynamic load-balancing mechanisms.



   REQ 13: The solution MUST NOT introduce substantial additional work
           for a node in an overloaded state.  For example, a
           requirement for an overloaded node to send overload
           information every time it received a new request would
           introduce substantial work.

           *Not Compliant*. DOIC does in fact encourage an overloaded
           node to send an OLR in every response.  The working group
           that other mechanisms to ensure that every relevant node
           receives an OLR would create even more work.  [Note: This
           needs discussion.]



   REQ 14: Some scenarios that result in overload involve a rapid
           increase of traffic with little time between normal levels
           and levels that induce overload.  The solution SHOULD provide
           for rapid feedback when traffic levels increase.

           *Compliant*. The piggyback mechanism allows OLRs to be sent
           at the same rate as application traffic.



   REQ 15: The solution MUST NOT interfere with the congestion control
           mechanisms of underlying transport protocols.  For example, a
           solution that opened additional TCP connections when the
           network is congested would reduce the effectiveness of the
           underlying congestion control mechanisms.





Korhonen, et al.          Expires June 25, 2015                [Page 39]

Internet-Draft                    DOIC                     December 2014


           *Compliant*. DOIC does not require or recommend changes in
           the handling of transport protocols or connections.



C.6.3.  Heterogeneous Support for Solution

   REQ 16: The solution is likely to be deployed incrementally.  The
           solution MUST support a mixed environment where some, but not
           all, nodes implement it.

           *Partially Compliant*. DOIC works with most mixed-deployment
           scenarios.  However, it cannot work across a non-supporting
           proxy that modifies Origin-Host AVPs in answer messages.
           DOIC will have limited impact in networks where the nodes
           that perform server selections do not support the mechanism.



   REQ 17: In a mixed environment with nodes that support the solution
           and nodes that do not, the solution MUST NOT result in
           materially less useful throughput during overload as would
           have resulted if the solution were not present.  It SHOULD
           result in less severe overload in this environment.

           *Compliant*. In most mixed-support deployment, DOIC will
           offer at least some value, and will not make things worse.



   REQ 18: In a mixed environment of nodes that support the solution and
           nodes that do not, the solution MUST NOT preclude elements
           that support overload control from treating elements that do
           not support overload control in an equitable fashion relative
           to those that do.  Users and operators of nodes that do not
           support the solution MUST NOT unfairly benefit from the
           solution.  The solution specification SHOULD provide guidance
           to implementers for dealing with elements not supporting
           overload control.

           *Compliant*. DOIC provides mechanisms to abate load from non-
           supporting sources.  Furthermore, it recommends that
           reporting nodes will still need to be able to apply whatever
           protections they would ordinarily apply if DOIC were not in
           use.






Korhonen, et al.          Expires June 25, 2015                [Page 40]

Internet-Draft                    DOIC                     December 2014


   REQ 19: It MUST be possible to use the solution between nodes in
           different realms and in different administrative domains.

           *Partially Compliant*. DOIC allows sending OLRs across
           administrative domains, and potentially to nodes in other
           realms.  However, an OLR cannot indicate overload for realms
           other than the one in the Origin-Realm AVP of the containing
           answer.



   REQ 20: Any explicit overload indication MUST be clearly
           distinguishable from other errors reported via Diameter.

           *Compliant*. DOIC sends explicit overload indication in
           overload reports.  It does not depend on error result codes.



   REQ 21: In cases where a network node fails, is so overloaded that it
           cannot process messages, or cannot communicate due to a
           network failure, it may not be able to provide explicit
           indications of the nature of the failure or its levels of
           overload.  The solution MUST result in at least as much
           useful throughput as would have resulted if the solution were
           not in place.

           *Compliant*. DOIC overload reports have the primary effect of
           suppressing message retries in overload conditions.  DOIC
           recommends that messages never be silently dropped if at all
           possible.



C.6.4.  Granular Control

   REQ 22: The solution MUST provide a way for a node to throttle the
           amount of traffic it receives from a peer node.  This
           throttling SHOULD be graded so that it can be applied
           gradually as offered load increases.  Overload is not a
           binary state; there may be degrees of overload.

           *Compliant*. The "loss" algorithm expresses a percentage
           reduction.







Korhonen, et al.          Expires June 25, 2015                [Page 41]

Internet-Draft                    DOIC                     December 2014


   REQ 23: The solution MUST provide sufficient information to enable a
           load-balancing node to divert messages that are rejected or
           otherwise throttled by an overloaded upstream node to other
           upstream nodes that are the most likely to have sufficient
           capacity to process them.

           *Not Compliant*. DOIC provides no built in mechanism to
           determine the best place to divert messages that would
           otherwise be throttled.  This can be accomplished with a
           future "load" extension, or with proprietary load balancing
           mechanisms.



   REQ 24: The solution MUST provide a mechanism for indicating load
           levels, even when not in an overload condition, to assist
           nodes in making decisions to prevent overload conditions from
           occurring.

           *Not Compliant*. "Load" information has been left for a
           future extension.



C.6.5.  Priority and Policy

   REQ 25: The base specification for the solution SHOULD offer general
           guidance on which message types might be desirable to send or
           process over others during times of overload, based on
           application-specific considerations.  For example, it may be
           more beneficial to process messages for existing sessions
           ahead of new sessions.  Some networks may have a requirement
           to give priority to requests associated with emergency
           sessions.  Any normative or otherwise detailed definition of
           the relative priorities of message types during an overload
           condition will be the responsibility of the application
           specification.

           *Compliant*. The specification offers guidance on how
           requests might be prioritized for different types of
           applications.



   REQ 26: The solution MUST NOT prevent a node from prioritizing
           requests based on any local policy, so that certain requests
           are given preferential treatment, given additional
           retransmission, not throttled, or processed ahead of others.



Korhonen, et al.          Expires June 25, 2015                [Page 42]

Internet-Draft                    DOIC                     December 2014


           *Compliant*. Nothing in the specification prevents
           application-specific, implementation-specific, or local
           policies.



C.6.6.  Security

   REQ 27: The solution MUST NOT provide new vulnerabilities to
           malicious attack or increase the severity of any existing
           vulnerabilities.  This includes vulnerabilities to DoS and
           DDoS attacks as well as replay and man-in-the-middle attacks.
           Note that the Diameter base specification [RFC6733] lacks
           end-to-end security and this must be considered (see the
           Security Considerations in [RFC7068]).  Note that this
           requirement was expressed at a high level so as to not
           preclude any particular solution.  It is expected that the
           solution will address this in more detail.

           *Compliant*. The working group is not aware of any such
           vulnerabilities.  [This may need further analysis.]



   REQ 28: The solution MUST NOT depend on being deployed in
           environments where all Diameter nodes are completely trusted.
           It SHOULD operate as effectively as possible in environments
           where other nodes are malicious; this includes preventing
           malicious nodes from obtaining more than a fair share of
           service.  Note that this does not imply any responsibility on
           the solution to detect, or take countermeasures against,
           malicious nodes.

           *Partially Compliant*. Since all Diameter security is
           currently at the transport layer, nodes must trust immediate
           peers to enforce trust policies.  However, there are
           situations where a DOIC node cannot determine if an immediate
           peer supports DOIC.  The authors recommend an expert security
           review.



   REQ 29: It MUST be possible for a supporting node to make
           authorization decisions about what information will be sent
           to peer nodes based on the identity of those nodes.  This
           allows a domain administrator who considers the load of their
           nodes to be sensitive information to restrict access to that
           information.  Of course, in such cases, there is no



Korhonen, et al.          Expires June 25, 2015                [Page 43]

Internet-Draft                    DOIC                     December 2014


           expectation that the solution itself will help prevent
           overload from that peer node.

           *Partially Compliant*. (See response to previous
           requirement.)



   REQ 30: The solution MUST NOT interfere with any Diameter-compliant
           method that a node may use to protect itself from overload
           from non-supporting nodes or from denial-of-service attacks.

           *Compliant*. The specification recommends that any such
           protection mechanism needed without DOIC should continue to
           be employed with DOIC.



C.6.7.  Flexibility and Extensibility

   REQ 31: There are multiple situations where a Diameter node may be
           overloaded for some purposes but not others.  For example,
           this can happen to an agent or server that supports multiple
           applications, or when a server depends on multiple external
           resources, some of which may become overloaded while others
           are fully available.  The solution MUST allow Diameter nodes
           to indicate overload with sufficient granularity to allow
           clients to take action based on the overloaded resources
           without unreasonably forcing available capacity to go unused.
           The solution MUST support specification of overload
           information with granularities of at least "Diameter node",
           "realm", and "Diameter application" and MUST allow
           extensibility for others to be added in the future.

           *Partially Compliant*. All DOIC overload reports are scoped
           to the specific application and realm.  Inside that scope,
           overload can be reported at the specific server or whole
           realm scope.  As currently specified, DOIC cannot indicate
           local overload for an agent.  At the time of this writing,
           the DIME working group has plans to work on an agent-overload
           extension.

           DOIC allows new "scopes" through the use of extended report
           types.







Korhonen, et al.          Expires June 25, 2015                [Page 44]

Internet-Draft                    DOIC                     December 2014


   REQ 32: The solution MUST provide a method for extending the
           information communicated and the algorithms used for overload
           control.

           *Compliant*. DOIC allows new report types and abatement
           algorithms to be created.  These may be indicated using the
           OC-Supported-Features AVP.



   REQ 33: The solution MUST provide a default algorithm that is
           mandatory to implement.

           *Compliant*. The "loss" algorithm is mandatory to implement.



   REQ 34: The solution SHOULD provide a method for exchanging overload
           and load information between elements that are connected by
           intermediaries that do not support the solution.

           *Partially Compliant*. DOIC information can traverse non-
           supporting agents, as long as those agents do not modify
           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a
           way for supporting nodes to detect such modification.



Appendix D.  Considerations for Applications Integrating the DOIC
             Solution

   This section outlines considerations to be taken into account when
   integrating the DOIC solution into Diameter applications.

D.1.  Application Classification

   The following is a classification of Diameter applications and
   request types.  This discussion is meant to document factors that
   play into decisions made by the Diameter identity responsible for
   handling overload reports.

   Section 8.1 of [RFC6733] defines two state machines that imply two
   types of applications, session-less and session-based applications.
   The primary difference between these types of applications is the
   lifetime of Session-Ids.

   For session-based applications, the Session-Id is used to tie
   multiple requests into a single session.



Korhonen, et al.          Expires June 25, 2015                [Page 45]

Internet-Draft                    DOIC                     December 2014


   The Credit-Control application defined in [RFC4006] is an example of
   a Diameter session-based application.

   In session-less applications, the lifetime of the Session-Id is a
   single Diameter transaction, i.e. the session is implicitly
   terminated after a single Diameter transaction and a new Session-Id
   is generated for each Diameter request.

   For the purposes of this discussion, session-less applications are
   further divided into two types of applications:

   Stateless Applications:

      Requests within a stateless application have no relationship to
      each other.  The 3GPP defined S13 application is an example of a
      stateless application [S13], where only a Diameter command is
      defined between a client and a server and no state is maintained
      between two consecutive transactions.

   Pseudo-Session Applications:

      Applications that do not rely on the Session-Id AVP for
      correlation of application messages related to the same session
      but use other session-related information in the Diameter requests
      for this purpose.  The 3GPP defined Cx application [Cx] is an
      example of a pseudo-session application.

   The handling of overload reports must take the type of application
   into consideration, as discussed in Appendix D.2.

D.2.  Application Type Overload Implications

   This section discusses considerations for mitigating overload
   reported by a Diameter entity.  This discussion focuses on the type
   of application.  Appendix D.3 discusses considerations for handling
   various request types when the target server is known to be in an
   overloaded state.

   These discussions assume that the strategy for mitigating the
   reported overload is to reduce the overall workload sent to the
   overloaded entity.  The concept of applying overload treatment to
   requests targeted for an overloaded Diameter entity is inherent to
   this discussion.  The method used to reduce offered load is not
   specified here but could include routing requests to another Diameter
   entity known to be able to handle them, or it could mean rejecting
   certain requests.  For a Diameter agent, rejecting requests will
   usually mean generating appropriate Diameter error responses.  For a
   Diameter client, rejecting requests will depend upon the application.



Korhonen, et al.          Expires June 25, 2015                [Page 46]

Internet-Draft                    DOIC                     December 2014


   For example, it could mean giving an indication to the entity
   requesting the Diameter service that the network is busy and to try
   again later.

   Stateless Applications:

      By definition there is no relationship between individual requests
      in a stateless application.  As a result, when a request is sent
      or relayed to an overloaded Diameter entity - either a Diameter
      Server or a Diameter Agent - the sending or relaying entity can
      choose to apply the overload treatment to any request targeted for
      the overloaded entity.

   Pseudo-Session Applications:

      For pseudo-session applications, there is an implied ordering of
      requests.  As a result, decisions about which requests towards an
      overloaded entity to reject could take the command code of the
      request into consideration.  This generally means that
      transactions later in the sequence of transactions should be given
      more favorable treatment than messages earlier in the sequence.
      This is because more work has already been done by the Diameter
      network for those transactions that occur later in the sequence.
      Rejecting them could result in increasing the load on the network
      as the transactions earlier in the sequence might also need to be
      repeated.

   Session-Based Applications:

      Overload handling for session-based applications must take into
      consideration the work load associated with setting up and
      maintaining a session.  As such, the entity sending requests
      towards an overloaded Diameter entity for a session-based
      application might tend to reject new session requests prior to
      rejecting intra-session requests.  In addition, session ending
      requests might be given a lower probability of being rejected as
      rejecting session ending requests could result in session status
      being out of sync between the Diameter clients and servers.
      Application designers that would decide to reject mid-session
      requests will need to consider whether the rejection invalidates
      the session and any resulting session cleanup procedures.

D.3.  Request Transaction Classification

   Independent Request:






Korhonen, et al.          Expires June 25, 2015                [Page 47]

Internet-Draft                    DOIC                     December 2014


      An independent request is not correlated to any other requests
      and, as such, the lifetime of the session-id is constrained to an
      individual transaction.

   Session-Initiating Request:

      A session-initiating request is the initial message that
      establishes a Diameter session.  The ACR message defined in
      [RFC6733] is an example of a session-initiating request.

   Correlated Session-Initiating Request:

      There are cases when multiple session-initiated requests must be
      correlated and managed by the same Diameter server.  It is notably
      the case in the 3GPP PCC architecture [PCC], where multiple
      apparently independent Diameter application sessions are actually
      correlated and must be handled by the same Diameter server.

   Intra-Session Request:

      An intra-session request is a request that uses the same Session-
      Id than the one used in a previous request.  An intra-session
      request generally needs to be delivered to the server that handled
      the session creating request for the session.  The STR message
      defined in [RFC6733] is an example of an intra-session request.

   Pseudo-Session Requests:

      Pseudo-session requests are independent requests and do not use
      the same Session-Id but are correlated by other session-related
      information contained in the request.  There exists Diameter
      applications that define an expected ordering of transactions.
      This sequencing of independent transactions results in a pseudo
      session.  The AIR, MAR and SAR requests in the 3GPP defined Cx
      [Cx] application are examples of pseudo-session requests.

D.4.  Request Type Overload Implications

   The request classes identified in Appendix D.3 have implications on
   decisions about which requests should be throttled first.  The
   following list of request treatment regarding throttling is provided
   as guidelines for application designers when implementing the
   Diameter overload control mechanism described in this document.  The
   exact behavior regarding throttling is a matter of local policy,
   unless specifically defined for the application.

   Independent Requests:




Korhonen, et al.          Expires June 25, 2015                [Page 48]

Internet-Draft                    DOIC                     December 2014


      Independent requests can generally be given equal treatment when
      making throttling decisions, unless otherwise indicated by
      application requirements or local policy.

   Session-Initiating Requests:

      Session-initiating requests often represent more work than
      independent or intra-session requests.  Moreover, session-
      initiating requests are typically followed by other session-
      related requests.  Since the main objective of the overload
      control is to reduce the total number of requests sent to the
      overloaded entity, throttling decisions might favor allowing
      intra-session requests over session-initiating requests.  In the
      absence of local policies or application specific requirements to
      the contrary, Individual session-initiating requests can be given
      equal treatment when making throttling decisions.

   Correlated Session-Initiating Requests:

      A Request that results in a new binding, where the binding is used
      for routing of subsequent session-initiating requests to the same
      server, represents more work load than other requests.  As such,
      these requests might be throttled more frequently than other
      request types.

   Pseudo-Session Requests:

      Throttling decisions for pseudo-session requests can take into
      consideration where individual requests fit into the overall
      sequence of requests within the pseudo session.  Requests that are
      earlier in the sequence might be throttled more aggressively than
      requests that occur later in the sequence.

   Intra-Session Requests:

      There are two types of intra-sessions requests, requests that
      terminate a session and the remainder of intra-session requests.
      Implementers and operators may choose to throttle session-
      terminating requests less aggressively in order to gracefully
      terminate sessions, allow cleanup of the related resources (e.g.
      session state) and avoid the need for additional intra-session
      requests.  Favoring session-termination requests may reduce the
      session management impact on the overloaded entity.  The default
      handling of other intra-session requests might be to treat them
      equally when making throttling decisions.  There might also be
      application level considerations whether some request types are
      favored over others.




Korhonen, et al.          Expires June 25, 2015                [Page 49]

Internet-Draft                    DOIC                     December 2014


Authors' Addresses

   Jouni Korhonen (editor)
   Broadcom
   Porkkalankatu 24
   Helsinki  FIN-00180
   Finland

   Email: jouni.nospam@gmail.com


   Steve Donovan (editor)
   Oracle
   7460 Warren Parkway
   Frisco, Texas  75034
   United States

   Email: srdonovan@usdonovans.com


   Ben Campbell
   Oracle
   7460 Warren Parkway
   Frisco, Texas  75034
   United States

   Email: ben@nostrum.com


   Lionel Morand
   Orange Labs
   38/40 rue du General Leclerc
   Issy-Les-Moulineaux Cedex 9  92794
   France

   Phone: +33145296257
   Email: lionel.morand@orange.com














Korhonen, et al.          Expires June 25, 2015                [Page 50]

--------------000005080501070401070001
Content-Type: text/html; charset=ISO-8859-1;
 name="Diff_ draft-ietf-dime-ovli-06.txt - draft-ietf-dime-ovli-06.txt.html"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
 filename*0="Diff_ draft-ietf-dime-ovli-06.txt - draft-ietf-dime-ovli-06.";
 filename*1="txt.html"


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 
<!-- Generated by rfcdiff 1.41: rfcdiff tmp/1/draft-ietf-dime-ovli-06.txt tmp/2/draft-ietf-dime-ovli-06.txt --> 
<!-- System: Linux gamay 2.6.39-2-686-pae #1 SMP Tue Jul 5 03:48:49 UTC 2011 i686 GNU/Linux --> 
<!-- Using awk: /usr/bin/gawk: GNU Awk 4.0.1 --> 
<!-- Using diff: /usr/bin/diff: diff (GNU diffutils) 3.3 --> 
<!-- Using wdiff: /usr/bin/wdiff: wdiff (GNU wdiff) 1.2.1 --> 
<html> 
<head> 
  <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> 
  <meta http-equiv="Content-Style-Type" content="text/css" /> 
  <title>Diff: draft-ietf-dime-ovli-06.txt - draft-ietf-dime-ovli-06.txt</title> 
  <style type="text/css"> 
    body    { margin: 0.4ex; margin-right: auto; } 
    tr      { } 
    td      { white-space: pre; font-family: monospace; vertical-align: top; font-size: 0.86em;} 
    th      { font-size: 0.86em; } 
    .small  { font-size: 0.6em; font-style: italic; font-family: Verdana, Helvetica, sans-serif; } 
    .left   { background-color: #EEE; } 
    .right  { background-color: #FFF; } 
    .diff   { background-color: #CCF; } 
    .lblock { background-color: #BFB; } 
    .rblock { background-color: #FF8; } 
    .insert { background-color: #8FF; } 
    .delete { background-color: #ACF; } 
    .void   { background-color: #FFB; } 
    .cont   { background-color: #EEE; } 
    .linebr { background-color: #AAA; } 
    .lineno { color: red; background-color: #FFF; font-size: 0.7em; text-align: right; padding: 0 2px; } 
    .elipsis{ background-color: #AAA; } 
    .left .cont { background-color: #DDD; } 
    .right .cont { background-color: #EEE; } 
    .lblock .cont { background-color: #9D9; } 
    .rblock .cont { background-color: #DD6; } 
    .insert .cont { background-color: #0DD; } 
    .delete .cont { background-color: #8AD; } 
    .stats, .stats td, .stats th { background-color: #EEE; padding: 2px 0; } 
  </style> 
</head> 
<body > 
  <table border="0" cellpadding="0" cellspacing="0"> 
  <tr bgcolor="orange"><th></th><th><a href="/rfcdiff?url2=draft-ietf-dime-ovli-06.txt" style="color:#008; text-decoration:none;">&lt;</a>&nbsp;<a href="/html/draft-ietf-dime-ovli-06.txt" style="color:#008">draft-ietf-dime-ovli-06.txt</a>&nbsp;</th><th> </th><th>&nbsp;<a href="/html/draft-ietf-dime-ovli-06.txt" style="color:#008">draft-ietf-dime-ovli-06.txt</a>&nbsp;<a href="/rfcdiff?url1=draft-ietf-dime-ovli-06.txt" style="color:#008; text-decoration:none;">&gt;</a></th><th></th></tr> 
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Diameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.</td><td> </td><td class="right">Diameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Internet-Draft                                                  Broadcom</td><td> </td><td class="right">Internet-Draft                                                  Broadcom</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Intended status: Standards Track                         S. Donovan, Ed.</td><td> </td><td class="right">Intended status: Standards Track                         S. Donovan, Ed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0001" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">Expires: June <span class="delete">18</span>, 2015                                       B. Campbell</td><td> </td><td class="rblock">Expires: June <span class="insert">25</span>, 2015                                       B. Campbell</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                                  Oracle</td><td> </td><td class="right">                                                                  Oracle</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                               L. Morand</td><td> </td><td class="right">                                                               L. Morand</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                             Orange Labs</td><td> </td><td class="right">                                                             Orange Labs</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0002" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                       December <span class="delete">15</span>, 2014</td><td> </td><td class="rblock">                                                       December <span class="insert">22</span>, 2014</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                Diameter Overload Indication Conveyance</td><td> </td><td class="right">                Diameter Overload Indication Conveyance</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                      draft-ietf-dime-ovli-06.txt</td><td> </td><td class="right">                      draft-ietf-dime-ovli-06.txt</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Abstract</td><td> </td><td class="right">Abstract</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification defines a base solution for Diameter overload</td><td> </td><td class="right">   This specification defines a base solution for Diameter overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   control, referred to as Diameter Overload Indication Conveyance</td><td> </td><td class="right">   control, referred to as Diameter Overload Indication Conveyance</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (DOIC).</td><td> </td><td class="right">   (DOIC).</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0003" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">Requirements</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   document are to be interpreted as described in RFC 2119 [RFC2119].</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Status of This Memo</td><td> </td><td class="right">Status of This Memo</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This Internet-Draft is submitted in full conformance with the</td><td> </td><td class="right">   This Internet-Draft is submitted in full conformance with the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   provisions of BCP 78 and BCP 79.</td><td> </td><td class="right">   provisions of BCP 78 and BCP 79.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are working documents of the Internet Engineering</td><td> </td><td class="right">   Internet-Drafts are working documents of the Internet Engineering</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Task Force (IETF).  Note that other groups may also distribute</td><td> </td><td class="right">   Task Force (IETF).  Note that other groups may also distribute</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   working documents as Internet-Drafts.  The list of current Internet-</td><td> </td><td class="right">   working documents as Internet-Drafts.  The list of current Internet-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td> </td><td class="right">   Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Internet-Drafts are draft documents valid for a maximum of six months</td><td> </td><td class="right">   Internet-Drafts are draft documents valid for a maximum of six months</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and may be updated, replaced, or obsoleted by other documents at any</td><td> </td><td class="right">   and may be updated, replaced, or obsoleted by other documents at any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   time.  It is inappropriate to use Internet-Drafts as reference</td><td> </td><td class="right">   time.  It is inappropriate to use Internet-Drafts as reference</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   material or to cite them other than as "work in progress."</td><td> </td><td class="right">   material or to cite them other than as "work in progress."</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0004" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   This Internet-Draft will expire on June <span class="delete">18</span>, 2015.</td><td> </td><td class="rblock">   This Internet-Draft will expire on June <span class="insert">25</span>, 2015.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Copyright Notice</td><td> </td><td class="right">Copyright Notice</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Copyright (c) 2014 IETF Trust and the persons identified as the</td><td> </td><td class="right">   Copyright (c) 2014 IETF Trust and the persons identified as the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   document authors.  All rights reserved.</td><td> </td><td class="right">   document authors.  All rights reserved.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td class="right">   This document is subject to BCP 78 and the IETF Trust's Legal</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Provisions Relating to IETF Documents</td><td> </td><td class="right">   Provisions Relating to IETF Documents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td> </td><td class="right">   (http://trustee.ietf.org/license-info) in effect on the date of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   publication of this document.  Please review these documents</td><td> </td><td class="right">   publication of this document.  Please review these documents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   carefully, as they describe your rights and restrictions with respect</td><td> </td><td class="right">   carefully, as they describe your rights and restrictions with respect</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to this document.  Code Components extracted from this document must</td><td> </td><td class="right">   to this document.  Code Components extracted from this document must</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   include Simplified BSD License text as described in Section 4.e of</td><td> </td><td class="right">   include Simplified BSD License text as described in Section 4.e of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the Trust Legal Provisions and are provided without warranty as</td><td> </td><td class="right">   the Trust Legal Provisions and are provided without warranty as</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   described in the Simplified BSD License.</td><td> </td><td class="right">   described in the Simplified BSD License.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Table of Contents</td><td> </td><td class="right">Table of Contents</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td> </td><td class="right">   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4</td><td> </td><td class="right">   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0005" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   3.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5</td><td> </td><td class="rblock">   3.  <span class="insert">Conventions Used in This Document . . . . . . . . . . . . . .   5</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">3.1.</span>  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7</td><td> </td><td class="rblock"><span class="insert">   4.</span>  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">3.2.</span>  DOIC Capability Announcement  . . . . . . . . . . . . . .   <span class="delete">8</span></td><td> </td><td class="rblock">     <span class="insert">4.1.</span>  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     3.3.</span>  DOIC Overload Condition Reporting . . . . . . . . . . . .   9</td><td> </td><td class="rblock">     <span class="insert">4.2.</span>  DOIC Capability Announcement  . . . . . . . . . . . . . .   <span class="insert">7</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">3.4.</span>  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11</td><td> </td><td class="rblock"><span class="insert">     4.3.</span>  DOIC Overload Condition Reporting . . . . . . . . . . . .   9</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">3.5.</span>  Simplified Example Architecture . . . . . . . . . . . . .  <span class="delete">12</span></td><td> </td><td class="rblock">     <span class="insert">4.4.</span>  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   4.</span>  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  <span class="delete">13</span></td><td> </td><td class="rblock">     <span class="insert">4.5.</span>  Simplified Example Architecture . . . . . . . . . . . . .  <span class="insert">11</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     4.1.</span>  Capability Announcement . . . . . . . . . . . . . . . . .  <span class="delete">13</span></td><td> </td><td class="rblock"><span class="insert">   5.</span>  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  <span class="insert">12</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       4.1.1.</span>  Reacting Node Behavior  . . . . . . . . . . . . . . .  <span class="delete">13</span></td><td> </td><td class="rblock"><span class="insert">     5.1.</span>  Capability Announcement . . . . . . . . . . . . . . . . .  <span class="insert">12</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">       4.1.2.</span>  Reporting Node Behavior . . . . . . . . . . . . . . .  13</td><td> </td><td class="rblock"><span class="insert">       5.1.1.</span>  Reacting Node Behavior  . . . . . . . . . . . . . . .  <span class="insert">12</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       <span class="delete">4.1.3.</span>  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14</td><td> </td><td class="rblock"><span class="insert">       5.1.2.</span>  Reporting Node Behavior . . . . . . . . . . . . . . .  13</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">4.2.</span>  Overload Report Processing  . . . . . . . . . . . . . . .  15</td><td> </td><td class="rblock">       <span class="insert">5.1.3.</span>  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       <span class="delete">4.2.1.</span>  Overload Control State  . . . . . . . . . . . . . . .  15</td><td> </td><td class="rblock">     <span class="insert">5.2.</span>  Overload Report Processing  . . . . . . . . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       <span class="delete">4.2.2.</span>  Reacting Node Behavior  . . . . . . . . . . . . . . .  19</td><td> </td><td class="rblock">       <span class="insert">5.2.1.</span>  Overload Control State  . . . . . . . . . . . . . . .  15</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       <span class="delete">4.2.3.</span>  Reporting Node Behavior . . . . . . . . . . . . . . .  20</td><td> </td><td class="rblock">       <span class="insert">5.2.2.</span>  Reacting Node Behavior  . . . . . . . . . . . . . . .  19</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">4.3.</span>  Protocol Extensibility  . . . . . . . . . . . . . . . . .  <span class="delete">22</span></td><td> </td><td class="rblock">       <span class="insert">5.2.3.</span>  Reporting Node Behavior . . . . . . . . . . . . . . .  20</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   5.</span>  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22</td><td> </td><td class="rblock">     <span class="insert">5.3.</span>  Protocol Extensibility  . . . . . . . . . . . . . . . . .  <span class="insert">21</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">5.1.</span>  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">23</span></td><td> </td><td class="rblock"><span class="insert">   6.</span>  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     5.2.</span>  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23</td><td> </td><td class="rblock">     <span class="insert">6.1.</span>  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">22</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">5.3.</span>  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  <span class="delete">24</span></td><td> </td><td class="rblock"><span class="insert">     6.2.</span>  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   6.</span>  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  <span class="delete">25</span></td><td> </td><td class="rblock">     <span class="insert">6.3.</span>  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  <span class="insert">23</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     6.1.</span>  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  <span class="delete">25</span></td><td> </td><td class="rblock"><span class="insert">   7.</span>  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  <span class="insert">24</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     6.2.</span>  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25</td><td> </td><td class="rblock"><span class="insert">     7.1.</span>  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  <span class="insert">24</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">6.3.</span>  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">26</span></td><td> </td><td class="rblock"><span class="insert">     7.2.</span>  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     6.4.</span>  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26</td><td> </td><td class="rblock">     <span class="insert">7.3.</span>  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">25</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     <span class="delete">6.5.</span>  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  <span class="delete">27</span></td><td> </td><td class="rblock"><span class="insert">     7.4.</span>  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     6.6.</span>  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  <span class="delete">27</span></td><td> </td><td class="rblock">     <span class="insert">7.5.</span>  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  <span class="insert">26</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     6.7.</span>  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  <span class="delete">27</span></td><td> </td><td class="rblock"><span class="insert">     7.6.</span>  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  <span class="insert">26</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     6.8.</span>  Attribute Value Pair flag rules . . . . . . . . . . . . .  <span class="delete">28</span></td><td> </td><td class="rblock"><span class="insert">     7.7.</span>  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  <span class="insert">26</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   7.</span>  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  <span class="delete">28</span></td><td> </td><td class="rblock"><span class="insert">     7.8.</span>  Attribute Value Pair flag rules . . . . . . . . . . . . .  <span class="insert">27</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   8.</span>  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  <span class="delete">29</span></td><td> </td><td class="rblock"><span class="insert">   8.</span>  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  <span class="insert">27</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     8.1.</span>  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">29</span></td><td> </td><td class="rblock"><span class="insert">   9.</span>  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  <span class="insert">28</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     8.2.</span>  New registries  . . . . . . . . . . . . . . . . . . . . .  <span class="delete">29</span></td><td> </td><td class="rblock"><span class="insert">     9.1.</span>  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">28</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   9.</span>  Security Considerations . . . . . . . . . . . . . . . . . . .  <span class="delete">30</span></td><td> </td><td class="rblock"><span class="insert">     9.2.</span>  New registries  . . . . . . . . . . . . . . . . . . . . .  <span class="insert">28</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     9.1.</span>  Potential Threat Modes  . . . . . . . . . . . . . . . . .  <span class="delete">30</span></td><td> </td><td class="rblock"><span class="insert">   10.</span> Security Considerations . . . . . . . . . . . . . . . . . . .  <span class="insert">29</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     9.2.</span>  Denial of Service Attacks . . . . . . . . . . . . . . . <span class="delete">.  31</span></td><td> </td><td class="rblock"><span class="insert">     10.1.</span>  Potential Threat Modes . . . . . . . . . . . . . . . . .  <span class="insert">29</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     9.3.</span>  Non-Compliant Nodes . . . . . . . . . . . . . . . . . . <span class="delete">.  32</span></td><td> </td><td class="rblock"><span class="insert">     10.2.</span>  Denial of Service Attacks  . . . . . . . . . . . . . . .  <span class="insert">30</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     9.4.</span>  End-to End-Security Issues  . . . . . . . . . . . . . . .  <span class="delete">32</span></td><td> </td><td class="rblock"><span class="insert">     10.3.</span>  Non-Compliant Nodes  . . . . . . . . . . . . . . . . . .  <span class="insert">31</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   10.</span> Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">33</span></td><td> </td><td class="rblock"><span class="insert">     10.4.</span>  End-to End-Security Issues . . . . . . . . . . . . . . .  <span class="insert">31</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   11.</span> References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">34</span></td><td> </td><td class="rblock"><span class="insert">   11.</span> Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">32</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     11.1.</span>  Normative References . . . . . . . . . . . . . . . . . .  <span class="delete">34</span></td><td> </td><td class="rblock"><span class="insert">   12.</span> References  . . . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">33</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">     11.2.</span>  Informative References . . . . . . . . . . . . . . . . .  <span class="delete">34</span></td><td> </td><td class="rblock"><span class="insert">     12.1.</span>  Normative References . . . . . . . . . . . . . . . . . .  <span class="insert">33</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Appendix A.  Issues left for future specifications  . . . . . . .  <span class="delete">34</span></td><td> </td><td class="rblock"><span class="insert">     12.2.</span>  Informative References . . . . . . . . . . . . . . . . .  <span class="insert">33</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     A.1.  Additional traffic abatement algorithms . . . . . . . . .  <span class="delete">35</span></td><td> </td><td class="rblock">   Appendix A.  Issues left for future specifications  . . . . . . .  <span class="insert">33</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  <span class="delete">35</span></td><td> </td><td class="rblock">     A.1.  Additional traffic abatement algorithms . . . . . . . . .  <span class="insert">33</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  <span class="delete">35</span></td><td> </td><td class="rblock">     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  <span class="insert">34</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  <span class="delete">35</span></td><td> </td><td class="rblock">     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  <span class="insert">34</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Appendix C.  Requirements Conformance Analysis  . . . . . . . . .  <span class="delete">35</span></td><td> </td><td class="rblock">   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  <span class="insert">34</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  <span class="delete">36</span></td><td> </td><td class="rblock">   Appendix C.  Requirements Conformance Analysis  . . . . . . . . .  <span class="insert">34</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  <span class="delete">36</span></td><td> </td><td class="rblock">     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  <span class="insert">34</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     C.3.  Implicit Application Indication . . . . . . . . . . . . .  <span class="delete">36</span></td><td> </td><td class="rblock">     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  <span class="insert">35</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  <span class="delete">37</span></td><td> </td><td class="rblock">     C.3.  Implicit Application Indication . . . . . . . . . . . . .  <span class="insert">35</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     C.5.  No New Vulnerabilities  . . . . . . . . . . . . . . . . .  <span class="delete">37</span></td><td> </td><td class="rblock">     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  <span class="insert">35</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  <span class="delete">37</span></td><td> </td><td class="rblock">     C.5.  No New Vulnerabilities  . . . . . . . . . . . . . . . . .  <span class="insert">36</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.1.  General . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">37</span></td><td> </td><td class="rblock">     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  <span class="insert">36</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  <span class="delete">39</span></td><td> </td><td class="rblock">       C.6.1.  General . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">36</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  <span class="delete">41</span></td><td> </td><td class="rblock">       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  <span class="insert">37</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  <span class="delete">43</span></td><td> </td><td class="rblock">       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  <span class="insert">40</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  <span class="delete">43</span></td><td> </td><td class="rblock">       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  <span class="insert">41</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">44</span></td><td> </td><td class="rblock">       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  <span class="insert">42</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  <span class="delete">45</span></td><td> </td><td class="rblock">       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">43</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  <span class="insert">44</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Appendix D.  Considerations for Applications Integrating the DOIC</td><td> </td><td class="right">   Appendix D.  Considerations for Applications Integrating the DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0006" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                Solution . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">46</span></td><td> </td><td class="rblock">                Solution . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">45</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     D.1.  Application Classification  . . . . . . . . . . . . . . .  <span class="delete">47</span></td><td> </td><td class="rblock">     D.1.  Application Classification  . . . . . . . . . . . . . . .  <span class="insert">45</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     D.2.  Application Type Overload Implications  . . . . . . . . .  <span class="delete">48</span></td><td> </td><td class="rblock">     D.2.  Application Type Overload Implications  . . . . . . . . .  <span class="insert">46</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     D.3.  Request Transaction Classification  . . . . . . . . . . .  <span class="delete">49</span></td><td> </td><td class="rblock">     D.3.  Request Transaction Classification  . . . . . . . . . . .  <span class="insert">47</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">     D.4.  Request Type Overload Implications  . . . . . . . . . . .  <span class="delete">50</span></td><td> </td><td class="rblock">     D.4.  Request Type Overload Implications  . . . . . . . . . . .  <span class="insert">48</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span class="delete">51</span></td><td> </td><td class="rblock">   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  <span class="insert">50</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">1.  Introduction</td><td> </td><td class="right">1.  Introduction</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification defines a base solution for Diameter overload</td><td> </td><td class="right">   This specification defines a base solution for Diameter overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   control, referred to as Diameter Overload Indication Conveyance</td><td> </td><td class="right">   control, referred to as Diameter Overload Indication Conveyance</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (DOIC), based on the requirements identified in [RFC7068].</td><td> </td><td class="right">   (DOIC), based on the requirements identified in [RFC7068].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification addresses Diameter overload control between</td><td> </td><td class="right">   This specification addresses Diameter overload control between</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter nodes that support the DOIC solution.  The solution, which</td><td> </td><td class="right">   Diameter nodes that support the DOIC solution.  The solution, which</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is designed to apply to existing and future Diameter applications,</td><td> </td><td class="right">   is designed to apply to existing and future Diameter applications,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requires no changes to the Diameter base protocol [RFC6733] and is</td><td> </td><td class="right">   requires no changes to the Diameter base protocol [RFC6733] and is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   deployable in environments where some Diameter nodes do not implement</td><td> </td><td class="right">   deployable in environments where some Diameter nodes do not implement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the Diameter overload control solution defined in this specification.</td><td> </td><td class="right">   the Diameter overload control solution defined in this specification.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0007" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">A new application specification can incorporate the overload control</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   mechanism specified in this document by making it mandatory to</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   implement for the application and referencing this specification</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   normatively.  It is the responsibility of the Diameter application</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   designers to define how overload control mechanisms works on that</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   application.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Note that the overload control solution defined in this specification</td><td> </td><td class="right">   Note that the overload control solution defined in this specification</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   does not address all the requirements listed in [RFC7068].  A number</td><td> </td><td class="right">   does not address all the requirements listed in [RFC7068].  A number</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   of overload control related features are left for future</td><td> </td><td class="right">   of overload control related features are left for future</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   specifications.  See Appendix A for a list of extensions that are</td><td> </td><td class="right">   specifications.  See Appendix A for a list of extensions that are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   currently being considered.  See Appendix C for an analysis of</td><td> </td><td class="right">   currently being considered.  See Appendix C for an analysis of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   conformance to the requirements specified in [RFC7068].</td><td> </td><td class="right">   conformance to the requirements specified in [RFC7068].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">2.  Terminology and Abbreviations</td><td> </td><td class="right">2.  Terminology and Abbreviations</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Abatement</td><td> </td><td class="right">   Abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Reaction to receipt of an overload report resulting in a reduction</td><td> </td><td class="right">      Reaction to receipt of an overload report resulting in a reduction</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      in traffic sent to the reporting node.  Abatement actions include</td><td> </td><td class="right">      in traffic sent to the reporting node.  Abatement actions include</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      diversion and throttling.</td><td> </td><td class="right">      diversion and throttling.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Abatement Algorithm</td><td> </td><td class="right">   Abatement Algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0008" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      <span class="delete">A</span> mechanism requested by reporting nodes and used by reacting</td><td> </td><td class="rblock">      <span class="insert">An extensible</span> mechanism requested by reporting nodes and used by</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      nodes to reduce the amount of traffic sent during an occurrence of</td><td> </td><td class="rblock">      reacting nodes to reduce the amount of traffic sent during an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      overload control.</td><td> </td><td class="rblock">      occurrence of overload control.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diversion</td><td> </td><td class="right">   Diversion</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0009" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      <span class="delete">A mechanism used for</span> overload abatement <span class="delete">by selecting a different</span></td><td> </td><td class="rblock">      <span class="insert">An</span> overload abatement <span class="insert">mechanism, where the reacting node selects</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      path</span> for requests.</td><td> </td><td class="rblock"><span class="insert">      alternate destinations or paths for</span> for requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Host-Routed Requests</td><td> </td><td class="right">   Host-Routed Requests</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Requests that a reacting node knows will be served by a particular</td><td> </td><td class="right">      Requests that a reacting node knows will be served by a particular</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      host, either due to the presence of a Destination-Host AVP, or by</td><td> </td><td class="right">      host, either due to the presence of a Destination-Host AVP, or by</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      some other local knowledge on the part of the reacting node.</td><td> </td><td class="right">      some other local knowledge on the part of the reacting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Overload Control State (OCS)</td><td> </td><td class="right">   Overload Control State (OCS)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0010" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      <span class="delete">Reporting and</span> reacting node <span class="delete">internally maintained state</span> describing</td><td> </td><td class="rblock">      <span class="insert">Internal state maintained by a reporting or</span> reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      occurrences of overload control.</td><td> </td><td class="rblock">      describing occurrences of overload control.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Overload Report (OLR)</td><td> </td><td class="right">   Overload Report (OLR)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Overload control information for a particular overload occurrence</td><td> </td><td class="right">      Overload control information for a particular overload occurrence</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      sent by a reporting node.</td><td> </td><td class="right">      sent by a reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reacting Node</td><td> </td><td class="right">   Reacting Node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      A Diameter node that acts upon an overload report.</td><td> </td><td class="right">      A Diameter node that acts upon an overload report.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Realm-Routed Requests</td><td> </td><td class="right">   Realm-Routed Requests</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0011" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      Requests that a reacting node does not know <span class="delete">the host tha</span>t will</td><td> </td><td class="rblock">      Requests that a reacting node does not know <span class="insert">which hos</span>t will</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      service the request.</td><td> </td><td class="right">      service the request.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reporting Node</td><td> </td><td class="right">   Reporting Node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      A Diameter node that generates an overload report.  (This may or</td><td> </td><td class="right">      A Diameter node that generates an overload report.  (This may or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      may not be the overloaded node.)</td><td> </td><td class="right">      may not be the overloaded node.)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Throttling</td><td> </td><td class="right">   Throttling</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      A mechanism for overload abatement that limits the number of</td><td> </td><td class="right">      A mechanism for overload abatement that limits the number of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      requests sent by the DIOC reacting node.  Throttling can include a</td><td> </td><td class="right">      requests sent by the DIOC reacting node.  Throttling can include a</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0012" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      Diameter Client not <span class="delete">sending</span> requests, or a Diameter Agent or</td><td> </td><td class="rblock">      Diameter Client <span class="insert">choosing to</span> not <span class="insert">send</span> requests, or a Diameter Agent</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      Server rejecting requests with appropriate error responses.  In</td><td> </td><td class="rblock">      or Server rejecting requests with appropriate error responses.  In</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      both cases the result of the throttling is a permanent rejection</td><td> </td><td class="right">      both cases the result of the throttling is a permanent rejection</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      of the transaction.</td><td> </td><td class="right">      of the transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0013" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">3.  Solution Overview</td><td> </td><td class="rblock">3.  <span class="insert">Conventions Used in This Document</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   document are to be interpreted as described in RFC 2119 [RFC2119].</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">4.</span>  Solution Overview</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The Diameter Overload Information Conveyance (DOIC) solution allows</td><td> </td><td class="right">   The Diameter Overload Information Conveyance (DOIC) solution allows</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter nodes to request other Diameter nodes to perform overload</td><td> </td><td class="right">   Diameter nodes to request other Diameter nodes to perform overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement actions, that is, actions to reduce the load offered to the</td><td> </td><td class="right">   abatement actions, that is, actions to reduce the load offered to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overloaded node or realm.</td><td> </td><td class="right">   overloaded node or realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A Diameter node that supports DOIC is known as a "DOIC node".  Any</td><td> </td><td class="right">   A Diameter node that supports DOIC is known as a "DOIC node".  Any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter node can act as a DOIC node, including Diameter Clients,</td><td> </td><td class="right">   Diameter node can act as a DOIC node, including Diameter Clients,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter Servers, and Diameter Agents.  DOIC nodes are further</td><td> </td><td class="right">   Diameter Servers, and Diameter Agents.  DOIC nodes are further</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting</td><td> </td><td class="right">   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l2" /><small>skipping to change at</small><em> page 6, line 10</em></th><th> </th><th><a name="part-r2" /><small>skipping to change at</small><em> page 6, line 16</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Likewise, a Diameter Agent may act as a reacting node from the</td><td> </td><td class="right">   Likewise, a Diameter Agent may act as a reacting node from the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   perspective of upstream nodes, and a reporting node from the</td><td> </td><td class="right">   perspective of upstream nodes, and a reporting node from the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   perspective of downstream nodes.</td><td> </td><td class="right">   perspective of downstream nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC nodes do not generate new messages to carry DOIC related</td><td> </td><td class="right">   DOIC nodes do not generate new messages to carry DOIC related</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information.  Rather, they "piggyback" DOIC information over existing</td><td> </td><td class="right">   information.  Rather, they "piggyback" DOIC information over existing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter messages by inserting new AVPs into existing Diameter</td><td> </td><td class="right">   Diameter messages by inserting new AVPs into existing Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requests and responses.  Nodes indicate support for DOIC, and any</td><td> </td><td class="right">   requests and responses.  Nodes indicate support for DOIC, and any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   needed DOIC parameters, by inserting an OC-Supported-Features AVP</td><td> </td><td class="right">   needed DOIC parameters, by inserting an OC-Supported-Features AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0014" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   (Section <span class="delete">6.2)</span> into existing requests and responses.  Reporting nodes</td><td> </td><td class="rblock">   (Section <span class="insert">7.2)</span> into existing requests and responses.  Reporting nodes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   send OLRs by inserting OC-OLR AVPs (Section <span class="delete">6.3).</span></td><td> </td><td class="rblock">   send OLRs by inserting OC-OLR AVPs (Section <span class="insert">7.3).</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A given OLR applies to the Diameter realm and application of the</td><td> </td><td class="right">   A given OLR applies to the Diameter realm and application of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter message that carries it.  If a reporting node supports more</td><td> </td><td class="right">   Diameter message that carries it.  If a reporting node supports more</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   than one realm and/or application, it reports independently for each</td><td> </td><td class="right">   than one realm and/or application, it reports independently for each</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   combination of realm and application.  Similarly, the OC-Supported-</td><td> </td><td class="right">   combination of realm and application.  Similarly, the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Features AVP applies to the realm and application of the enclosing</td><td> </td><td class="right">   Features AVP applies to the realm and application of the enclosing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message.  This implies that a node may support DOIC for one</td><td> </td><td class="right">   message.  This implies that a node may support DOIC for one</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   application and/or realm, but not another, and may indicate different</td><td> </td><td class="right">   application and/or realm, but not another, and may indicate different</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC parameters for each application and realm for which it supports</td><td> </td><td class="right">   DOIC parameters for each application and realm for which it supports</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC.</td><td> </td><td class="right">   DOIC.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reacting nodes perform overload abatement according to an agreed-upon</td><td> </td><td class="right">   Reacting nodes perform overload abatement according to an agreed-upon</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement algorithm.  An abatement algorithm defines the meaning of</td><td> </td><td class="right">   abatement algorithm.  An abatement algorithm defines the meaning of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   some of the parameters of an OLR and the procedures required for</td><td> </td><td class="right">   some of the parameters of an OLR and the procedures required for</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload abatement.  An overload abatement algorithm separates</td><td> </td><td class="right">   overload abatement.  An overload abatement algorithm separates</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter requests into two sets.  The first set contains the requests</td><td> </td><td class="right">   Diameter requests into two sets.  The first set contains the requests</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that are to undergo overload abatement treatment of either throttling</td><td> </td><td class="right">   that are to undergo overload abatement treatment of either throttling</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   or diversion.  The second set contains the requests that are to be</td><td> </td><td class="right">   or diversion.  The second set contains the requests that are to be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   given normal routing treatment.  This document specifies a single</td><td> </td><td class="right">   given normal routing treatment.  This document specifies a single</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0015" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   must-support algorithm, namely the "loss" algorithm (Section <span class="delete">5</span>).</td><td> </td><td class="rblock">   must-support algorithm, namely the "loss" algorithm (Section <span class="insert">6</span>).</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Future specifications may introduce new algorithms.</td><td> </td><td class="right">   Future specifications may introduce new algorithms.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Overload conditions may vary in scope.  For example, a single</td><td> </td><td class="right">   Overload conditions may vary in scope.  For example, a single</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter node may be overloaded, in which case reacting nodes may</td><td> </td><td class="right">   Diameter node may be overloaded, in which case reacting nodes may</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   attempt to send requests to other destinations.  On the other hand,</td><td> </td><td class="right">   attempt to send requests to other destinations.  On the other hand,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   an entire Diameter realm may be overloaded, in which case such</td><td> </td><td class="right">   an entire Diameter realm may be overloaded, in which case such</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   attempts would do harm.  DOIC OLRs have a concept of "report type"</td><td> </td><td class="right">   attempts would do harm.  DOIC OLRs have a concept of "report type"</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0016" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   (Section <span class="delete">6</span>.6), where the type defines such behaviors.  Report types</td><td> </td><td class="rblock">   (Section <span class="insert">7</span>.6), where the type defines such behaviors.  Report types</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   are extensible.  This document defines report types for overload of a</td><td> </td><td class="right">   are extensible.  This document defines report types for overload of a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   specific host, and for overload of an entire realm.</td><td> </td><td class="right">   specific host, and for overload of an entire realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0017" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">A report of type "HOST_REPORT" is sent to indicate the overload of a</span></td><td> </td><td class="rblock">   DOIC <span class="insert">works through non supporting</span> Diameter <span class="insert">Agents</span> that <span class="insert">properly</span> pass</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   specific host, identified by the Origin-Host AVP of the message</span></td><td> </td><td class="rblock">   unknown AVPs unchanged.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   containing the OLR, for the application-id indicated in the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   transaction.  When receiving an OLR of type "HOST_REPORT", a reacting</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   node applies overload abatement treatment to the host-routed requests</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   identified by the overload abatement algorithm (see definition in</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Section 2) sent for this application to the overloaded host.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   A report of type "REALM_REPORT" is sent to indicate the overload of a</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   realm for the application-id indicated in the transaction.  The</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   overloaded realm is identified by the Destination-Realm AVP of the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   message containing the OLR.  When receiving an OLR of type</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   "REALM_REPORT", a reacting node applies overload abatement treatment</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   to realm-routed requests identified by the overload abatement</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   algorithm (see definition in Section 2) sent for this application to</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the overloaded realm.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   that are "adjacent" for</span> DOIC <span class="delete">purposes may not be adjacent from a</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Diameter, or transport, perspective.  For example, one or more</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Diameter <span class="delete">agents</span> that <span class="delete">do not support DOIC may exist between a given</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   pair of reporting and reacting nodes, as long as those agents</span> pass</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   unknown AVPs <span class="delete">through</span> unchanged.  <span class="delete">The report types described in this</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   document can safely pass through non-supporting agents.  This may not</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   be true for report types defined in future specifications.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0018" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">3</span>.1.  Piggybacking</td><td> </td><td class="rblock"><span class="insert">4</span>.1.  Piggybacking</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   There is no new Diameter application defined to carry overload</td><td> </td><td class="right">   There is no new Diameter application defined to carry overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   related AVPs.  The overload control AVPs defined in this</td><td> </td><td class="right">   related AVPs.  The overload control AVPs defined in this</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   specification have been designed to be piggybacked on top of existing</td><td> </td><td class="right">   specification have been designed to be piggybacked on top of existing</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0019" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   application messages.  This is made possible by adding overload</td><td> </td><td class="rblock">   application messages.  This is made possible by adding <span class="insert">the optional</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   control <span class="delete">AVPs, the</span> OC-OLR <span class="delete">AVP</span> and <span class="delete">the</span> OC-Supported-Features <span class="delete">AVP, as</span></td><td> </td><td class="rblock">   overload control <span class="insert">AVPs</span> OC-OLR and OC-Supported-Features into existing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   optional AVPs</span> into existing <span class="delete">commands when the corresponding Command</span></td><td> </td><td class="rblock">   <span class="insert">commands.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Code Format (CCF) specification allows adding new optional AVPs (see</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Section 1.3.4 of [RFC6733]).</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reacting nodes indicate support for DOIC by including the OC-</td><td> </td><td class="right">   Reacting nodes indicate support for DOIC by including the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP in all request messages originated or relayed</td><td> </td><td class="right">   Supported-Features AVP in all request messages originated or relayed</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   by the reacting node.</td><td> </td><td class="right">   by the reacting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reporting nodes indicate support for DOIC by including the OC-</td><td> </td><td class="right">   Reporting nodes indicate support for DOIC by including the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP in all answer messages originated or relayed</td><td> </td><td class="right">   Supported-Features AVP in all answer messages originated or relayed</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   by the reporting node that are in response to a request that</td><td> </td><td class="right">   by the reporting node that are in response to a request that</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0020" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   contained the OC-Supported-Features AVP.  Reporting nodes <span class="delete">also</span></td><td> </td><td class="rblock">   contained the OC-Supported-Features AVP.  Reporting nodes <span class="insert">may</span> include</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   include overload reports using the OC-OLR AVP in answer messages.</td><td> </td><td class="rblock">   overload reports using the OC-OLR AVP in answer messages.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Note that the overload control solution does not have fixed server</td><td> </td><td class="right">   Note that the overload control solution does not have fixed server</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and client roles.  The DOIC node role is determined based on the</td><td> </td><td class="right">   and client roles.  The DOIC node role is determined based on the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message type: whether the message is a request (i.e. sent by a</td><td> </td><td class="right">   message type: whether the message is a request (i.e. sent by a</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0021" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   "reacting node") or an answer (i.e. sen<span class="delete">d</span> by a "reporting node").</td><td> </td><td class="rblock">   "reacting node") or an answer (i.e. sen<span class="insert">t</span> by a "reporting node").</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Therefore, in a typical "client-server" deployment, the Diameter</td><td> </td><td class="right">   Therefore, in a typical "client-server" deployment, the Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0022" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Client <span class="delete">MAY</span> report its overload condition to the Diameter Server for</td><td> </td><td class="rblock">   Client <span class="insert">may</span> report its overload condition to the Diameter Server for</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   any Diameter Server initiated message exchange.  An example of such</td><td> </td><td class="right">   any Diameter Server initiated message exchange.  An example of such</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is the Diameter Server requesting a re-authentication from a Diameter</td><td> </td><td class="right">   is the Diameter Server requesting a re-authentication from a Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Client.</td><td> </td><td class="right">   Client.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0023" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">3</span>.2.  DOIC Capability Announcement</td><td> </td><td class="rblock"><span class="insert">4</span>.2.  DOIC Capability Announcement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DOIC solution supports the ability for Diameter nodes to</td><td> </td><td class="right">   The DOIC solution supports the ability for Diameter nodes to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   determine if other nodes in the path of a request support the</td><td> </td><td class="right">   determine if other nodes in the path of a request support the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   solution.  This capability is referred to as DOIC Capability</td><td> </td><td class="right">   solution.  This capability is referred to as DOIC Capability</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Announcement (DCA) and is separate from Diameter Capability Exchange.</td><td> </td><td class="right">   Announcement (DCA) and is separate from Diameter Capability Exchange.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the</td><td> </td><td class="right">   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter overload features supported.</td><td> </td><td class="right">   Diameter overload features supported.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The first node in the path of a Diameter request that supports the</td><td> </td><td class="right">   The first node in the path of a Diameter request that supports the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC solution inserts the OC-Supported-Features AVP in the request</td><td> </td><td class="right">   DOIC solution inserts the OC-Supported-Features AVP in the request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message.</td><td> </td><td class="right">   message.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0024" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">The individual features supported by the DOIC nodes are indicated in</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   the OC-Feature-Vector AVP.  Any semantics associated with the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   features will be defined in extension specifications that introduce</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   the features.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: As discussed elsewhere in the document, agents in the path</td><td> </td><td class="right">      Note: As discussed elsewhere in the document, agents in the path</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      of the request can modify the OC-Supported-Features AVP.</td><td> </td><td class="right">      of the request can modify the OC-Supported-Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: The DOIC solution must support deployments where Diameter</td><td> </td><td class="right">      Note: The DOIC solution must support deployments where Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Clients and/or Diameter Servers do not support the DOIC solution.</td><td> </td><td class="right">      Clients and/or Diameter Servers do not support the DOIC solution.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      In this scenario, Diameter Agents that support the DOIC solution</td><td> </td><td class="right">      In this scenario, Diameter Agents that support the DOIC solution</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      may handle overload abatement for the non supporting Diameter</td><td> </td><td class="right">      may handle overload abatement for the non supporting Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      nodes.  In this case the DOIC agent will insert the OC-Supported-</td><td> </td><td class="right">      nodes.  In this case the DOIC agent will insert the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Features AVP in requests that do not already contain one, telling</td><td> </td><td class="right">      Features AVP in requests that do not already contain one, telling</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the reporting node that there is a DOIC node that will handle</td><td> </td><td class="right">      the reporting node that there is a DOIC node that will handle</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      overload abatement.  For transactions where there was an OC-</td><td> </td><td class="right">      overload abatement.  For transactions where there was an OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Supporting-Features AVP in the request, the agent will insert the</td><td> </td><td class="right">      Supporting-Features AVP in the request, the agent will insert the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OC-Supported-Features AVP in answers, telling the reacting node</td><td> </td><td class="right">      OC-Supported-Features AVP in answers, telling the reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      that there is a reporting node.</td><td> </td><td class="right">      that there is a reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0025" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-Feature-Vector AVP will contain an indication of support for</td><td> </td><td class="rblock">   The OC-Feature-Vector AVP will <span class="insert">always</span> contain an indication of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the loss overload abatement algorithm defined in this specification</td><td> </td><td class="rblock">   support for the loss overload abatement algorithm defined in this</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   (see Section <span class="delete">5).</span>  This ensures that a reporting node always supports</td><td> </td><td class="rblock">   specification (see Section <span class="insert">6).</span>  This ensures that a reporting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   at least one of the advertized abatement algorithms received in a</td><td> </td><td class="rblock">   always supports at least one of the advertized abatement algorithms</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   request messages.</td><td> </td><td class="rblock">   received in a request messages.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reporting node inserts the OC-Supported-Features AVP in all</td><td> </td><td class="right">   The reporting node inserts the OC-Supported-Features AVP in all</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   answer messages to requests that contained the OC-Supported-Features</td><td> </td><td class="right">   answer messages to requests that contained the OC-Supported-Features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   AVP.  The contents of the reporting node's OC-Supported-Features AVP</td><td> </td><td class="right">   AVP.  The contents of the reporting node's OC-Supported-Features AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicate the set of Diameter overload features supported by the</td><td> </td><td class="right">   indicate the set of Diameter overload features supported by the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reporting node.  This specification defines one exception - the</td><td> </td><td class="right">   reporting node.  This specification defines one exception - the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reporting node only includes an indication of support for one</td><td> </td><td class="right">   reporting node only includes an indication of support for one</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload abatement algorithm, independent of the number of overload</td><td> </td><td class="right">   overload abatement algorithm, independent of the number of overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement algorithms actually supported by the reacting node.  The</td><td> </td><td class="right">   abatement algorithms actually supported by the reacting node.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload abatement algorithm indicated is the algorithm that the</td><td> </td><td class="right">   overload abatement algorithm indicated is the algorithm that the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l3" /><small>skipping to change at</small><em> page 9, line 15</em></th><th> </th><th><a name="part-r3" /><small>skipping to change at</small><em> page 8, line 49</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requested.</td><td> </td><td class="right">   requested.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note that the loss algorithm defined in this document is a</td><td> </td><td class="right">      Note that the loss algorithm defined in this document is a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      stateless abatement algorithm.  As a result it does not require</td><td> </td><td class="right">      stateless abatement algorithm.  As a result it does not require</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      any actions by reacting nodes prior to the receipt of an overload</td><td> </td><td class="right">      any actions by reacting nodes prior to the receipt of an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      report.  Stateful abatement algorithms that base the abatement</td><td> </td><td class="right">      report.  Stateful abatement algorithms that base the abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      logic on a history of request messages sent might require reacting</td><td> </td><td class="right">      logic on a history of request messages sent might require reacting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      nodes to maintain state in advance of receiving an overload report</td><td> </td><td class="right">      nodes to maintain state in advance of receiving an overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      to ensure that the overload reports can be properly handled.</td><td> </td><td class="right">      to ensure that the overload reports can be properly handled.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0026" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Reporting nodes <span class="delete">are allowed to</span> change the overload abatement</td><td> </td><td class="rblock">   Reporting nodes <span class="insert">can</span> change the overload abatement algorithm indicated</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   algorithm indicated in the OC-Feature-Vector AVP if the reporting</td><td> </td><td class="rblock">   in the OC-Feature-Vector AVP if the reporting node is not currently</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   node is not currently in an overload condition and sending overload</td><td> </td><td class="rblock">   in an overload condition and sending overload reports.  The reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   reports.  The reporting node is not allowed to change the overload</td><td> </td><td class="rblock">   node is not allowed to change the overload abatement algorithm while</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   abatement algorithm while the reporting node is in an overload</td><td> </td><td class="rblock">   the reporting node is in an overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   condition.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The individual features supported by the DOIC nodes are indicated in</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the OC-Feature-Vector AVP.  Any semantics associated with the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   features will be defined in extension specifications that introduce</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the features.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DCA mechanism must also allow the scenario where the set of</td><td> </td><td class="right">   The DCA mechanism must also allow the scenario where the set of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   features supported by the sender of a request and by agents in the</td><td> </td><td class="right">   features supported by the sender of a request and by agents in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   path of a request differ.  In this case, the agent can update the OC-</td><td> </td><td class="right">   path of a request differ.  In this case, the agent can update the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP to reflect the mixture of the two sets of</td><td> </td><td class="right">   Supported-Features AVP to reflect the mixture of the two sets of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supported features.</td><td> </td><td class="right">   supported features.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: The logic to determine if the content of the OC-Supported-</td><td> </td><td class="right">      Note: The logic to determine if the content of the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Features AVP should be changed is out-of-scope for this document,</td><td> </td><td class="right">      Features AVP should be changed is out-of-scope for this document,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      as is the logic to determine the content of a modified OC-</td><td> </td><td class="right">      as is the logic to determine the content of a modified OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Supported-Features AVP.  These are left to implementation</td><td> </td><td class="right">      Supported-Features AVP.  These are left to implementation</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      decisions.  Care must be taken not to introduce interoperability</td><td> </td><td class="right">      decisions.  Care must be taken not to introduce interoperability</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      issues for downstream or upstream DOIC nodes.</td><td> </td><td class="right">      issues for downstream or upstream DOIC nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0027" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">3</span>.3.  DOIC Overload Condition Reporting</td><td> </td><td class="rblock"><span class="insert">4</span>.3.  DOIC Overload Condition Reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As with DOIC capability announcement, overload condition reporting</td><td> </td><td class="right">   As with DOIC capability announcement, overload condition reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0028" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   uses new AVPs (Section <span class="delete">6</span>.3) to indicate an overload condition.</td><td> </td><td class="rblock">   uses new AVPs (Section <span class="insert">7</span>.3) to indicate an overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP</td><td> </td><td class="right">   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   includes the type of report, a sequence number, the length of time</td><td> </td><td class="right">   includes the type of report, a sequence number, the length of time</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that the report is valid and abatement algorithm specific AVPs.</td><td> </td><td class="right">   that the report is valid and abatement algorithm specific AVPs.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0029" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Two types of overload reports are defined in this document<span class="delete">,</span> host</td><td> </td><td class="rblock">   Two types of overload reports are defined in this document<span class="insert">:</span> host</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reports and realm reports.</td><td> </td><td class="right">   reports and realm reports.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A report of type "HOST_REPORT" is sent to indicate the overload of a</td><td> </td><td class="right">   A report of type "HOST_REPORT" is sent to indicate the overload of a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   specific Diameter node for the application-id indicated in the</td><td> </td><td class="right">   specific Diameter node for the application-id indicated in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   transaction.  When receiving an OLR of type host, a reacting node</td><td> </td><td class="right">   transaction.  When receiving an OLR of type host, a reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   applies overload abatement to what is referred to in this document as</td><td> </td><td class="right">   applies overload abatement to what is referred to in this document as</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   host-routed requests.  The reacting node applies overload abatement</td><td> </td><td class="right">   host-routed requests.  The reacting node applies overload abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   on those host-routed requests which the reacting node knows will be</td><td> </td><td class="right">   on those host-routed requests which the reacting node knows will be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   served by the server that matches the Origin-Host AVP of the received</td><td> </td><td class="right">   served by the server that matches the Origin-Host AVP of the received</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message that contained the received OLR of type host.</td><td> </td><td class="right">   message that contained the received OLR of type host.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l4" /><small>skipping to change at</small><em> page 10, line 40</em></th><th> </th><th><a name="part-r4" /><small>skipping to change at</small><em> page 10, line 19</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      which apply to the same Diameter entity exist.  Reacting nodes</td><td> </td><td class="right">      which apply to the same Diameter entity exist.  Reacting nodes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      have no way of determining the source and, as such, will treat</td><td> </td><td class="right">      have no way of determining the source and, as such, will treat</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      them as coming from a single source.  Variance in sequence numbers</td><td> </td><td class="right">      them as coming from a single source.  Variance in sequence numbers</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      between the two sources can then cause incorrect overload</td><td> </td><td class="right">      between the two sources can then cause incorrect overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      abatement treatment to be applied for indeterminate periods of</td><td> </td><td class="right">      abatement treatment to be applied for indeterminate periods of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      time.</td><td> </td><td class="right">      time.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Reporting nodes are responsible for determining the need for a</td><td> </td><td class="right">   Reporting nodes are responsible for determining the need for a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reduction of traffic.  The method for making this determination is</td><td> </td><td class="right">   reduction of traffic.  The method for making this determination is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   implementation specific and depend on the type of overload report</td><td> </td><td class="right">   implementation specific and depend on the type of overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0030" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   being generated.  A <span class="delete">host-report, for instance, will generally</span> be</td><td> </td><td class="rblock">   being generated.  A <span class="insert">host-report might</span> be generated by tracking <span class="insert">use</span> of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   generated by tracking <span class="delete">utilization</span> of resources required by the host</td><td> </td><td class="rblock">   resources required by the host to handle transactions for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   to handle transactions for the Diameter application.  A realm-report</td><td> </td><td class="rblock">   Diameter application.  A realm-report generally impacts the traffic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   generally impacts the traffic sent to multiple hosts and, as such,</td><td> </td><td class="rblock">   sent to multiple hosts and, as such, requires tracking the capacity</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   requires tracking the capacity of all servers able to handle realm-</td><td> </td><td class="rblock">   of all servers able to handle realm- routed requests for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   routed requests for the application and realm.</td><td> </td><td class="rblock">   application and realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Once a reporting node determines the need for a reduction in traffic,</td><td> </td><td class="right">   Once a reporting node determines the need for a reduction in traffic,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   it uses the DOIC defined AVPs to report on the condition.  These AVPs</td><td> </td><td class="right">   it uses the DOIC defined AVPs to report on the condition.  These AVPs</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   are included in answer messages sent or relayed by the reporting</td><td> </td><td class="right">   are included in answer messages sent or relayed by the reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node.  The reporting node indicates the overload abatement algorithm</td><td> </td><td class="right">   node.  The reporting node indicates the overload abatement algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that is to be used to handle the traffic reduction in the OC-</td><td> </td><td class="right">   that is to be used to handle the traffic reduction in the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Supported-Features AVP.  The OC-OLR AVP is used to communicate</td><td> </td><td class="right">   Supported-Features AVP.  The OC-OLR AVP is used to communicate</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information about the requested reduction.</td><td> </td><td class="right">   information about the requested reduction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0031" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Reacting nodes, upon receipt of an overload report, <span class="delete">are responsible</span></td><td> </td><td class="rblock">   Reacting nodes, upon receipt of an overload report, applying the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   for</span> applying the overload abatement algorithm to traffic impacted by</td><td> </td><td class="rblock">   overload abatement algorithm to traffic impacted by the overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the overload report.  The method used to determine the requests that</td><td> </td><td class="rblock">   report.  The method used to determine the requests that are to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   are to receive overload abatement treatment is dependent on the</td><td> </td><td class="rblock">   receive overload abatement treatment is dependent on the abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   abatement algorithm.  The loss abatement algorithm is defined in this</td><td> </td><td class="rblock">   algorithm.  The loss abatement algorithm is defined in this document</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   document (Section <span class="delete">5).</span>  Other abatement algorithms can be defined in</td><td> </td><td class="rblock">   (Section <span class="insert">6).</span>  Other abatement algorithms can be defined in extensions</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   extensions to the DOIC solutions.</td><td> </td><td class="rblock">   to the DOIC solutions.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Two types of overload abatement treatment are defined, diversion and</td><td> </td><td class="right">   Two types of overload abatement treatment are defined, diversion and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   throttling.  Reacting nodes are responsible for determining which</td><td> </td><td class="right">   throttling.  Reacting nodes are responsible for determining which</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   treatment is appropriate for individual requests.</td><td> </td><td class="right">   treatment is appropriate for individual requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As the conditions that lead to the generation of the overload report</td><td> </td><td class="right">   As the conditions that lead to the generation of the overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   change the reporting node can send new overload reports requesting</td><td> </td><td class="right">   change the reporting node can send new overload reports requesting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   greater reduction if the condition gets worse or less reduction if</td><td> </td><td class="right">   greater reduction if the condition gets worse or less reduction if</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the condition improves.  The reporting node sends an overload report</td><td> </td><td class="right">   the condition improves.  The reporting node sends an overload report</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   with a duration of zero to indicate that the overload condition has</td><td> </td><td class="right">   with a duration of zero to indicate that the overload condition has</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   ended and abatement is no longer needed.</td><td> </td><td class="right">   ended and abatement is no longer needed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reacting node also determines when the overload report expires</td><td> </td><td class="right">   The reacting node also determines when the overload report expires</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   based on the OC-Validity-Duration AVP in the overload report and</td><td> </td><td class="right">   based on the OC-Validity-Duration AVP in the overload report and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   stops applying the abatement algorithm when the report expires.</td><td> </td><td class="right">   stops applying the abatement algorithm when the report expires.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0032" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">3</span>.4.  DOIC Extensibility</td><td> </td><td class="rblock"><span class="insert">4</span>.4.  DOIC Extensibility</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DOIC solution is designed to be extensible.  This extensibility</td><td> </td><td class="right">   The DOIC solution is designed to be extensible.  This extensibility</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is based on existing Diameter based extensibility mechanisms, along</td><td> </td><td class="right">   is based on existing Diameter based extensibility mechanisms, along</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   with the DOIC capability announcement mechanism.</td><td> </td><td class="right">   with the DOIC capability announcement mechanism.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   There are multiple categories of extensions that are expected.  This</td><td> </td><td class="right">   There are multiple categories of extensions that are expected.  This</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   includes the definition of new overload abatement algorithms, the</td><td> </td><td class="right">   includes the definition of new overload abatement algorithms, the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   definition of new report types and the definition of new scopes of</td><td> </td><td class="right">   definition of new report types and the definition of new scopes of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   messages impacted by an overload report.</td><td> </td><td class="right">   messages impacted by an overload report.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0033" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The</span> DOIC <span class="delete">solution uses the OC-Supported-Features AVP for DOIC nodes</span></td><td> </td><td class="rblock">   <span class="insert">A</span> DOIC <span class="insert">node communicates</span> supported features by <span class="insert">including them</span> in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   to communicate</span> supported <span class="delete">features.  The specific</span> features <span class="delete">supported</span></td><td> </td><td class="rblock">   OC-Feature-Vector <span class="insert">AVP, as a sub-AVP of OC-Supported-Features.  Any</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   by <span class="delete">the DOIC node are indicated</span> in the OC-Feature-Vector <span class="delete">AVP.</span>  DOIC</td><td> </td><td class="rblock"><span class="insert">   non-backwards compatible</span> DOIC extensions define new values for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   extensions <span class="delete">that require new normative behavior</span> define new values for</td><td> </td><td class="rblock">   OC-Feature-Vector AVP.  DOIC extensions also have the ability to add</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the OC-Feature-Vector AVP.  DOIC extensions also have the ability to</td><td> </td><td class="rblock">   new AVPs to the OC-Supported-Features AVP, if additional information</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   add new AVPs to the OC-Supported-Features AVP, if additional</td><td> </td><td class="rblock">   about the new feature is required.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   information about the new feature is required.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0034" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">Reporting nodes use the OC-OLR AVP to communicate overload</span></td><td> </td><td class="rblock">   <span class="insert">Overload reports</span> can be <span class="insert">also</span> extended <span class="insert">by adding</span> new <span class="insert">sub-AVPs to the</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   occurrences.  This AVP</span> can <span class="delete">also</span> be extended <span class="delete">to add</span> new <span class="delete">AVPs</span> allowing</td><td> </td><td class="rblock"><span class="insert">   OC-OLR AVP,</span> allowing reporting nodes to communicate additional</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   reporting nodes to communicate additional information about handling</td><td> </td><td class="rblock">   information about handling an overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   an overload condition.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If necessary, new extensions can also define new AVPs that are not</td><td> </td><td class="right">   If necessary, new extensions can also define new AVPs that are not</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,</td><td> </td><td class="right">   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   however, recommended that DOIC extensions use the OC-Supported-</td><td> </td><td class="right">   however, recommended that DOIC extensions use the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.</td><td> </td><td class="right">   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0035" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">3</span>.5.  Simplified Example Architecture</td><td> </td><td class="rblock"><span class="insert">4</span>.5.  Simplified Example Architecture</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Figure 1 illustrates the simplified architecture for Diameter</td><td> </td><td class="right">   Figure 1 illustrates the simplified architecture for Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload information conveyance.</td><td> </td><td class="right">   overload information conveyance.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">    Realm X                                  Same or other Realms</td><td> </td><td class="right">    Realm X                                  Same or other Realms</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   &lt;--------------------------------------&gt; &lt;----------------------&gt;</td><td> </td><td class="right">   &lt;--------------------------------------&gt; &lt;----------------------&gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--^-----+                 : (optional) :</td><td> </td><td class="right">      +--^-----+                 : (optional) :</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |Diameter|                 :            :</td><td> </td><td class="right">      |Diameter|                 :            :</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |Server A|--+     .--.     : +---^----+ :     .--.</td><td> </td><td class="right">      |Server A|--+     .--.     : +---^----+ :     .--.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l5" /><small>skipping to change at</small><em> page 13, line 5</em></th><th> </th><th><a name="part-r5" /><small>skipping to change at</small><em> page 12, line 34</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                 Diameter Application Y   Diameter Application Y</td><td> </td><td class="right">                 Diameter Application Y   Diameter Application Y</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">     Figure 1: Simplified architecture choices for overload indication</td><td> </td><td class="right">     Figure 1: Simplified architecture choices for overload indication</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                 delivery</td><td> </td><td class="right">                                 delivery</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   In Figure 1, the Diameter overload indication can be conveyed (1)</td><td> </td><td class="right">   In Figure 1, the Diameter overload indication can be conveyed (1)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   end-to-end between servers and clients or (2) between servers and</td><td> </td><td class="right">   end-to-end between servers and clients or (2) between servers and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter agent inside the realm and then between the Diameter agent</td><td> </td><td class="right">   Diameter agent inside the realm and then between the Diameter agent</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and the clients.</td><td> </td><td class="right">   and the clients.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0036" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.  Solution Procedures</td><td> </td><td class="rblock"><span class="insert">5</span>.  Solution Procedures</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This section outlines the normative behavior for the DOIC solution.</td><td> </td><td class="right">   This section outlines the normative behavior for the DOIC solution.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0037" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.1.  Capability Announcement</td><td> </td><td class="rblock"><span class="insert">5</span>.1.  Capability Announcement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This section defines DOIC Capability Announcement (DCA) behavior.</td><td> </td><td class="right">   This section defines DOIC Capability Announcement (DCA) behavior.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0038" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.1.1.  Reacting Node Behavior</td><td> </td><td class="rblock"><span class="insert">5</span>.1.1.  Reacting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reacting node MUST include the OC-Supported-Features AVP in all</td><td> </td><td class="right">   A reacting node MUST include the OC-Supported-Features AVP in all</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0039" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   requests.  It MAY include the OC-Feature-Vector <span class="delete">AVP.</span>  If it does so,</td><td> </td><td class="rblock">   requests.  It MAY include the OC-Feature-Vector <span class="insert">AVP, as a sub-avp of</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   it MUST indicate support for the "loss" algorithm.  If the reacting</td><td> </td><td class="rblock"><span class="insert">   OC-Supported-Features.</span>  If it does so, it MUST indicate support for</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   node is configured to support features (including other algorithms)</td><td> </td><td class="rblock">   the "loss" algorithm.  If the reacting node is configured to support</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   in addition to the loss algorithm, it MUST indicate such support in</td><td> </td><td class="rblock">   features (including other algorithms) in addition to the loss</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   an OC-Feature-Vector AVP.</td><td> </td><td class="rblock">   algorithm, it MUST indicate such support in an OC-Feature-Vector AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   An OC-Supported-Features AVP in answer messages indicates there is a</td><td> </td><td class="right">   An OC-Supported-Features AVP in answer messages indicates there is a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reporting node for the transaction.  The reacting node MAY take</td><td> </td><td class="right">   reporting node for the transaction.  The reacting node MAY take</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   action, for example creating state for some stateful abatement</td><td> </td><td class="right">   action, for example creating state for some stateful abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm, based on the features indicated in the OC-Feature-Vector</td><td> </td><td class="right">   algorithm, based on the features indicated in the OC-Feature-Vector</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   AVP.</td><td> </td><td class="right">   AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: The loss abatement algorithm does not require stateful</td><td> </td><td class="right">      Note: The loss abatement algorithm does not require stateful</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0040" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      behavior when there is no active overload report.  <span class="delete">This behavior</span></td><td> </td><td class="rblock">      behavior when there is no active overload report.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      is described in Section 4.2 and Section 5.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0041" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.1.2.  Reporting Node Behavior</td><td> </td><td class="rblock"><span class="insert">5</span>.1.2.  Reporting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Upon receipt of a request message, a reporting node determines if</td><td> </td><td class="right">   Upon receipt of a request message, a reporting node determines if</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   there is a reacting node for the transaction based on the presence of</td><td> </td><td class="right">   there is a reacting node for the transaction based on the presence of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the OC-Supported-Features AVP in the request message.</td><td> </td><td class="right">   the OC-Supported-Features AVP in the request message.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the request message contains an OC-Supported-Features AVP then a</td><td> </td><td class="right">   If the request message contains an OC-Supported-Features AVP then a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reporting node MUST include the OC-Supported-Features AVP in the</td><td> </td><td class="right">   reporting node MUST include the OC-Supported-Features AVP in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   answer message for that transaction.</td><td> </td><td class="right">   answer message for that transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-</td><td> </td><td class="right">   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l6" /><small>skipping to change at</small><em> page 14, line 37</em></th><th> </th><th><a name="part-r6" /><small>skipping to change at</small><em> page 14, line 22</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reporting node SHOULD indicate support for other DOIC features</td><td> </td><td class="right">   The reporting node SHOULD indicate support for other DOIC features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   defined in extension drafts that it supports and that apply to the</td><td> </td><td class="right">   defined in extension drafts that it supports and that apply to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   transaction.</td><td> </td><td class="right">   transaction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: Not all DOIC features will apply to all Diameter</td><td> </td><td class="right">      Note: Not all DOIC features will apply to all Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      applications or deployment scenarios.  The features included in</td><td> </td><td class="right">      applications or deployment scenarios.  The features included in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the OC-Feature-Vector AVP are based on local reporting node</td><td> </td><td class="right">      the OC-Feature-Vector AVP are based on local reporting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      policy.</td><td> </td><td class="right">      policy.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0042" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.1.3.  Agent Behavior</td><td> </td><td class="rblock"><span class="insert">5</span>.1.3.  Agent Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0043" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Diameter Agents that support DOIC <span class="delete">SHOULD</span> ensure that all messages</td><td> </td><td class="rblock">   Diameter Agents that support DOIC <span class="insert">MAY</span> ensure that all messages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   relayed by the agent contain the OC-Supported-Features AVP.</td><td> </td><td class="right">   relayed by the agent contain the OC-Supported-Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A Diameter Agent SHOULD take on reacting node behavior for Diameter</td><td> </td><td class="right">   A Diameter Agent SHOULD take on reacting node behavior for Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   endpoints that do not support the DOIC solution.  A Diameter Agent</td><td> </td><td class="right">   endpoints that do not support the DOIC solution.  A Diameter Agent</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   detects that a Diameter endpoint does not support DOIC reacting node</td><td> </td><td class="right">   detects that a Diameter endpoint does not support DOIC reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   behavior when there is no OC-Supported-Features AVP in a request</td><td> </td><td class="right">   behavior when there is no OC-Supported-Features AVP in a request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message.</td><td> </td><td class="right">   message.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For a Diameter Agent to be a reacting node for a non supporting</td><td> </td><td class="right">   For a Diameter Agent to be a reacting node for a non supporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter endpoint, the Diameter Agent MUST include the OC-Supported-</td><td> </td><td class="right">   Diameter endpoint, the Diameter Agent MUST include the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0044" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Features AVP in request messages it re<span class="delete">ceive</span>s that do not contain the</td><td> </td><td class="rblock">   Features AVP in request messages it re<span class="insert">lay</span>s that do not contain the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-Supported-Features AVP.</td><td> </td><td class="right">   OC-Supported-Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0045" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   A Diameter Agent <span class="delete">SHOULD</span> take on reporting node behavior for Diameter</td><td> </td><td class="rblock">   A Diameter Agent <span class="insert">MAY</span> take on reporting node behavior for Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   endpoints that do not support the DOIC solution.  A Diameter Agent</td><td> </td><td class="rblock">   endpoints that do not support the DOIC solution.  <span class="insert">The Diameter Agent</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   detects that a Diameter endpoint does not support DOIC reporting node</td><td> </td><td class="rblock"><span class="insert">   MUST have visibility to all traffic destined for the non supporting</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   behavior when there is no OC-Supported-Features AVP in an answer</td><td> </td><td class="rblock"><span class="insert">   host in order to become the reporting node for the Diameter endpoint.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   message for a transaction that contained the <span class="delete">OC-Supported-Features</span></td><td> </td><td class="rblock">   A Diameter Agent detects that a Diameter endpoint does not support</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   AVP in the request message.</span></td><td> </td><td class="rblock">   DOIC reporting node behavior when there is no OC-Supported-Features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock">   AVP in an answer message for a transaction that contained the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   For a Diameter Agent to take on reporting node behavior for a non</span></td><td> </td><td class="rblock">   Supported-Features AVP in the request <span class="insert">message.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   supporting Diameter endpoint the Diameter Agent MUST include the</span> OC-</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Supported-Features AVP in <span class="delete">answer messages it receives that do not</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   contain the OC-Supported-Features AVP.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   As with a Diameter endpoint taking on reporting node behavior, a</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   Diameter Agent MUST NOT include the OC-Supported-Features AVP in</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   answer messages for transactions where</span> the request <span class="delete">message received</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   by the Diameter Agent had no OC-Supported-Features AVP.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0046" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   If a request <span class="delete">message</span> already has the OC-Supported-Features <span class="delete">AVP then</span> a</td><td> </td><td class="rblock">   If a request already has the OC-Supported-Features <span class="insert">AVP,</span> a Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Diameter <span class="delete">Agent MAY leave it unchanged in the relayed message or</span> MAY</td><td> </td><td class="rblock">   <span class="insert">agent</span> MAY modify it to reflect the features appropriate for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   modify it to reflect the features appropriate for the transaction.</td><td> </td><td class="rblock">   transaction.  <span class="insert">Otherwise, the agent relays the OC-Supported-Features</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   AVP without change.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      For instance, if the agent supports a superset of the features</td><td> </td><td class="right">      For instance, if the agent supports a superset of the features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reported by the reacting node then the agent might choose, based</td><td> </td><td class="right">      reported by the reacting node then the agent might choose, based</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      on local policy, to advertise that superset of features to the</td><td> </td><td class="right">      on local policy, to advertise that superset of features to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reporting node.</td><td> </td><td class="right">      reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the Diameter Agent changes the OC-Supported-Features AVP in a</td><td> </td><td class="right">   If the Diameter Agent changes the OC-Supported-Features AVP in a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   request message then it is likely it will also need to modify the OC-</td><td> </td><td class="right">   request message then it is likely it will also need to modify the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0047" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Supported-Features AVP in the answer message for the transaction.  <span class="delete">As</span></td><td> </td><td class="rblock">   Supported-Features AVP in the answer message for the transaction.  <span class="insert">A</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   such, a</span> Diameter Agent MAY modify the OC-Supported-Features AVP</td><td> </td><td class="rblock">   Diameter Agent MAY modify the OC-Supported-Features AVP carried in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   carried in answer messages.</td><td> </td><td class="rblock">   answer messages.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When making changes to the OC-Supported-Features AVP the Diameter</td><td> </td><td class="right">   When making changes to the OC-Supported-Features AVP the Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0048" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Agent needs to ensure that <span class="delete">there is no ambiguity in DOIC</span> behavior for</td><td> </td><td class="rblock">   Agent needs to ensure that <span class="insert">it does not introduce incorrect</span> behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">both</span> upstream <span class="delete">and</span> downstream DOIC <span class="delete">nodes.</span></td><td> </td><td class="rblock">   for <span class="insert">either the</span> upstream <span class="insert">or</span> downstream DOIC <span class="insert">nodes..</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0049" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.  Overload Report Processing</td><td> </td><td class="rblock"><span class="insert">5</span>.2.  Overload Report Processing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0050" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.1.  Overload Control State</td><td> </td><td class="rblock"><span class="insert">5</span>.2.1.  Overload Control State</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Both reacting and reporting nodes maintain Overload Control State</td><td> </td><td class="right">   Both reacting and reporting nodes maintain Overload Control State</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (OCS) for active overload conditions.  The following sections define</td><td> </td><td class="right">   (OCS) for active overload conditions.  The following sections define</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   behavior associated with that OCS.</td><td> </td><td class="right">   behavior associated with that OCS.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0051" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.1.1.  Overload Control State for Reacting Nodes</td><td> </td><td class="rblock"><span class="insert">5</span>.2.1.1.  Overload Control State for Reacting Nodes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reacting node SHOULD maintain the following OCS per supported</td><td> </td><td class="right">   A reacting node SHOULD maintain the following OCS per supported</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter application:</td><td> </td><td class="right">   Diameter application:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  A host-type OCS entry for each Destination-Host to which it sends</td><td> </td><td class="right">   o  A host-type OCS entry for each Destination-Host to which it sends</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      host-type requests and</td><td> </td><td class="right">      host-type requests and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  A realm-type OCS entry for each Destination-Realm to which it</td><td> </td><td class="right">   o  A realm-type OCS entry for each Destination-Realm to which it</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      sends realm-type requests.</td><td> </td><td class="right">      sends realm-type requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l7" /><small>skipping to change at</small><em> page 16, line 39</em></th><th> </th><th><a name="part-r7" /><small>skipping to change at</small><em> page 16, line 15</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the OC-OLR AVP and time of reception of the message carrying OC-</td><td> </td><td class="right">      the OC-OLR AVP and time of reception of the message carrying OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OLR AVP)</td><td> </td><td class="right">      OLR AVP)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Selected Abatement Algorithm (as received in the OC-Supported-</td><td> </td><td class="right">   o  Selected Abatement Algorithm (as received in the OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Features AVP)</td><td> </td><td class="right">      Features AVP)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Abatement Algorithm specific input data (as received in the OC-OLR</td><td> </td><td class="right">   o  Abatement Algorithm specific input data (as received in the OC-OLR</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      AVP, for example, OC-Reduction-Percentage for the Loss abatement</td><td> </td><td class="right">      AVP, for example, OC-Reduction-Percentage for the Loss abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      algorithm)</td><td> </td><td class="right">      algorithm)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0052" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.1.2.  Overload Control State for Reporting Nodes</td><td> </td><td class="rblock"><span class="insert">5</span>.2.1.2.  Overload Control State for Reporting Nodes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node SHOULD maintain OCS entries per supported Diameter</td><td> </td><td class="right">   A reporting node SHOULD maintain OCS entries per supported Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   application, per supported (and eventually selected) Abatement</td><td> </td><td class="right">   application, per supported (and eventually selected) Abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Algorithm and per report-type.</td><td> </td><td class="right">   Algorithm and per report-type.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   An OCS entry is identified by the tuple of Application-Id, Report-</td><td> </td><td class="right">   An OCS entry is identified by the tuple of Application-Id, Report-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Type and Abatement Algorithm and MAY include the following</td><td> </td><td class="right">   Type and Abatement Algorithm and MAY include the following</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information (the actual information stored is an implementation</td><td> </td><td class="right">   information (the actual information stored is an implementation</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   decision):</td><td> </td><td class="right">   decision):</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l8" /><small>skipping to change at</small><em> page 17, line 4</em></th><th> </th><th><a name="part-r8" /><small>skipping to change at</small><em> page 16, line 29</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Algorithm and per report-type.</td><td> </td><td class="right">   Algorithm and per report-type.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   An OCS entry is identified by the tuple of Application-Id, Report-</td><td> </td><td class="right">   An OCS entry is identified by the tuple of Application-Id, Report-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Type and Abatement Algorithm and MAY include the following</td><td> </td><td class="right">   Type and Abatement Algorithm and MAY include the following</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information (the actual information stored is an implementation</td><td> </td><td class="right">   information (the actual information stored is an implementation</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   decision):</td><td> </td><td class="right">   decision):</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Sequence number</td><td> </td><td class="right">   o  Sequence number</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Validity Duration</td><td> </td><td class="right">   o  Validity Duration</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0053" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">                                                                         </span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Expiration Time</td><td> </td><td class="right">   o  Expiration Time</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Algorithm specific input data (for example, the Reduction</td><td> </td><td class="right">   o  Algorithm specific input data (for example, the Reduction</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Percentage for the Loss Abatement Algorithm)</td><td> </td><td class="right">      Percentage for the Loss Abatement Algorithm)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0054" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.1.3.  Reacting Node Maintenance of Overload Control State</td><td> </td><td class="rblock"><span class="insert">5</span>.2.1.3.  Reacting Node Maintenance of Overload Control State</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a reacting node receives an OC-OLR AVP, it MUST determine if it</td><td> </td><td class="right">   When a reacting node receives an OC-OLR AVP, it MUST determine if it</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is for an existing or new overload condition.</td><td> </td><td class="right">   is for an existing or new overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: For the remainder of this section the term OLR refers to the</td><td> </td><td class="right">      Note: For the remainder of this section the term OLR refers to the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      combination of the contents of the received OC-OLR AVP and the</td><td> </td><td class="right">      combination of the contents of the received OC-OLR AVP and the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      abatement algorithm indicated in the received OC-Supported-</td><td> </td><td class="right">      abatement algorithm indicated in the received OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Features AVP.</td><td> </td><td class="right">      Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When receiving an answer message with multiple OLRs of different</td><td> </td><td class="right">   When receiving an answer message with multiple OLRs of different</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0055" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   supported report types, a re<span class="delete">por</span>ting node MUST process each received</td><td> </td><td class="rblock">   supported report types, a re<span class="insert">ac</span>ting node MUST process each received</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OLR.</td><td> </td><td class="right">   OLR.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0056" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   When receiving an <span class="delete">OC-OLR AVPs</span> with <span class="delete">unknown values,</span> a reacting node</td><td> </td><td class="rblock">   When receiving an <span class="insert">answer message</span> with <span class="insert">multiple OLRs and multiple of</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   SHOULD <span class="delete">be silently discarded by reacting nodes and</span> the <span class="delete">event</span> SHOULD</td><td> </td><td class="rblock"><span class="insert">   the OLRs are of the same supported report types,</span> a reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">be logged.</span></td><td> </td><td class="rblock">   SHOULD <span class="insert">ignore</span> the <span class="insert">duplicated OLRs.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   A reacting node</span> SHOULD <span class="insert">ignore an OC-OLR with a OC-Report-Type AVP</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   that contains an unrecognized value.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OLR is for an existing overload condition if a reacting node has</td><td> </td><td class="right">   The OLR is for an existing overload condition if a reacting node has</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   an OCS that matches the received OLR.</td><td> </td><td class="right">   an OCS that matches the received OLR.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For a host-report this means it matches the application-id and the</td><td> </td><td class="right">   For a host-report this means it matches the application-id and the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   host's DiameterIdentity in an existing host OCS entry.</td><td> </td><td class="right">   host's DiameterIdentity in an existing host OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For a realm-report this means it matches the application-id and the</td><td> </td><td class="right">   For a realm-report this means it matches the application-id and the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   realm in an existing realm OCS entry.</td><td> </td><td class="right">   realm in an existing realm OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l9" /><small>skipping to change at</small><em> page 18, line 28</em></th><th> </th><th><a name="part-r9" /><small>skipping to change at</small><em> page 18, line 9</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reacting node MUST update the OCS entry as being expired.</td><td> </td><td class="right">   reacting node MUST update the OCS entry as being expired.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: It is not necessarily appropriate to delete the OCS entry,</td><td> </td><td class="right">      Note: It is not necessarily appropriate to delete the OCS entry,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      as there is recommended behavior that the reacting node slowly</td><td> </td><td class="right">      as there is recommended behavior that the reacting node slowly</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      returns to full traffic when ending an overload abatement period.</td><td> </td><td class="right">      returns to full traffic when ending an overload abatement period.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reacting node does not delete an OCS when receiving an answer</td><td> </td><td class="right">   The reacting node does not delete an OCS when receiving an answer</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message that does not contain an OC-OLR AVP (i.e. absence of OLR</td><td> </td><td class="right">   message that does not contain an OC-OLR AVP (i.e. absence of OLR</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   means "no change").</td><td> </td><td class="right">   means "no change").</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0057" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.1.4.  Reporting Node Maintenance of Overload Control State</td><td> </td><td class="rblock"><span class="insert">5</span>.2.1.4.  Reporting Node Maintenance of Overload Control State</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node SHOULD create a new OCS entry when entering an</td><td> </td><td class="right">   A reporting node SHOULD create a new OCS entry when entering an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload condition.</td><td> </td><td class="right">   overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: If a reporting node knows through absence of the OC-</td><td> </td><td class="right">      Note: If a reporting node knows through absence of the OC-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Supported-Features AVP in received messages that there are no</td><td> </td><td class="right">      Supported-Features AVP in received messages that there are no</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reacting nodes supporting DOIC then the reporting node can choose</td><td> </td><td class="right">      reacting nodes supporting DOIC then the reporting node can choose</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      to not create OCS entries.</td><td> </td><td class="right">      to not create OCS entries.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When generating a new OCS entry the sequence number SHOULD be set to</td><td> </td><td class="right">   When generating a new OCS entry the sequence number SHOULD be set to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l10" /><small>skipping to change at</small><em> page 19, line 18</em></th><th> </th><th><a name="part-r10" /><small>skipping to change at</small><em> page 18, line 46</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      For instance, if a reporting node wishes to instruct reacting</td><td> </td><td class="right">      For instance, if a reporting node wishes to instruct reacting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      nodes to continue overload abatement for a longer period of time</td><td> </td><td class="right">      nodes to continue overload abatement for a longer period of time</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      than originally communicated.  This also applies if the reporting</td><td> </td><td class="right">      than originally communicated.  This also applies if the reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      node wishes to shorten the period of time that overload abatement</td><td> </td><td class="right">      node wishes to shorten the period of time that overload abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      is to continue.</td><td> </td><td class="right">      is to continue.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST NOT update the abatement algorithm in an active</td><td> </td><td class="right">   A reporting node MUST NOT update the abatement algorithm in an active</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OCS entry.</td><td> </td><td class="right">   OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST update an OCS entry when it wishes to adjust</td><td> </td><td class="right">   A reporting node MUST update an OCS entry when it wishes to adjust</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0058" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   any abatement algorithm specific parameters, <span class="delete">including</span> the reduction</td><td> </td><td class="rblock">   any abatement algorithm specific parameters, <span class="insert">including, for example,</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   percentage used for the Loss abatement algorithm.</td><td> </td><td class="rblock">   the reduction percentage used for the Loss abatement algorithm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      For instance, if a reporting node wishes to change the reduction</td><td> </td><td class="right">      For instance, if a reporting node wishes to change the reduction</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      percentage either higher, if the overload condition has worsened,</td><td> </td><td class="right">      percentage either higher, if the overload condition has worsened,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      or lower, if the overload condition has improved, then the</td><td> </td><td class="right">      or lower, if the overload condition has improved, then the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reporting node would update the appropriate OCS entry.</td><td> </td><td class="right">      reporting node would update the appropriate OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0059" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   A reporting node MUST <span class="delete">update</span> the sequence number associated with the</td><td> </td><td class="rblock">   A reporting node MUST <span class="insert">increment</span> the sequence number associated with</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   OCS entry anytime the contents of the OCS entry are changed.  This</td><td> </td><td class="rblock">   the OCS entry anytime the contents of the OCS entry are changed.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   will result in a new sequence number being sent to reacting nodes,</td><td> </td><td class="rblock">   This will result in a new sequence number being sent to reacting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   instructing reacting nodes to process the OC-OLR AVP.</td><td> </td><td class="rblock">   nodes, instructing reacting nodes to process the OC-OLR AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node SHOULD update an OCS entry with a validity duration</td><td> </td><td class="right">   A reporting node SHOULD update an OCS entry with a validity duration</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   of zero ("0") when the overload condition ends.</td><td> </td><td class="right">   of zero ("0") when the overload condition ends.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: If a reporting node knows that the OCS entries in the</td><td> </td><td class="right">      Note: If a reporting node knows that the OCS entries in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reacting nodes are near expiration then the reporting node might</td><td> </td><td class="right">      reacting nodes are near expiration then the reporting node might</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      decide not to send an OLR with a validity duration of zero.</td><td> </td><td class="right">      decide not to send an OLR with a validity duration of zero.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST keep an OCS entry with a validity duration of</td><td> </td><td class="right">   A reporting node MUST keep an OCS entry with a validity duration of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   zero ("0") for a period of time long enough to ensure that any non-</td><td> </td><td class="right">   zero ("0") for a period of time long enough to ensure that any non-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   expired reacting node's OCS entry created as a result of the overload</td><td> </td><td class="right">   expired reacting node's OCS entry created as a result of the overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   condition in the reporting node is deleted.</td><td> </td><td class="right">   condition in the reporting node is deleted.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0060" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.2.  Reacting Node Behavior</td><td> </td><td class="rblock"><span class="insert">5</span>.2.2.  Reacting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a reacting node sends a request it MUST determine if that</td><td> </td><td class="right">   When a reacting node sends a request it MUST determine if that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   request matches an active OCS.</td><td> </td><td class="right">   request matches an active OCS.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the request matches an active OCS then the reacting node MUST use</td><td> </td><td class="right">   If the request matches an active OCS then the reacting node MUST use</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the overload abatement algorithm indicated in the OCS to determine if</td><td> </td><td class="right">   the overload abatement algorithm indicated in the OCS to determine if</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the request is to receive overload abatement treatment.</td><td> </td><td class="right">   the request is to receive overload abatement treatment.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For the Loss abatement algorithm defined in this specification, see</td><td> </td><td class="right">   For the Loss abatement algorithm defined in this specification, see</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0061" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Section <span class="delete">5</span> for the overload abatement algorithm logic applied.</td><td> </td><td class="rblock">   Section <span class="insert">6</span> for the overload abatement algorithm logic applied.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the overload abatement algorithm selects the request for overload</td><td> </td><td class="right">   If the overload abatement algorithm selects the request for overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement treatment then the reacting node MUST apply overload</td><td> </td><td class="right">   abatement treatment then the reacting node MUST apply overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement treatment on the request.  The abatement treatment applied</td><td> </td><td class="right">   abatement treatment on the request.  The abatement treatment applied</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   depends on the context of the request.</td><td> </td><td class="right">   depends on the context of the request.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0062" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   If <span class="delete">the request</span> is a <span class="delete">host-routed</span> request then the reacting node SHOULD</td><td> </td><td class="rblock">   If <span class="insert">diversion abatement treatment</span> is <span class="insert">possible (i.e.</span> a <span class="insert">different path</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   apply <span class="delete">throttling</span> abatement treatment to the request.</td><td> </td><td class="rblock"><span class="insert">   for the</span> request <span class="insert">can be selected where the overloaded node is not part</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"><span class="insert">   of the different path),</span> then the reacting node SHOULD apply <span class="insert">diversion</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">If the request is a realm-routed request then</span> the reacting node</td><td> </td><td class="rblock">   abatement treatment to the request.  <span class="insert">Otherwise</span> the reacting node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   SHOULD apply <span class="delete">diversion</span> abatement treatment to the request.</td><td> </td><td class="rblock">   SHOULD apply <span class="insert">throttling</span> abatement treatment to the request.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If the overload abatement treatment results in throttling of the</td><td> </td><td class="right">   If the overload abatement treatment results in throttling of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   request and if the reacting node is an agent then the agent MUST send</td><td> </td><td class="right">   request and if the reacting node is an agent then the agent MUST send</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0063" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   an appropriate error as defined in Section <span class="delete">7</span>.</td><td> </td><td class="rblock">   an appropriate error as defined in Section <span class="insert">8</span>.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0064" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The behavior of reacting nodes that are</span> Diameter endpoints <span class="delete">when</span></td><td> </td><td class="rblock">   Diameter endpoints <span class="insert">that throttle</span> requests <span class="insert">need to do so according to</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   throttling</span> requests <span class="delete">depends on</span> the <span class="delete">application</span> and <span class="delete">is outside</span> the</td><td> </td><td class="rblock">   the <span class="insert">rules of the client application.  Those rules will vary by</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   scope of this <span class="delete">specification.</span></td><td> </td><td class="rblock"><span class="insert">   application,</span> and <span class="insert">are beyond</span> the scope of this <span class="insert">document.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   In the case that the OCS entry indicated no traffic was to be sent to</td><td> </td><td class="right">   In the case that the OCS entry indicated no traffic was to be sent to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the overloaded entity and the validity duration expires then overload</td><td> </td><td class="right">   the overloaded entity and the validity duration expires then overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement associated with the overload report MUST be ended in a</td><td> </td><td class="right">   abatement associated with the overload report MUST be ended in a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   controlled fashion.</td><td> </td><td class="right">   controlled fashion.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0065" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4</span>.2.3.  Reporting Node Behavior</td><td> </td><td class="rblock"><span class="insert">5</span>.2.3.  Reporting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If there is an active OCS entry then a reporting node SHOULD include</td><td> </td><td class="right">   If there is an active OCS entry then a reporting node SHOULD include</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0066" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the OC-OLR AVP in all <span class="delete">answer messages</span> to requests that contain the</td><td> </td><td class="rblock">   the OC-OLR AVP in all <span class="insert">answers</span> to requests that contain the <span class="insert">OC-</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">OC-Supported-Features</span> AVP and that match the active OCS entry.</td><td> </td><td class="rblock"><span class="insert">   Supported-Features</span> AVP and that match the active OCS entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: A request matches if the application-id in the request</td><td> </td><td class="right">      Note: A request matches if the application-id in the request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      matches the application-id in any active OCS entry and if the</td><td> </td><td class="right">      matches the application-id in any active OCS entry and if the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      report-type in the OCS entry matches a report-type supported by</td><td> </td><td class="right">      report-type in the OCS entry matches a report-type supported by</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the reporting node as indicated in the OC-Supported-Features AVP.</td><td> </td><td class="right">      the reporting node as indicated in the OC-Supported-Features AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The contents of the OC-OLR AVP depend on the selected algorithm.</td><td> </td><td class="right">   The contents of the OC-OLR AVP depend on the selected algorithm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MAY choose to not resend an overload report to a</td><td> </td><td class="right">   A reporting node MAY choose to not resend an overload report to a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reacting node if it can guarantee that this overload report is</td><td> </td><td class="right">   reacting node if it can guarantee that this overload report is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l11" /><small>skipping to change at</small><em> page 21, line 15</em></th><th> </th><th><a name="part-r11" /><small>skipping to change at</small><em> page 20, line 41</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      report.</td><td> </td><td class="right">      report.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node MUST NOT send overload reports of a type that has</td><td> </td><td class="right">   A reporting node MUST NOT send overload reports of a type that has</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   not been advertised as supported by the reacting node.</td><td> </td><td class="right">   not been advertised as supported by the reacting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: A reacting node implicitly advertises support for the host</td><td> </td><td class="right">      Note: A reacting node implicitly advertises support for the host</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      and realm report types by including the OC-Supported-Features AVP</td><td> </td><td class="right">      and realm report types by including the OC-Supported-Features AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      in the request.  Support for other report types will be explicitly</td><td> </td><td class="right">      in the request.  Support for other report types will be explicitly</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      indicated by new feature bits in the OC-Feature-Vector AVP.</td><td> </td><td class="right">      indicated by new feature bits in the OC-Feature-Vector AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0067" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">A reporting node MAY rely on the OC-Validity-Duration AVP values for</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the implicit overload control state cleanup on the reacting node.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node SHOULD explicitly indicate the end of an overload</td><td> </td><td class="right">   A reporting node SHOULD explicitly indicate the end of an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   occurrence by sending a new OLR with OC-Validity-Duration set to a</td><td> </td><td class="right">   occurrence by sending a new OLR with OC-Validity-Duration set to a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   value of zero ("0").  The reporting node SHOULD ensure that all</td><td> </td><td class="right">   value of zero ("0").  The reporting node SHOULD ensure that all</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reacting nodes receive the updated overload report.</td><td> </td><td class="right">   reacting nodes receive the updated overload report.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0068" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">A reporting node MAY rely on the OC-Validity-Duration AVP values for</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   the implicit overload control state cleanup on the reacting node.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">                                                                         </td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: All OLRs sent have an expiration time calculated by adding</td><td> </td><td class="right">      Note: All OLRs sent have an expiration time calculated by adding</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the validity-duration contained in the OLR to the time the message</td><td> </td><td class="right">      the validity-duration contained in the OLR to the time the message</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      was sent.  Transit time for the OLR can be safely ignored.  The</td><td> </td><td class="right">      was sent.  Transit time for the OLR can be safely ignored.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reporting node can ensure that all reacting nodes have received</td><td> </td><td class="right">      reporting node can ensure that all reacting nodes have received</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the OLR by continuing to send it in answer messages until the</td><td> </td><td class="right">      the OLR by continuing to send it in answer messages until the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      expiration time for all OLRs sent for that overload condition have</td><td> </td><td class="right">      expiration time for all OLRs sent for that overload condition have</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      expired.</td><td> </td><td class="right">      expired.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a reporting node sends an OLR, it effectively delegates any</td><td> </td><td class="right">   When a reporting node sends an OLR, it effectively delegates any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   necessary throttling to downstream nodes.  If the reporting node also</td><td> </td><td class="right">   necessary throttling to downstream nodes.  If the reporting node also</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l12" /><small>skipping to change at</small><em> page 22, line 5</em></th><th> </th><th><a name="part-r12" /><small>skipping to change at</small><em> page 21, line 30</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   for reasons other than overload.  For example, an agent or server</td><td> </td><td class="right">   for reasons other than overload.  For example, an agent or server</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   might have a configured rate limit for each client, and throttle</td><td> </td><td class="right">   might have a configured rate limit for each client, and throttle</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requests that exceed that limit, even if such requests had already</td><td> </td><td class="right">   requests that exceed that limit, even if such requests had already</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   been candidates for throttling by downstream nodes.  The reporting</td><td> </td><td class="right">   been candidates for throttling by downstream nodes.  The reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node also has the option to send new OLRs requesting greater</td><td> </td><td class="right">   node also has the option to send new OLRs requesting greater</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reductions in traffic, reducing the need for local throttling.</td><td> </td><td class="right">   reductions in traffic, reducing the need for local throttling.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node SHOULD decrease requested overload abatement</td><td> </td><td class="right">   A reporting node SHOULD decrease requested overload abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   treatment in a controlled fashion to avoid oscillations in traffic.</td><td> </td><td class="right">   treatment in a controlled fashion to avoid oscillations in traffic.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0069" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">4.3.</span>  Protocol Extensibility</td><td> </td><td class="rblock">      <span class="insert">For example, it might wait some period of time after overload ends</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      before terminating the OLR, or it might send a series of OLRs</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      indicating progressively less overload severity.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">5.3.</span>  Protocol Extensibility</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DOIC solution can be extended.  Types of potential extensions</td><td> </td><td class="right">   The DOIC solution can be extended.  Types of potential extensions</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   include new traffic abatement algorithms, new report types or other</td><td> </td><td class="right">   include new traffic abatement algorithms, new report types or other</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   new functionality.</td><td> </td><td class="right">   new functionality.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When defining a new extension that requires new normative behavior,</td><td> </td><td class="right">   When defining a new extension that requires new normative behavior,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the specification MUST define a new feature for the OC-Feature-</td><td> </td><td class="right">   the specification MUST define a new feature for the OC-Feature-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Vector.  This feature bit is used to communicate support for the new</td><td> </td><td class="right">   Vector.  This feature bit is used to communicate support for the new</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   feature.</td><td> </td><td class="right">   feature.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The extension MAY define new AVPs for use in DOIC Capability</td><td> </td><td class="right">   The extension MAY define new AVPs for use in DOIC Capability</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Announcement and for use in DOIC Overload reporting.  These new AVPs</td><td> </td><td class="right">   Announcement and for use in DOIC Overload reporting.  These new AVPs</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   SHOULD be defined to be extensions to the OC-Supported-Features or</td><td> </td><td class="right">   SHOULD be defined to be extensions to the OC-Supported-Features or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-OLR AVPs defined in this document.</td><td> </td><td class="right">   OC-OLR AVPs defined in this document.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC6733] defined Grouped AVP extension mechanisms apply.  This</td><td> </td><td class="right">   [RFC6733] defined Grouped AVP extension mechanisms apply.  This</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   allows, for example, defining a new feature that is mandatory to be</td><td> </td><td class="right">   allows, for example, defining a new feature that is mandatory to be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   understood even when piggybacked on an existing application.</td><td> </td><td class="right">   understood even when piggybacked on an existing application.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0070" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The handling of feature bits in the OC-Feature-Vector AVP that are</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   not associated with overload abatement algorithms MUST be specified</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   by the extensions that define the features.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When defining new report type values, the corresponding specification</td><td> </td><td class="right">   When defining new report type values, the corresponding specification</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   MUST define the semantics of the new report types and how they affect</td><td> </td><td class="right">   MUST define the semantics of the new report types and how they affect</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0071" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the OC-OLR AVP handling.  <span class="delete">The specification MUST also reserve a</span></td><td> </td><td class="rblock">   the OC-OLR AVP handling.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   corresponding new feature bit in the OC-Feature-Vector AVP.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-OLR AVP can be expanded with optional sub-AVPs only if a</td><td> </td><td class="right">   The OC-OLR AVP can be expanded with optional sub-AVPs only if a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   legacy DOIC implementation can safely ignore them without breaking</td><td> </td><td class="right">   legacy DOIC implementation can safely ignore them without breaking</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0072" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   backward compatibility for the given OC-Report-Type AVP value.  <span class="delete">If</span></td><td> </td><td class="rblock">   backward compatibility for the given OC-Report-Type AVP value.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the new sub-AVPs imply new semantics for handling the indicated</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   report type, then a new OC-Report-Type AVP value MUST be defined.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Documents that introduce new report types MUST describe any</td><td> </td><td class="right">   Documents that introduce new report types MUST describe any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   limitations on their use across non-supporting agents.</td><td> </td><td class="right">   limitations on their use across non-supporting agents.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0073" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock">   <span class="insert">As with any Diameter specification, RFC6733 requires all new AVPs to</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   be registered with IANA.  See Section 9 for the required procedures.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   New features (feature bits in the OC-Feature-Vector AVP) and report</td><td> </td><td class="right">   New features (feature bits in the OC-Feature-Vector AVP) and report</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0074" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   types (in the OC-Report-Type AVP) MUST be registered with IANA.  <span class="delete">As</span></td><td> </td><td class="rblock">   types (in the OC-Report-Type AVP) MUST be registered with IANA.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   with any Diameter specification, RFC6733 requires all new AVPs to be</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   registered with IANA.  See Section 8 for the required procedures.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0075" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">5</span>.  Loss Algorithm</td><td> </td><td class="rblock"><span class="insert">6</span>.  Loss Algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This section documents the Diameter overload loss abatement</td><td> </td><td class="right">   This section documents the Diameter overload loss abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm.</td><td> </td><td class="right">   algorithm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0076" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">5</span>.1.  Overview</td><td> </td><td class="rblock"><span class="insert">6</span>.1.  Overview</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The DOIC specification supports the ability for multiple overload</td><td> </td><td class="right">   The DOIC specification supports the ability for multiple overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   abatement algorithms to be specified.  The abatement algorithm used</td><td> </td><td class="right">   abatement algorithms to be specified.  The abatement algorithm used</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   for any instance of overload is determined by the Diameter Overload</td><td> </td><td class="right">   for any instance of overload is determined by the Diameter Overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0077" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Capability Announcement process documented in Section <span class="delete">4</span>.1.</td><td> </td><td class="rblock">   Capability Announcement process documented in Section <span class="insert">5</span>.1.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The loss algorithm described in this section is the default algorithm</td><td> </td><td class="right">   The loss algorithm described in this section is the default algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that must be supported by all Diameter nodes that support DOIC.</td><td> </td><td class="right">   that must be supported by all Diameter nodes that support DOIC.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The loss algorithm is designed to be a straightforward and stateless</td><td> </td><td class="right">   The loss algorithm is designed to be a straightforward and stateless</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload abatement algorithm.  It is used by reporting nodes to</td><td> </td><td class="right">   overload abatement algorithm.  It is used by reporting nodes to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   request a percentage reduction in the amount of traffic sent.  The</td><td> </td><td class="right">   request a percentage reduction in the amount of traffic sent.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   traffic impacted by the requested reduction depends on the type of</td><td> </td><td class="right">   traffic impacted by the requested reduction depends on the type of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload report.</td><td> </td><td class="right">   overload report.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0078" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Reporting nodes <span class="delete">use a strategy</span> of <span class="delete">applying abatement logic to</span> the</td><td> </td><td class="rblock">   Reporting nodes <span class="insert">request the stateless reduction</span> of the <span class="insert">number of</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">requested</span> percentage of <span class="delete">request</span> messages <span class="delete">sent (or handled in</span> the <span class="delete">case</span></td><td> </td><td class="rblock"><span class="insert">   requests by an indicated percentage.  This</span> percentage <span class="insert">reduction is in</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   of <span class="delete">agents) by</span> the <span class="delete">reacting</span> node <span class="delete">that are impacted by</span> the <span class="delete">overload</span></td><td> </td><td class="rblock"><span class="insert">   comparison to the number</span> of messages the <span class="insert">node otherwise would send,</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   report.</span></td><td> </td><td class="rblock"><span class="insert">   regardless</span> of <span class="insert">how many requests</span> the node <span class="insert">might have sent in</span> the <span class="insert">past.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   From a conceptual level, the logic at the reacting node could be</td><td> </td><td class="right">   From a conceptual level, the logic at the reacting node could be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   outlined as follows.</td><td> </td><td class="right">   outlined as follows.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   1.  An overload report is received and the associated OCS is either</td><td> </td><td class="right">   1.  An overload report is received and the associated OCS is either</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       saved or updated (if required) by the reacting node.</td><td> </td><td class="right">       saved or updated (if required) by the reacting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   2.  A new Diameter request is generated by the application running on</td><td> </td><td class="right">   2.  A new Diameter request is generated by the application running on</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       the reacting node.</td><td> </td><td class="right">       the reacting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l13" /><small>skipping to change at</small><em> page 23, line 47</em></th><th> </th><th><a name="part-r13" /><small>skipping to change at</small><em> page 23, line 23</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       entry.</td><td> </td><td class="right">       entry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   4.  The reacting node determines if overload abatement treatment</td><td> </td><td class="right">   4.  The reacting node determines if overload abatement treatment</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       should be applied to the request.  One approach that could be</td><td> </td><td class="right">       should be applied to the request.  One approach that could be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       taken for each request is to select a random number between 1 and</td><td> </td><td class="right">       taken for each request is to select a random number between 1 and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       100.  If the random number is less than or equal to the indicated</td><td> </td><td class="right">       100.  If the random number is less than or equal to the indicated</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       reduction percentage then the request is given abatement</td><td> </td><td class="right">       reduction percentage then the request is given abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       treatment, otherwise the request is given normal routing</td><td> </td><td class="right">       treatment, otherwise the request is given normal routing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       treatment.</td><td> </td><td class="right">       treatment.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0079" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">5</span>.2.  Reporting Node Behavior</td><td> </td><td class="rblock"><span class="insert">6</span>.2.  Reporting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The method a reporting node uses to determine the amount of traffic</td><td> </td><td class="right">   The method a reporting node uses to determine the amount of traffic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reduction required to address an overload condition is an</td><td> </td><td class="right">   reduction required to address an overload condition is an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   implementation decision.</td><td> </td><td class="right">   implementation decision.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a reporting node that has selected the loss abatement algorithm</td><td> </td><td class="right">   When a reporting node that has selected the loss abatement algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   determines the need to request a reduction in traffic, it includes an</td><td> </td><td class="right">   determines the need to request a reduction in traffic, it includes an</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0080" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   OC-OLR AVP in <span class="delete">response messages as described in Section 4</span>.2.3.</td><td> </td><td class="rblock">   OC-OLR AVP in <span class="insert">answer messages as described in Section 5</span>.2.3.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When sending the OC-OLR AVP, the reporting node MUST indicate a</td><td> </td><td class="right">   When sending the OC-OLR AVP, the reporting node MUST indicate a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   percentage reduction in the OC-Reduction-Percentage AVP.</td><td> </td><td class="right">   percentage reduction in the OC-Reduction-Percentage AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The reporting node MAY change the reduction percentage in subsequent</td><td> </td><td class="right">   The reporting node MAY change the reduction percentage in subsequent</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload reports.  When doing so the reporting node must conform to</td><td> </td><td class="right">   overload reports.  When doing so the reporting node must conform to</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0081" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   overload report handing specified in Section <span class="delete">4</span>.2.3.</td><td> </td><td class="rblock">   overload report handing specified in Section <span class="insert">5</span>.2.3.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0082" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">5</span>.3.  Reacting Node Behavior</td><td> </td><td class="rblock"><span class="insert">6</span>.3.  Reacting Node Behavior</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The method a reacting node uses to determine which request messages</td><td> </td><td class="right">   The method a reacting node uses to determine which request messages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   are given abatement treatment is an implementation decision.</td><td> </td><td class="right">   are given abatement treatment is an implementation decision.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When receiving an OC-OLR in an answer message where the algorithm</td><td> </td><td class="right">   When receiving an OC-OLR in an answer message where the algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicated in the OC-Supported-Features AVP is the loss algorithm, the</td><td> </td><td class="right">   indicated in the OC-Supported-Features AVP is the loss algorithm, the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reacting node MUST apply abatement treatment to the requested</td><td> </td><td class="right">   reacting node MUST apply abatement treatment to the requested</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   percentage of request messages sent.</td><td> </td><td class="right">   percentage of request messages sent.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Note: The loss algorithm is a stateless algorithm.  As a result,</td><td> </td><td class="right">      Note: The loss algorithm is a stateless algorithm.  As a result,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l14" /><small>skipping to change at</small><em> page 24, line 38</em></th><th> </th><th><a name="part-r14" /><small>skipping to change at</small><em> page 24, line 13</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      absolute reduction in traffic sent.  Rather, it guarantees that</td><td> </td><td class="right">      absolute reduction in traffic sent.  Rather, it guarantees that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the requested percentage of new requests will be given abatement</td><td> </td><td class="right">      the requested percentage of new requests will be given abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      treatment.</td><td> </td><td class="right">      treatment.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When applying overload abatement treatment for the loss abatement</td><td> </td><td class="right">   When applying overload abatement treatment for the loss abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm, the reacting node MUST abate the requested percentage of</td><td> </td><td class="right">   algorithm, the reacting node MUST abate the requested percentage of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requests that would have otherwise been sent to the reporting host or</td><td> </td><td class="right">   requests that would have otherwise been sent to the reporting host or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   realm.</td><td> </td><td class="right">   realm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   If reacting node comes out of the 100 percent traffic reduction as a</td><td> </td><td class="right">   If reacting node comes out of the 100 percent traffic reduction as a</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0083" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   result of the overload report timing out, the following <span class="delete">concerns</span> are</td><td> </td><td class="rblock">   result of the overload report timing out, the following <span class="insert">procedures</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   RECOMMENDED to be applied.  The reacting node sending the traffic</td><td> </td><td class="rblock">   are RECOMMENDED to be applied.  The reacting node sending the traffic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   should be conservative and, for example, first send "probe" messages</td><td> </td><td class="right">   should be conservative and, for example, first send "probe" messages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to learn the overload condition of the overloaded node before</td><td> </td><td class="right">   to learn the overload condition of the overloaded node before</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   converging to any traffic amount/rate decided by the sender.  Similar</td><td> </td><td class="right">   converging to any traffic amount/rate decided by the sender.  Similar</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   concerns apply in all cases when the overload report times out unless</td><td> </td><td class="right">   concerns apply in all cases when the overload report times out unless</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the previous overload report stated 0 percent reduction.</td><td> </td><td class="right">   the previous overload report stated 0 percent reduction.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0084" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">If the reacting node does not receive an OLR in response to messages</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   sent to the formerly overloaded node then the reacting node SHOULD</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   slowly increase the rate of traffic sent to the overloaded node.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   When an active overload report expires, it is suggested that the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   reacting node progressively decrease the amount of traffic given</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   abatement treatment, until the reduction is completely removed and no</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   traffic is given abatement treatment.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      The goal of this behavior is to reduce the probability of overload</td><td> </td><td class="right">      The goal of this behavior is to reduce the probability of overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      condition thrashing where an immediate transition from 100%</td><td> </td><td class="right">      condition thrashing where an immediate transition from 100%</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reduction to 0% reduction results in the reporting node moving</td><td> </td><td class="right">      reduction to 0% reduction results in the reporting node moving</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      quickly back into an overload condition.</td><td> </td><td class="right">      quickly back into an overload condition.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0085" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6.</span>  Attribute Value Pairs</td><td> </td><td class="rblock">   <span class="insert">If the reacting node does not receive an OLR in answers received from</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   the formerly overloaded node then the reacting node SHOULD slowly</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">   increase the rate of traffic sent to the overloaded node.</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"></span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">7.</span>  Attribute Value Pairs</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This section describes the encoding and semantics of the Diameter</td><td> </td><td class="right">   This section describes the encoding and semantics of the Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Overload Indication Attribute Value Pairs (AVPs) defined in this</td><td> </td><td class="right">   Overload Indication Attribute Value Pairs (AVPs) defined in this</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   document.</td><td> </td><td class="right">   document.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0086" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">A new application specification can incorporate the overload control</span></td><td> </td><td class="rblock"><span class="insert">7.1.</span>  OC-Supported-Features AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   mechanism specified in this document by making it mandatory to</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   implement for the application and referencing this specification</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   normatively.  It is the responsibility of the Diameter application</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   designers to define how overload control mechanisms works on that</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   application.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6.1.</span>  OC-Supported-Features AVP</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and</td><td> </td><td class="right">   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   serves two purposes.  First, it announces a node's support for the</td><td> </td><td class="right">   serves two purposes.  First, it announces a node's support for the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC solution in general.  Second, it contains the description of the</td><td> </td><td class="right">   DOIC solution in general.  Second, it contains the description of the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supported DOIC features of the sending node.  The OC-Supported-</td><td> </td><td class="right">   supported DOIC features of the sending node.  The OC-Supported-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Features AVP MUST be included in every Diameter request message a</td><td> </td><td class="right">   Features AVP MUST be included in every Diameter request message a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC supporting node sends.</td><td> </td><td class="right">   DOIC supporting node sends.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OC-Supported-Features ::= &lt; AVP Header: TBD1 &gt;</td><td> </td><td class="right">      OC-Supported-Features ::= &lt; AVP Header: TBD1 &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                [ OC-Feature-Vector ]</td><td> </td><td class="right">                                [ OC-Feature-Vector ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                              * [ AVP ]</td><td> </td><td class="right">                              * [ AVP ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0087" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.2.  OC-Feature-Vector AVP</td><td> </td><td class="rblock"><span class="insert">7</span>.2.  OC-Feature-Vector AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0088" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-Feature-Vector AVP (AVP code TBD<span class="delete">6</span>) is of type Unsigned64 and</td><td> </td><td class="rblock">   The OC-Feature-Vector AVP (AVP code TBD<span class="insert">2</span>) is of type Unsigned64 and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contains a 64 bit flags field of announced capabilities of a DOIC</td><td> </td><td class="right">   contains a 64 bit flags field of announced capabilities of a DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node.  The value of zero (0) is reserved.</td><td> </td><td class="right">   node.  The value of zero (0) is reserved.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The OC-Feature-Vector sub-AVP is used to announce the DOIC features</td><td> </td><td class="right">   The OC-Feature-Vector sub-AVP is used to announce the DOIC features</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   supported by the DOIC node, in the form of a flag-bits field in which</td><td> </td><td class="right">   supported by the DOIC node, in the form of a flag-bits field in which</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   each bit announces one feature or capability supported by the node.</td><td> </td><td class="right">   each bit announces one feature or capability supported by the node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The absence of the OC-Feature-Vector AVP in request messages</td><td> </td><td class="right">   The absence of the OC-Feature-Vector AVP in request messages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   indicates that only the default traffic abatement algorithm described</td><td> </td><td class="right">   indicates that only the default traffic abatement algorithm described</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   in this specification is supported.  The absence of the OC- Feature-</td><td> </td><td class="right">   in this specification is supported.  The absence of the OC- Feature-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Vector AVP in answer messages indicates that the default traffic</td><td> </td><td class="right">   Vector AVP in answer messages indicates that the default traffic</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l15" /><small>skipping to change at</small><em> page 26, line 17</em></th><th> </th><th><a name="part-r15" /><small>skipping to change at</small><em> page 25, line 31</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The following capabilities are defined in this document:</td><td> </td><td class="right">   The following capabilities are defined in this document:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OLR_DEFAULT_ALGO (0x0000000000000001)</td><td> </td><td class="right">   OLR_DEFAULT_ALGO (0x0000000000000001)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      When this flag is set by the a DOIC reacting node it means that</td><td> </td><td class="right">      When this flag is set by the a DOIC reacting node it means that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      the default traffic abatement (loss) algorithm is supported.  When</td><td> </td><td class="right">      the default traffic abatement (loss) algorithm is supported.  When</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      this flag is set by a DOIC reporting node it means that the loss</td><td> </td><td class="right">      this flag is set by a DOIC reporting node it means that the loss</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      algorithm will be used for requested overload abatement.</td><td> </td><td class="right">      algorithm will be used for requested overload abatement.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0089" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.3.  OC-OLR AVP</td><td> </td><td class="rblock"><span class="insert">7</span>.3.  OC-OLR AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0090" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-OLR AVP (AVP code TBD<span class="delete">2</span>) is of type Grouped and contains the</td><td> </td><td class="rblock">   The OC-OLR AVP (AVP code TBD<span class="insert">3</span>) is of type Grouped and contains the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   information necessary to convey an overload report on an overload</td><td> </td><td class="right">   information necessary to convey an overload report on an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0091" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   condition at the reporting node.  The <span class="delete">OC-OLR AVP does not explicitly</span></td><td> </td><td class="rblock">   condition at the reporting node.  The application the OC-OLR AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   contain all information needed by the reacting node to decide whether</span></td><td> </td><td class="rblock">   applies to is the same as the Application-Id found in the Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   a subsequent request must undergo abatement using the selected</span></td><td> </td><td class="rblock">   message header.  The host or realm the OC-OLR AVP concerns is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   abatement algorithm.  The value of the OC-Report-Type AVP within the</span></td><td> </td><td class="rblock">   determined from the Origin-Host AVP and/or Origin-Realm AVP found in</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   OC-OLR AVP indicates which implicit information is relevant for this</span></td><td> </td><td class="rblock">   the encapsulating Diameter command.  The OC-OLR AVP is intended to be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   decision (see Section 6.6).  The</span> application the OC-OLR AVP applies</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   to is the same as the Application-Id found in the Diameter message</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   header.  The host or realm the OC-OLR AVP concerns is determined from</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   the Origin-Host AVP and/or Origin-Realm AVP found in the</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   encapsulating Diameter command.  The OC-OLR AVP is intended to be</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   sent only by a reporting node.</td><td> </td><td class="right">   sent only by a reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      OC-OLR ::= &lt; AVP Header: TBD2 &gt;</td><td> </td><td class="right">      OC-OLR ::= &lt; AVP Header: TBD2 &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                 &lt; OC-Sequence-Number &gt;</td><td> </td><td class="right">                 &lt; OC-Sequence-Number &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                 &lt; OC-Report-Type &gt;</td><td> </td><td class="right">                 &lt; OC-Report-Type &gt;</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                 [ OC-Reduction-Percentage ]</td><td> </td><td class="right">                 [ OC-Reduction-Percentage ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                 [ OC-Validity-Duration ]</td><td> </td><td class="right">                 [ OC-Validity-Duration ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">               * [ AVP ]</td><td> </td><td class="right">               * [ AVP ]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0092" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.4.  OC-Sequence-Number AVP</td><td> </td><td class="rblock"><span class="insert">7</span>.4.  OC-Sequence-Number AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0093" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-Sequence-Number AVP (AVP code TBD<span class="delete">3</span>) is of type Unsigned64.</td><td> </td><td class="rblock">   The OC-Sequence-Number AVP (AVP code TBD<span class="insert">4</span>) is of type Unsigned64.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Its usage in the context of overload control is described in</td><td> </td><td class="right">   Its usage in the context of overload control is described in</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0094" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   Section <span class="delete">4</span>.2.</td><td> </td><td class="rblock">   Section <span class="insert">5</span>.2.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   From the functionality point of view, the OC-Sequence-Number AVP is</td><td> </td><td class="right">   From the functionality point of view, the OC-Sequence-Number AVP is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   used as a non-volatile increasing counter for a sequence of overload</td><td> </td><td class="right">   used as a non-volatile increasing counter for a sequence of overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0095" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   reports between two DOIC nodes for the same overload occurrence.  <span class="delete">The</span></td><td> </td><td class="rblock">   reports between two DOIC nodes for the same overload occurrence.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   sequence number is only required to be unique between two DOIC nodes.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Sequence numbers are treated in a uni-directional manner, i.e. two</td><td> </td><td class="right">   Sequence numbers are treated in a uni-directional manner, i.e. two</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   sequence numbers on each direction between two DOIC nodes are not</td><td> </td><td class="right">   sequence numbers on each direction between two DOIC nodes are not</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   related or correlated.</td><td> </td><td class="right">   related or correlated.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0096" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.5.  OC-Validity-Duration AVP</td><td> </td><td class="rblock"><span class="insert">7</span>.5.  OC-Validity-Duration AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0097" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-Validity-Duration AVP (AVP code TBD<span class="delete">4</span>) is of type Unsigned32</td><td> </td><td class="rblock">   The OC-Validity-Duration AVP (AVP code TBD<span class="insert">5</span>) is of type Unsigned32</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and indicates in milliseconds the validity time of the overload</td><td> </td><td class="right">   and indicates in milliseconds the validity time of the overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   report.  The number of milliseconds is measured after reception of</td><td> </td><td class="right">   report.  The number of milliseconds is measured after reception of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   the first OC-OLR AVP with a given value of OC-Sequence-Number AVP.</td><td> </td><td class="right">   the first OC-OLR AVP with a given value of OC-Sequence-Number AVP.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30</td><td> </td><td class="right">   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   seconds).  When the OC-Validity-Duration AVP is not present in the</td><td> </td><td class="right">   seconds).  When the OC-Validity-Duration AVP is not present in the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-OLR AVP, the default value applies.</td><td> </td><td class="right">   OC-OLR AVP, the default value applies.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0098" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.6.  OC-Report-Type AVP</td><td> </td><td class="rblock"><span class="insert">7</span>.6.  OC-Report-Type AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0099" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-Report-Type AVP (AVP code TBD<span class="delete">5</span>) is of type Enumerated.  The</td><td> </td><td class="rblock">   The OC-Report-Type AVP (AVP code TBD<span class="insert">6</span>) is of type Enumerated.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   value of the AVP describes what the overload report concerns.  The</td><td> </td><td class="right">   value of the AVP describes what the overload report concerns.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   following values are initially defined:</td><td> </td><td class="right">   following values are initially defined:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   HOST_REPORT 0  The overload report is for a host.  Overload abatement</td><td> </td><td class="right">   HOST_REPORT 0  The overload report is for a host.  Overload abatement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      treatment applies to host-routed requests.</td><td> </td><td class="right">      treatment applies to host-routed requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   REALM_REPORT 1  The overload report is for a realm.  Overload</td><td> </td><td class="right">   REALM_REPORT 1  The overload report is for a realm.  Overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      abatement treatment applies to realm-routed requests.</td><td> </td><td class="right">      abatement treatment applies to realm-routed requests.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0100" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.7.  OC-Reduction-Percentage AVP</td><td> </td><td class="rblock"><span class="insert">7</span>.7.  OC-Reduction-Percentage AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0101" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   The OC-Reduction-Percentage AVP (AVP code TBD<span class="delete">8</span>) is of type Unsigned32</td><td> </td><td class="rblock">   The OC-Reduction-Percentage AVP (AVP code TBD<span class="insert">7</span>) is of type Unsigned32</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and describes the percentage of the traffic that the sender is</td><td> </td><td class="right">   and describes the percentage of the traffic that the sender is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requested to reduce, compared to what it otherwise would send.  The</td><td> </td><td class="right">   requested to reduce, compared to what it otherwise would send.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   OC-Reduction-Percentage AVP applies to the default (loss) algorithm</td><td> </td><td class="right">   OC-Reduction-Percentage AVP applies to the default (loss) algorithm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   specified in this specification.  However, the AVP can be reused for</td><td> </td><td class="right">   specified in this specification.  However, the AVP can be reused for</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   future abatement algorithms, if its semantics fit into the new</td><td> </td><td class="right">   future abatement algorithms, if its semantics fit into the new</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm.</td><td> </td><td class="right">   algorithm.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The value of the Reduction-Percentage AVP is between zero (0) and one</td><td> </td><td class="right">   The value of the Reduction-Percentage AVP is between zero (0) and one</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   hundred (100).  Values greater than 100 are ignored.  The value of</td><td> </td><td class="right">   hundred (100).  Values greater than 100 are ignored.  The value of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   100 means that all traffic is to be throttled, i.e. the reporting</td><td> </td><td class="right">   100 means that all traffic is to be throttled, i.e. the reporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node is under a severe load and ceases to process any new messages.</td><td> </td><td class="right">   node is under a severe load and ceases to process any new messages.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The value of 0 means that the reporting node is in a stable state and</td><td> </td><td class="right">   The value of 0 means that the reporting node is in a stable state and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   has no need for the reacting node to apply any traffic abatement.</td><td> </td><td class="right">   has no need for the reacting node to apply any traffic abatement.</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0102" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">The default value of the OC-Reduction-Percentage AVP is 0.  When the</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   OC-Reduction-Percentage AVP is not present in the overload report,</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">   the default value applies.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0103" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">6</span>.8.  Attribute Value Pair flag rules</td><td> </td><td class="rblock"><span class="insert">7</span>.8.  Attribute Value Pair flag rules</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                         +---------+</td><td> </td><td class="right">                                                         +---------+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                         |AVP flag |</td><td> </td><td class="right">                                                         |AVP flag |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                         |rules    |</td><td> </td><td class="right">                                                         |rules    |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                                                         +----+----+</td><td> </td><td class="right">                                                         +----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">                              AVP   Section              |    |MUST|</td><td> </td><td class="right">                              AVP   Section              |    |MUST|</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">       Attribute Name         Code  Defined  Value Type  |MUST| NOT|</td><td> </td><td class="right">       Attribute Name         Code  Defined  Value Type  |MUST| NOT|</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      |OC-Supported-Features  TBD1  6.1      Grouped     |    | V  |</td><td> </td><td class="right">      |OC-Supported-Features  TBD1  6.1      Grouped     |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0104" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      |OC-<span class="delete">OLR                 TBD2  6.3      Grouped   </span>  |    | V  |</td><td> </td><td class="rblock">      |OC-<span class="insert">Feature-Vector      TBD2  6.2      Unsigned64</span>  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0105" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      |OC-<span class="delete">Sequence-Number     TBD3  6.4      Unsigned64</span>  |    | V  |</td><td> </td><td class="rblock">      |OC-<span class="insert">OLR                 TBD3  6.3      Grouped   </span>  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0106" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      |OC-<span class="delete">Validity-Duration   TBD4  6.5      Unsigned32</span>  |    | V  |</td><td> </td><td class="rblock">      |OC-<span class="insert">Sequence-Number     TBD4  6.4      Unsigned64</span>  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0107" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      |OC-<span class="delete">Report-Type         TBD5  6.6      Enumerated</span>  |    | V  |</td><td> </td><td class="rblock">      |OC-<span class="insert">Validity-Duration   TBD5  6.5      Unsigned32</span>  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0108" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      <span class="delete">|OC-Reduction                                      |    |    |</span></td><td> </td><td class="rblock">      <span class="insert">|OC-Report-Type         TBD6  6.6      Enumerated</span>  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">      |  -Percentage          TBD8  6.7      Unsigned32</span>  |    | V  |</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0109" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">      <span class="delete">|OC-Feature-Vector      TBD6  6.2      Unsigned64</span>  |    | V  |</td><td> </td><td class="rblock">      <span class="insert">|OC-Reduction                                      |    |    |</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert">      |  -Percentage          TBD7  6.7      Unsigned32</span>  |    | V  |</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      +--------------------------------------------------+----+----+</td><td> </td><td class="right">      +--------------------------------------------------+----+----+</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   As described in the Diameter base protocol [RFC6733], the M-bit usage</td><td> </td><td class="right">   As described in the Diameter base protocol [RFC6733], the M-bit usage</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   for a given AVP in a given command may be defined by the application.</td><td> </td><td class="right">   for a given AVP in a given command may be defined by the application.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0110" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">7</span>.  Error Response Codes</td><td> </td><td class="rblock"><span class="insert">8</span>.  Error Response Codes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a DOIC node rejects a Diameter request due to overload, the DOIC</td><td> </td><td class="right">   When a DOIC node rejects a Diameter request due to overload, the DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   node MUST select an appropriate error response code.  This</td><td> </td><td class="right">   node MUST select an appropriate error response code.  This</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   determination is made based on the probability of the request</td><td> </td><td class="right">   determination is made based on the probability of the request</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   succeeding if retried on a different path.</td><td> </td><td class="right">   succeeding if retried on a different path.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A reporting node rejecting a Diameter request due to an overload</td><td> </td><td class="right">   A reporting node rejecting a Diameter request due to an overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can</td><td> </td><td class="right">   condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   assume that the same request may succeed on a different path.</td><td> </td><td class="right">   assume that the same request may succeed on a different path.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l16" /><small>skipping to change at</small><em> page 29, line 20</em></th><th> </th><th><a name="part-r16" /><small>skipping to change at</small><em> page 28, line 24</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      reporting node can assume that retrying the request would result</td><td> </td><td class="right">      reporting node can assume that retrying the request would result</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      in it coming to the same reporting node.</td><td> </td><td class="right">      in it coming to the same reporting node.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.</td><td> </td><td class="right">      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      A second example is when an agent that supports the DOIC solution</td><td> </td><td class="right">      A second example is when an agent that supports the DOIC solution</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      is performing the role of a reacting node for a non supporting</td><td> </td><td class="right">      is performing the role of a reacting node for a non supporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      client.  Requests that are rejected as a result of DOIC throttling</td><td> </td><td class="right">      client.  Requests that are rejected as a result of DOIC throttling</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      by the agent in this scenario would generally be rejected with a</td><td> </td><td class="right">      by the agent in this scenario would generally be rejected with a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      DIAMETER_UNABLE_TO_COMPLY response code.</td><td> </td><td class="right">      DIAMETER_UNABLE_TO_COMPLY response code.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0111" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">8</span>.  IANA Considerations</td><td> </td><td class="rblock"><span class="insert">9</span>.  IANA Considerations</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0112" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">8</span>.1.  AVP codes</td><td> </td><td class="rblock"><span class="insert">9</span>.1.  AVP codes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0113" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   New AVPs defined by this specification are listed in Section <span class="delete">6</span>.  All</td><td> </td><td class="rblock">   New AVPs defined by this specification are listed in Section <span class="insert">7</span>.  All</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   AVP codes are allocated from the 'Authentication, Authorization, and</td><td> </td><td class="right">   AVP codes are allocated from the 'Authentication, Authorization, and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Accounting (AAA) Parameters' AVP Codes registry.</td><td> </td><td class="right">   Accounting (AAA) Parameters' AVP Codes registry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0114" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">8</span>.2.  New registries</td><td> </td><td class="rblock"><span class="insert">9</span>.2.  New registries</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Two new registries are needed under the 'Authentication,</td><td> </td><td class="right">   Two new registries are needed under the 'Authentication,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Authorization, and Accounting (AAA) Parameters' registry.</td><td> </td><td class="right">   Authorization, and Accounting (AAA) Parameters' registry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A new "Overload Control Feature Vector" registry is required.  The</td><td> </td><td class="right">   A new "Overload Control Feature Vector" registry is required.  The</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   registry must contain the following:</td><td> </td><td class="right">   registry must contain the following:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Feature Vector Value</td><td> </td><td class="right">      Feature Vector Value</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Specification - the specification that defines the new value.</td><td> </td><td class="right">      Specification - the specification that defines the new value.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0115" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   See Section <span class="delete">6</span>.2 for the initial Feature Vector Value in the registry.</td><td> </td><td class="rblock">   See Section <span class="insert">7</span>.2 for the initial Feature Vector Value in the registry.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification is the specification defining the value.  New</td><td> </td><td class="right">   This specification is the specification defining the value.  New</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   values can be added into the registry using the Specification</td><td> </td><td class="right">   values can be added into the registry using the Specification</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Required policy.  [RFC5226].</td><td> </td><td class="right">   Required policy.  [RFC5226].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   A new "Overload Report Type" registry is required.  The registry must</td><td> </td><td class="right">   A new "Overload Report Type" registry is required.  The registry must</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contain the following:</td><td> </td><td class="right">   contain the following:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Report Type Value</td><td> </td><td class="right">      Report Type Value</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0116" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">                                                                         </span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      Specification - the specification that defines the new value.</td><td> </td><td class="right">      Specification - the specification that defines the new value.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0117" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   See Section <span class="delete">6</span>.6 for the initial assignment in the registry.  New</td><td> </td><td class="rblock">   See Section <span class="insert">7</span>.6 for the initial assignment in the registry.  New</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   types can be added using the Specification Required policy [RFC5226].</td><td> </td><td class="right">   types can be added using the Specification Required policy [RFC5226].</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0118" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">9</span>.  Security Considerations</td><td> </td><td class="rblock"><span class="insert">10</span>.  Security Considerations</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   DOIC gives Diameter nodes the ability to request that downstream</td><td> </td><td class="right">   DOIC gives Diameter nodes the ability to request that downstream</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   nodes send fewer Diameter requests.  Nodes do this by exchanging</td><td> </td><td class="right">   nodes send fewer Diameter requests.  Nodes do this by exchanging</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload reports that directly effect this reduction.  This exchange</td><td> </td><td class="right">   overload reports that directly effect this reduction.  This exchange</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is potentially subject to multiple methods of attack, and has the</td><td> </td><td class="right">   is potentially subject to multiple methods of attack, and has the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   potential to be used as a Denial-of-Service (DoS) attack vector.</td><td> </td><td class="right">   potential to be used as a Denial-of-Service (DoS) attack vector.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Overload reports may contain information about the topology and</td><td> </td><td class="right">   Overload reports may contain information about the topology and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   current status of a Diameter network.  This information is</td><td> </td><td class="right">   current status of a Diameter network.  This information is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   potentially sensitive.  Network operators may wish to control</td><td> </td><td class="right">   potentially sensitive.  Network operators may wish to control</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   disclosure of overload reports to unauthorized parties to avoid its</td><td> </td><td class="right">   disclosure of overload reports to unauthorized parties to avoid its</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   use for competitive intelligence or to target attacks.</td><td> </td><td class="right">   use for competitive intelligence or to target attacks.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter does not include features to provide end-to-end</td><td> </td><td class="right">   Diameter does not include features to provide end-to-end</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   authentication, integrity protection, or confidentiality.  This may</td><td> </td><td class="right">   authentication, integrity protection, or confidentiality.  This may</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   cause complications when sending overload reports between non-</td><td> </td><td class="right">   cause complications when sending overload reports between non-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   adjacent nodes.</td><td> </td><td class="right">   adjacent nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0119" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">9</span>.1.  Potential Threat Modes</td><td> </td><td class="rblock"><span class="insert">10</span>.1.  Potential Threat Modes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The Diameter protocol involves transactions in the form of requests</td><td> </td><td class="right">   The Diameter protocol involves transactions in the form of requests</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   and answers exchanged between clients and servers.  These clients and</td><td> </td><td class="right">   and answers exchanged between clients and servers.  These clients and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   servers may be peers, that is, they may share a direct transport</td><td> </td><td class="right">   servers may be peers, that is, they may share a direct transport</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   (e.g.  TCP or SCTP) connection, or the messages may traverse one or</td><td> </td><td class="right">   (e.g.  TCP or SCTP) connection, or the messages may traverse one or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   more intermediaries, known as Diameter Agents.  Diameter nodes use</td><td> </td><td class="right">   more intermediaries, known as Diameter Agents.  Diameter nodes use</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   TLS, DTLS, or IPsec to authenticate peers, and to provide</td><td> </td><td class="right">   TLS, DTLS, or IPsec to authenticate peers, and to provide</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   confidentiality and integrity protection of traffic between peers.</td><td> </td><td class="right">   confidentiality and integrity protection of traffic between peers.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Nodes can make authorization decisions based on the peer identities</td><td> </td><td class="right">   Nodes can make authorization decisions based on the peer identities</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   authenticated at the transport layer.</td><td> </td><td class="right">   authenticated at the transport layer.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l17" /><small>skipping to change at</small><em> page 31, line 31</em></th><th> </th><th><a name="part-r17" /><small>skipping to change at</small><em> page 30, line 33</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   before acting on the report or forwarding the report to other peers.</td><td> </td><td class="right">   before acting on the report or forwarding the report to other peers.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   For example, an overload report from a peer that applies to a realm</td><td> </td><td class="right">   For example, an overload report from a peer that applies to a realm</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   not handled by that peer is suspect.</td><td> </td><td class="right">   not handled by that peer is suspect.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      This attack is partially mitigated by the fact that the</td><td> </td><td class="right">      This attack is partially mitigated by the fact that the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      application, as well as host and realm, for a given OLR is</td><td> </td><td class="right">      application, as well as host and realm, for a given OLR is</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      determined implicitly by respective AVPs in the enclosing answer.</td><td> </td><td class="right">      determined implicitly by respective AVPs in the enclosing answer.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      If a reporting node modifies any of those AVPs, the enclosing</td><td> </td><td class="right">      If a reporting node modifies any of those AVPs, the enclosing</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      transaction will also be affected.</td><td> </td><td class="right">      transaction will also be affected.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0120" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">9</span>.2.  Denial of Service Attacks</td><td> </td><td class="rblock"><span class="insert">10</span>.2.  Denial of Service Attacks</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter overload reports, especially realm-reports, can cause a node</td><td> </td><td class="right">   Diameter overload reports, especially realm-reports, can cause a node</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to cease sending some or all Diameter requests for an extended</td><td> </td><td class="right">   to cease sending some or all Diameter requests for an extended</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   period.  This makes them a tempting vector for DoS attacks.</td><td> </td><td class="right">   period.  This makes them a tempting vector for DoS attacks.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Furthermore, since Diameter is almost always used in support of other</td><td> </td><td class="right">   Furthermore, since Diameter is almost always used in support of other</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   protocols, a DoS attack on Diameter is likely to impact those</td><td> </td><td class="right">   protocols, a DoS attack on Diameter is likely to impact those</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   protocols as well.  Therefore, Diameter nodes MUST NOT honor or</td><td> </td><td class="right">   protocols as well.  Therefore, Diameter nodes MUST NOT honor or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   forward OLRs received from peers that are not trusted to send them.</td><td> </td><td class="right">   forward OLRs received from peers that are not trusted to send them.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   An attacker might use the information in an OLR to assist in DoS</td><td> </td><td class="right">   An attacker might use the information in an OLR to assist in DoS</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   attacks.  For example, an attacker could use information about</td><td> </td><td class="right">   attacks.  For example, an attacker could use information about</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   current overload conditions to time an attack for maximum effect, or</td><td> </td><td class="right">   current overload conditions to time an attack for maximum effect, or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   use subsequent overload reports as a feedback mechanism to learn the</td><td> </td><td class="right">   use subsequent overload reports as a feedback mechanism to learn the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   results of a previous or ongoing attack.  Operators need the ability</td><td> </td><td class="right">   results of a previous or ongoing attack.  Operators need the ability</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to ensure that OLRs are not leaked to untrusted parties.</td><td> </td><td class="right">   to ensure that OLRs are not leaked to untrusted parties.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0121" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">9</span>.3.  Non-Compliant Nodes</td><td> </td><td class="rblock"><span class="insert">10</span>.3.  Non-Compliant Nodes</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   In the absence of an overload control mechanism, Diameter nodes need</td><td> </td><td class="right">   In the absence of an overload control mechanism, Diameter nodes need</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   to implement strategies to protect themselves from floods of</td><td> </td><td class="right">   to implement strategies to protect themselves from floods of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requests, and to make sure that a disproportionate load from one</td><td> </td><td class="right">   requests, and to make sure that a disproportionate load from one</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   source does not prevent other sources from receiving service.  For</td><td> </td><td class="right">   source does not prevent other sources from receiving service.  For</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   example, a Diameter server might throttle a certain percentage of</td><td> </td><td class="right">   example, a Diameter server might throttle a certain percentage of</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   requests from sources that exceed certain limits.  Overload control</td><td> </td><td class="right">   requests from sources that exceed certain limits.  Overload control</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   can be thought of as an optimization for such strategies, where</td><td> </td><td class="right">   can be thought of as an optimization for such strategies, where</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   downstream nodes never send the excess requests in the first place.</td><td> </td><td class="right">   downstream nodes never send the excess requests in the first place.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   However, the presence of an overload control mechanism does not</td><td> </td><td class="right">   However, the presence of an overload control mechanism does not</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l18" /><small>skipping to change at</small><em> page 32, line 28</em></th><th> </th><th><a name="part-r18" /><small>skipping to change at</small><em> page 31, line 28</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   When a Diameter node sends an overload report, it cannot assume that</td><td> </td><td class="right">   When a Diameter node sends an overload report, it cannot assume that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   all nodes will comply, even if they indicate support for DOIC.  A</td><td> </td><td class="right">   all nodes will comply, even if they indicate support for DOIC.  A</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   non-compliant node might continue to send requests with no reduction</td><td> </td><td class="right">   non-compliant node might continue to send requests with no reduction</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   in load.  Such non-compliance could be done accidentally, or</td><td> </td><td class="right">   in load.  Such non-compliance could be done accidentally, or</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   maliciously to gain an unfair advantage over compliant nodes.</td><td> </td><td class="right">   maliciously to gain an unfair advantage over compliant nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Requirement 28 [RFC7068] indicates that the overload control solution</td><td> </td><td class="right">   Requirement 28 [RFC7068] indicates that the overload control solution</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   cannot assume that all Diameter nodes in a network are trusted, and</td><td> </td><td class="right">   cannot assume that all Diameter nodes in a network are trusted, and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   that malicious nodes not be allowed to take advantage of the overload</td><td> </td><td class="right">   that malicious nodes not be allowed to take advantage of the overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   control mechanism to get more than their fair share of service.</td><td> </td><td class="right">   control mechanism to get more than their fair share of service.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0122" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">9</span>.4.  End-to End-Security Issues</td><td> </td><td class="rblock"><span class="insert">10</span>.4.  End-to End-Security Issues</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The lack of end-to-end integrity features makes it difficult to</td><td> </td><td class="right">   The lack of end-to-end integrity features makes it difficult to</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   establish trust in overload reports received from non-adjacent nodes.</td><td> </td><td class="right">   establish trust in overload reports received from non-adjacent nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Any agents in the message path may insert or modify overload reports.</td><td> </td><td class="right">   Any agents in the message path may insert or modify overload reports.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Nodes must trust that their adjacent peers perform proper checks on</td><td> </td><td class="right">   Nodes must trust that their adjacent peers perform proper checks on</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload reports from their peers, and so on, creating a transitive-</td><td> </td><td class="right">   overload reports from their peers, and so on, creating a transitive-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   trust requirement extending for potentially long chains of nodes.</td><td> </td><td class="right">   trust requirement extending for potentially long chains of nodes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Network operators must determine if this transitive trust requirement</td><td> </td><td class="right">   Network operators must determine if this transitive trust requirement</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   is acceptable for their deployments.  Nodes supporting Diameter</td><td> </td><td class="right">   is acceptable for their deployments.  Nodes supporting Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload control MUST give operators the ability to select which</td><td> </td><td class="right">   overload control MUST give operators the ability to select which</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   peers are trusted to deliver overload reports, and whether they are</td><td> </td><td class="right">   peers are trusted to deliver overload reports, and whether they are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   trusted to forward overload reports from non-adjacent nodes.  DOIC</td><td> </td><td class="right">   trusted to forward overload reports from non-adjacent nodes.  DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   nodes MUST strip DOIC AVPs from messages received from peers that are</td><td> </td><td class="right">   nodes MUST strip DOIC AVPs from messages received from peers that are</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   not trusted for DOIC purposes.</td><td> </td><td class="right">   not trusted for DOIC purposes.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The lack of end-to-end confidentiality protection means that any</td><td> </td><td class="right">   The lack of end-to-end confidentiality protection means that any</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter agent in the path of an overload report can view the</td><td> </td><td class="right">   Diameter agent in the path of an overload report can view the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   contents of that report.  In addition to the requirement to select</td><td> </td><td class="right">   contents of that report.  In addition to the requirement to select</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   which peers are trusted to send overload reports, operators MUST be</td><td> </td><td class="right">   which peers are trusted to send overload reports, operators MUST be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   able to select which peers are authorized to receive reports.  A node</td><td> </td><td class="right">   able to select which peers are authorized to receive reports.  A node</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0123" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   MUST <span class="delete">not</span> send an overload report to a peer not authorized to receive</td><td> </td><td class="rblock">   MUST <span class="insert">NOT</span> send an overload report to a peer not authorized to receive</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   it.  Furthermore, an agent MUST remove any overload reports that</td><td> </td><td class="right">   it.  Furthermore, an agent MUST remove any overload reports that</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   might have been inserted by other nodes before forwarding a Diameter</td><td> </td><td class="right">   might have been inserted by other nodes before forwarding a Diameter</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   message to a peer that is not authorized to receive overload reports.</td><td> </td><td class="right">   message to a peer that is not authorized to receive overload reports.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      A DOIC node cannot always automatically detect that a peer also</td><td> </td><td class="right">      A DOIC node cannot always automatically detect that a peer also</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      supports DOIC.  For example, a node might have a peer that is a</td><td> </td><td class="right">      supports DOIC.  For example, a node might have a peer that is a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      non-supporting agent.  If nodes on the other side of that agent</td><td> </td><td class="right">      non-supporting agent.  If nodes on the other side of that agent</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      send OC-Supported-Features AVPs, the agent is likely to forward</td><td> </td><td class="right">      send OC-Supported-Features AVPs, the agent is likely to forward</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      them as unknown AVPs.  Messages received across the non-supporting</td><td> </td><td class="right">      them as unknown AVPs.  Messages received across the non-supporting</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">      agent may be indistinguishable from messages received across a</td><td> </td><td class="right">      agent may be indistinguishable from messages received across a</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
      <tr bgcolor="gray" ><td></td><th><a name="part-l19" /><small>skipping to change at</small><em> page 33, line 31</em></th><th> </th><th><a name="part-r19" /><small>skipping to change at</small><em> page 32, line 31</em></th><td></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   adjacent nodes for overload control purposes.  Readers should be</td><td> </td><td class="right">   adjacent nodes for overload control purposes.  Readers should be</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   reminded, however, that the overload control mechanism encourages</td><td> </td><td class="right">   reminded, however, that the overload control mechanism encourages</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter agents to modify AVPs in, or insert additional AVPs into,</td><td> </td><td class="right">   Diameter agents to modify AVPs in, or insert additional AVPs into,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   existing messages that are originated by other nodes.  If end-to-end</td><td> </td><td class="right">   existing messages that are originated by other nodes.  If end-to-end</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   security is enabled, there is a risk that such modification could</td><td> </td><td class="right">   security is enabled, there is a risk that such modification could</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   violate integrity protection.  The details of using any future</td><td> </td><td class="right">   violate integrity protection.  The details of using any future</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   Diameter end-to-end security mechanism with overload control will</td><td> </td><td class="right">   Diameter end-to-end security mechanism with overload control will</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   require careful consideration, and are beyond the scope of this</td><td> </td><td class="right">   require careful consideration, and are beyond the scope of this</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   document.</td><td> </td><td class="right">   document.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0124" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">1<span class="delete">0</span>.  Contributors</td><td> </td><td class="rblock">1<span class="insert">1</span>.  Contributors</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The following people contributed substantial ideas, feedback, and</td><td> </td><td class="right">   The following people contributed substantial ideas, feedback, and</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   discussion to this document:</td><td> </td><td class="right">   discussion to this document:</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Eric McMurry</td><td> </td><td class="right">   o  Eric McMurry</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Hannes Tschofenig</td><td> </td><td class="right">   o  Hannes Tschofenig</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Ulrich Wiehe</td><td> </td><td class="right">   o  Ulrich Wiehe</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Jean-Jacques Trottin</td><td> </td><td class="right">   o  Jean-Jacques Trottin</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Maria Cruz Bartolome</td><td> </td><td class="right">   o  Maria Cruz Bartolome</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Martin Dolly</td><td> </td><td class="right">   o  Martin Dolly</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Nirav Salot</td><td> </td><td class="right">   o  Nirav Salot</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   o  Susan Shishufeng</td><td> </td><td class="right">   o  Susan Shishufeng</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0125" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">1<span class="delete">1</span>.  References</td><td> </td><td class="rblock">1<span class="insert">2</span>.  References</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0126" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">1<span class="delete">1</span>.1.  Normative References</td><td> </td><td class="rblock">1<span class="insert">2</span>.1.  Normative References</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate</td><td> </td><td class="right">   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Requirement Levels", BCP 14, RFC 2119, March 1997.</td><td> </td><td class="right">              Requirement Levels", BCP 14, RFC 2119, March 1997.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an</td><td> </td><td class="right">   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              IANA Considerations Section in RFCs", BCP 26, RFC 5226,</td><td> </td><td class="right">              IANA Considerations Section in RFCs", BCP 26, RFC 5226,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              May 2008.</td><td> </td><td class="right">              May 2008.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0127" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">[RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">              Time Protocol Version 4: Protocol and Algorithms</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">              Specification", RFC 5905, June 2010.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,</td><td> </td><td class="right">   [RFC6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              "Diameter Base Protocol", RFC 6733, October 2012.</td><td> </td><td class="right">              "Diameter Base Protocol", RFC 6733, October 2012.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0128" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">1<span class="delete">1</span>.2.  Informative References</td><td> </td><td class="rblock">1<span class="insert">2</span>.2.  Informative References</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [Cx]       3GPP, , "ETSI TS 129 229 V11.4.0", August 2013.</td><td> </td><td class="right">   [Cx]       3GPP, , "ETSI TS 129 229 V11.4.0", August 2013.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [I-D.ietf-dime-e2e-sec-req]</td><td> </td><td class="right">   [I-D.ietf-dime-e2e-sec-req]</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,</td><td> </td><td class="right">              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              "Diameter AVP Level Security: Scenarios and Requirements",</td><td> </td><td class="right">              "Diameter AVP Level Security: Scenarios and Requirements",</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0129" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">              <span class="delete">draft-ietf-dime-e2e-sec-req-00</span> (work in progress),</td><td> </td><td class="rblock">              <span class="insert">draft-ietf-dime-e2e-sec-req-01</span> (work in progress), <span class="insert">October</span></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">              <span class="delete">September</span> 2013.</td><td> </td><td class="rblock">              2013.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.</td><td> </td><td class="right">   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.</td><td> </td><td class="right">   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Loughney, "Diameter Credit-Control Application", RFC 4006,</td><td> </td><td class="right">              Loughney, "Diameter Credit-Control Application", RFC 4006,</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              August 2005.</td><td> </td><td class="right">              August 2005.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0130" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   <span class="delete">[RFC5729]  Korhonen, J., Jones, M., Morand, L., and T. Tsou,</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">              "Clarifications on the Routing of Diameter Requests Based</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">              on the Username and the Realm", RFC 5729, December 2009.</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">                                                                         </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [RFC7068]  McMurry, E. and B. Campbell, "Diameter Overload Control</td><td> </td><td class="right">   [RFC7068]  McMurry, E. and B. Campbell, "Diameter Overload Control</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">              Requirements", RFC 7068, November 2013.</td><td> </td><td class="right">              Requirements", RFC 7068, November 2013.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.</td><td> </td><td class="right">   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">Appendix A.  Issues left for future specifications</td><td> </td><td class="right">Appendix A.  Issues left for future specifications</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   The base solution for the overload control does not cover all</td><td> </td><td class="right">   The base solution for the overload control does not cover all</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   possible use cases.  A number of solution aspects were intentionally</td><td> </td><td class="right">   possible use cases.  A number of solution aspects were intentionally</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   left for future specification and protocol work.  The following sub-</td><td> </td><td class="right">   left for future specification and protocol work.  The following sub-</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   sections define some of the potential extensions to the DOIC</td><td> </td><td class="right">   sections define some of the potential extensions to the DOIC</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   solution.</td><td> </td><td class="right">   solution.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">A.1.  Additional traffic abatement algorithms</td><td> </td><td class="right">A.1.  Additional traffic abatement algorithms</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification describes only means for a simple loss based</td><td> </td><td class="right">   This specification describes only means for a simple loss based</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   algorithm.  Future algorithms can be added using the designed</td><td> </td><td class="right">   algorithm.  Future algorithms can be added using the designed</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   solution extension mechanism.  The new algorithms need to be</td><td> </td><td class="right">   solution extension mechanism.  The new algorithms need to be</td><td class="lineno" valign="top"></td></tr>
      <tr><td><a name="diff0131" /></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="lblock">   registered with IANA.  See Sections <span class="delete">6.1 and 8</span> for the required IANA</td><td> </td><td class="rblock">   registered with IANA.  See Sections <span class="insert">7.1 and 9</span> for the required IANA</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   steps.</td><td> </td><td class="right">   steps.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">A.2.  Agent Overload</td><td> </td><td class="right">A.2.  Agent Overload</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   This specification focuses on Diameter endpoint (server or client)</td><td> </td><td class="right">   This specification focuses on Diameter endpoint (server or client)</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   overload.  A separate extension will be required to outline the</td><td> </td><td class="right">   overload.  A separate extension will be required to outline the</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">   handling of the case of agent overload.</td><td> </td><td class="right">   handling of the case of agent overload.</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left">A.3.  New Error Diagnostic AVP</td><td> </td><td class="right">A.3.  New Error Diagnostic AVP</td><td class="lineno" valign="top"></td></tr>
      <tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>

     <tr><td></td><td class="left"></td><td> </td><td class="right"></td><td></td></tr>
     <tr bgcolor="gray"><th colspan="5" align="center"><a name="end">&nbsp;End of changes. 131 change blocks.&nbsp;</a></th></tr>
     <tr class="stats"><td></td><th><i>352 lines changed or deleted</i></th><th><i> </i></th><th><i>295 lines changed or added</i></th><td></td></tr>
     <tr><td colspan="5" align="center" class="small"><br/>This html diff was produced by rfcdiff 1.41. The latest version is available from <a href="http://www.tools.ietf.org/tools/rfcdiff/" >http://tools.ietf.org/tools/rfcdiff/</a> </td></tr>
   </table>
   </body>
   </html>
X-Generator: pyht 0.35

<!-- args: {'--oldcolour': 'red', '--width': '', 'difftype': '--html', 'filename2': '\n\n\n\nDiameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.\nInternet-Draft                                                  Broadcom\nIntended status: Standards Track                         S. Donovan, Ed.\nExpires: June 25, 2015                                       B. Campbell\n                                                                  Oracle\n                                                               L. Morand\n                                                             Orange Labs\n                                                       December 22, 2014\n\n\n                Diameter Overload Indication Conveyance\n                      draft-ietf-dime-ovli-06.txt\n\nAbstract\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC).\n\nStatus of This Memo\n\n   This Inter
 net-Draft is submitted in full conformance with the\n   provisions of BCP 78 and BCP 79.\n\n   Internet-Drafts are working documents of the Internet Engineering\n   Task Force (IETF).  Note that other groups may also distribute\n   working documents as Internet-Drafts.  The list of current Internet-\n   Drafts is at http://datatracker.ietf.org/drafts/current/.\n\n   Internet-Drafts are draft documents valid for a maximum of six months\n   and may be updated, replaced, or obsoleted by other documents at any\n   time.  It is inappropriate to use Internet-Drafts as reference\n   material or to cite them other than as "work in progress."\n\n   This Internet-Draft will expire on June 25, 2015.\n\nCopyright Notice\n\n   Copyright (c) 2014 IETF Trust and the persons identified as the\n   document authors.  All rights reserved.\n\n   This document is subject to BCP 78 and the IETF Trust\'s Legal\n   Provisions Relating to IETF Documents\n   (http://trustee.ietf.org/license-info) in effect o
 n the date of\n   publication of this document.  Please review these documents\n   carefully, as they describe your rights and restrictions with respect\n   to this document.  Code Components extracted from this document must\n   include Simplified BSD License text as described in Section 4.e of\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 1]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   the Trust Legal Provisions and are provided without warranty as\n   described in the Simplified BSD License.\n\nTable of Contents\n\n   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3\n   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4\n   3.  Conventions Used in This Document . . . . . . . . . . . . . .   5\n   4.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5\n     4.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7\n     4.2.  DOIC Capability Annou
 ncement  . . . . . . . . . . . . . .   7\n     4.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9\n     4.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11\n     4.5.  Simplified Example Architecture . . . . . . . . . . . . .  11\n   5.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  12\n     5.1.  Capability Announcement . . . . . . . . . . . . . . . . .  12\n       5.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  12\n       5.1.2.  Reporting Node Behavior . . . . . . . . . . . . . . .  13\n       5.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14\n     5.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15\n       5.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15\n       5.2.2.  Reacting Node Behavior  . . . . . . . . . . . . . . .  19\n       5.2.3.  Reporting Node Behavior . . . . . . . . . . . . . . .  20\n     5.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . 
 .  21\n   6.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22\n     6.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  22\n     6.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23\n     6.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  23\n   7.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  24\n     7.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  24\n     7.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25\n     7.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  25\n     7.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26\n     7.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  26\n     7.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  26\n     7.7.  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  26\n     7.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  27\n   8.  Error Response Codes 
  . . . . . . . . . . . . . . . . . . . .  27\n   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  28\n     9.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  28\n     9.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  28\n   10. Security Considerations . . . . . . . . . . . . . . . . . . .  29\n     10.1.  Potential Threat Modes . . . . . . . . . . . . . . . . .  29\n     10.2.  Denial of Service Attacks  . . . . . . . . . . . . . . .  30\n     10.3.  Non-Compliant Nodes  . . . . . . . . . . . . . . . . . .  31\n     10.4.  End-to End-Security Issues . . . . . . . . . . . . . . .  31\n   11. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  32\n   12. References  . . . . . . . . . . . . . . . . . . . . . . . . .  33\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 2]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n     12.1.  Normative References . . . . . . . . .
  . . . . . . . . .  33\n     12.2.  Informative References . . . . . . . . . . . . . . . . .  33\n   Appendix A.  Issues left for future specifications  . . . . . . .  33\n     A.1.  Additional traffic abatement algorithms . . . . . . . . .  33\n     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  34\n     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  34\n   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  34\n   Appendix C.  Requirements Conformance Analysis  . . . . . . . . .  34\n     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  34\n     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  35\n     C.3.  Implicit Application Indication . . . . . . . . . . . . .  35\n     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  35\n     C.5.  No New Vulnerabilities  . . . . . . . . . . . . . . . . .  36\n     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  36\n       C.6.
 1.  General . . . . . . . . . . . . . . . . . . . . . . .  36\n       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  37\n       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  40\n       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  41\n       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  42\n       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  43\n       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  44\n   Appendix D.  Considerations for Applications Integrating the DOIC\n                Solution . . . . . . . . . . . . . . . . . . . . . .  45\n     D.1.  Application Classification  . . . . . . . . . . . . . . .  45\n     D.2.  Application Type Overload Implications  . . . . . . . . .  46\n     D.3.  Request Transaction Classification  . . . . . . . . . . .  47\n     D.4.  Request Type Overload Implications  . . . . . . . . . . .  48\n   Authors\' Addresses  . . . . . . . . . . . . . 
 . . . . . . . . . .  50\n\n1.  Introduction\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC), based on the requirements identified in [RFC7068].\n\n   This specification addresses Diameter overload control between\n   Diameter nodes that support the DOIC solution.  The solution, which\n   is designed to apply to existing and future Diameter applications,\n   requires no changes to the Diameter base protocol [RFC6733] and is\n   deployable in environments where some Diameter nodes do not implement\n   the Diameter overload control solution defined in this specification.\n\n   A new application specification can incorporate the overload control\n   mechanism specified in this document by making it mandatory to\n   implement for the application and referencing this specification\n   normatively.  It is the responsibility of the Diameter application\n   designers to define how overload c
 ontrol mechanisms works on that\n   application.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 3]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Note that the overload control solution defined in this specification\n   does not address all the requirements listed in [RFC7068].  A number\n   of overload control related features are left for future\n   specifications.  See Appendix A for a list of extensions that are\n   currently being considered.  See Appendix C for an analysis of\n   conformance to the requirements specified in [RFC7068].\n\n2.  Terminology and Abbreviations\n\n   Abatement\n\n      Reaction to receipt of an overload report resulting in a reduction\n      in traffic sent to the reporting node.  Abatement actions include\n      diversion and throttling.\n\n   Abatement Algorithm\n\n      An extensible mechanism requested by reporting nodes and used by\n      reacting nodes to reduce the amount of t
 raffic sent during an\n      occurrence of overload control.\n\n   Diversion\n\n      An overload abatement mechanism, where the reacting node selects\n      alternate destinations or paths for for requests.\n\n   Host-Routed Requests\n\n      Requests that a reacting node knows will be served by a particular\n      host, either due to the presence of a Destination-Host AVP, or by\n      some other local knowledge on the part of the reacting node.\n\n   Overload Control State (OCS)\n\n      Internal state maintained by a reporting or reacting node\n      describing occurrences of overload control.\n\n   Overload Report (OLR)\n\n      Overload control information for a particular overload occurrence\n      sent by a reporting node.\n\n   Reacting Node\n\n      A Diameter node that acts upon an overload report.\n\n   Realm-Routed Requests\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 4]\n_\nInternet-Draft                    DOIC                     Dec
 ember 2014\n\n\n      Requests that a reacting node does not know which host will\n      service the request.\n\n   Reporting Node\n\n      A Diameter node that generates an overload report.  (This may or\n      may not be the overloaded node.)\n\n   Throttling\n\n      A mechanism for overload abatement that limits the number of\n      requests sent by the DIOC reacting node.  Throttling can include a\n      Diameter Client choosing to not send requests, or a Diameter Agent\n      or Server rejecting requests with appropriate error responses.  In\n      both cases the result of the throttling is a permanent rejection\n      of the transaction.\n\n\n\n3.  Conventions Used in This Document\n\n   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",\n   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this\n   document are to be interpreted as described in RFC 2119 [RFC2119].\n\n4.  Solution Overview\n\n   The Diameter Overload Information Conveyance (DOIC
 ) solution allows\n   Diameter nodes to request other Diameter nodes to perform overload\n   abatement actions, that is, actions to reduce the load offered to the\n   overloaded node or realm.\n\n   A Diameter node that supports DOIC is known as a "DOIC node".  Any\n   Diameter node can act as a DOIC node, including Diameter Clients,\n   Diameter Servers, and Diameter Agents.  DOIC nodes are further\n   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting\n   node requests overload abatement by sending Overload Reports (OLR).\n\n   A reacting node acts upon OLRs, and performs whatever actions are\n   needed to fulfill the abatement requests included in the OLRs.  A\n   Reporting node may report overload on its own behalf, or on behalf of\n   other nodes.  Likewise, a reacting node may perform overload\n   abatement on its own behalf, or on behalf of other nodes.\n\n   A Diameter node\'s role as a DOIC node is independent of its Diameter\n   role.  For example, Diameter 
 Agents may act as DOIC nodes, even\n   though they are not endpoints in the Diameter sense.  Since Diameter\n   enables bi-directional applications, where Diameter Servers can send\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 5]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   requests towards Diameter Clients, a given Diameter node can\n   simultaneously act as both a reporting node and a reacting node.\n\n   Likewise, a Diameter Agent may act as a reacting node from the\n   perspective of upstream nodes, and a reporting node from the\n   perspective of downstream nodes.\n\n   DOIC nodes do not generate new messages to carry DOIC related\n   information.  Rather, they "piggyback" DOIC information over existing\n   Diameter messages by inserting new AVPs into existing Diameter\n   requests and responses.  Nodes indicate support for DOIC, and any\n   needed DOIC parameters, by inserting an OC-Supported-Features AVP\n
    (Section 7.2) into existing requests and responses.  Reporting nodes\n   send OLRs by inserting OC-OLR AVPs (Section 7.3).\n\n   A given OLR applies to the Diameter realm and application of the\n   Diameter message that carries it.  If a reporting node supports more\n   than one realm and/or application, it reports independently for each\n   combination of realm and application.  Similarly, the OC-Supported-\n   Features AVP applies to the realm and application of the enclosing\n   message.  This implies that a node may support DOIC for one\n   application and/or realm, but not another, and may indicate different\n   DOIC parameters for each application and realm for which it supports\n   DOIC.\n\n   Reacting nodes perform overload abatement according to an agreed-upon\n   abatement algorithm.  An abatement algorithm defines the meaning of\n   some of the parameters of an OLR and the procedures required for\n   overload abatement.  An overload abatement algorithm separates\n   Di
 ameter requests into two sets.  The first set contains the requests\n   that are to undergo overload abatement treatment of either throttling\n   or diversion.  The second set contains the requests that are to be\n   given normal routing treatment.  This document specifies a single\n   must-support algorithm, namely the "loss" algorithm (Section 6).\n   Future specifications may introduce new algorithms.\n\n   Overload conditions may vary in scope.  For example, a single\n   Diameter node may be overloaded, in which case reacting nodes may\n   attempt to send requests to other destinations.  On the other hand,\n   an entire Diameter realm may be overloaded, in which case such\n   attempts would do harm.  DOIC OLRs have a concept of "report type"\n   (Section 7.6), where the type defines such behaviors.  Report types\n   are extensible.  This document defines report types for overload of a\n   specific host, and for overload of an entire realm.\n\n   DOIC works through non supporting
  Diameter Agents that properly pass\n   unknown AVPs unchanged.\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 6]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.1.  Piggybacking\n\n   There is no new Diameter application defined to carry overload\n   related AVPs.  The overload control AVPs defined in this\n   specification have been designed to be piggybacked on top of existing\n   application messages.  This is made possible by adding the optional\n   overload control AVPs OC-OLR and OC-Supported-Features into existing\n   commands.\n\n   Reacting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all request messages originated or relayed\n   by the reacting node.\n\n   Reporting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all answer messages originated or relayed\n   by the reporting node that are in response to a request that\n   contained 
 the OC-Supported-Features AVP.  Reporting nodes may include\n   overload reports using the OC-OLR AVP in answer messages.\n\n   Note that the overload control solution does not have fixed server\n   and client roles.  The DOIC node role is determined based on the\n   message type: whether the message is a request (i.e. sent by a\n   "reacting node") or an answer (i.e. sent by a "reporting node").\n   Therefore, in a typical "client-server" deployment, the Diameter\n   Client may report its overload condition to the Diameter Server for\n   any Diameter Server initiated message exchange.  An example of such\n   is the Diameter Server requesting a re-authentication from a Diameter\n   Client.\n\n4.2.  DOIC Capability Announcement\n\n   The DOIC solution supports the ability for Diameter nodes to\n   determine if other nodes in the path of a request support the\n   solution.  This capability is referred to as DOIC Capability\n   Announcement (DCA) and is separate from Diameter Capabilit
 y Exchange.\n\n   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the\n   Diameter overload features supported.\n\n   The first node in the path of a Diameter request that supports the\n   DOIC solution inserts the OC-Supported-Features AVP in the request\n   message.\n\n   The individual features supported by the DOIC nodes are indicated in\n   the OC-Feature-Vector AVP.  Any semantics associated with the\n   features will be defined in extension specifications that introduce\n   the features.\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 7]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Note: As discussed elsewhere in the document, agents in the path\n      of the request can modify the OC-Supported-Features AVP.\n\n      Note: The DOIC solution must support deployments where Diameter\n      Clients and/or Diameter Servers do not support the DOIC solution.\n      In this scenario, Diameter 
 Agents that support the DOIC solution\n      may handle overload abatement for the non supporting Diameter\n      nodes.  In this case the DOIC agent will insert the OC-Supported-\n      Features AVP in requests that do not already contain one, telling\n      the reporting node that there is a DOIC node that will handle\n      overload abatement.  For transactions where there was an OC-\n      Supporting-Features AVP in the request, the agent will insert the\n      OC-Supported-Features AVP in answers, telling the reacting node\n      that there is a reporting node.\n\n   The OC-Feature-Vector AVP will always contain an indication of\n   support for the loss overload abatement algorithm defined in this\n   specification (see Section 6).  This ensures that a reporting node\n   always supports at least one of the advertized abatement algorithms\n   received in a request messages.\n\n   The reporting node inserts the OC-Supported-Features AVP in all\n   answer messages to requests that
  contained the OC-Supported-Features\n   AVP.  The contents of the reporting node\'s OC-Supported-Features AVP\n   indicate the set of Diameter overload features supported by the\n   reporting node.  This specification defines one exception - the\n   reporting node only includes an indication of support for one\n   overload abatement algorithm, independent of the number of overload\n   abatement algorithms actually supported by the reacting node.  The\n   overload abatement algorithm indicated is the algorithm that the\n   reporting node intends to use should it enter an overload condition.\n   Reacting nodes can use the indicated overload abatement algorithm to\n   prepare for possible overload reports and must use the indicated\n   overload abatement algorithm if traffic reduction is actually\n   requested.\n\n      Note that the loss algorithm defined in this document is a\n      stateless abatement algorithm.  As a result it does not require\n      any actions by reacting nodes 
 prior to the receipt of an overload\n      report.  Stateful abatement algorithms that base the abatement\n      logic on a history of request messages sent might require reacting\n      nodes to maintain state in advance of receiving an overload report\n      to ensure that the overload reports can be properly handled.\n\n   Reporting nodes can change the overload abatement algorithm indicated\n   in the OC-Feature-Vector AVP if the reporting node is not currently\n   in an overload condition and sending overload reports.  The reporting\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 8]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   node is not allowed to change the overload abatement algorithm while\n   the reporting node is in an overload condition.\n\n   The DCA mechanism must also allow the scenario where the set of\n   features supported by the sender of a request and by agents in the\n   path of a request di
 ffer.  In this case, the agent can update the OC-\n   Supported-Features AVP to reflect the mixture of the two sets of\n   supported features.\n\n      Note: The logic to determine if the content of the OC-Supported-\n      Features AVP should be changed is out-of-scope for this document,\n      as is the logic to determine the content of a modified OC-\n      Supported-Features AVP.  These are left to implementation\n      decisions.  Care must be taken not to introduce interoperability\n      issues for downstream or upstream DOIC nodes.\n\n4.3.  DOIC Overload Condition Reporting\n\n   As with DOIC capability announcement, overload condition reporting\n   uses new AVPs (Section 7.3) to indicate an overload condition.\n\n   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP\n   includes the type of report, a sequence number, the length of time\n   that the report is valid and abatement algorithm specific AVPs.\n\n   Two types of overload reports are defined in thi
 s document: host\n   reports and realm reports.\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific Diameter node for the application-id indicated in the\n   transaction.  When receiving an OLR of type host, a reacting node\n   applies overload abatement to what is referred to in this document as\n   host-routed requests.  The reacting node applies overload abatement\n   on those host-routed requests which the reacting node knows will be\n   served by the server that matches the Origin-Host AVP of the received\n   message that contained the received OLR of type host.\n\n   A report of type "REALM_REPORT" is sent to indicate the overload of\n   all Diameter nodes within a realm for the application-id indicated in\n   the transaction.  When receiving an OLR of type realm, a reacting\n   node applies overload abatement to what is referred to in this\n   document as realm-routed requests.  The reacting node applies\n   overload abatement on those real
 m-routed requests which contain a\n   Destination-Realm AVP that matches the Origin-Realm AVP of the\n   received message that contained the received OLR of type realm.\n\n   This document assumes that there is a single source for realm-reports\n   for a given realm, or that if multiple nodes can send realm reports,\n\n\n\nKorhonen, et al.          Expires June 25, 2015                 [Page 9]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   that each such node has full knowledge of the overload state of the\n   entire realm.  A reacting node cannot distinguish between receiving\n   realm-reports from a single node, or from multiple nodes.\n\n      Note: Known issues exist if multiple sources for overload reports\n      which apply to the same Diameter entity exist.  Reacting nodes\n      have no way of determining the source and, as such, will treat\n      them as coming from a single source.  Variance in sequence numbers\n      between the two 
 sources can then cause incorrect overload\n      abatement treatment to be applied for indeterminate periods of\n      time.\n\n   Reporting nodes are responsible for determining the need for a\n   reduction of traffic.  The method for making this determination is\n   implementation specific and depend on the type of overload report\n   being generated.  A host-report might be generated by tracking use of\n   resources required by the host to handle transactions for the\n   Diameter application.  A realm-report generally impacts the traffic\n   sent to multiple hosts and, as such, requires tracking the capacity\n   of all servers able to handle realm- routed requests for the\n   application and realm.\n\n   Once a reporting node determines the need for a reduction in traffic,\n   it uses the DOIC defined AVPs to report on the condition.  These AVPs\n   are included in answer messages sent or relayed by the reporting\n   node.  The reporting node indicates the overload abatement algo
 rithm\n   that is to be used to handle the traffic reduction in the OC-\n   Supported-Features AVP.  The OC-OLR AVP is used to communicate\n   information about the requested reduction.\n\n   Reacting nodes, upon receipt of an overload report, applying the\n   overload abatement algorithm to traffic impacted by the overload\n   report.  The method used to determine the requests that are to\n   receive overload abatement treatment is dependent on the abatement\n   algorithm.  The loss abatement algorithm is defined in this document\n   (Section 6).  Other abatement algorithms can be defined in extensions\n   to the DOIC solutions.\n\n   Two types of overload abatement treatment are defined, diversion and\n   throttling.  Reacting nodes are responsible for determining which\n   treatment is appropriate for individual requests.\n\n   As the conditions that lead to the generation of the overload report\n   change the reporting node can send new overload reports requesting\n   greater re
 duction if the condition gets worse or less reduction if\n   the condition improves.  The reporting node sends an overload report\n   with a duration of zero to indicate that the overload condition has\n   ended and abatement is no longer needed.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 10]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   The reacting node also determines when the overload report expires\n   based on the OC-Validity-Duration AVP in the overload report and\n   stops applying the abatement algorithm when the report expires.\n\n4.4.  DOIC Extensibility\n\n   The DOIC solution is designed to be extensible.  This extensibility\n   is based on existing Diameter based extensibility mechanisms, along\n   with the DOIC capability announcement mechanism.\n\n   There are multiple categories of extensions that are expected.  This\n   includes the definition of new overload abatement algorithms, the\n   defin
 ition of new report types and the definition of new scopes of\n   messages impacted by an overload report.\n\n   A DOIC node communicates supported features by including them in the\n   OC-Feature-Vector AVP, as a sub-AVP of OC-Supported-Features.  Any\n   non-backwards compatible DOIC extensions define new values for the\n   OC-Feature-Vector AVP.  DOIC extensions also have the ability to add\n   new AVPs to the OC-Supported-Features AVP, if additional information\n   about the new feature is required.\n\n   Overload reports can be also extended by adding new sub-AVPs to the\n   OC-OLR AVP, allowing reporting nodes to communicate additional\n   information about handling an overload condition.\n\n   If necessary, new extensions can also define new AVPs that are not\n   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,\n   however, recommended that DOIC extensions use the OC-Supported-\n   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.\n\n4.5.  Simplified
  Example Architecture\n\n   Figure 1 illustrates the simplified architecture for Diameter\n   overload information conveyance.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 11]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n    Realm X                                  Same or other Realms\n   _--------------------------------------_ _----------------------_\n\n\n      +--^-----+                 : (optional) :\n      _Diameter_                 :            :\n      _Server A_--+     .--.     : +---^----+ :     .--.\n      +--------+  _   _(    _.   : _Diameter_ :   _(    _.   +---^----+\n                  +--(        )--:-_  Agent _-:--(        )--_Diameter_\n      +--------+  _ ( _  .  )  ) : +-----^--+ : ( _  .  )  ) _ Client _\n      _Diameter_--+  _--(___.-\'  :            :  _--(___.-\'  +-----^--+\n      _Server B_                 :            :\n      +---^----+                 :        
     :\n\n                          End-to-end Overload Indication\n             1)  _-----------------------------------------------_\n                             Diameter Application Y\n\n                  Overload Indication A    Overload Indication A\'\n             2)  _----------------------_ _----------------------_\n                 Diameter Application Y   Diameter Application Y\n\n\n\n     Figure 1: Simplified architecture choices for overload indication\n                                 delivery\n\n   In Figure 1, the Diameter overload indication can be conveyed (1)\n   end-to-end between servers and clients or (2) between servers and\n   Diameter agent inside the realm and then between the Diameter agent\n   and the clients.\n\n5.  Solution Procedures\n\n   This section outlines the normative behavior for the DOIC solution.\n\n5.1.  Capability Announcement\n\n   This section defines DOIC Capability Announcement (DCA) behavior.\n\n5.1.1.  Reacting Node Behavior\n\n   A re
 acting node MUST include the OC-Supported-Features AVP in all\n   requests.  It MAY include the OC-Feature-Vector AVP, as a sub-avp of\n   OC-Supported-Features.  If it does so, it MUST indicate support for\n   the "loss" algorithm.  If the reacting node is configured to support\n   features (including other algorithms) in addition to the loss\n   algorithm, it MUST indicate such support in an OC-Feature-Vector AVP.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 12]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   An OC-Supported-Features AVP in answer messages indicates there is a\n   reporting node for the transaction.  The reacting node MAY take\n   action, for example creating state for some stateful abatement\n   algorithm, based on the features indicated in the OC-Feature-Vector\n   AVP.\n\n      Note: The loss abatement algorithm does not require stateful\n      behavior when there is no active overload report.\
 n\n5.1.2.  Reporting Node Behavior\n\n   Upon receipt of a request message, a reporting node determines if\n   there is a reacting node for the transaction based on the presence of\n   the OC-Supported-Features AVP in the request message.\n\n   If the request message contains an OC-Supported-Features AVP then a\n   reporting node MUST include the OC-Supported-Features AVP in the\n   answer message for that transaction.\n\n   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-\n   OLR AVP or any other overload control AVPs defined in extension\n   drafts in response messages for transactions where the request\n   message does not include the OC-Supported-Features AVP.  Lack of the\n   OC-Supported-Features AVP in the request message indicates that there\n   is no reacting node for the transaction.\n\n   A reporting node knows what overload control functionality is\n   supported by the reacting node based on the content or absence of the\n   OC-Feature-Vector AVP with
 in the OC-Supported-Features AVP in the\n   request message.\n\n   A reporting node MUST indicate support for one and only one abatement\n   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm\n   selected MUST indicate the abatement algorithm the reporting node\n   wants the reacting node to use when the reporting node enters an\n   overload condition.\n\n   The abatement algorithm selected MUST be from the set of abatement\n   algorithms contained in the request message\'s OC-Feature-Vector AVP.\n\n   A reporting node that selects the loss algorithm may do so by\n   including the OC-Feature-Vector AVP with an explicit indication of\n   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects\n   a different algorithm, it MUST include the OC-Feature-Vector AVP with\n   an explicit indication of the selected algorithm.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 13]\n_\nInternet-Draft                    DOIC             
         December 2014\n\n\n   A reporting node MUST NOT change the selected algorithm during the\n   period of time that starts when entering an overload condition and\n   ends when the associated OCS becomes invalid in all reacting nodes.\n\n   The reporting node MAY change the overload abatement algorithm\n   indicated in the OC-Supported-Features AVP at any time as long as no\n   previously sent OLRs may be active.\n\n   The reporting node SHOULD indicate support for other DOIC features\n   defined in extension drafts that it supports and that apply to the\n   transaction.\n\n      Note: Not all DOIC features will apply to all Diameter\n      applications or deployment scenarios.  The features included in\n      the OC-Feature-Vector AVP are based on local reporting node\n      policy.\n\n5.1.3.  Agent Behavior\n\n   Diameter Agents that support DOIC MAY ensure that all messages\n   relayed by the agent contain the OC-Supported-Features AVP.\n\n   A Diameter Agent SHOULD take on 
 reacting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reacting node\n   behavior when there is no OC-Supported-Features AVP in a request\n   message.\n\n   For a Diameter Agent to be a reacting node for a non supporting\n   Diameter endpoint, the Diameter Agent MUST include the OC-Supported-\n   Features AVP in request messages it relays that do not contain the\n   OC-Supported-Features AVP.\n\n   A Diameter Agent MAY take on reporting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  The Diameter Agent\n   MUST have visibility to all traffic destined for the non supporting\n   host in order to become the reporting node for the Diameter endpoint.\n   A Diameter Agent detects that a Diameter endpoint does not support\n   DOIC reporting node behavior when there is no OC-Supported-Features\n   AVP in an answer message for a transaction that cont
 ained the OC-\n   Supported-Features AVP in the request message.\n\n   If a request already has the OC-Supported-Features AVP, a Diameter\n   agent MAY modify it to reflect the features appropriate for the\n   transaction.  Otherwise, the agent relays the OC-Supported-Features\n   AVP without change.\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 14]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      For instance, if the agent supports a superset of the features\n      reported by the reacting node then the agent might choose, based\n      on local policy, to advertise that superset of features to the\n      reporting node.\n\n   If the Diameter Agent changes the OC-Supported-Features AVP in a\n   request message then it is likely it will also need to modify the OC-\n   Supported-Features AVP in the answer message for the transaction.  A\n   Diameter Agent MAY modify the OC-Supported-Features AVP carried in\n   an
 swer messages.\n\n   When making changes to the OC-Supported-Features AVP the Diameter\n   Agent needs to ensure that it does not introduce incorrect behavior\n   for either the upstream or downstream DOIC nodes..\n\n5.2.  Overload Report Processing\n\n5.2.1.  Overload Control State\n\n   Both reacting and reporting nodes maintain Overload Control State\n   (OCS) for active overload conditions.  The following sections define\n   behavior associated with that OCS.\n\n5.2.1.1.  Overload Control State for Reacting Nodes\n\n   A reacting node SHOULD maintain the following OCS per supported\n   Diameter application:\n\n   o  A host-type OCS entry for each Destination-Host to which it sends\n      host-type requests and\n\n   o  A realm-type OCS entry for each Destination-Realm to which it\n      sends realm-type requests.\n\n   A host-type OCS entry is identified by the pair of application-id and\n   the node\'s DiameterIdentity.\n\n   A realm-type OCS entry is identified by the pair of 
 application-id\n   and realm.\n\n   The host-type and realm-type OCS entries MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number (as received in OC-OLR)\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 15]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   o  Time of expiry (derived from OC-Validity-Duration AVP received in\n      the OC-OLR AVP and time of reception of the message carrying OC-\n      OLR AVP)\n\n   o  Selected Abatement Algorithm (as received in the OC-Supported-\n      Features AVP)\n\n   o  Abatement Algorithm specific input data (as received in the OC-OLR\n      AVP, for example, OC-Reduction-Percentage for the Loss abatement\n      algorithm)\n\n5.2.1.2.  Overload Control State for Reporting Nodes\n\n   A reporting node SHOULD maintain OCS entries per supported Diameter\n   application, per supported (and eventuall
 y selected) Abatement\n   Algorithm and per report-type.\n\n   An OCS entry is identified by the tuple of Application-Id, Report-\n   Type and Abatement Algorithm and MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number\n\n   o  Validity Duration\n\n   o  Expiration Time\n\n   o  Algorithm specific input data (for example, the Reduction\n      Percentage for the Loss Abatement Algorithm)\n\n5.2.1.3.  Reacting Node Maintenance of Overload Control State\n\n   When a reacting node receives an OC-OLR AVP, it MUST determine if it\n   is for an existing or new overload condition.\n\n      Note: For the remainder of this section the term OLR refers to the\n      combination of the contents of the received OC-OLR AVP and the\n      abatement algorithm indicated in the received OC-Supported-\n      Features AVP.\n\n   When receiving an answer message with multiple OLRs of different\n   supported report types, a 
 reacting node MUST process each received\n   OLR.\n\n   When receiving an answer message with multiple OLRs and multiple of\n   the OLRs are of the same supported report types, a reacting node\n   SHOULD ignore the duplicated OLRs.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 16]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reacting node SHOULD ignore an OC-OLR with a OC-Report-Type AVP\n   that contains an unrecognized value.\n\n   The OLR is for an existing overload condition if a reacting node has\n   an OCS that matches the received OLR.\n\n   For a host-report this means it matches the application-id and the\n   host\'s DiameterIdentity in an existing host OCS entry.\n\n   For a realm-report this means it matches the application-id and the\n   realm in an existing realm OCS entry.\n\n   If the OLR is for an existing overload condition then a reacting node\n   MUST determine if the OLR is a retransmission o
 r an update to the\n   existing OLR.\n\n   If the sequence number for the received OLR is greater than the\n   sequence number stored in the matching OCS entry then a reacting node\n   MUST update the matching OCS entry.\n\n   If the sequence number for the received OLR is less than or equal to\n   the sequence number in the matching OCS entry then a reacting node\n   MUST silently ignore the received OLR.  The matching OCS MUST NOT be\n   updated in this case.\n\n   If the received OLR is for a new overload condition then a reacting\n   node MUST generate a new OCS entry for the overload condition.\n\n   For a host-report this means a reacting node creates on OCS entry\n   with the application-id in the received message and DiameterIdentity\n   of the Origin-Host in the received message.\n\n      Note: This solution assumes that the Origin-Host AVP in the answer\n      message included by the reporting node is not changed along the\n      path to the reacting node.\n\n   For a real
 m-report this means a reacting node creates on OCS entry\n   with the application-id in the received message and realm of the\n   Origin-Realm in the received message.\n\n   If the received OLR contains a validity duration of zero ("0") then a\n   reacting node MUST update the OCS entry as being expired.\n\n      Note: It is not necessarily appropriate to delete the OCS entry,\n      as there is recommended behavior that the reacting node slowly\n      returns to full traffic when ending an overload abatement period.\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 17]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   The reacting node does not delete an OCS when receiving an answer\n   message that does not contain an OC-OLR AVP (i.e. absence of OLR\n   means "no change").\n\n5.2.1.4.  Reporting Node Maintenance of Overload Control State\n\n   A reporting node SHOULD create a new OCS entry when entering an\n   overlo
 ad condition.\n\n      Note: If a reporting node knows through absence of the OC-\n      Supported-Features AVP in received messages that there are no\n      reacting nodes supporting DOIC then the reporting node can choose\n      to not create OCS entries.\n\n   When generating a new OCS entry the sequence number SHOULD be set to\n   zero ("0").\n\n   When generating sequence numbers for new overload conditions, the new\n   sequence number MUST be greater than any sequence number in an active\n   (unexpired) overload report for the same application and report-type\n   previously sent by the reporting node.  This property MUST hold over\n   a reboot of the reporting node.\n\n      Note: One way of addressing this over a reboot of a reporting node\n      is to use a time stamp for the first overload condition that\n      occurs after the report and to start using sequence numbers of\n      zero for subsequent overload conditions.\n\n   A reporting node MUST update an OCS entry when i
 t needs to adjust the\n   validity duration of the overload condition at reacting nodes.\n\n      For instance, if a reporting node wishes to instruct reacting\n      nodes to continue overload abatement for a longer period of time\n      than originally communicated.  This also applies if the reporting\n      node wishes to shorten the period of time that overload abatement\n      is to continue.\n\n   A reporting node MUST NOT update the abatement algorithm in an active\n   OCS entry.\n\n   A reporting node MUST update an OCS entry when it wishes to adjust\n   any abatement algorithm specific parameters, including, for example,\n   the reduction percentage used for the Loss abatement algorithm.\n\n      For instance, if a reporting node wishes to change the reduction\n      percentage either higher, if the overload condition has worsened,\n      or lower, if the overload condition has improved, then the\n      reporting node would update the appropriate OCS entry.\n\n\n\nKorhonen,
  et al.          Expires June 25, 2015                [Page 18]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node MUST increment the sequence number associated with\n   the OCS entry anytime the contents of the OCS entry are changed.\n   This will result in a new sequence number being sent to reacting\n   nodes, instructing reacting nodes to process the OC-OLR AVP.\n\n   A reporting node SHOULD update an OCS entry with a validity duration\n   of zero ("0") when the overload condition ends.\n\n      Note: If a reporting node knows that the OCS entries in the\n      reacting nodes are near expiration then the reporting node might\n      decide not to send an OLR with a validity duration of zero.\n\n   A reporting node MUST keep an OCS entry with a validity duration of\n   zero ("0") for a period of time long enough to ensure that any non-\n   expired reacting node\'s OCS entry created as a result of the overload\n   condition in the 
 reporting node is deleted.\n\n5.2.2.  Reacting Node Behavior\n\n   When a reacting node sends a request it MUST determine if that\n   request matches an active OCS.\n\n   If the request matches an active OCS then the reacting node MUST use\n   the overload abatement algorithm indicated in the OCS to determine if\n   the request is to receive overload abatement treatment.\n\n   For the Loss abatement algorithm defined in this specification, see\n   Section 6 for the overload abatement algorithm logic applied.\n\n   If the overload abatement algorithm selects the request for overload\n   abatement treatment then the reacting node MUST apply overload\n   abatement treatment on the request.  The abatement treatment applied\n   depends on the context of the request.\n\n   If diversion abatement treatment is possible (i.e. a different path\n   for the request can be selected where the overloaded node is not part\n   of the different path), then the reacting node SHOULD apply diversion\n  
  abatement treatment to the request.  Otherwise the reacting node\n   SHOULD apply throttling abatement treatment to the request.\n\n   If the overload abatement treatment results in throttling of the\n   request and if the reacting node is an agent then the agent MUST send\n   an appropriate error as defined in Section 8.\n\n   Diameter endpoints that throttle requests need to do so according to\n   the rules of the client application.  Those rules will vary by\n   application, and are beyond the scope of this document.\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 19]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   In the case that the OCS entry indicated no traffic was to be sent to\n   the overloaded entity and the validity duration expires then overload\n   abatement associated with the overload report MUST be ended in a\n   controlled fashion.\n\n5.2.3.  Reporting Node Behavior\n\n   If there is an active OCS
  entry then a reporting node SHOULD include\n   the OC-OLR AVP in all answers to requests that contain the OC-\n   Supported-Features AVP and that match the active OCS entry.\n\n      Note: A request matches if the application-id in the request\n      matches the application-id in any active OCS entry and if the\n      report-type in the OCS entry matches a report-type supported by\n      the reporting node as indicated in the OC-Supported-Features AVP.\n\n   The contents of the OC-OLR AVP depend on the selected algorithm.\n\n   A reporting node MAY choose to not resend an overload report to a\n   reacting node if it can guarantee that this overload report is\n   already active in the reacting node.\n\n      Note: In some cases (e.g. when there are one or more agents in the\n      path between reporting and reacting nodes, or when overload\n      reports are discarded by reacting nodes) a reporting node may not\n      be able to guarantee that the reacting node has received the\n   
    report.\n\n   A reporting node MUST NOT send overload reports of a type that has\n   not been advertised as supported by the reacting node.\n\n      Note: A reacting node implicitly advertises support for the host\n      and realm report types by including the OC-Supported-Features AVP\n      in the request.  Support for other report types will be explicitly\n      indicated by new feature bits in the OC-Feature-Vector AVP.\n\n   A reporting node SHOULD explicitly indicate the end of an overload\n   occurrence by sending a new OLR with OC-Validity-Duration set to a\n   value of zero ("0").  The reporting node SHOULD ensure that all\n   reacting nodes receive the updated overload report.\n\n   A reporting node MAY rely on the OC-Validity-Duration AVP values for\n   the implicit overload control state cleanup on the reacting node.\n\n      Note: All OLRs sent have an expiration time calculated by adding\n      the validity-duration contained in the OLR to the time the message\n    
   was sent.  Transit time for the OLR can be safely ignored.  The\n      reporting node can ensure that all reacting nodes have received\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 20]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      the OLR by continuing to send it in answer messages until the\n      expiration time for all OLRs sent for that overload condition have\n      expired.\n\n   When a reporting node sends an OLR, it effectively delegates any\n   necessary throttling to downstream nodes.  If the reporting node also\n   locally throttles the same set of messages, the overall number of\n   throttled requests may be higher than intended.  Therefore, before\n   applying local message throttling, a reporting node needs to check if\n   these messages match existing OCS entries, indicating that these\n   messages have survived throttling applied by downstream nodes that\n   have received the related OLR.\n\n  
  However, even if the set of messages match existing OCS entries, the\n   reporting node can still apply other abatement methods such as\n   diversion.  The reporting node might also need to throttle requests\n   for reasons other than overload.  For example, an agent or server\n   might have a configured rate limit for each client, and throttle\n   requests that exceed that limit, even if such requests had already\n   been candidates for throttling by downstream nodes.  The reporting\n   node also has the option to send new OLRs requesting greater\n   reductions in traffic, reducing the need for local throttling.\n\n   A reporting node SHOULD decrease requested overload abatement\n   treatment in a controlled fashion to avoid oscillations in traffic.\n\n      For example, it might wait some period of time after overload ends\n      before terminating the OLR, or it might send a series of OLRs\n      indicating progressively less overload severity.\n\n5.3.  Protocol Extensibility\n\
 n   The DOIC solution can be extended.  Types of potential extensions\n   include new traffic abatement algorithms, new report types or other\n   new functionality.\n\n   When defining a new extension that requires new normative behavior,\n   the specification MUST define a new feature for the OC-Feature-\n   Vector.  This feature bit is used to communicate support for the new\n   feature.\n\n   The extension MAY define new AVPs for use in DOIC Capability\n   Announcement and for use in DOIC Overload reporting.  These new AVPs\n   SHOULD be defined to be extensions to the OC-Supported-Features or\n   OC-OLR AVPs defined in this document.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 21]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   [RFC6733] defined Grouped AVP extension mechanisms apply.  This\n   allows, for example, defining a new feature that is mandatory to be\n   understood even when piggybacked on an e
 xisting application.\n\n   When defining new report type values, the corresponding specification\n   MUST define the semantics of the new report types and how they affect\n   the OC-OLR AVP handling.\n\n   The OC-OLR AVP can be expanded with optional sub-AVPs only if a\n   legacy DOIC implementation can safely ignore them without breaking\n   backward compatibility for the given OC-Report-Type AVP value.\n\n   Documents that introduce new report types MUST describe any\n   limitations on their use across non-supporting agents.\n\n   As with any Diameter specification, RFC6733 requires all new AVPs to\n   be registered with IANA.  See Section 9 for the required procedures.\n   New features (feature bits in the OC-Feature-Vector AVP) and report\n   types (in the OC-Report-Type AVP) MUST be registered with IANA.\n\n6.  Loss Algorithm\n\n   This section documents the Diameter overload loss abatement\n   algorithm.\n\n6.1.  Overview\n\n   The DOIC specification supports the ability for m
 ultiple overload\n   abatement algorithms to be specified.  The abatement algorithm used\n   for any instance of overload is determined by the Diameter Overload\n   Capability Announcement process documented in Section 5.1.\n\n   The loss algorithm described in this section is the default algorithm\n   that must be supported by all Diameter nodes that support DOIC.\n\n   The loss algorithm is designed to be a straightforward and stateless\n   overload abatement algorithm.  It is used by reporting nodes to\n   request a percentage reduction in the amount of traffic sent.  The\n   traffic impacted by the requested reduction depends on the type of\n   overload report.\n\n   Reporting nodes request the stateless reduction of the number of\n   requests by an indicated percentage.  This percentage reduction is in\n   comparison to the number of messages the node otherwise would send,\n   regardless of how many requests the node might have sent in the past.\n\n   From a conceptual level, t
 he logic at the reacting node could be\n   outlined as follows.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 22]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   1.  An overload report is received and the associated OCS is either\n       saved or updated (if required) by the reacting node.\n\n   2.  A new Diameter request is generated by the application running on\n       the reacting node.\n\n   3.  The reacting node determines that an active overload report\n       applies to the request, as indicated by the corresponding OCS\n       entry.\n\n   4.  The reacting node determines if overload abatement treatment\n       should be applied to the request.  One approach that could be\n       taken for each request is to select a random number between 1 and\n       100.  If the random number is less than or equal to the indicated\n       reduction percentage then the request is given abatement\n       treatment, otherwis
 e the request is given normal routing\n       treatment.\n\n6.2.  Reporting Node Behavior\n\n   The method a reporting node uses to determine the amount of traffic\n   reduction required to address an overload condition is an\n   implementation decision.\n\n   When a reporting node that has selected the loss abatement algorithm\n   determines the need to request a reduction in traffic, it includes an\n   OC-OLR AVP in answer messages as described in Section 5.2.3.\n\n   When sending the OC-OLR AVP, the reporting node MUST indicate a\n   percentage reduction in the OC-Reduction-Percentage AVP.\n\n   The reporting node MAY change the reduction percentage in subsequent\n   overload reports.  When doing so the reporting node must conform to\n   overload report handing specified in Section 5.2.3.\n\n6.3.  Reacting Node Behavior\n\n   The method a reacting node uses to determine which request messages\n   are given abatement treatment is an implementation decision.\n\n   When receiving an
  OC-OLR in an answer message where the algorithm\n   indicated in the OC-Supported-Features AVP is the loss algorithm, the\n   reacting node MUST apply abatement treatment to the requested\n   percentage of request messages sent.\n\n      Note: The loss algorithm is a stateless algorithm.  As a result,\n      the reacting node does not guarantee that there will be an\n      absolute reduction in traffic sent.  Rather, it guarantees that\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 23]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      the requested percentage of new requests will be given abatement\n      treatment.\n\n   When applying overload abatement treatment for the loss abatement\n   algorithm, the reacting node MUST abate the requested percentage of\n   requests that would have otherwise been sent to the reporting host or\n   realm.\n\n   If reacting node comes out of the 100 percent traffic reduction as a\n
    result of the overload report timing out, the following procedures\n   are RECOMMENDED to be applied.  The reacting node sending the traffic\n   should be conservative and, for example, first send "probe" messages\n   to learn the overload condition of the overloaded node before\n   converging to any traffic amount/rate decided by the sender.  Similar\n   concerns apply in all cases when the overload report times out unless\n   the previous overload report stated 0 percent reduction.\n\n      The goal of this behavior is to reduce the probability of overload\n      condition thrashing where an immediate transition from 100_\n      reduction to 0_ reduction results in the reporting node moving\n      quickly back into an overload condition.\n\n   If the reacting node does not receive an OLR in answers received from\n   the formerly overloaded node then the reacting node SHOULD slowly\n   increase the rate of traffic sent to the overloaded node.\n\n7.  Attribute Value Pairs\n\n   T
 his section describes the encoding and semantics of the Diameter\n   Overload Indication Attribute Value Pairs (AVPs) defined in this\n   document.\n\n7.1.  OC-Supported-Features AVP\n\n   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and\n   serves two purposes.  First, it announces a node\'s support for the\n   DOIC solution in general.  Second, it contains the description of the\n   supported DOIC features of the sending node.  The OC-Supported-\n   Features AVP MUST be included in every Diameter request message a\n   DOIC supporting node sends.\n\n      OC-Supported-Features ::= _ AVP Header: TBD1 _\n                                [ OC-Feature-Vector ]\n                              * [ AVP ]\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 24]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n7.2.  OC-Feature-Vector AVP\n\n   The OC-Feature-Vector AVP (AVP code TBD2) is of type Unsigned64 and
 \n   contains a 64 bit flags field of announced capabilities of a DOIC\n   node.  The value of zero (0) is reserved.\n\n   The OC-Feature-Vector sub-AVP is used to announce the DOIC features\n   supported by the DOIC node, in the form of a flag-bits field in which\n   each bit announces one feature or capability supported by the node.\n   The absence of the OC-Feature-Vector AVP in request messages\n   indicates that only the default traffic abatement algorithm described\n   in this specification is supported.  The absence of the OC- Feature-\n   Vector AVP in answer messages indicates that the default traffic\n   abatement algorithm described in this specification is selected\n   (while other traffic abatement algorithms may be supported), and no\n   features other than abatement algorithms are supported.\n\n   The following capabilities are defined in this document:\n\n   OLR_DEFAULT_ALGO (0x0000000000000001)\n\n      When this flag is set by the a DOIC reacting node it means that
 \n      the default traffic abatement (loss) algorithm is supported.  When\n      this flag is set by a DOIC reporting node it means that the loss\n      algorithm will be used for requested overload abatement.\n\n7.3.  OC-OLR AVP\n\n   The OC-OLR AVP (AVP code TBD3) is of type Grouped and contains the\n   information necessary to convey an overload report on an overload\n   condition at the reporting node.  The application the OC-OLR AVP\n   applies to is the same as the Application-Id found in the Diameter\n   message header.  The host or realm the OC-OLR AVP concerns is\n   determined from the Origin-Host AVP and/or Origin-Realm AVP found in\n   the encapsulating Diameter command.  The OC-OLR AVP is intended to be\n   sent only by a reporting node.\n\n      OC-OLR ::= _ AVP Header: TBD2 _\n                 _ OC-Sequence-Number _\n                 _ OC-Report-Type _\n                 [ OC-Reduction-Percentage ]\n                 [ OC-Validity-Duration ]\n               * [ AVP ]\n
 \n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 25]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n7.4.  OC-Sequence-Number AVP\n\n   The OC-Sequence-Number AVP (AVP code TBD4) is of type Unsigned64.\n   Its usage in the context of overload control is described in\n   Section 5.2.\n\n   From the functionality point of view, the OC-Sequence-Number AVP is\n   used as a non-volatile increasing counter for a sequence of overload\n   reports between two DOIC nodes for the same overload occurrence.\n   Sequence numbers are treated in a uni-directional manner, i.e. two\n   sequence numbers on each direction between two DOIC nodes are not\n   related or correlated.\n\n7.5.  OC-Validity-Duration AVP\n\n   The OC-Validity-Duration AVP (AVP code TBD5) is of type Unsigned32\n   and indicates in milliseconds the validity time of the overload\n   report.  The number of milliseconds is measured after reception of\n   the first
  OC-OLR AVP with a given value of OC-Sequence-Number AVP.\n   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30\n   seconds).  When the OC-Validity-Duration AVP is not present in the\n   OC-OLR AVP, the default value applies.\n\n7.6.  OC-Report-Type AVP\n\n   The OC-Report-Type AVP (AVP code TBD6) is of type Enumerated.  The\n   value of the AVP describes what the overload report concerns.  The\n   following values are initially defined:\n\n   HOST_REPORT 0  The overload report is for a host.  Overload abatement\n      treatment applies to host-routed requests.\n\n   REALM_REPORT 1  The overload report is for a realm.  Overload\n      abatement treatment applies to realm-routed requests.\n\n7.7.  OC-Reduction-Percentage AVP\n\n   The OC-Reduction-Percentage AVP (AVP code TBD7) is of type Unsigned32\n   and describes the percentage of the traffic that the sender is\n   requested to reduce, compared to what it otherwise would send.  The\n   OC-Reduction-Percentage 
 AVP applies to the default (loss) algorithm\n   specified in this specification.  However, the AVP can be reused for\n   future abatement algorithms, if its semantics fit into the new\n   algorithm.\n\n   The value of the Reduction-Percentage AVP is between zero (0) and one\n   hundred (100).  Values greater than 100 are ignored.  The value of\n   100 means that all traffic is to be throttled, i.e. the reporting\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 26]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   node is under a severe load and ceases to process any new messages.\n   The value of 0 means that the reporting node is in a stable state and\n   has no need for the reacting node to apply any traffic abatement.\n\n7.8.  Attribute Value Pair flag rules\n\n                                                         +---------+\n                                                         _AVP flag _\n                    
                                      _rules    _\n                                                         +----+----+\n                              AVP   Section              _    _MUST_\n       Attribute Name         Code  Defined  Value Type  _MUST_ NOT_\n      +--------------------------------------------------+----+----+\n      _OC-Supported-Features  TBD1  6.1      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Feature-Vector      TBD2  6.2      Unsigned64  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-OLR                 TBD3  6.3      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Sequence-Number     TBD4  6.4      Unsigned64  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Validity-Duration   TBD5  6.5      Unsigned32  _    _ V  _\n      +------------------------------
 --------------------+----+----+\n      _OC-Report-Type         TBD6  6.6      Enumerated  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Reduction                                      _    _    _\n      _  -Percentage          TBD7  6.7      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n\n\n   As described in the Diameter base protocol [RFC6733], the M-bit usage\n   for a given AVP in a given command may be defined by the application.\n\n8.  Error Response Codes\n\n   When a DOIC node rejects a Diameter request due to overload, the DOIC\n   node MUST select an appropriate error response code.  This\n   determination is made based on the probability of the request\n   succeeding if retried on a different path.\n\n   A reporting node rejecting a Diameter request due to an overload\n   condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can\n   assume that the same request may suc
 ceed on a different path.\n\n   If a reporting node knows or assumes that the same request will not\n   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response\n   SHOULD be used.  Retrying would consume valuable resources during an\n   occurrence of overload.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 27]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      For instance, if the request arrived at the reporting node without\n      a Destination-Host AVP then the reporting node might determine\n      that there is an alternative Diameter node that could successfully\n      process the request and that retrying the transaction would not\n      negatively impact the reporting node.  DIAMETER_TOO_BUSY would be\n      sent in this case.\n\n      If the request arrived at the reporting node with a Destination-\n      Host AVP populated with its own Diameter identity then the\n      reporting node can assume 
 that retrying the request would result\n      in it coming to the same reporting node.\n      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.\n\n      A second example is when an agent that supports the DOIC solution\n      is performing the role of a reacting node for a non supporting\n      client.  Requests that are rejected as a result of DOIC throttling\n      by the agent in this scenario would generally be rejected with a\n      DIAMETER_UNABLE_TO_COMPLY response code.\n\n9.  IANA Considerations\n\n9.1.  AVP codes\n\n   New AVPs defined by this specification are listed in Section 7.  All\n   AVP codes are allocated from the \'Authentication, Authorization, and\n   Accounting (AAA) Parameters\' AVP Codes registry.\n\n9.2.  New registries\n\n   Two new registries are needed under the \'Authentication,\n   Authorization, and Accounting (AAA) Parameters\' registry.\n\n   A new "Overload Control Feature Vector" registry is required.  The\n   registry must contain the followi
 ng:\n\n      Feature Vector Value\n\n      Specification - the specification that defines the new value.\n\n   See Section 7.2 for the initial Feature Vector Value in the registry.\n   This specification is the specification defining the value.  New\n   values can be added into the registry using the Specification\n   Required policy.  [RFC5226].\n\n   A new "Overload Report Type" registry is required.  The registry must\n   contain the following:\n\n      Report Type Value\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 28]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Specification - the specification that defines the new value.\n\n   See Section 7.6 for the initial assignment in the registry.  New\n   types can be added using the Specification Required policy [RFC5226].\n\n10.  Security Considerations\n\n   DOIC gives Diameter nodes the ability to request that downstream\n   nodes send fewer Diameter requests. 
  Nodes do this by exchanging\n   overload reports that directly effect this reduction.  This exchange\n   is potentially subject to multiple methods of attack, and has the\n   potential to be used as a Denial-of-Service (DoS) attack vector.\n\n   Overload reports may contain information about the topology and\n   current status of a Diameter network.  This information is\n   potentially sensitive.  Network operators may wish to control\n   disclosure of overload reports to unauthorized parties to avoid its\n   use for competitive intelligence or to target attacks.\n\n   Diameter does not include features to provide end-to-end\n   authentication, integrity protection, or confidentiality.  This may\n   cause complications when sending overload reports between non-\n   adjacent nodes.\n\n10.1.  Potential Threat Modes\n\n   The Diameter protocol involves transactions in the form of requests\n   and answers exchanged between clients and servers.  These clients and\n   servers may be peer
 s, that is, they may share a direct transport\n   (e.g.  TCP or SCTP) connection, or the messages may traverse one or\n   more intermediaries, known as Diameter Agents.  Diameter nodes use\n   TLS, DTLS, or IPsec to authenticate peers, and to provide\n   confidentiality and integrity protection of traffic between peers.\n   Nodes can make authorization decisions based on the peer identities\n   authenticated at the transport layer.\n\n   When agents are involved, this presents an effectively transitive\n   trust model.  That is, a Diameter client or server can authorize an\n   agent for certain actions, but it must trust that agent to make\n   appropriate authorization decisions about its peers, and so on.\n   Since confidentiality and integrity protection occurs at the\n   transport layer, agents can read, and perhaps modify, any part of a\n   Diameter message, including an overload report.\n\n   There are several ways an attacker might attempt to exploit the\n   overload control m
 echanism.  An unauthorized third party might inject\n   an overload report into the network.  If this third party is upstream\n   of an agent, and that agent fails to apply proper authorization\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 29]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   policies, downstream nodes may mistakenly trust the report.  This\n   attack is at least partially mitigated by the assumption that nodes\n   include overload reports in Diameter answers but not in requests.\n   This requires an attacker to have knowledge of the original request\n   in order to construct an answer.  Such an answer would also need to\n   arrive at a Diameter node via a protected transport connection.\n   Therefore, implementations MUST validate that an answer containing an\n   overload report is a properly constructed response to a pending\n   request prior to acting on the overload report, and that the answer\n   
 was received via an appropriate transport connection.\n\n   A similar attack involves a compromised but otherwise authorized node\n   that sends an inappropriate overload report.  For example, a server\n   for the realm "example.com" might send an overload report indicating\n   that a competitor\'s realm "example.net" is overloaded.  If other\n   nodes act on the report, they may falsely believe that "example.net"\n   is overloaded, effectively reducing that realm\'s capacity.\n   Therefore, it\'s critical that nodes validate that an overload report\n   received from a peer actually falls within that peer\'s responsibility\n   before acting on the report or forwarding the report to other peers.\n   For example, an overload report from a peer that applies to a realm\n   not handled by that peer is suspect.\n\n      This attack is partially mitigated by the fact that the\n      application, as well as host and realm, for a given OLR is\n      determined implicitly by respective AVPs i
 n the enclosing answer.\n      If a reporting node modifies any of those AVPs, the enclosing\n      transaction will also be affected.\n\n10.2.  Denial of Service Attacks\n\n   Diameter overload reports, especially realm-reports, can cause a node\n   to cease sending some or all Diameter requests for an extended\n   period.  This makes them a tempting vector for DoS attacks.\n   Furthermore, since Diameter is almost always used in support of other\n   protocols, a DoS attack on Diameter is likely to impact those\n   protocols as well.  Therefore, Diameter nodes MUST NOT honor or\n   forward OLRs received from peers that are not trusted to send them.\n\n   An attacker might use the information in an OLR to assist in DoS\n   attacks.  For example, an attacker could use information about\n   current overload conditions to time an attack for maximum effect, or\n   use subsequent overload reports as a feedback mechanism to learn the\n   results of a previous or ongoing attack.  Operators
  need the ability\n   to ensure that OLRs are not leaked to untrusted parties.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 30]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n10.3.  Non-Compliant Nodes\n\n   In the absence of an overload control mechanism, Diameter nodes need\n   to implement strategies to protect themselves from floods of\n   requests, and to make sure that a disproportionate load from one\n   source does not prevent other sources from receiving service.  For\n   example, a Diameter server might throttle a certain percentage of\n   requests from sources that exceed certain limits.  Overload control\n   can be thought of as an optimization for such strategies, where\n   downstream nodes never send the excess requests in the first place.\n   However, the presence of an overload control mechanism does not\n   remove the need for these other protection strategies.\n\n   When a Diameter node sends a
 n overload report, it cannot assume that\n   all nodes will comply, even if they indicate support for DOIC.  A\n   non-compliant node might continue to send requests with no reduction\n   in load.  Such non-compliance could be done accidentally, or\n   maliciously to gain an unfair advantage over compliant nodes.\n   Requirement 28 [RFC7068] indicates that the overload control solution\n   cannot assume that all Diameter nodes in a network are trusted, and\n   that malicious nodes not be allowed to take advantage of the overload\n   control mechanism to get more than their fair share of service.\n\n10.4.  End-to End-Security Issues\n\n   The lack of end-to-end integrity features makes it difficult to\n   establish trust in overload reports received from non-adjacent nodes.\n   Any agents in the message path may insert or modify overload reports.\n   Nodes must trust that their adjacent peers perform proper checks on\n   overload reports from their peers, and so on, creating a transi
 tive-\n   trust requirement extending for potentially long chains of nodes.\n   Network operators must determine if this transitive trust requirement\n   is acceptable for their deployments.  Nodes supporting Diameter\n   overload control MUST give operators the ability to select which\n   peers are trusted to deliver overload reports, and whether they are\n   trusted to forward overload reports from non-adjacent nodes.  DOIC\n   nodes MUST strip DOIC AVPs from messages received from peers that are\n   not trusted for DOIC purposes.\n\n   The lack of end-to-end confidentiality protection means that any\n   Diameter agent in the path of an overload report can view the\n   contents of that report.  In addition to the requirement to select\n   which peers are trusted to send overload reports, operators MUST be\n   able to select which peers are authorized to receive reports.  A node\n   MUST NOT send an overload report to a peer not authorized to receive\n   it.  Furthermore, an agent 
 MUST remove any overload reports that\n   might have been inserted by other nodes before forwarding a Diameter\n   message to a peer that is not authorized to receive overload reports.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 31]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      A DOIC node cannot always automatically detect that a peer also\n      supports DOIC.  For example, a node might have a peer that is a\n      non-supporting agent.  If nodes on the other side of that agent\n      send OC-Supported-Features AVPs, the agent is likely to forward\n      them as unknown AVPs.  Messages received across the non-supporting\n      agent may be indistinguishable from messages received across a\n      DOIC supporting agent, giving the false impression that the non-\n      supporting agent actually supports DOIC.  This complicates the\n      transitive-trust nature of DOIC.  Operators need to be careful to\n      a
 void situations where a non-supporting agent is mistakenly\n      trusted to enforce DOIC related authorization policies.\n\n   At the time of this writing, the DIME working group is studying\n   requirements for adding end-to-end security features\n   [I-D.ietf-dime-e2e-sec-req] to Diameter.  These features, when they\n   become available, might make it easier to establish trust in non-\n   adjacent nodes for overload control purposes.  Readers should be\n   reminded, however, that the overload control mechanism encourages\n   Diameter agents to modify AVPs in, or insert additional AVPs into,\n   existing messages that are originated by other nodes.  If end-to-end\n   security is enabled, there is a risk that such modification could\n   violate integrity protection.  The details of using any future\n   Diameter end-to-end security mechanism with overload control will\n   require careful consideration, and are beyond the scope of this\n   document.\n\n11.  Contributors\n\n   The fol
 lowing people contributed substantial ideas, feedback, and\n   discussion to this document:\n\n   o  Eric McMurry\n\n   o  Hannes Tschofenig\n\n   o  Ulrich Wiehe\n\n   o  Jean-Jacques Trottin\n\n   o  Maria Cruz Bartolome\n\n   o  Martin Dolly\n\n   o  Nirav Salot\n\n   o  Susan Shishufeng\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 32]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n12.  References\n\n12.1.  Normative References\n\n   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate\n              Requirement Levels", BCP 14, RFC 2119, March 1997.\n\n   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an\n              IANA Considerations Section in RFCs", BCP 26, RFC 5226,\n              May 2008.\n\n   [RFC6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,\n              "Diameter Base Protocol", RFC 6733, October 2012.\n\n12.2.  Informative References\n\n   [Cx]       3GPP
 , , "ETSI TS 129 229 V11.4.0", August 2013.\n\n   [I-D.ietf-dime-e2e-sec-req]\n              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,\n              "Diameter AVP Level Security: Scenarios and Requirements",\n              draft-ietf-dime-e2e-sec-req-01 (work in progress), October\n              2013.\n\n   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.\n\n   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.\n              Loughney, "Diameter Credit-Control Application", RFC 4006,\n              August 2005.\n\n   [RFC7068]  McMurry, E. and B. Campbell, "Diameter Overload Control\n              Requirements", RFC 7068, November 2013.\n\n   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.\n\nAppendix A.  Issues left for future specifications\n\n   The base solution for the overload control does not cover all\n   possible use cases.  A number of solution aspects were intentionally\n   left for future specification and protoc
 ol work.  The following sub-\n   sections define some of the potential extensions to the DOIC\n   solution.\n\nA.1.  Additional traffic abatement algorithms\n\n   This specification describes only means for a simple loss based\n   algorithm.  Future algorithms can be added using the designed\n   solution extension mechanism.  The new algorithms need to be\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 33]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   registered with IANA.  See Sections 7.1 and 9 for the required IANA\n   steps.\n\nA.2.  Agent Overload\n\n   This specification focuses on Diameter endpoint (server or client)\n   overload.  A separate extension will be required to outline the\n   handling of the case of agent overload.\n\nA.3.  New Error Diagnostic AVP\n\n   This specification indicates the use of existing error messages when\n   nodes reject requests due to overload.  The DIME working group is\n   con
 sidering defining additional error codes or AVPs to indicate that\n   overload was the reason for the rejection of the message.\n\nAppendix B.  Deployment Considerations\n\n   Non Supporting Agents\n\n      Due to the way that realm-routed requests are handled in Diameter\n      networks with the server selection for the request done by an\n      agent, network operators should enable DOIC at agents that perform\n      server selection first.\n\n   Topology Hiding Interactions\n\n      There exist proxies that implement what is referred to as Topology\n      Hiding.  This can include cases where the agent modifies the\n      Origin-Host in answer messages.  The behavior of the DOIC solution\n      is not well understood when this happens.  As such, the DOIC\n      solution does not address this scenario.\n\nAppendix C.  Requirements Conformance Analysis\n\n   This section contains the result of an analysis of the DOIC solutions\n   conformance to the requirements defined in [RFC7068
 ].\n\nC.1.  Deferred Requirements\n\n   The 3GPP has adopted an early version of this document as normative\n   references in various Diameter related specifications to support the\n   overload control mechanism in their release 12 framework.  The DIME\n   working group has therefore decided to defer certain requirements in\n   order to complete the design of an extensible, generic solution\n   before the deadline scheduled by the 3GPP for the completion of the\n   release 12 protocol work by the end of 2014.  The deferred work\n   includes the following:\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 34]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   o  Agent Overload - The ability for an agent to report an overload\n      condition of the agent itself.\n\n   o  Load Information - The ability for a node to report its load level\n      when not overloaded.\n\n   At the time of this writing, DIME has begun separate wo
 rk efforts for\n   these requirements.\n\nC.2.  Detection of non-supporting Intermediaries\n\n   The DOIC mechanism as currently defined does not allow supporting\n   nodes to automatically determine whether OC-Supported-Features or OC-\n   OLR AVPs are originated by a peer node, or by a non-peer node and\n   sent across a non-supporting peer.  This makes it impossible to\n   detect the presence of non-supporting nodes between supporting nodes,\n   except by configuration.  The working group determined that such a\n   configuration requirement is acceptable.\n\n   This limits full compliance with certain requirements related to the\n   limitation of new configuration, deployment in environments with\n   mixed support, operating across non-supporting agents, and\n   authorization.\n\nC.3.  Implicit Application Indication\n\n   The working group elected to determine the application for an\n   overload report from that of the enclosing message.  This prevents\n   sending an OLR for an 
 application when there are no transactions for\n   that application.\n\n   As a consequence, DOIC does not comply with the requirement to be\n   able to report overload information across quiescent connections.\n   DOIC does not fully comply with requirements to operate on up-to-date\n   information, since if an OLR causes all transactions to stop for an\n   application, the only way traffic will resume is for the OLR to\n   expire.\n\nC.4.  Stateless Operation\n\n   RFC7068 explicitly discourages the sending of OLRs in every answer\n   message, as part of the requirement to avoid additional work for\n   overloaded nodes.  DOIC recommends exactly that behavior during\n   active overload conditions.  The working group determined that doing\n   otherwise would reduce reliability and increase statefulness.  (Note\n   that DOIC does allow nodes to avoid sending OLRs in every answer if\n   they have some other method of ensuring that OLRs get to all relevant\n   reacting nodes.)\n\n\n\nK
 orhonen, et al.          Expires June 25, 2015                [Page 35]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.5.  No New Vulnerabilities\n\n   The working group believes that DOIC is compliant with the\n   requirement to avoid introducing new vulnerabilities.  However, this\n   requirement may warrant an early security expert review.\n\nC.6.  Detailed Requirements\n\n   [RFC Editor: Please remove this section and subsections prior to\n   publication as an RFC.]\n\nC.6.1.  General\n\n   REQ 1:  The solution MUST provide a communication method for Diameter\n           nodes to exchange load and overload information.\n\n           *Partially Compliant*. The mechanism uses new AVPs\n           piggybacked on existing Diameter messages to exchange\n           overload information.  It does not currently support "load"\n           information or the ability to report overload of an agent.\n           These have been left for future extensions.
 \n\n\n\n   REQ 2:  The solution MUST allow Diameter nodes to support overload\n           control regardless of which Diameter applications they\n           support.  Diameter clients and agents must be able to use the\n           received load and overload information to support graceful\n           behavior during an overload condition.  Graceful behavior\n           under overload conditions is best described by REQ 3.\n\n           *Partially Compliant*. The DOIC AVPs can be used in any\n           application that allows the extension of AVPs.  However,\n           "load" information is not currently supported.\n\n\n\n   REQ 3:  The solution MUST limit the impact of overload on the overall\n           useful throughput of a Diameter server, even when the\n           incoming load on the network is far in excess of its\n           capacity.  The overall useful throughput under load is the\n           ultimate measure of the value of a solution.\n\n           *Compliant*. DOIC pr
 ovides information that nodes can use to\n           reduce the impact of overload.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 36]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 4:  Diameter allows requests to be sent from either side of a\n           connection, and either side of a connection may have need to\n           provide its overload status.  The solution MUST allow each\n           side of a connection to independently inform the other of its\n           overload status.\n\n           *Compliant*. DOIC AVPs can be included regardless of\n           transaction "direction"\n\n\n\n   REQ 5:  Diameter allows nodes to determine their peers via dynamic\n           discovery or manual configuration.  The solution MUST work\n           consistently without regard to how peers are determined.\n\n           *Compliant*. DOIC contains no assumptions about how peers are\n           discovered.\n\n\n\n  
  REQ 6:  The solution designers SHOULD seek to minimize the amount of\n           new configuration required in order to work.  For example, it\n           is better to allow peers to advertise or negotiate support\n           for the solution, rather than to require that this knowledge\n           to be configured at each node.\n\n           *Partially Compliant*. Most DOIC parameters are advertised\n           using the DOIC capability announcement mechanism.  However,\n           there are some situations where configuration is required.\n           For example, a DOIC node detect the fact that a peer may not\n           support DOIC when nodes on the other side of the non-\n           supporting node do support DOIC without configuration.\n\n\n\nC.6.2.  Performance\n\n   REQ 7:  The solution and any associated default algorithm(s) MUST\n           ensure that the system remains stable.  At some point after\n           an overload condition has ended, the solution MUST enable\n  
          capacity to stabilize and become equal to what it would be in\n           the absence of an overload condition.  Note that this also\n           requires that the solution MUST allow nodes to shed load\n           without introducing non-converging oscillations during or\n           after an overload condition.\n\n           *Compliant*. The specification offers guidance that\n           implementations should apply hysteresis when recovering from\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 37]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           overload, and avoid sudden ramp ups in offered load when\n           recovering.\n\n\n\n   REQ 8:  Supporting nodes MUST be able to distinguish current overload\n           information from stale information.\n\n           *Partially Compliant*. DOIC overload reports are "soft\n           state", that is they expire after an indicated period.  DOIC\n           
 nodes may also send reports that end existing overload\n           conditions.  DOIC requires reporting nodes to ensure that all\n           relevant reacting nodes receive overload reports.\n\n           However, since DOIC does not allow reporting nodes to send\n           OLRs in watchdog messages, if an overload condition results\n           in zero offered load, the reporting node cannot update the\n           condition until the expiration of the original OLR.\n\n\n\n   REQ 9:  The solution MUST function across fully loaded as well as\n           quiescent transport connections.  This is partially derived\n           from the requirement for stability in REQ 7.\n\n           *Not Compliant*. DOIC does not allow OLRs to be sent over\n           quiescent transport connections.  This is due to the fact\n           that OLRs cannot be sent outside of the application to which\n           they apply.\n\n\n\n   REQ 10: Consumers of overload information MUST be able to determine\n   
         when the overload condition improves or ends.\n\n           *Partially Compliant*. (See response to previous two\n           requirements.)\n\n\n\n   REQ 11: The solution MUST be able to operate in networks of different\n           sizes.\n\n           *Compliant*. DOIC makes no assumptions about the size of the\n           network.  DOIC can operate purely between clients and\n           servers, or across agents.\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 38]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 12: When a single network node fails, goes into overload, or\n           suffers from reduced processing capacity, the solution MUST\n           make it possible to limit the impact of the affected node on\n           other nodes in the network.  This helps to prevent a small-\n           scale failure from becoming a widespread outage.\n\n           *Partially Compliant*. DOIC allows overload 
 reports for an\n           entire realm, where abated traffic will not be redirected\n           towards another server.  But in situations where nodes choose\n           to divert traffic to other nodes, DOIC offers no way of\n           knowing whether the new recipients can handle the traffic if\n           they have not already indicated overload.  This may be\n           mitigated with the use of a future "load" extension, or with\n           the use of proprietary dynamic load-balancing mechanisms.\n\n\n\n   REQ 13: The solution MUST NOT introduce substantial additional work\n           for a node in an overloaded state.  For example, a\n           requirement for an overloaded node to send overload\n           information every time it received a new request would\n           introduce substantial work.\n\n           *Not Compliant*. DOIC does in fact encourage an overloaded\n           node to send an OLR in every response.  The working group\n           that other mechanism
 s to ensure that every relevant node\n           receives an OLR would create even more work.  [Note: This\n           needs discussion.]\n\n\n\n   REQ 14: Some scenarios that result in overload involve a rapid\n           increase of traffic with little time between normal levels\n           and levels that induce overload.  The solution SHOULD provide\n           for rapid feedback when traffic levels increase.\n\n           *Compliant*. The piggyback mechanism allows OLRs to be sent\n           at the same rate as application traffic.\n\n\n\n   REQ 15: The solution MUST NOT interfere with the congestion control\n           mechanisms of underlying transport protocols.  For example, a\n           solution that opened additional TCP connections when the\n           network is congested would reduce the effectiveness of the\n           underlying congestion control mechanisms.\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 39]\n_\nInternet-Draft     
                DOIC                     December 2014\n\n\n           *Compliant*. DOIC does not require or recommend changes in\n           the handling of transport protocols or connections.\n\n\n\nC.6.3.  Heterogeneous Support for Solution\n\n   REQ 16: The solution is likely to be deployed incrementally.  The\n           solution MUST support a mixed environment where some, but not\n           all, nodes implement it.\n\n           *Partially Compliant*. DOIC works with most mixed-deployment\n           scenarios.  However, it cannot work across a non-supporting\n           proxy that modifies Origin-Host AVPs in answer messages.\n           DOIC will have limited impact in networks where the nodes\n           that perform server selections do not support the mechanism.\n\n\n\n   REQ 17: In a mixed environment with nodes that support the solution\n           and nodes that do not, the solution MUST NOT result in\n           materially less useful throughput during overload as wo
 uld\n           have resulted if the solution were not present.  It SHOULD\n           result in less severe overload in this environment.\n\n           *Compliant*. In most mixed-support deployment, DOIC will\n           offer at least some value, and will not make things worse.\n\n\n\n   REQ 18: In a mixed environment of nodes that support the solution and\n           nodes that do not, the solution MUST NOT preclude elements\n           that support overload control from treating elements that do\n           not support overload control in an equitable fashion relative\n           to those that do.  Users and operators of nodes that do not\n           support the solution MUST NOT unfairly benefit from the\n           solution.  The solution specification SHOULD provide guidance\n           to implementers for dealing with elements not supporting\n           overload control.\n\n           *Compliant*. DOIC provides mechanisms to abate load from non-\n           supporting source
 s.  Furthermore, it recommends that\n           reporting nodes will still need to be able to apply whatever\n           protections they would ordinarily apply if DOIC were not in\n           use.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 40]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 19: It MUST be possible to use the solution between nodes in\n           different realms and in different administrative domains.\n\n           *Partially Compliant*. DOIC allows sending OLRs across\n           administrative domains, and potentially to nodes in other\n           realms.  However, an OLR cannot indicate overload for realms\n           other than the one in the Origin-Realm AVP of the containing\n           answer.\n\n\n\n   REQ 20: Any explicit overload indication MUST be clearly\n           distinguishable from other errors reported via Diameter.\n\n           *Compliant*. DOIC sends explicit overl
 oad indication in\n           overload reports.  It does not depend on error result codes.\n\n\n\n   REQ 21: In cases where a network node fails, is so overloaded that it\n           cannot process messages, or cannot communicate due to a\n           network failure, it may not be able to provide explicit\n           indications of the nature of the failure or its levels of\n           overload.  The solution MUST result in at least as much\n           useful throughput as would have resulted if the solution were\n           not in place.\n\n           *Compliant*. DOIC overload reports have the primary effect of\n           suppressing message retries in overload conditions.  DOIC\n           recommends that messages never be silently dropped if at all\n           possible.\n\n\n\nC.6.4.  Granular Control\n\n   REQ 22: The solution MUST provide a way for a node to throttle the\n           amount of traffic it receives from a peer node.  This\n           throttling SHOULD be graded 
 so that it can be applied\n           gradually as offered load increases.  Overload is not a\n           binary state; there may be degrees of overload.\n\n           *Compliant*. The "loss" algorithm expresses a percentage\n           reduction.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 41]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 23: The solution MUST provide sufficient information to enable a\n           load-balancing node to divert messages that are rejected or\n           otherwise throttled by an overloaded upstream node to other\n           upstream nodes that are the most likely to have sufficient\n           capacity to process them.\n\n           *Not Compliant*. DOIC provides no built in mechanism to\n           determine the best place to divert messages that would\n           otherwise be throttled.  This can be accomplished with a\n           future "load" extension, or with pro
 prietary load balancing\n           mechanisms.\n\n\n\n   REQ 24: The solution MUST provide a mechanism for indicating load\n           levels, even when not in an overload condition, to assist\n           nodes in making decisions to prevent overload conditions from\n           occurring.\n\n           *Not Compliant*. "Load" information has been left for a\n           future extension.\n\n\n\nC.6.5.  Priority and Policy\n\n   REQ 25: The base specification for the solution SHOULD offer general\n           guidance on which message types might be desirable to send or\n           process over others during times of overload, based on\n           application-specific considerations.  For example, it may be\n           more beneficial to process messages for existing sessions\n           ahead of new sessions.  Some networks may have a requirement\n           to give priority to requests associated with emergency\n           sessions.  Any normative or otherwise detailed definition of
 \n           the relative priorities of message types during an overload\n           condition will be the responsibility of the application\n           specification.\n\n           *Compliant*. The specification offers guidance on how\n           requests might be prioritized for different types of\n           applications.\n\n\n\n   REQ 26: The solution MUST NOT prevent a node from prioritizing\n           requests based on any local policy, so that certain requests\n           are given preferential treatment, given additional\n           retransmission, not throttled, or processed ahead of others.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 42]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Compliant*. Nothing in the specification prevents\n           application-specific, implementation-specific, or local\n           policies.\n\n\n\nC.6.6.  Security\n\n   REQ 27: The solution MUST NOT provide new vu
 lnerabilities to\n           malicious attack or increase the severity of any existing\n           vulnerabilities.  This includes vulnerabilities to DoS and\n           DDoS attacks as well as replay and man-in-the-middle attacks.\n           Note that the Diameter base specification [RFC6733] lacks\n           end-to-end security and this must be considered (see the\n           Security Considerations in [RFC7068]).  Note that this\n           requirement was expressed at a high level so as to not\n           preclude any particular solution.  It is expected that the\n           solution will address this in more detail.\n\n           *Compliant*. The working group is not aware of any such\n           vulnerabilities.  [This may need further analysis.]\n\n\n\n   REQ 28: The solution MUST NOT depend on being deployed in\n           environments where all Diameter nodes are completely trusted.\n           It SHOULD operate as effectively as possible in environments\n           where
  other nodes are malicious; this includes preventing\n           malicious nodes from obtaining more than a fair share of\n           service.  Note that this does not imply any responsibility on\n           the solution to detect, or take countermeasures against,\n           malicious nodes.\n\n           *Partially Compliant*. Since all Diameter security is\n           currently at the transport layer, nodes must trust immediate\n           peers to enforce trust policies.  However, there are\n           situations where a DOIC node cannot determine if an immediate\n           peer supports DOIC.  The authors recommend an expert security\n           review.\n\n\n\n   REQ 29: It MUST be possible for a supporting node to make\n           authorization decisions about what information will be sent\n           to peer nodes based on the identity of those nodes.  This\n           allows a domain administrator who considers the load of their\n           nodes to be sensitive information
  to restrict access to that\n           information.  Of course, in such cases, there is no\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 43]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           expectation that the solution itself will help prevent\n           overload from that peer node.\n\n           *Partially Compliant*. (See response to previous\n           requirement.)\n\n\n\n   REQ 30: The solution MUST NOT interfere with any Diameter-compliant\n           method that a node may use to protect itself from overload\n           from non-supporting nodes or from denial-of-service attacks.\n\n           *Compliant*. The specification recommends that any such\n           protection mechanism needed without DOIC should continue to\n           be employed with DOIC.\n\n\n\nC.6.7.  Flexibility and Extensibility\n\n   REQ 31: There are multiple situations where a Diameter node may be\n           overloaded for so
 me purposes but not others.  For example,\n           this can happen to an agent or server that supports multiple\n           applications, or when a server depends on multiple external\n           resources, some of which may become overloaded while others\n           are fully available.  The solution MUST allow Diameter nodes\n           to indicate overload with sufficient granularity to allow\n           clients to take action based on the overloaded resources\n           without unreasonably forcing available capacity to go unused.\n           The solution MUST support specification of overload\n           information with granularities of at least "Diameter node",\n           "realm", and "Diameter application" and MUST allow\n           extensibility for others to be added in the future.\n\n           *Partially Compliant*. All DOIC overload reports are scoped\n           to the specific application and realm.  Inside that scope,\n           overload can be reported at the 
 specific server or whole\n           realm scope.  As currently specified, DOIC cannot indicate\n           local overload for an agent.  At the time of this writing,\n           the DIME working group has plans to work on an agent-overload\n           extension.\n\n           DOIC allows new "scopes" through the use of extended report\n           types.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 44]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 32: The solution MUST provide a method for extending the\n           information communicated and the algorithms used for overload\n           control.\n\n           *Compliant*. DOIC allows new report types and abatement\n           algorithms to be created.  These may be indicated using the\n           OC-Supported-Features AVP.\n\n\n\n   REQ 33: The solution MUST provide a default algorithm that is\n           mandatory to implement.\n\n           *Complia
 nt*. The "loss" algorithm is mandatory to implement.\n\n\n\n   REQ 34: The solution SHOULD provide a method for exchanging overload\n           and load information between elements that are connected by\n           intermediaries that do not support the solution.\n\n           *Partially Compliant*. DOIC information can traverse non-\n           supporting agents, as long as those agents do not modify\n           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a\n           way for supporting nodes to detect such modification.\n\n\n\nAppendix D.  Considerations for Applications Integrating the DOIC\n             Solution\n\n   This section outlines considerations to be taken into account when\n   integrating the DOIC solution into Diameter applications.\n\nD.1.  Application Classification\n\n   The following is a classification of Diameter applications and\n   request types.  This discussion is meant to document factors that\n   play into decisions made by the Diameter id
 entity responsible for\n   handling overload reports.\n\n   Section 8.1 of [RFC6733] defines two state machines that imply two\n   types of applications, session-less and session-based applications.\n   The primary difference between these types of applications is the\n   lifetime of Session-Ids.\n\n   For session-based applications, the Session-Id is used to tie\n   multiple requests into a single session.\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 45]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   The Credit-Control application defined in [RFC4006] is an example of\n   a Diameter session-based application.\n\n   In session-less applications, the lifetime of the Session-Id is a\n   single Diameter transaction, i.e. the session is implicitly\n   terminated after a single Diameter transaction and a new Session-Id\n   is generated for each Diameter request.\n\n   For the purposes of this discussion, session-less ap
 plications are\n   further divided into two types of applications:\n\n   Stateless Applications:\n\n      Requests within a stateless application have no relationship to\n      each other.  The 3GPP defined S13 application is an example of a\n      stateless application [S13], where only a Diameter command is\n      defined between a client and a server and no state is maintained\n      between two consecutive transactions.\n\n   Pseudo-Session Applications:\n\n      Applications that do not rely on the Session-Id AVP for\n      correlation of application messages related to the same session\n      but use other session-related information in the Diameter requests\n      for this purpose.  The 3GPP defined Cx application [Cx] is an\n      example of a pseudo-session application.\n\n   The handling of overload reports must take the type of application\n   into consideration, as discussed in Appendix D.2.\n\nD.2.  Application Type Overload Implications\n\n   This section discusses con
 siderations for mitigating overload\n   reported by a Diameter entity.  This discussion focuses on the type\n   of application.  Appendix D.3 discusses considerations for handling\n   various request types when the target server is known to be in an\n   overloaded state.\n\n   These discussions assume that the strategy for mitigating the\n   reported overload is to reduce the overall workload sent to the\n   overloaded entity.  The concept of applying overload treatment to\n   requests targeted for an overloaded Diameter entity is inherent to\n   this discussion.  The method used to reduce offered load is not\n   specified here but could include routing requests to another Diameter\n   entity known to be able to handle them, or it could mean rejecting\n   certain requests.  For a Diameter agent, rejecting requests will\n   usually mean generating appropriate Diameter error responses.  For a\n   Diameter client, rejecting requests will depend upon the application.\n\n\n\nKorhonen, et
  al.          Expires June 25, 2015                [Page 46]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   For example, it could mean giving an indication to the entity\n   requesting the Diameter service that the network is busy and to try\n   again later.\n\n   Stateless Applications:\n\n      By definition there is no relationship between individual requests\n      in a stateless application.  As a result, when a request is sent\n      or relayed to an overloaded Diameter entity - either a Diameter\n      Server or a Diameter Agent - the sending or relaying entity can\n      choose to apply the overload treatment to any request targeted for\n      the overloaded entity.\n\n   Pseudo-Session Applications:\n\n      For pseudo-session applications, there is an implied ordering of\n      requests.  As a result, decisions about which requests towards an\n      overloaded entity to reject could take the command code of the\n      request into cons
 ideration.  This generally means that\n      transactions later in the sequence of transactions should be given\n      more favorable treatment than messages earlier in the sequence.\n      This is because more work has already been done by the Diameter\n      network for those transactions that occur later in the sequence.\n      Rejecting them could result in increasing the load on the network\n      as the transactions earlier in the sequence might also need to be\n      repeated.\n\n   Session-Based Applications:\n\n      Overload handling for session-based applications must take into\n      consideration the work load associated with setting up and\n      maintaining a session.  As such, the entity sending requests\n      towards an overloaded Diameter entity for a session-based\n      application might tend to reject new session requests prior to\n      rejecting intra-session requests.  In addition, session ending\n      requests might be given a lower probability of being re
 jected as\n      rejecting session ending requests could result in session status\n      being out of sync between the Diameter clients and servers.\n      Application designers that would decide to reject mid-session\n      requests will need to consider whether the rejection invalidates\n      the session and any resulting session cleanup procedures.\n\nD.3.  Request Transaction Classification\n\n   Independent Request:\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 47]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      An independent request is not correlated to any other requests\n      and, as such, the lifetime of the session-id is constrained to an\n      individual transaction.\n\n   Session-Initiating Request:\n\n      A session-initiating request is the initial message that\n      establishes a Diameter session.  The ACR message defined in\n      [RFC6733] is an example of a session-initiating request.
 \n\n   Correlated Session-Initiating Request:\n\n      There are cases when multiple session-initiated requests must be\n      correlated and managed by the same Diameter server.  It is notably\n      the case in the 3GPP PCC architecture [PCC], where multiple\n      apparently independent Diameter application sessions are actually\n      correlated and must be handled by the same Diameter server.\n\n   Intra-Session Request:\n\n      An intra-session request is a request that uses the same Session-\n      Id than the one used in a previous request.  An intra-session\n      request generally needs to be delivered to the server that handled\n      the session creating request for the session.  The STR message\n      defined in [RFC6733] is an example of an intra-session request.\n\n   Pseudo-Session Requests:\n\n      Pseudo-session requests are independent requests and do not use\n      the same Session-Id but are correlated by other session-related\n      information contained in t
 he request.  There exists Diameter\n      applications that define an expected ordering of transactions.\n      This sequencing of independent transactions results in a pseudo\n      session.  The AIR, MAR and SAR requests in the 3GPP defined Cx\n      [Cx] application are examples of pseudo-session requests.\n\nD.4.  Request Type Overload Implications\n\n   The request classes identified in Appendix D.3 have implications on\n   decisions about which requests should be throttled first.  The\n   following list of request treatment regarding throttling is provided\n   as guidelines for application designers when implementing the\n   Diameter overload control mechanism described in this document.  The\n   exact behavior regarding throttling is a matter of local policy,\n   unless specifically defined for the application.\n\n   Independent Requests:\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 48]\n_\nInternet-Draft                    DOIC               
       December 2014\n\n\n      Independent requests can generally be given equal treatment when\n      making throttling decisions, unless otherwise indicated by\n      application requirements or local policy.\n\n   Session-Initiating Requests:\n\n      Session-initiating requests often represent more work than\n      independent or intra-session requests.  Moreover, session-\n      initiating requests are typically followed by other session-\n      related requests.  Since the main objective of the overload\n      control is to reduce the total number of requests sent to the\n      overloaded entity, throttling decisions might favor allowing\n      intra-session requests over session-initiating requests.  In the\n      absence of local policies or application specific requirements to\n      the contrary, Individual session-initiating requests can be given\n      equal treatment when making throttling decisions.\n\n   Correlated Session-Initiating Requests:\n\n      A Request that 
 results in a new binding, where the binding is used\n      for routing of subsequent session-initiating requests to the same\n      server, represents more work load than other requests.  As such,\n      these requests might be throttled more frequently than other\n      request types.\n\n   Pseudo-Session Requests:\n\n      Throttling decisions for pseudo-session requests can take into\n      consideration where individual requests fit into the overall\n      sequence of requests within the pseudo session.  Requests that are\n      earlier in the sequence might be throttled more aggressively than\n      requests that occur later in the sequence.\n\n   Intra-Session Requests:\n\n      There are two types of intra-sessions requests, requests that\n      terminate a session and the remainder of intra-session requests.\n      Implementers and operators may choose to throttle session-\n      terminating requests less aggressively in order to gracefully\n      terminate sessions, allow c
 leanup of the related resources (e.g.\n      session state) and avoid the need for additional intra-session\n      requests.  Favoring session-termination requests may reduce the\n      session management impact on the overloaded entity.  The default\n      handling of other intra-session requests might be to treat them\n      equally when making throttling decisions.  There might also be\n      application level considerations whether some request types are\n      favored over others.\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 49]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nAuthors\' Addresses\n\n   Jouni Korhonen (editor)\n   Broadcom\n   Porkkalankatu 24\n   Helsinki  FIN-00180\n   Finland\n\n   Email: jouni.nospam@gmail.com\n\n\n   Steve Donovan (editor)\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: srdonovan@usdonovans.com\n\n\n   Ben Campbell\n   Oracle\n   746
 0 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: ben@nostrum.com\n\n\n   Lionel Morand\n   Orange Labs\n   38/40 rue du General Leclerc\n   Issy-Les-Moulineaux Cedex 9  92794\n   France\n\n   Phone: +33145296257\n   Email: lionel.morand@orange.com\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 25, 2015                [Page 50]\n', 'filename1': '\n\n\n\nDiameter Maintenance and Extensions (DIME)              J. Korhonen, Ed.\nInternet-Draft                                                  Broadcom\nIntended status: Standards Track                         S. Donovan, Ed.\nExpires: June 18, 2015                                       B. Campbell\n                                                                  Oracle\n                                                               L. Morand\n                                                             Orange Labs\n                                                       December 15, 2014\n\n\n 
                Diameter Overload Indication Conveyance\n                      draft-ietf-dime-ovli-06.txt\n\nAbstract\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC).\n\nRequirements\n\n   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",\n   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this\n   document are to be interpreted as described in RFC 2119 [RFC2119].\n\nStatus of This Memo\n\n   This Internet-Draft is submitted in full conformance with the\n   provisions of BCP 78 and BCP 79.\n\n   Internet-Drafts are working documents of the Internet Engineering\n   Task Force (IETF).  Note that other groups may also distribute\n   working documents as Internet-Drafts.  The list of current Internet-\n   Drafts is at http://datatracker.ietf.org/drafts/current/.\n\n   Internet-Drafts are draft documents valid for a maximum of six months\n   and may be u
 pdated, replaced, or obsoleted by other documents at any\n   time.  It is inappropriate to use Internet-Drafts as reference\n   material or to cite them other than as "work in progress."\n\n   This Internet-Draft will expire on June 18, 2015.\n\nCopyright Notice\n\n   Copyright (c) 2014 IETF Trust and the persons identified as the\n   document authors.  All rights reserved.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 1]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   This document is subject to BCP 78 and the IETF Trust\'s Legal\n   Provisions Relating to IETF Documents\n   (http://trustee.ietf.org/license-info) in effect on the date of\n   publication of this document.  Please review these documents\n   carefully, as they describe your rights and restrictions with respect\n   to this document.  Code Components extracted from this document must\n   include Simplified BSD License text as described in Section 4.
 e of\n   the Trust Legal Provisions and are provided without warranty as\n   described in the Simplified BSD License.\n\nTable of Contents\n\n   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3\n   2.  Terminology and Abbreviations . . . . . . . . . . . . . . . .   4\n   3.  Solution Overview . . . . . . . . . . . . . . . . . . . . . .   5\n     3.1.  Piggybacking  . . . . . . . . . . . . . . . . . . . . . .   7\n     3.2.  DOIC Capability Announcement  . . . . . . . . . . . . . .   8\n     3.3.  DOIC Overload Condition Reporting . . . . . . . . . . . .   9\n     3.4.  DOIC Extensibility  . . . . . . . . . . . . . . . . . . .  11\n     3.5.  Simplified Example Architecture . . . . . . . . . . . . .  12\n   4.  Solution Procedures . . . . . . . . . . . . . . . . . . . . .  13\n     4.1.  Capability Announcement . . . . . . . . . . . . . . . . .  13\n       4.1.1.  Reacting Node Behavior  . . . . . . . . . . . . . . .  13\n       4.1.2.  Reporting Node Behavior . 
 . . . . . . . . . . . . . .  13\n       4.1.3.  Agent Behavior  . . . . . . . . . . . . . . . . . . .  14\n     4.2.  Overload Report Processing  . . . . . . . . . . . . . . .  15\n       4.2.1.  Overload Control State  . . . . . . . . . . . . . . .  15\n       4.2.2.  Reacting Node Behavior  . . . . . . . . . . . . . . .  19\n       4.2.3.  Reporting Node Behavior . . . . . . . . . . . . . . .  20\n     4.3.  Protocol Extensibility  . . . . . . . . . . . . . . . . .  22\n   5.  Loss Algorithm  . . . . . . . . . . . . . . . . . . . . . . .  22\n     5.1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . .  23\n     5.2.  Reporting Node Behavior . . . . . . . . . . . . . . . . .  23\n     5.3.  Reacting Node Behavior  . . . . . . . . . . . . . . . . .  24\n   6.  Attribute Value Pairs . . . . . . . . . . . . . . . . . . . .  25\n     6.1.  OC-Supported-Features AVP . . . . . . . . . . . . . . . .  25\n     6.2.  OC-Feature-Vector AVP . . . . . . . . . . . . . . . . . .  25\n  
    6.3.  OC-OLR AVP  . . . . . . . . . . . . . . . . . . . . . . .  26\n     6.4.  OC-Sequence-Number AVP  . . . . . . . . . . . . . . . . .  26\n     6.5.  OC-Validity-Duration AVP  . . . . . . . . . . . . . . . .  27\n     6.6.  OC-Report-Type AVP  . . . . . . . . . . . . . . . . . . .  27\n     6.7.  OC-Reduction-Percentage AVP . . . . . . . . . . . . . . .  27\n     6.8.  Attribute Value Pair flag rules . . . . . . . . . . . . .  28\n   7.  Error Response Codes  . . . . . . . . . . . . . . . . . . . .  28\n   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  29\n     8.1.  AVP codes . . . . . . . . . . . . . . . . . . . . . . . .  29\n     8.2.  New registries  . . . . . . . . . . . . . . . . . . . . .  29\n   9.  Security Considerations . . . . . . . . . . . . . . . . . . .  30\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 2]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n     9.1.  Potential Thr
 eat Modes  . . . . . . . . . . . . . . . . .  30\n     9.2.  Denial of Service Attacks . . . . . . . . . . . . . . . .  31\n     9.3.  Non-Compliant Nodes . . . . . . . . . . . . . . . . . . .  32\n     9.4.  End-to End-Security Issues  . . . . . . . . . . . . . . .  32\n   10. Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  33\n   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .  34\n     11.1.  Normative References . . . . . . . . . . . . . . . . . .  34\n     11.2.  Informative References . . . . . . . . . . . . . . . . .  34\n   Appendix A.  Issues left for future specifications  . . . . . . .  34\n     A.1.  Additional traffic abatement algorithms . . . . . . . . .  35\n     A.2.  Agent Overload  . . . . . . . . . . . . . . . . . . . . .  35\n     A.3.  New Error Diagnostic AVP  . . . . . . . . . . . . . . . .  35\n   Appendix B.  Deployment Considerations  . . . . . . . . . . . . .  35\n   Appendix C.  Requirements Conformance Analysis  . . . . 
 . . . . .  35\n     C.1.  Deferred Requirements . . . . . . . . . . . . . . . . . .  36\n     C.2.  Detection of non-supporting Intermediaries  . . . . . . .  36\n     C.3.  Implicit Application Indication . . . . . . . . . . . . .  36\n     C.4.  Stateless Operation . . . . . . . . . . . . . . . . . . .  37\n     C.5.  No New Vulnerabilities  . . . . . . . . . . . . . . . . .  37\n     C.6.  Detailed Requirements . . . . . . . . . . . . . . . . . .  37\n       C.6.1.  General . . . . . . . . . . . . . . . . . . . . . . .  37\n       C.6.2.  Performance . . . . . . . . . . . . . . . . . . . . .  39\n       C.6.3.  Heterogeneous Support for Solution  . . . . . . . . .  41\n       C.6.4.  Granular Control  . . . . . . . . . . . . . . . . . .  43\n       C.6.5.  Priority and Policy . . . . . . . . . . . . . . . . .  43\n       C.6.6.  Security  . . . . . . . . . . . . . . . . . . . . . .  44\n       C.6.7.  Flexibility and Extensibility . . . . . . . . . . . .  45\n   Appendix D.  Cons
 iderations for Applications Integrating the DOIC\n                Solution . . . . . . . . . . . . . . . . . . . . . .  46\n     D.1.  Application Classification  . . . . . . . . . . . . . . .  47\n     D.2.  Application Type Overload Implications  . . . . . . . . .  48\n     D.3.  Request Transaction Classification  . . . . . . . . . . .  49\n     D.4.  Request Type Overload Implications  . . . . . . . . . . .  50\n   Authors\' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  51\n\n1.  Introduction\n\n   This specification defines a base solution for Diameter overload\n   control, referred to as Diameter Overload Indication Conveyance\n   (DOIC), based on the requirements identified in [RFC7068].\n\n   This specification addresses Diameter overload control between\n   Diameter nodes that support the DOIC solution.  The solution, which\n   is designed to apply to existing and future Diameter applications,\n   requires no changes to the Diameter base protocol [RFC6733] and i
 s\n   deployable in environments where some Diameter nodes do not implement\n   the Diameter overload control solution defined in this specification.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 3]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Note that the overload control solution defined in this specification\n   does not address all the requirements listed in [RFC7068].  A number\n   of overload control related features are left for future\n   specifications.  See Appendix A for a list of extensions that are\n   currently being considered.  See Appendix C for an analysis of\n   conformance to the requirements specified in [RFC7068].\n\n2.  Terminology and Abbreviations\n\n   Abatement\n\n      Reaction to receipt of an overload report resulting in a reduction\n      in traffic sent to the reporting node.  Abatement actions include\n      diversion and throttling.\n\n   Abatement Algorithm\n\n      A mechani
 sm requested by reporting nodes and used by reacting\n      nodes to reduce the amount of traffic sent during an occurrence of\n      overload control.\n\n   Diversion\n\n      A mechanism used for overload abatement by selecting a different\n      path for requests.\n\n   Host-Routed Requests\n\n      Requests that a reacting node knows will be served by a particular\n      host, either due to the presence of a Destination-Host AVP, or by\n      some other local knowledge on the part of the reacting node.\n\n   Overload Control State (OCS)\n\n      Reporting and reacting node internally maintained state describing\n      occurrences of overload control.\n\n   Overload Report (OLR)\n\n      Overload control information for a particular overload occurrence\n      sent by a reporting node.\n\n   Reacting Node\n\n      A Diameter node that acts upon an overload report.\n\n   Realm-Routed Requests\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 4]\n_\nInte
 rnet-Draft                    DOIC                     December 2014\n\n\n      Requests that a reacting node does not know the host that will\n      service the request.\n\n   Reporting Node\n\n      A Diameter node that generates an overload report.  (This may or\n      may not be the overloaded node.)\n\n   Throttling\n\n      A mechanism for overload abatement that limits the number of\n      requests sent by the DIOC reacting node.  Throttling can include a\n      Diameter Client not sending requests, or a Diameter Agent or\n      Server rejecting requests with appropriate error responses.  In\n      both cases the result of the throttling is a permanent rejection\n      of the transaction.\n\n\n\n3.  Solution Overview\n\n   The Diameter Overload Information Conveyance (DOIC) solution allows\n   Diameter nodes to request other Diameter nodes to perform overload\n   abatement actions, that is, actions to reduce the load offered to the\n   overloaded node or realm.\n\n   A Diamet
 er node that supports DOIC is known as a "DOIC node".  Any\n   Diameter node can act as a DOIC node, including Diameter Clients,\n   Diameter Servers, and Diameter Agents.  DOIC nodes are further\n   divided into "Reporting Nodes" and "Reacting Nodes."  A reporting\n   node requests overload abatement by sending Overload Reports (OLR).\n\n   A reacting node acts upon OLRs, and performs whatever actions are\n   needed to fulfill the abatement requests included in the OLRs.  A\n   Reporting node may report overload on its own behalf, or on behalf of\n   other nodes.  Likewise, a reacting node may perform overload\n   abatement on its own behalf, or on behalf of other nodes.\n\n   A Diameter node\'s role as a DOIC node is independent of its Diameter\n   role.  For example, Diameter Agents may act as DOIC nodes, even\n   though they are not endpoints in the Diameter sense.  Since Diameter\n   enables bi-directional applications, where Diameter Servers can send\n   requests towards Diame
 ter Clients, a given Diameter node can\n   simultaneously act as both a reporting node and a reacting node.\n\n   Likewise, a Diameter Agent may act as a reacting node from the\n   perspective of upstream nodes, and a reporting node from the\n   perspective of downstream nodes.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 5]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   DOIC nodes do not generate new messages to carry DOIC related\n   information.  Rather, they "piggyback" DOIC information over existing\n   Diameter messages by inserting new AVPs into existing Diameter\n   requests and responses.  Nodes indicate support for DOIC, and any\n   needed DOIC parameters, by inserting an OC-Supported-Features AVP\n   (Section 6.2) into existing requests and responses.  Reporting nodes\n   send OLRs by inserting OC-OLR AVPs (Section 6.3).\n\n   A given OLR applies to the Diameter realm and application of the\n   Diameter
  message that carries it.  If a reporting node supports more\n   than one realm and/or application, it reports independently for each\n   combination of realm and application.  Similarly, the OC-Supported-\n   Features AVP applies to the realm and application of the enclosing\n   message.  This implies that a node may support DOIC for one\n   application and/or realm, but not another, and may indicate different\n   DOIC parameters for each application and realm for which it supports\n   DOIC.\n\n   Reacting nodes perform overload abatement according to an agreed-upon\n   abatement algorithm.  An abatement algorithm defines the meaning of\n   some of the parameters of an OLR and the procedures required for\n   overload abatement.  An overload abatement algorithm separates\n   Diameter requests into two sets.  The first set contains the requests\n   that are to undergo overload abatement treatment of either throttling\n   or diversion.  The second set contains the requests that are to
  be\n   given normal routing treatment.  This document specifies a single\n   must-support algorithm, namely the "loss" algorithm (Section 5).\n   Future specifications may introduce new algorithms.\n\n   Overload conditions may vary in scope.  For example, a single\n   Diameter node may be overloaded, in which case reacting nodes may\n   attempt to send requests to other destinations.  On the other hand,\n   an entire Diameter realm may be overloaded, in which case such\n   attempts would do harm.  DOIC OLRs have a concept of "report type"\n   (Section 6.6), where the type defines such behaviors.  Report types\n   are extensible.  This document defines report types for overload of a\n   specific host, and for overload of an entire realm.\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific host, identified by the Origin-Host AVP of the message\n   containing the OLR, for the application-id indicated in the\n   transaction.  When receiving an OLR o
 f type "HOST_REPORT", a reacting\n   node applies overload abatement treatment to the host-routed requests\n   identified by the overload abatement algorithm (see definition in\n   Section 2) sent for this application to the overloaded host.\n\n   A report of type "REALM_REPORT" is sent to indicate the overload of a\n   realm for the application-id indicated in the transaction.  The\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 6]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   overloaded realm is identified by the Destination-Realm AVP of the\n   message containing the OLR.  When receiving an OLR of type\n   "REALM_REPORT", a reacting node applies overload abatement treatment\n   to realm-routed requests identified by the overload abatement\n   algorithm (see definition in Section 2) sent for this application to\n   the overloaded realm.\n\n   While a reporting node sends OLRs to "adjacent" reacting nodes, nodes\n 
   that are "adjacent" for DOIC purposes may not be adjacent from a\n   Diameter, or transport, perspective.  For example, one or more\n   Diameter agents that do not support DOIC may exist between a given\n   pair of reporting and reacting nodes, as long as those agents pass\n   unknown AVPs through unchanged.  The report types described in this\n   document can safely pass through non-supporting agents.  This may not\n   be true for report types defined in future specifications.\n\n3.1.  Piggybacking\n\n   There is no new Diameter application defined to carry overload\n   related AVPs.  The overload control AVPs defined in this\n   specification have been designed to be piggybacked on top of existing\n   application messages.  This is made possible by adding overload\n   control AVPs, the OC-OLR AVP and the OC-Supported-Features AVP, as\n   optional AVPs into existing commands when the corresponding Command\n   Code Format (CCF) specification allows adding new optional AVPs (see\n 
   Section 1.3.4 of [RFC6733]).\n\n   Reacting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all request messages originated or relayed\n   by the reacting node.\n\n   Reporting nodes indicate support for DOIC by including the OC-\n   Supported-Features AVP in all answer messages originated or relayed\n   by the reporting node that are in response to a request that\n   contained the OC-Supported-Features AVP.  Reporting nodes also\n   include overload reports using the OC-OLR AVP in answer messages.\n\n   Note that the overload control solution does not have fixed server\n   and client roles.  The DOIC node role is determined based on the\n   message type: whether the message is a request (i.e. sent by a\n   "reacting node") or an answer (i.e. send by a "reporting node").\n   Therefore, in a typical "client-server" deployment, the Diameter\n   Client MAY report its overload condition to the Diameter Server for\n   any Diameter Server initiated mes
 sage exchange.  An example of such\n   is the Diameter Server requesting a re-authentication from a Diameter\n   Client.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 7]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n3.2.  DOIC Capability Announcement\n\n   The DOIC solution supports the ability for Diameter nodes to\n   determine if other nodes in the path of a request support the\n   solution.  This capability is referred to as DOIC Capability\n   Announcement (DCA) and is separate from Diameter Capability Exchange.\n\n   The DCA mechanism uses the OC-Supported-Features AVPs to indicate the\n   Diameter overload features supported.\n\n   The first node in the path of a Diameter request that supports the\n   DOIC solution inserts the OC-Supported-Features AVP in the request\n   message.\n\n      Note: As discussed elsewhere in the document, agents in the path\n      of the request can modify the OC-Supported-Feat
 ures AVP.\n\n      Note: The DOIC solution must support deployments where Diameter\n      Clients and/or Diameter Servers do not support the DOIC solution.\n      In this scenario, Diameter Agents that support the DOIC solution\n      may handle overload abatement for the non supporting Diameter\n      nodes.  In this case the DOIC agent will insert the OC-Supported-\n      Features AVP in requests that do not already contain one, telling\n      the reporting node that there is a DOIC node that will handle\n      overload abatement.  For transactions where there was an OC-\n      Supporting-Features AVP in the request, the agent will insert the\n      OC-Supported-Features AVP in answers, telling the reacting node\n      that there is a reporting node.\n\n   The OC-Feature-Vector AVP will contain an indication of support for\n   the loss overload abatement algorithm defined in this specification\n   (see Section 5).  This ensures that a reporting node always supports\n   at least on
 e of the advertized abatement algorithms received in a\n   request messages.\n\n   The reporting node inserts the OC-Supported-Features AVP in all\n   answer messages to requests that contained the OC-Supported-Features\n   AVP.  The contents of the reporting node\'s OC-Supported-Features AVP\n   indicate the set of Diameter overload features supported by the\n   reporting node.  This specification defines one exception - the\n   reporting node only includes an indication of support for one\n   overload abatement algorithm, independent of the number of overload\n   abatement algorithms actually supported by the reacting node.  The\n   overload abatement algorithm indicated is the algorithm that the\n   reporting node intends to use should it enter an overload condition.\n   Reacting nodes can use the indicated overload abatement algorithm to\n   prepare for possible overload reports and must use the indicated\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [
 Page 8]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   overload abatement algorithm if traffic reduction is actually\n   requested.\n\n      Note that the loss algorithm defined in this document is a\n      stateless abatement algorithm.  As a result it does not require\n      any actions by reacting nodes prior to the receipt of an overload\n      report.  Stateful abatement algorithms that base the abatement\n      logic on a history of request messages sent might require reacting\n      nodes to maintain state in advance of receiving an overload report\n      to ensure that the overload reports can be properly handled.\n\n   Reporting nodes are allowed to change the overload abatement\n   algorithm indicated in the OC-Feature-Vector AVP if the reporting\n   node is not currently in an overload condition and sending overload\n   reports.  The reporting node is not allowed to change the overload\n   abatement algorithm while the reporting node 
 is in an overload\n   condition.\n\n   The individual features supported by the DOIC nodes are indicated in\n   the OC-Feature-Vector AVP.  Any semantics associated with the\n   features will be defined in extension specifications that introduce\n   the features.\n\n   The DCA mechanism must also allow the scenario where the set of\n   features supported by the sender of a request and by agents in the\n   path of a request differ.  In this case, the agent can update the OC-\n   Supported-Features AVP to reflect the mixture of the two sets of\n   supported features.\n\n      Note: The logic to determine if the content of the OC-Supported-\n      Features AVP should be changed is out-of-scope for this document,\n      as is the logic to determine the content of a modified OC-\n      Supported-Features AVP.  These are left to implementation\n      decisions.  Care must be taken not to introduce interoperability\n      issues for downstream or upstream DOIC nodes.\n\n3.3.  DOIC Overload
  Condition Reporting\n\n   As with DOIC capability announcement, overload condition reporting\n   uses new AVPs (Section 6.3) to indicate an overload condition.\n\n   The OC-OLR AVP is referred to as an overload report.  The OC-OLR AVP\n   includes the type of report, a sequence number, the length of time\n   that the report is valid and abatement algorithm specific AVPs.\n\n   Two types of overload reports are defined in this document, host\n   reports and realm reports.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                 [Page 9]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A report of type "HOST_REPORT" is sent to indicate the overload of a\n   specific Diameter node for the application-id indicated in the\n   transaction.  When receiving an OLR of type host, a reacting node\n   applies overload abatement to what is referred to in this document as\n   host-routed requests.  The reacting node applies overload abatement\n
    on those host-routed requests which the reacting node knows will be\n   served by the server that matches the Origin-Host AVP of the received\n   message that contained the received OLR of type host.\n\n   A report of type "REALM_REPORT" is sent to indicate the overload of\n   all Diameter nodes within a realm for the application-id indicated in\n   the transaction.  When receiving an OLR of type realm, a reacting\n   node applies overload abatement to what is referred to in this\n   document as realm-routed requests.  The reacting node applies\n   overload abatement on those realm-routed requests which contain a\n   Destination-Realm AVP that matches the Origin-Realm AVP of the\n   received message that contained the received OLR of type realm.\n\n   This document assumes that there is a single source for realm-reports\n   for a given realm, or that if multiple nodes can send realm reports,\n   that each such node has full knowledge of the overload state of the\n   entire realm.
   A reacting node cannot distinguish between receiving\n   realm-reports from a single node, or from multiple nodes.\n\n      Note: Known issues exist if multiple sources for overload reports\n      which apply to the same Diameter entity exist.  Reacting nodes\n      have no way of determining the source and, as such, will treat\n      them as coming from a single source.  Variance in sequence numbers\n      between the two sources can then cause incorrect overload\n      abatement treatment to be applied for indeterminate periods of\n      time.\n\n   Reporting nodes are responsible for determining the need for a\n   reduction of traffic.  The method for making this determination is\n   implementation specific and depend on the type of overload report\n   being generated.  A host-report, for instance, will generally be\n   generated by tracking utilization of resources required by the host\n   to handle transactions for the Diameter application.  A realm-report\n   generally impac
 ts the traffic sent to multiple hosts and, as such,\n   requires tracking the capacity of all servers able to handle realm-\n   routed requests for the application and realm.\n\n   Once a reporting node determines the need for a reduction in traffic,\n   it uses the DOIC defined AVPs to report on the condition.  These AVPs\n   are included in answer messages sent or relayed by the reporting\n   node.  The reporting node indicates the overload abatement algorithm\n   that is to be used to handle the traffic reduction in the OC-\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 10]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Supported-Features AVP.  The OC-OLR AVP is used to communicate\n   information about the requested reduction.\n\n   Reacting nodes, upon receipt of an overload report, are responsible\n   for applying the overload abatement algorithm to traffic impacted by\n   the overload report.  The method use
 d to determine the requests that\n   are to receive overload abatement treatment is dependent on the\n   abatement algorithm.  The loss abatement algorithm is defined in this\n   document (Section 5).  Other abatement algorithms can be defined in\n   extensions to the DOIC solutions.\n\n   Two types of overload abatement treatment are defined, diversion and\n   throttling.  Reacting nodes are responsible for determining which\n   treatment is appropriate for individual requests.\n\n   As the conditions that lead to the generation of the overload report\n   change the reporting node can send new overload reports requesting\n   greater reduction if the condition gets worse or less reduction if\n   the condition improves.  The reporting node sends an overload report\n   with a duration of zero to indicate that the overload condition has\n   ended and abatement is no longer needed.\n\n   The reacting node also determines when the overload report expires\n   based on the OC-Validity-Dura
 tion AVP in the overload report and\n   stops applying the abatement algorithm when the report expires.\n\n3.4.  DOIC Extensibility\n\n   The DOIC solution is designed to be extensible.  This extensibility\n   is based on existing Diameter based extensibility mechanisms, along\n   with the DOIC capability announcement mechanism.\n\n   There are multiple categories of extensions that are expected.  This\n   includes the definition of new overload abatement algorithms, the\n   definition of new report types and the definition of new scopes of\n   messages impacted by an overload report.\n\n   The DOIC solution uses the OC-Supported-Features AVP for DOIC nodes\n   to communicate supported features.  The specific features supported\n   by the DOIC node are indicated in the OC-Feature-Vector AVP.  DOIC\n   extensions that require new normative behavior define new values for\n   the OC-Feature-Vector AVP.  DOIC extensions also have the ability to\n   add new AVPs to the OC-Supported-Featu
 res AVP, if additional\n   information about the new feature is required.\n\n   Reporting nodes use the OC-OLR AVP to communicate overload\n   occurrences.  This AVP can also be extended to add new AVPs allowing\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 11]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   reporting nodes to communicate additional information about handling\n   an overload condition.\n\n   If necessary, new extensions can also define new AVPs that are not\n   part of the OC-Supported-Features and OC-OLR group AVPs.  It is,\n   however, recommended that DOIC extensions use the OC-Supported-\n   Features AVP and OC-OLR AVP to carry all DOIC related AVPs.\n\n3.5.  Simplified Example Architecture\n\n   Figure 1 illustrates the simplified architecture for Diameter\n   overload information conveyance.\n\n\n    Realm X                                  Same or other Realms\n   _--------------------------
 ------------_ _----------------------_\n\n\n      +--^-----+                 : (optional) :\n      _Diameter_                 :            :\n      _Server A_--+     .--.     : +---^----+ :     .--.\n      +--------+  _   _(    _.   : _Diameter_ :   _(    _.   +---^----+\n                  +--(        )--:-_  Agent _-:--(        )--_Diameter_\n      +--------+  _ ( _  .  )  ) : +-----^--+ : ( _  .  )  ) _ Client _\n      _Diameter_--+  _--(___.-\'  :            :  _--(___.-\'  +-----^--+\n      _Server B_                 :            :\n      +---^----+                 :            :\n\n                          End-to-end Overload Indication\n             1)  _-----------------------------------------------_\n                             Diameter Application Y\n\n                  Overload Indication A    Overload Indication A\'\n             2)  _----------------------_ _----------------------_\n                 Diameter Application Y   Diameter Application Y\n\n\n\n     Figure 1:
  Simplified architecture choices for overload indication\n                                 delivery\n\n   In Figure 1, the Diameter overload indication can be conveyed (1)\n   end-to-end between servers and clients or (2) between servers and\n   Diameter agent inside the realm and then between the Diameter agent\n   and the clients.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 12]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.  Solution Procedures\n\n   This section outlines the normative behavior for the DOIC solution.\n\n4.1.  Capability Announcement\n\n   This section defines DOIC Capability Announcement (DCA) behavior.\n\n4.1.1.  Reacting Node Behavior\n\n   A reacting node MUST include the OC-Supported-Features AVP in all\n   requests.  It MAY include the OC-Feature-Vector AVP.  If it does so,\n   it MUST indicate support for the "loss" algorithm.  If the reacting\n   node is configured to support featur
 es (including other algorithms)\n   in addition to the loss algorithm, it MUST indicate such support in\n   an OC-Feature-Vector AVP.\n\n   An OC-Supported-Features AVP in answer messages indicates there is a\n   reporting node for the transaction.  The reacting node MAY take\n   action, for example creating state for some stateful abatement\n   algorithm, based on the features indicated in the OC-Feature-Vector\n   AVP.\n\n      Note: The loss abatement algorithm does not require stateful\n      behavior when there is no active overload report.  This behavior\n      is described in Section 4.2 and Section 5.\n\n4.1.2.  Reporting Node Behavior\n\n   Upon receipt of a request message, a reporting node determines if\n   there is a reacting node for the transaction based on the presence of\n   the OC-Supported-Features AVP in the request message.\n\n   If the request message contains an OC-Supported-Features AVP then a\n   reporting node MUST include the OC-Supported-Features AVP in th
 e\n   answer message for that transaction.\n\n   A reporting node MUST NOT include the OC-Supported-Features AVP, OC-\n   OLR AVP or any other overload control AVPs defined in extension\n   drafts in response messages for transactions where the request\n   message does not include the OC-Supported-Features AVP.  Lack of the\n   OC-Supported-Features AVP in the request message indicates that there\n   is no reacting node for the transaction.\n\n   A reporting node knows what overload control functionality is\n   supported by the reacting node based on the content or absence of the\n   OC-Feature-Vector AVP within the OC-Supported-Features AVP in the\n   request message.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 13]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node MUST indicate support for one and only one abatement\n   algorithm in the OC-Feature-Vector AVP.  The abatement algorithm\n   selected MU
 ST indicate the abatement algorithm the reporting node\n   wants the reacting node to use when the reporting node enters an\n   overload condition.\n\n   The abatement algorithm selected MUST be from the set of abatement\n   algorithms contained in the request message\'s OC-Feature-Vector AVP.\n\n   A reporting node that selects the loss algorithm may do so by\n   including the OC-Feature-Vector AVP with an explicit indication of\n   the loss algorithm, or it MAY omit OC-Feature-Vector.  If it selects\n   a different algorithm, it MUST include the OC-Feature-Vector AVP with\n   an explicit indication of the selected algorithm.\n\n   A reporting node MUST NOT change the selected algorithm during the\n   period of time that starts when entering an overload condition and\n   ends when the associated OCS becomes invalid in all reacting nodes.\n\n   The reporting node MAY change the overload abatement algorithm\n   indicated in the OC-Supported-Features AVP at any time as long as no\n   
 previously sent OLRs may be active.\n\n   The reporting node SHOULD indicate support for other DOIC features\n   defined in extension drafts that it supports and that apply to the\n   transaction.\n\n      Note: Not all DOIC features will apply to all Diameter\n      applications or deployment scenarios.  The features included in\n      the OC-Feature-Vector AVP are based on local reporting node\n      policy.\n\n4.1.3.  Agent Behavior\n\n   Diameter Agents that support DOIC SHOULD ensure that all messages\n   relayed by the agent contain the OC-Supported-Features AVP.\n\n   A Diameter Agent SHOULD take on reacting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reacting node\n   behavior when there is no OC-Supported-Features AVP in a request\n   message.\n\n   For a Diameter Agent to be a reacting node for a non supporting\n   Diameter endpoint, the Diameter Agent MUST incl
 ude the OC-Supported-\n   Features AVP in request messages it receives that do not contain the\n   OC-Supported-Features AVP.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 14]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A Diameter Agent SHOULD take on reporting node behavior for Diameter\n   endpoints that do not support the DOIC solution.  A Diameter Agent\n   detects that a Diameter endpoint does not support DOIC reporting node\n   behavior when there is no OC-Supported-Features AVP in an answer\n   message for a transaction that contained the OC-Supported-Features\n   AVP in the request message.\n\n   For a Diameter Agent to take on reporting node behavior for a non\n   supporting Diameter endpoint the Diameter Agent MUST include the OC-\n   Supported-Features AVP in answer messages it receives that do not\n   contain the OC-Supported-Features AVP.\n\n   As with a Diameter endpoint taking on reporting node b
 ehavior, a\n   Diameter Agent MUST NOT include the OC-Supported-Features AVP in\n   answer messages for transactions where the request message received\n   by the Diameter Agent had no OC-Supported-Features AVP.\n\n   If a request message already has the OC-Supported-Features AVP then a\n   Diameter Agent MAY leave it unchanged in the relayed message or MAY\n   modify it to reflect the features appropriate for the transaction.\n\n      For instance, if the agent supports a superset of the features\n      reported by the reacting node then the agent might choose, based\n      on local policy, to advertise that superset of features to the\n      reporting node.\n\n   If the Diameter Agent changes the OC-Supported-Features AVP in a\n   request message then it is likely it will also need to modify the OC-\n   Supported-Features AVP in the answer message for the transaction.  As\n   such, a Diameter Agent MAY modify the OC-Supported-Features AVP\n   carried in answer messages.\n\n   When
  making changes to the OC-Supported-Features AVP the Diameter\n   Agent needs to ensure that there is no ambiguity in DOIC behavior for\n   both upstream and downstream DOIC nodes.\n\n4.2.  Overload Report Processing\n\n4.2.1.  Overload Control State\n\n   Both reacting and reporting nodes maintain Overload Control State\n   (OCS) for active overload conditions.  The following sections define\n   behavior associated with that OCS.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 15]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.2.1.1.  Overload Control State for Reacting Nodes\n\n   A reacting node SHOULD maintain the following OCS per supported\n   Diameter application:\n\n   o  A host-type OCS entry for each Destination-Host to which it sends\n      host-type requests and\n\n   o  A realm-type OCS entry for each Destination-Realm to which it\n      sends realm-type requests.\n\n   A host-type OCS entry is i
 dentified by the pair of application-id and\n   the node\'s DiameterIdentity.\n\n   A realm-type OCS entry is identified by the pair of application-id\n   and realm.\n\n   The host-type and realm-type OCS entries MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number (as received in OC-OLR)\n\n   o  Time of expiry (derived from OC-Validity-Duration AVP received in\n      the OC-OLR AVP and time of reception of the message carrying OC-\n      OLR AVP)\n\n   o  Selected Abatement Algorithm (as received in the OC-Supported-\n      Features AVP)\n\n   o  Abatement Algorithm specific input data (as received in the OC-OLR\n      AVP, for example, OC-Reduction-Percentage for the Loss abatement\n      algorithm)\n\n4.2.1.2.  Overload Control State for Reporting Nodes\n\n   A reporting node SHOULD maintain OCS entries per supported Diameter\n   application, per supported (and eventually selected) Abatement\n   Alg
 orithm and per report-type.\n\n   An OCS entry is identified by the tuple of Application-Id, Report-\n   Type and Abatement Algorithm and MAY include the following\n   information (the actual information stored is an implementation\n   decision):\n\n   o  Sequence number\n\n   o  Validity Duration\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 16]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   o  Expiration Time\n\n   o  Algorithm specific input data (for example, the Reduction\n      Percentage for the Loss Abatement Algorithm)\n\n4.2.1.3.  Reacting Node Maintenance of Overload Control State\n\n   When a reacting node receives an OC-OLR AVP, it MUST determine if it\n   is for an existing or new overload condition.\n\n      Note: For the remainder of this section the term OLR refers to the\n      combination of the contents of the received OC-OLR AVP and the\n      abatement algorithm indicated in the received OC-Sup
 ported-\n      Features AVP.\n\n   When receiving an answer message with multiple OLRs of different\n   supported report types, a reporting node MUST process each received\n   OLR.\n\n   When receiving an OC-OLR AVPs with unknown values, a reacting node\n   SHOULD be silently discarded by reacting nodes and the event SHOULD\n   be logged.\n\n   The OLR is for an existing overload condition if a reacting node has\n   an OCS that matches the received OLR.\n\n   For a host-report this means it matches the application-id and the\n   host\'s DiameterIdentity in an existing host OCS entry.\n\n   For a realm-report this means it matches the application-id and the\n   realm in an existing realm OCS entry.\n\n   If the OLR is for an existing overload condition then a reacting node\n   MUST determine if the OLR is a retransmission or an update to the\n   existing OLR.\n\n   If the sequence number for the received OLR is greater than the\n   sequence number stored in the matching OCS entry the
 n a reacting node\n   MUST update the matching OCS entry.\n\n   If the sequence number for the received OLR is less than or equal to\n   the sequence number in the matching OCS entry then a reacting node\n   MUST silently ignore the received OLR.  The matching OCS MUST NOT be\n   updated in this case.\n\n   If the received OLR is for a new overload condition then a reacting\n   node MUST generate a new OCS entry for the overload condition.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 17]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   For a host-report this means a reacting node creates on OCS entry\n   with the application-id in the received message and DiameterIdentity\n   of the Origin-Host in the received message.\n\n      Note: This solution assumes that the Origin-Host AVP in the answer\n      message included by the reporting node is not changed along the\n      path to the reacting node.\n\n   For a realm-
 report this means a reacting node creates on OCS entry\n   with the application-id in the received message and realm of the\n   Origin-Realm in the received message.\n\n   If the received OLR contains a validity duration of zero ("0") then a\n   reacting node MUST update the OCS entry as being expired.\n\n      Note: It is not necessarily appropriate to delete the OCS entry,\n      as there is recommended behavior that the reacting node slowly\n      returns to full traffic when ending an overload abatement period.\n\n   The reacting node does not delete an OCS when receiving an answer\n   message that does not contain an OC-OLR AVP (i.e. absence of OLR\n   means "no change").\n\n4.2.1.4.  Reporting Node Maintenance of Overload Control State\n\n   A reporting node SHOULD create a new OCS entry when entering an\n   overload condition.\n\n      Note: If a reporting node knows through absence of the OC-\n      Supported-Features AVP in received messages that there are no\n      reactin
 g nodes supporting DOIC then the reporting node can choose\n      to not create OCS entries.\n\n   When generating a new OCS entry the sequence number SHOULD be set to\n   zero ("0").\n\n   When generating sequence numbers for new overload conditions, the new\n   sequence number MUST be greater than any sequence number in an active\n   (unexpired) overload report for the same application and report-type\n   previously sent by the reporting node.  This property MUST hold over\n   a reboot of the reporting node.\n\n      Note: One way of addressing this over a reboot of a reporting node\n      is to use a time stamp for the first overload condition that\n      occurs after the report and to start using sequence numbers of\n      zero for subsequent overload conditions.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 18]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   A reporting node MUST update an OCS entry when it 
 needs to adjust the\n   validity duration of the overload condition at reacting nodes.\n\n      For instance, if a reporting node wishes to instruct reacting\n      nodes to continue overload abatement for a longer period of time\n      than originally communicated.  This also applies if the reporting\n      node wishes to shorten the period of time that overload abatement\n      is to continue.\n\n   A reporting node MUST NOT update the abatement algorithm in an active\n   OCS entry.\n\n   A reporting node MUST update an OCS entry when it wishes to adjust\n   any abatement algorithm specific parameters, including the reduction\n   percentage used for the Loss abatement algorithm.\n\n      For instance, if a reporting node wishes to change the reduction\n      percentage either higher, if the overload condition has worsened,\n      or lower, if the overload condition has improved, then the\n      reporting node would update the appropriate OCS entry.\n\n   A reporting node MUST upda
 te the sequence number associated with the\n   OCS entry anytime the contents of the OCS entry are changed.  This\n   will result in a new sequence number being sent to reacting nodes,\n   instructing reacting nodes to process the OC-OLR AVP.\n\n   A reporting node SHOULD update an OCS entry with a validity duration\n   of zero ("0") when the overload condition ends.\n\n      Note: If a reporting node knows that the OCS entries in the\n      reacting nodes are near expiration then the reporting node might\n      decide not to send an OLR with a validity duration of zero.\n\n   A reporting node MUST keep an OCS entry with a validity duration of\n   zero ("0") for a period of time long enough to ensure that any non-\n   expired reacting node\'s OCS entry created as a result of the overload\n   condition in the reporting node is deleted.\n\n4.2.2.  Reacting Node Behavior\n\n   When a reacting node sends a request it MUST determine if that\n   request matches an active OCS.\n\n   If the
  request matches an active OCS then the reacting node MUST use\n   the overload abatement algorithm indicated in the OCS to determine if\n   the request is to receive overload abatement treatment.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 19]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   For the Loss abatement algorithm defined in this specification, see\n   Section 5 for the overload abatement algorithm logic applied.\n\n   If the overload abatement algorithm selects the request for overload\n   abatement treatment then the reacting node MUST apply overload\n   abatement treatment on the request.  The abatement treatment applied\n   depends on the context of the request.\n\n   If the request is a host-routed request then the reacting node SHOULD\n   apply throttling abatement treatment to the request.\n\n   If the request is a realm-routed request then the reacting node\n   SHOULD apply diversion abatement
  treatment to the request.\n\n   If the overload abatement treatment results in throttling of the\n   request and if the reacting node is an agent then the agent MUST send\n   an appropriate error as defined in Section 7.\n\n   The behavior of reacting nodes that are Diameter endpoints when\n   throttling requests depends on the application and is outside the\n   scope of this specification.\n\n   In the case that the OCS entry indicated no traffic was to be sent to\n   the overloaded entity and the validity duration expires then overload\n   abatement associated with the overload report MUST be ended in a\n   controlled fashion.\n\n4.2.3.  Reporting Node Behavior\n\n   If there is an active OCS entry then a reporting node SHOULD include\n   the OC-OLR AVP in all answer messages to requests that contain the\n   OC-Supported-Features AVP and that match the active OCS entry.\n\n      Note: A request matches if the application-id in the request\n      matches the application-id in any 
 active OCS entry and if the\n      report-type in the OCS entry matches a report-type supported by\n      the reporting node as indicated in the OC-Supported-Features AVP.\n\n   The contents of the OC-OLR AVP depend on the selected algorithm.\n\n   A reporting node MAY choose to not resend an overload report to a\n   reacting node if it can guarantee that this overload report is\n   already active in the reacting node.\n\n      Note: In some cases (e.g. when there are one or more agents in the\n      path between reporting and reacting nodes, or when overload\n      reports are discarded by reacting nodes) a reporting node may not\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 20]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      be able to guarantee that the reacting node has received the\n      report.\n\n   A reporting node MUST NOT send overload reports of a type that has\n   not been advertised as supported by
  the reacting node.\n\n      Note: A reacting node implicitly advertises support for the host\n      and realm report types by including the OC-Supported-Features AVP\n      in the request.  Support for other report types will be explicitly\n      indicated by new feature bits in the OC-Feature-Vector AVP.\n\n   A reporting node MAY rely on the OC-Validity-Duration AVP values for\n   the implicit overload control state cleanup on the reacting node.\n\n   A reporting node SHOULD explicitly indicate the end of an overload\n   occurrence by sending a new OLR with OC-Validity-Duration set to a\n   value of zero ("0").  The reporting node SHOULD ensure that all\n   reacting nodes receive the updated overload report.\n\n      Note: All OLRs sent have an expiration time calculated by adding\n      the validity-duration contained in the OLR to the time the message\n      was sent.  Transit time for the OLR can be safely ignored.  The\n      reporting node can ensure that all reacting nodes 
 have received\n      the OLR by continuing to send it in answer messages until the\n      expiration time for all OLRs sent for that overload condition have\n      expired.\n\n   When a reporting node sends an OLR, it effectively delegates any\n   necessary throttling to downstream nodes.  If the reporting node also\n   locally throttles the same set of messages, the overall number of\n   throttled requests may be higher than intended.  Therefore, before\n   applying local message throttling, a reporting node needs to check if\n   these messages match existing OCS entries, indicating that these\n   messages have survived throttling applied by downstream nodes that\n   have received the related OLR.\n\n   However, even if the set of messages match existing OCS entries, the\n   reporting node can still apply other abatement methods such as\n   diversion.  The reporting node might also need to throttle requests\n   for reasons other than overload.  For example, an agent or server\n   m
 ight have a configured rate limit for each client, and throttle\n   requests that exceed that limit, even if such requests had already\n   been candidates for throttling by downstream nodes.  The reporting\n   node also has the option to send new OLRs requesting greater\n   reductions in traffic, reducing the need for local throttling.\n\n   A reporting node SHOULD decrease requested overload abatement\n   treatment in a controlled fashion to avoid oscillations in traffic.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 21]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n4.3.  Protocol Extensibility\n\n   The DOIC solution can be extended.  Types of potential extensions\n   include new traffic abatement algorithms, new report types or other\n   new functionality.\n\n   When defining a new extension that requires new normative behavior,\n   the specification MUST define a new feature for the OC-Feature-\n   Vector.  This f
 eature bit is used to communicate support for the new\n   feature.\n\n   The extension MAY define new AVPs for use in DOIC Capability\n   Announcement and for use in DOIC Overload reporting.  These new AVPs\n   SHOULD be defined to be extensions to the OC-Supported-Features or\n   OC-OLR AVPs defined in this document.\n\n   [RFC6733] defined Grouped AVP extension mechanisms apply.  This\n   allows, for example, defining a new feature that is mandatory to be\n   understood even when piggybacked on an existing application.\n\n   The handling of feature bits in the OC-Feature-Vector AVP that are\n   not associated with overload abatement algorithms MUST be specified\n   by the extensions that define the features.\n\n   When defining new report type values, the corresponding specification\n   MUST define the semantics of the new report types and how they affect\n   the OC-OLR AVP handling.  The specification MUST also reserve a\n   corresponding new feature bit in the OC-Feature-Vector 
 AVP.\n\n   The OC-OLR AVP can be expanded with optional sub-AVPs only if a\n   legacy DOIC implementation can safely ignore them without breaking\n   backward compatibility for the given OC-Report-Type AVP value.  If\n   the new sub-AVPs imply new semantics for handling the indicated\n   report type, then a new OC-Report-Type AVP value MUST be defined.\n\n   Documents that introduce new report types MUST describe any\n   limitations on their use across non-supporting agents.\n\n   New features (feature bits in the OC-Feature-Vector AVP) and report\n   types (in the OC-Report-Type AVP) MUST be registered with IANA.  As\n   with any Diameter specification, RFC6733 requires all new AVPs to be\n   registered with IANA.  See Section 8 for the required procedures.\n\n5.  Loss Algorithm\n\n   This section documents the Diameter overload loss abatement\n   algorithm.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 22]\n_\nInternet-Draft                    DOIC 
                     December 2014\n\n\n5.1.  Overview\n\n   The DOIC specification supports the ability for multiple overload\n   abatement algorithms to be specified.  The abatement algorithm used\n   for any instance of overload is determined by the Diameter Overload\n   Capability Announcement process documented in Section 4.1.\n\n   The loss algorithm described in this section is the default algorithm\n   that must be supported by all Diameter nodes that support DOIC.\n\n   The loss algorithm is designed to be a straightforward and stateless\n   overload abatement algorithm.  It is used by reporting nodes to\n   request a percentage reduction in the amount of traffic sent.  The\n   traffic impacted by the requested reduction depends on the type of\n   overload report.\n\n   Reporting nodes use a strategy of applying abatement logic to the\n   requested percentage of request messages sent (or handled in the case\n   of agents) by the reacting node that are impacted by the overloa
 d\n   report.\n\n   From a conceptual level, the logic at the reacting node could be\n   outlined as follows.\n\n   1.  An overload report is received and the associated OCS is either\n       saved or updated (if required) by the reacting node.\n\n   2.  A new Diameter request is generated by the application running on\n       the reacting node.\n\n   3.  The reacting node determines that an active overload report\n       applies to the request, as indicated by the corresponding OCS\n       entry.\n\n   4.  The reacting node determines if overload abatement treatment\n       should be applied to the request.  One approach that could be\n       taken for each request is to select a random number between 1 and\n       100.  If the random number is less than or equal to the indicated\n       reduction percentage then the request is given abatement\n       treatment, otherwise the request is given normal routing\n       treatment.\n\n5.2.  Reporting Node Behavior\n\n   The method a repo
 rting node uses to determine the amount of traffic\n   reduction required to address an overload condition is an\n   implementation decision.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 23]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   When a reporting node that has selected the loss abatement algorithm\n   determines the need to request a reduction in traffic, it includes an\n   OC-OLR AVP in response messages as described in Section 4.2.3.\n\n   When sending the OC-OLR AVP, the reporting node MUST indicate a\n   percentage reduction in the OC-Reduction-Percentage AVP.\n\n   The reporting node MAY change the reduction percentage in subsequent\n   overload reports.  When doing so the reporting node must conform to\n   overload report handing specified in Section 4.2.3.\n\n5.3.  Reacting Node Behavior\n\n   The method a reacting node uses to determine which request messages\n   are given abatement treatment is a
 n implementation decision.\n\n   When receiving an OC-OLR in an answer message where the algorithm\n   indicated in the OC-Supported-Features AVP is the loss algorithm, the\n   reacting node MUST apply abatement treatment to the requested\n   percentage of request messages sent.\n\n      Note: The loss algorithm is a stateless algorithm.  As a result,\n      the reacting node does not guarantee that there will be an\n      absolute reduction in traffic sent.  Rather, it guarantees that\n      the requested percentage of new requests will be given abatement\n      treatment.\n\n   When applying overload abatement treatment for the loss abatement\n   algorithm, the reacting node MUST abate the requested percentage of\n   requests that would have otherwise been sent to the reporting host or\n   realm.\n\n   If reacting node comes out of the 100 percent traffic reduction as a\n   result of the overload report timing out, the following concerns are\n   RECOMMENDED to be applied.  The rea
 cting node sending the traffic\n   should be conservative and, for example, first send "probe" messages\n   to learn the overload condition of the overloaded node before\n   converging to any traffic amount/rate decided by the sender.  Similar\n   concerns apply in all cases when the overload report times out unless\n   the previous overload report stated 0 percent reduction.\n\n   If the reacting node does not receive an OLR in response to messages\n   sent to the formerly overloaded node then the reacting node SHOULD\n   slowly increase the rate of traffic sent to the overloaded node.\n\n   When an active overload report expires, it is suggested that the\n   reacting node progressively decrease the amount of traffic given\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 24]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   abatement treatment, until the reduction is completely removed and no\n   traffic is given abate
 ment treatment.\n\n      The goal of this behavior is to reduce the probability of overload\n      condition thrashing where an immediate transition from 100_\n      reduction to 0_ reduction results in the reporting node moving\n      quickly back into an overload condition.\n\n6.  Attribute Value Pairs\n\n   This section describes the encoding and semantics of the Diameter\n   Overload Indication Attribute Value Pairs (AVPs) defined in this\n   document.\n\n   A new application specification can incorporate the overload control\n   mechanism specified in this document by making it mandatory to\n   implement for the application and referencing this specification\n   normatively.  It is the responsibility of the Diameter application\n   designers to define how overload control mechanisms works on that\n   application.\n\n6.1.  OC-Supported-Features AVP\n\n   The OC-Supported-Features AVP (AVP code TBD1) is of type Grouped and\n   serves two purposes.  First, it announces a node\'s s
 upport for the\n   DOIC solution in general.  Second, it contains the description of the\n   supported DOIC features of the sending node.  The OC-Supported-\n   Features AVP MUST be included in every Diameter request message a\n   DOIC supporting node sends.\n\n      OC-Supported-Features ::= _ AVP Header: TBD1 _\n                                [ OC-Feature-Vector ]\n                              * [ AVP ]\n\n\n6.2.  OC-Feature-Vector AVP\n\n   The OC-Feature-Vector AVP (AVP code TBD6) is of type Unsigned64 and\n   contains a 64 bit flags field of announced capabilities of a DOIC\n   node.  The value of zero (0) is reserved.\n\n   The OC-Feature-Vector sub-AVP is used to announce the DOIC features\n   supported by the DOIC node, in the form of a flag-bits field in which\n   each bit announces one feature or capability supported by the node.\n   The absence of the OC-Feature-Vector AVP in request messages\n   indicates that only the default traffic abatement algorithm described\n   
 in this specification is supported.  The absence of the OC- Feature-\n   Vector AVP in answer messages indicates that the default traffic\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 25]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   abatement algorithm described in this specification is selected\n   (while other traffic abatement algorithms may be supported), and no\n   features other than abatement algorithms are supported.\n\n   The following capabilities are defined in this document:\n\n   OLR_DEFAULT_ALGO (0x0000000000000001)\n\n      When this flag is set by the a DOIC reacting node it means that\n      the default traffic abatement (loss) algorithm is supported.  When\n      this flag is set by a DOIC reporting node it means that the loss\n      algorithm will be used for requested overload abatement.\n\n6.3.  OC-OLR AVP\n\n   The OC-OLR AVP (AVP code TBD2) is of type Grouped and contains the\n   information
  necessary to convey an overload report on an overload\n   condition at the reporting node.  The OC-OLR AVP does not explicitly\n   contain all information needed by the reacting node to decide whether\n   a subsequent request must undergo abatement using the selected\n   abatement algorithm.  The value of the OC-Report-Type AVP within the\n   OC-OLR AVP indicates which implicit information is relevant for this\n   decision (see Section 6.6).  The application the OC-OLR AVP applies\n   to is the same as the Application-Id found in the Diameter message\n   header.  The host or realm the OC-OLR AVP concerns is determined from\n   the Origin-Host AVP and/or Origin-Realm AVP found in the\n   encapsulating Diameter command.  The OC-OLR AVP is intended to be\n   sent only by a reporting node.\n\n      OC-OLR ::= _ AVP Header: TBD2 _\n                 _ OC-Sequence-Number _\n                 _ OC-Report-Type _\n                 [ OC-Reduction-Percentage ]\n                 [ OC-Validity-Du
 ration ]\n               * [ AVP ]\n\n\n6.4.  OC-Sequence-Number AVP\n\n   The OC-Sequence-Number AVP (AVP code TBD3) is of type Unsigned64.\n   Its usage in the context of overload control is described in\n   Section 4.2.\n\n   From the functionality point of view, the OC-Sequence-Number AVP is\n   used as a non-volatile increasing counter for a sequence of overload\n   reports between two DOIC nodes for the same overload occurrence.  The\n   sequence number is only required to be unique between two DOIC nodes.\n   Sequence numbers are treated in a uni-directional manner, i.e. two\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 26]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   sequence numbers on each direction between two DOIC nodes are not\n   related or correlated.\n\n6.5.  OC-Validity-Duration AVP\n\n   The OC-Validity-Duration AVP (AVP code TBD4) is of type Unsigned32\n   and indicates in milliseconds the valid
 ity time of the overload\n   report.  The number of milliseconds is measured after reception of\n   the first OC-OLR AVP with a given value of OC-Sequence-Number AVP.\n   The default value for the OC-Validity-Duration AVP is 30000 (i.e.; 30\n   seconds).  When the OC-Validity-Duration AVP is not present in the\n   OC-OLR AVP, the default value applies.\n\n6.6.  OC-Report-Type AVP\n\n   The OC-Report-Type AVP (AVP code TBD5) is of type Enumerated.  The\n   value of the AVP describes what the overload report concerns.  The\n   following values are initially defined:\n\n   HOST_REPORT 0  The overload report is for a host.  Overload abatement\n      treatment applies to host-routed requests.\n\n   REALM_REPORT 1  The overload report is for a realm.  Overload\n      abatement treatment applies to realm-routed requests.\n\n6.7.  OC-Reduction-Percentage AVP\n\n   The OC-Reduction-Percentage AVP (AVP code TBD8) is of type Unsigned32\n   and describes the percentage of the traffic that the s
 ender is\n   requested to reduce, compared to what it otherwise would send.  The\n   OC-Reduction-Percentage AVP applies to the default (loss) algorithm\n   specified in this specification.  However, the AVP can be reused for\n   future abatement algorithms, if its semantics fit into the new\n   algorithm.\n\n   The value of the Reduction-Percentage AVP is between zero (0) and one\n   hundred (100).  Values greater than 100 are ignored.  The value of\n   100 means that all traffic is to be throttled, i.e. the reporting\n   node is under a severe load and ceases to process any new messages.\n   The value of 0 means that the reporting node is in a stable state and\n   has no need for the reacting node to apply any traffic abatement.\n   The default value of the OC-Reduction-Percentage AVP is 0.  When the\n   OC-Reduction-Percentage AVP is not present in the overload report,\n   the default value applies.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Pa
 ge 27]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n6.8.  Attribute Value Pair flag rules\n\n                                                         +---------+\n                                                         _AVP flag _\n                                                         _rules    _\n                                                         +----+----+\n                              AVP   Section              _    _MUST_\n       Attribute Name         Code  Defined  Value Type  _MUST_ NOT_\n      +--------------------------------------------------+----+----+\n      _OC-Supported-Features  TBD1  6.1      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-OLR                 TBD2  6.3      Grouped     _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Sequence-Number     TBD3  6.4      Unsigned64  _    _ V  _\n      +--------------------
 ------------------------------+----+----+\n      _OC-Validity-Duration   TBD4  6.5      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Report-Type         TBD5  6.6      Enumerated  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Reduction                                      _    _    _\n      _  -Percentage          TBD8  6.7      Unsigned32  _    _ V  _\n      +--------------------------------------------------+----+----+\n      _OC-Feature-Vector      TBD6  6.2      Unsigned64  _    _ V  _\n      +--------------------------------------------------+----+----+\n\n\n   As described in the Diameter base protocol [RFC6733], the M-bit usage\n   for a given AVP in a given command may be defined by the application.\n\n7.  Error Response Codes\n\n   When a DOIC node rejects a Diameter request due to overload, the DOIC\n   node MUST select an appropriate error response code.  This\n   de
 termination is made based on the probability of the request\n   succeeding if retried on a different path.\n\n   A reporting node rejecting a Diameter request due to an overload\n   condition SHOULD send a DIAMETER_TOO_BUSY error response, if it can\n   assume that the same request may succeed on a different path.\n\n   If a reporting node knows or assumes that the same request will not\n   succeed on a different path, DIAMETER_UNABLE_TO_COMPLY error response\n   SHOULD be used.  Retrying would consume valuable resources during an\n   occurrence of overload.\n\n      For instance, if the request arrived at the reporting node without\n      a Destination-Host AVP then the reporting node might determine\n      that there is an alternative Diameter node that could successfully\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 28]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      process the request and that retrying the tr
 ansaction would not\n      negatively impact the reporting node.  DIAMETER_TOO_BUSY would be\n      sent in this case.\n\n      If the request arrived at the reporting node with a Destination-\n      Host AVP populated with its own Diameter identity then the\n      reporting node can assume that retrying the request would result\n      in it coming to the same reporting node.\n      DIAMETER_UNABLE_TO_COMPLY would be sent in this case.\n\n      A second example is when an agent that supports the DOIC solution\n      is performing the role of a reacting node for a non supporting\n      client.  Requests that are rejected as a result of DOIC throttling\n      by the agent in this scenario would generally be rejected with a\n      DIAMETER_UNABLE_TO_COMPLY response code.\n\n8.  IANA Considerations\n\n8.1.  AVP codes\n\n   New AVPs defined by this specification are listed in Section 6.  All\n   AVP codes are allocated from the \'Authentication, Authorization, and\n   Accounting (AAA) Pa
 rameters\' AVP Codes registry.\n\n8.2.  New registries\n\n   Two new registries are needed under the \'Authentication,\n   Authorization, and Accounting (AAA) Parameters\' registry.\n\n   A new "Overload Control Feature Vector" registry is required.  The\n   registry must contain the following:\n\n      Feature Vector Value\n\n      Specification - the specification that defines the new value.\n\n   See Section 6.2 for the initial Feature Vector Value in the registry.\n   This specification is the specification defining the value.  New\n   values can be added into the registry using the Specification\n   Required policy.  [RFC5226].\n\n   A new "Overload Report Type" registry is required.  The registry must\n   contain the following:\n\n      Report Type Value\n\n      Specification - the specification that defines the new value.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 29]\n_\nInternet-Draft                    DOIC                     December 2
 014\n\n\n   See Section 6.6 for the initial assignment in the registry.  New\n   types can be added using the Specification Required policy [RFC5226].\n\n9.  Security Considerations\n\n   DOIC gives Diameter nodes the ability to request that downstream\n   nodes send fewer Diameter requests.  Nodes do this by exchanging\n   overload reports that directly effect this reduction.  This exchange\n   is potentially subject to multiple methods of attack, and has the\n   potential to be used as a Denial-of-Service (DoS) attack vector.\n\n   Overload reports may contain information about the topology and\n   current status of a Diameter network.  This information is\n   potentially sensitive.  Network operators may wish to control\n   disclosure of overload reports to unauthorized parties to avoid its\n   use for competitive intelligence or to target attacks.\n\n   Diameter does not include features to provide end-to-end\n   authentication, integrity protection, or confidentiality.  This ma
 y\n   cause complications when sending overload reports between non-\n   adjacent nodes.\n\n9.1.  Potential Threat Modes\n\n   The Diameter protocol involves transactions in the form of requests\n   and answers exchanged between clients and servers.  These clients and\n   servers may be peers, that is, they may share a direct transport\n   (e.g.  TCP or SCTP) connection, or the messages may traverse one or\n   more intermediaries, known as Diameter Agents.  Diameter nodes use\n   TLS, DTLS, or IPsec to authenticate peers, and to provide\n   confidentiality and integrity protection of traffic between peers.\n   Nodes can make authorization decisions based on the peer identities\n   authenticated at the transport layer.\n\n   When agents are involved, this presents an effectively transitive\n   trust model.  That is, a Diameter client or server can authorize an\n   agent for certain actions, but it must trust that agent to make\n   appropriate authorization decisions about its peers, 
 and so on.\n   Since confidentiality and integrity protection occurs at the\n   transport layer, agents can read, and perhaps modify, any part of a\n   Diameter message, including an overload report.\n\n   There are several ways an attacker might attempt to exploit the\n   overload control mechanism.  An unauthorized third party might inject\n   an overload report into the network.  If this third party is upstream\n   of an agent, and that agent fails to apply proper authorization\n   policies, downstream nodes may mistakenly trust the report.  This\n   attack is at least partially mitigated by the assumption that nodes\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 30]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   include overload reports in Diameter answers but not in requests.\n   This requires an attacker to have knowledge of the original request\n   in order to construct an answer.  Such an answer would also ne
 ed to\n   arrive at a Diameter node via a protected transport connection.\n   Therefore, implementations MUST validate that an answer containing an\n   overload report is a properly constructed response to a pending\n   request prior to acting on the overload report, and that the answer\n   was received via an appropriate transport connection.\n\n   A similar attack involves a compromised but otherwise authorized node\n   that sends an inappropriate overload report.  For example, a server\n   for the realm "example.com" might send an overload report indicating\n   that a competitor\'s realm "example.net" is overloaded.  If other\n   nodes act on the report, they may falsely believe that "example.net"\n   is overloaded, effectively reducing that realm\'s capacity.\n   Therefore, it\'s critical that nodes validate that an overload report\n   received from a peer actually falls within that peer\'s responsibility\n   before acting on the report or forwarding the report to other peers.\n
    For example, an overload report from a peer that applies to a realm\n   not handled by that peer is suspect.\n\n      This attack is partially mitigated by the fact that the\n      application, as well as host and realm, for a given OLR is\n      determined implicitly by respective AVPs in the enclosing answer.\n      If a reporting node modifies any of those AVPs, the enclosing\n      transaction will also be affected.\n\n9.2.  Denial of Service Attacks\n\n   Diameter overload reports, especially realm-reports, can cause a node\n   to cease sending some or all Diameter requests for an extended\n   period.  This makes them a tempting vector for DoS attacks.\n   Furthermore, since Diameter is almost always used in support of other\n   protocols, a DoS attack on Diameter is likely to impact those\n   protocols as well.  Therefore, Diameter nodes MUST NOT honor or\n   forward OLRs received from peers that are not trusted to send them.\n\n   An attacker might use the information in a
 n OLR to assist in DoS\n   attacks.  For example, an attacker could use information about\n   current overload conditions to time an attack for maximum effect, or\n   use subsequent overload reports as a feedback mechanism to learn the\n   results of a previous or ongoing attack.  Operators need the ability\n   to ensure that OLRs are not leaked to untrusted parties.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 31]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n9.3.  Non-Compliant Nodes\n\n   In the absence of an overload control mechanism, Diameter nodes need\n   to implement strategies to protect themselves from floods of\n   requests, and to make sure that a disproportionate load from one\n   source does not prevent other sources from receiving service.  For\n   example, a Diameter server might throttle a certain percentage of\n   requests from sources that exceed certain limits.  Overload control\n   can
  be thought of as an optimization for such strategies, where\n   downstream nodes never send the excess requests in the first place.\n   However, the presence of an overload control mechanism does not\n   remove the need for these other protection strategies.\n\n   When a Diameter node sends an overload report, it cannot assume that\n   all nodes will comply, even if they indicate support for DOIC.  A\n   non-compliant node might continue to send requests with no reduction\n   in load.  Such non-compliance could be done accidentally, or\n   maliciously to gain an unfair advantage over compliant nodes.\n   Requirement 28 [RFC7068] indicates that the overload control solution\n   cannot assume that all Diameter nodes in a network are trusted, and\n   that malicious nodes not be allowed to take advantage of the overload\n   control mechanism to get more than their fair share of service.\n\n9.4.  End-to End-Security Issues\n\n   The lack of end-to-end integrity features makes it difficu
 lt to\n   establish trust in overload reports received from non-adjacent nodes.\n   Any agents in the message path may insert or modify overload reports.\n   Nodes must trust that their adjacent peers perform proper checks on\n   overload reports from their peers, and so on, creating a transitive-\n   trust requirement extending for potentially long chains of nodes.\n   Network operators must determine if this transitive trust requirement\n   is acceptable for their deployments.  Nodes supporting Diameter\n   overload control MUST give operators the ability to select which\n   peers are trusted to deliver overload reports, and whether they are\n   trusted to forward overload reports from non-adjacent nodes.  DOIC\n   nodes MUST strip DOIC AVPs from messages received from peers that are\n   not trusted for DOIC purposes.\n\n   The lack of end-to-end confidentiality protection means that any\n   Diameter agent in the path of an overload report can view the\n   contents of that report.
   In addition to the requirement to select\n   which peers are trusted to send overload reports, operators MUST be\n   able to select which peers are authorized to receive reports.  A node\n   MUST not send an overload report to a peer not authorized to receive\n   it.  Furthermore, an agent MUST remove any overload reports that\n   might have been inserted by other nodes before forwarding a Diameter\n   message to a peer that is not authorized to receive overload reports.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 32]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      A DOIC node cannot always automatically detect that a peer also\n      supports DOIC.  For example, a node might have a peer that is a\n      non-supporting agent.  If nodes on the other side of that agent\n      send OC-Supported-Features AVPs, the agent is likely to forward\n      them as unknown AVPs.  Messages received across the non-supporting\
 n      agent may be indistinguishable from messages received across a\n      DOIC supporting agent, giving the false impression that the non-\n      supporting agent actually supports DOIC.  This complicates the\n      transitive-trust nature of DOIC.  Operators need to be careful to\n      avoid situations where a non-supporting agent is mistakenly\n      trusted to enforce DOIC related authorization policies.\n\n   At the time of this writing, the DIME working group is studying\n   requirements for adding end-to-end security features\n   [I-D.ietf-dime-e2e-sec-req] to Diameter.  These features, when they\n   become available, might make it easier to establish trust in non-\n   adjacent nodes for overload control purposes.  Readers should be\n   reminded, however, that the overload control mechanism encourages\n   Diameter agents to modify AVPs in, or insert additional AVPs into,\n   existing messages that are originated by other nodes.  If end-to-end\n   security is enabled, there
  is a risk that such modification could\n   violate integrity protection.  The details of using any future\n   Diameter end-to-end security mechanism with overload control will\n   require careful consideration, and are beyond the scope of this\n   document.\n\n10.  Contributors\n\n   The following people contributed substantial ideas, feedback, and\n   discussion to this document:\n\n   o  Eric McMurry\n\n   o  Hannes Tschofenig\n\n   o  Ulrich Wiehe\n\n   o  Jean-Jacques Trottin\n\n   o  Maria Cruz Bartolome\n\n   o  Martin Dolly\n\n   o  Nirav Salot\n\n   o  Susan Shishufeng\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 33]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n11.  References\n\n11.1.  Normative References\n\n   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate\n              Requirement Levels", BCP 14, RFC 2119, March 1997.\n\n   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for W
 riting an\n              IANA Considerations Section in RFCs", BCP 26, RFC 5226,\n              May 2008.\n\n   [RFC5905]  Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network\n              Time Protocol Version 4: Protocol and Algorithms\n              Specification", RFC 5905, June 2010.\n\n   [RFC6733]  Fajardo, V., Arkko, J., Loughney, J., and G. Zorn,\n              "Diameter Base Protocol", RFC 6733, October 2012.\n\n11.2.  Informative References\n\n   [Cx]       3GPP, , "ETSI TS 129 229 V11.4.0", August 2013.\n\n   [I-D.ietf-dime-e2e-sec-req]\n              Tschofenig, H., Korhonen, J., Zorn, G., and K. Pillay,\n              "Diameter AVP Level Security: Scenarios and Requirements",\n              draft-ietf-dime-e2e-sec-req-00 (work in progress),\n              September 2013.\n\n   [PCC]      3GPP, , "ETSI TS 123 203 V11.12.0", December 2013.\n\n   [RFC4006]  Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.\n              Loughney, "Diameter Credit-Control
  Application", RFC 4006,\n              August 2005.\n\n   [RFC5729]  Korhonen, J., Jones, M., Morand, L., and T. Tsou,\n              "Clarifications on the Routing of Diameter Requests Based\n              on the Username and the Realm", RFC 5729, December 2009.\n\n   [RFC7068]  McMurry, E. and B. Campbell, "Diameter Overload Control\n              Requirements", RFC 7068, November 2013.\n\n   [S13]      3GPP, , "ETSI TS 129 272 V11.9.0", December 2012.\n\nAppendix A.  Issues left for future specifications\n\n   The base solution for the overload control does not cover all\n   possible use cases.  A number of solution aspects were intentionally\n   left for future specification and protocol work.  The following sub-\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 34]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   sections define some of the potential extensions to the DOIC\n   solution.\n\nA.1.  Additional traffic a
 batement algorithms\n\n   This specification describes only means for a simple loss based\n   algorithm.  Future algorithms can be added using the designed\n   solution extension mechanism.  The new algorithms need to be\n   registered with IANA.  See Sections 6.1 and 8 for the required IANA\n   steps.\n\nA.2.  Agent Overload\n\n   This specification focuses on Diameter endpoint (server or client)\n   overload.  A separate extension will be required to outline the\n   handling of the case of agent overload.\n\nA.3.  New Error Diagnostic AVP\n\n   This specification indicates the use of existing error messages when\n   nodes reject requests due to overload.  The DIME working group is\n   considering defining additional error codes or AVPs to indicate that\n   overload was the reason for the rejection of the message.\n\nAppendix B.  Deployment Considerations\n\n   Non Supporting Agents\n\n      Due to the way that realm-routed requests are handled in Diameter\n      networks with the 
 server selection for the request done by an\n      agent, network operators should enable DOIC at agents that perform\n      server selection first.\n\n   Topology Hiding Interactions\n\n      There exist proxies that implement what is referred to as Topology\n      Hiding.  This can include cases where the agent modifies the\n      Origin-Host in answer messages.  The behavior of the DOIC solution\n      is not well understood when this happens.  As such, the DOIC\n      solution does not address this scenario.\n\nAppendix C.  Requirements Conformance Analysis\n\n   This section contains the result of an analysis of the DOIC solutions\n   conformance to the requirements defined in [RFC7068].\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 35]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.1.  Deferred Requirements\n\n   The 3GPP has adopted an early version of this document as normative\n   references in various
  Diameter related specifications to support the\n   overload control mechanism in their release 12 framework.  The DIME\n   working group has therefore decided to defer certain requirements in\n   order to complete the design of an extensible, generic solution\n   before the deadline scheduled by the 3GPP for the completion of the\n   release 12 protocol work by the end of 2014.  The deferred work\n   includes the following:\n\n   o  Agent Overload - The ability for an agent to report an overload\n      condition of the agent itself.\n\n   o  Load Information - The ability for a node to report its load level\n      when not overloaded.\n\n   At the time of this writing, DIME has begun separate work efforts for\n   these requirements.\n\nC.2.  Detection of non-supporting Intermediaries\n\n   The DOIC mechanism as currently defined does not allow supporting\n   nodes to automatically determine whether OC-Supported-Features or OC-\n   OLR AVPs are originated by a peer node, or by a non
 -peer node and\n   sent across a non-supporting peer.  This makes it impossible to\n   detect the presence of non-supporting nodes between supporting nodes,\n   except by configuration.  The working group determined that such a\n   configuration requirement is acceptable.\n\n   This limits full compliance with certain requirements related to the\n   limitation of new configuration, deployment in environments with\n   mixed support, operating across non-supporting agents, and\n   authorization.\n\nC.3.  Implicit Application Indication\n\n   The working group elected to determine the application for an\n   overload report from that of the enclosing message.  This prevents\n   sending an OLR for an application when there are no transactions for\n   that application.\n\n   As a consequence, DOIC does not comply with the requirement to be\n   able to report overload information across quiescent connections.\n   DOIC does not fully comply with requirements to operate on up-to-date\n   inf
 ormation, since if an OLR causes all transactions to stop for an\n   application, the only way traffic will resume is for the OLR to\n   expire.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 36]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.4.  Stateless Operation\n\n   RFC7068 explicitly discourages the sending of OLRs in every answer\n   message, as part of the requirement to avoid additional work for\n   overloaded nodes.  DOIC recommends exactly that behavior during\n   active overload conditions.  The working group determined that doing\n   otherwise would reduce reliability and increase statefulness.  (Note\n   that DOIC does allow nodes to avoid sending OLRs in every answer if\n   they have some other method of ensuring that OLRs get to all relevant\n   reacting nodes.)\n\nC.5.  No New Vulnerabilities\n\n   The working group believes that DOIC is compliant with the\n   requirement to avoid introducing new vul
 nerabilities.  However, this\n   requirement may warrant an early security expert review.\n\nC.6.  Detailed Requirements\n\n   [RFC Editor: Please remove this section and subsections prior to\n   publication as an RFC.]\n\nC.6.1.  General\n\n   REQ 1:  The solution MUST provide a communication method for Diameter\n           nodes to exchange load and overload information.\n\n           *Partially Compliant*. The mechanism uses new AVPs\n           piggybacked on existing Diameter messages to exchange\n           overload information.  It does not currently support "load"\n           information or the ability to report overload of an agent.\n           These have been left for future extensions.\n\n\n\n   REQ 2:  The solution MUST allow Diameter nodes to support overload\n           control regardless of which Diameter applications they\n           support.  Diameter clients and agents must be able to use the\n           received load and overload information to support graceful\n 
           behavior during an overload condition.  Graceful behavior\n           under overload conditions is best described by REQ 3.\n\n           *Partially Compliant*. The DOIC AVPs can be used in any\n           application that allows the extension of AVPs.  However,\n           "load" information is not currently supported.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 37]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   REQ 3:  The solution MUST limit the impact of overload on the overall\n           useful throughput of a Diameter server, even when the\n           incoming load on the network is far in excess of its\n           capacity.  The overall useful throughput under load is the\n           ultimate measure of the value of a solution.\n\n           *Compliant*. DOIC provides information that nodes can use to\n           reduce the impact of overload.\n\n\n\n   REQ 4:  Diameter allows requests to b
 e sent from either side of a\n           connection, and either side of a connection may have need to\n           provide its overload status.  The solution MUST allow each\n           side of a connection to independently inform the other of its\n           overload status.\n\n           *Compliant*. DOIC AVPs can be included regardless of\n           transaction "direction"\n\n\n\n   REQ 5:  Diameter allows nodes to determine their peers via dynamic\n           discovery or manual configuration.  The solution MUST work\n           consistently without regard to how peers are determined.\n\n           *Compliant*. DOIC contains no assumptions about how peers are\n           discovered.\n\n\n\n   REQ 6:  The solution designers SHOULD seek to minimize the amount of\n           new configuration required in order to work.  For example, it\n           is better to allow peers to advertise or negotiate support\n           for the solution, rather than to require that this knowledge\n   
         to be configured at each node.\n\n           *Partially Compliant*. Most DOIC parameters are advertised\n           using the DOIC capability announcement mechanism.  However,\n           there are some situations where configuration is required.\n           For example, a DOIC node detect the fact that a peer may not\n           support DOIC when nodes on the other side of the non-\n           supporting node do support DOIC without configuration.\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 38]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.6.2.  Performance\n\n   REQ 7:  The solution and any associated default algorithm(s) MUST\n           ensure that the system remains stable.  At some point after\n           an overload condition has ended, the solution MUST enable\n           capacity to stabilize and become equal to what it would be in\n           the absence of an overload condition.  Note 
 that this also\n           requires that the solution MUST allow nodes to shed load\n           without introducing non-converging oscillations during or\n           after an overload condition.\n\n           *Compliant*. The specification offers guidance that\n           implementations should apply hysteresis when recovering from\n           overload, and avoid sudden ramp ups in offered load when\n           recovering.\n\n\n\n   REQ 8:  Supporting nodes MUST be able to distinguish current overload\n           information from stale information.\n\n           *Partially Compliant*. DOIC overload reports are "soft\n           state", that is they expire after an indicated period.  DOIC\n           nodes may also send reports that end existing overload\n           conditions.  DOIC requires reporting nodes to ensure that all\n           relevant reacting nodes receive overload reports.\n\n           However, since DOIC does not allow reporting nodes to send\n           OLRs in watc
 hdog messages, if an overload condition results\n           in zero offered load, the reporting node cannot update the\n           condition until the expiration of the original OLR.\n\n\n\n   REQ 9:  The solution MUST function across fully loaded as well as\n           quiescent transport connections.  This is partially derived\n           from the requirement for stability in REQ 7.\n\n           *Not Compliant*. DOIC does not allow OLRs to be sent over\n           quiescent transport connections.  This is due to the fact\n           that OLRs cannot be sent outside of the application to which\n           they apply.\n\n\n\n   REQ 10: Consumers of overload information MUST be able to determine\n           when the overload condition improves or ends.\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 39]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. (See response to previous two\n     
       requirements.)\n\n\n\n   REQ 11: The solution MUST be able to operate in networks of different\n           sizes.\n\n           *Compliant*. DOIC makes no assumptions about the size of the\n           network.  DOIC can operate purely between clients and\n           servers, or across agents.\n\n\n\n   REQ 12: When a single network node fails, goes into overload, or\n           suffers from reduced processing capacity, the solution MUST\n           make it possible to limit the impact of the affected node on\n           other nodes in the network.  This helps to prevent a small-\n           scale failure from becoming a widespread outage.\n\n           *Partially Compliant*. DOIC allows overload reports for an\n           entire realm, where abated traffic will not be redirected\n           towards another server.  But in situations where nodes choose\n           to divert traffic to other nodes, DOIC offers no way of\n           knowing whether the new recipients can handle t
 he traffic if\n           they have not already indicated overload.  This may be\n           mitigated with the use of a future "load" extension, or with\n           the use of proprietary dynamic load-balancing mechanisms.\n\n\n\n   REQ 13: The solution MUST NOT introduce substantial additional work\n           for a node in an overloaded state.  For example, a\n           requirement for an overloaded node to send overload\n           information every time it received a new request would\n           introduce substantial work.\n\n           *Not Compliant*. DOIC does in fact encourage an overloaded\n           node to send an OLR in every response.  The working group\n           that other mechanisms to ensure that every relevant node\n           receives an OLR would create even more work.  [Note: This\n           needs discussion.]\n\n\n\n   REQ 14: Some scenarios that result in overload involve a rapid\n           increase of traffic with little time between normal levels\n\n\
 n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 40]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           and levels that induce overload.  The solution SHOULD provide\n           for rapid feedback when traffic levels increase.\n\n           *Compliant*. The piggyback mechanism allows OLRs to be sent\n           at the same rate as application traffic.\n\n\n\n   REQ 15: The solution MUST NOT interfere with the congestion control\n           mechanisms of underlying transport protocols.  For example, a\n           solution that opened additional TCP connections when the\n           network is congested would reduce the effectiveness of the\n           underlying congestion control mechanisms.\n\n           *Compliant*. DOIC does not require or recommend changes in\n           the handling of transport protocols or connections.\n\n\n\nC.6.3.  Heterogeneous Support for Solution\n\n   REQ 16: The solution is likely to be 
 deployed incrementally.  The\n           solution MUST support a mixed environment where some, but not\n           all, nodes implement it.\n\n           *Partially Compliant*. DOIC works with most mixed-deployment\n           scenarios.  However, it cannot work across a non-supporting\n           proxy that modifies Origin-Host AVPs in answer messages.\n           DOIC will have limited impact in networks where the nodes\n           that perform server selections do not support the mechanism.\n\n\n\n   REQ 17: In a mixed environment with nodes that support the solution\n           and nodes that do not, the solution MUST NOT result in\n           materially less useful throughput during overload as would\n           have resulted if the solution were not present.  It SHOULD\n           result in less severe overload in this environment.\n\n           *Compliant*. In most mixed-support deployment, DOIC will\n           offer at least some value, and will not make things worse.\n\n\n
 \n   REQ 18: In a mixed environment of nodes that support the solution and\n           nodes that do not, the solution MUST NOT preclude elements\n           that support overload control from treating elements that do\n           not support overload control in an equitable fashion relative\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 41]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           to those that do.  Users and operators of nodes that do not\n           support the solution MUST NOT unfairly benefit from the\n           solution.  The solution specification SHOULD provide guidance\n           to implementers for dealing with elements not supporting\n           overload control.\n\n           *Compliant*. DOIC provides mechanisms to abate load from non-\n           supporting sources.  Furthermore, it recommends that\n           reporting nodes will still need to be able to apply whatever\n           prot
 ections they would ordinarily apply if DOIC were not in\n           use.\n\n\n\n   REQ 19: It MUST be possible to use the solution between nodes in\n           different realms and in different administrative domains.\n\n           *Partially Compliant*. DOIC allows sending OLRs across\n           administrative domains, and potentially to nodes in other\n           realms.  However, an OLR cannot indicate overload for realms\n           other than the one in the Origin-Realm AVP of the containing\n           answer.\n\n\n\n   REQ 20: Any explicit overload indication MUST be clearly\n           distinguishable from other errors reported via Diameter.\n\n           *Compliant*. DOIC sends explicit overload indication in\n           overload reports.  It does not depend on error result codes.\n\n\n\n   REQ 21: In cases where a network node fails, is so overloaded that it\n           cannot process messages, or cannot communicate due to a\n           network failure, it may not be able
  to provide explicit\n           indications of the nature of the failure or its levels of\n           overload.  The solution MUST result in at least as much\n           useful throughput as would have resulted if the solution were\n           not in place.\n\n           *Compliant*. DOIC overload reports have the primary effect of\n           suppressing message retries in overload conditions.  DOIC\n           recommends that messages never be silently dropped if at all\n           possible.\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 42]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nC.6.4.  Granular Control\n\n   REQ 22: The solution MUST provide a way for a node to throttle the\n           amount of traffic it receives from a peer node.  This\n           throttling SHOULD be graded so that it can be applied\n           gradually as offered load increases.  Overload is not a\n           binary state; there
  may be degrees of overload.\n\n           *Compliant*. The "loss" algorithm expresses a percentage\n           reduction.\n\n\n\n   REQ 23: The solution MUST provide sufficient information to enable a\n           load-balancing node to divert messages that are rejected or\n           otherwise throttled by an overloaded upstream node to other\n           upstream nodes that are the most likely to have sufficient\n           capacity to process them.\n\n           *Not Compliant*. DOIC provides no built in mechanism to\n           determine the best place to divert messages that would\n           otherwise be throttled.  This can be accomplished with a\n           future "load" extension, or with proprietary load balancing\n           mechanisms.\n\n\n\n   REQ 24: The solution MUST provide a mechanism for indicating load\n           levels, even when not in an overload condition, to assist\n           nodes in making decisions to prevent overload conditions from\n           occurrin
 g.\n\n           *Not Compliant*. "Load" information has been left for a\n           future extension.\n\n\n\nC.6.5.  Priority and Policy\n\n   REQ 25: The base specification for the solution SHOULD offer general\n           guidance on which message types might be desirable to send or\n           process over others during times of overload, based on\n           application-specific considerations.  For example, it may be\n           more beneficial to process messages for existing sessions\n           ahead of new sessions.  Some networks may have a requirement\n           to give priority to requests associated with emergency\n           sessions.  Any normative or otherwise detailed definition of\n           the relative priorities of message types during an overload\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 43]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           condition will be the responsibility of th
 e application\n           specification.\n\n           *Compliant*. The specification offers guidance on how\n           requests might be prioritized for different types of\n           applications.\n\n\n\n   REQ 26: The solution MUST NOT prevent a node from prioritizing\n           requests based on any local policy, so that certain requests\n           are given preferential treatment, given additional\n           retransmission, not throttled, or processed ahead of others.\n\n           *Compliant*. Nothing in the specification prevents\n           application-specific, implementation-specific, or local\n           policies.\n\n\n\nC.6.6.  Security\n\n   REQ 27: The solution MUST NOT provide new vulnerabilities to\n           malicious attack or increase the severity of any existing\n           vulnerabilities.  This includes vulnerabilities to DoS and\n           DDoS attacks as well as replay and man-in-the-middle attacks.\n           Note that the Diameter base specification 
 [RFC6733] lacks\n           end-to-end security and this must be considered (see the\n           Security Considerations in [RFC7068]).  Note that this\n           requirement was expressed at a high level so as to not\n           preclude any particular solution.  It is expected that the\n           solution will address this in more detail.\n\n           *Compliant*. The working group is not aware of any such\n           vulnerabilities.  [This may need further analysis.]\n\n\n\n   REQ 28: The solution MUST NOT depend on being deployed in\n           environments where all Diameter nodes are completely trusted.\n           It SHOULD operate as effectively as possible in environments\n           where other nodes are malicious; this includes preventing\n           malicious nodes from obtaining more than a fair share of\n           service.  Note that this does not imply any responsibility on\n           the solution to detect, or take countermeasures against,\n           malicious
  nodes.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 44]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. Since all Diameter security is\n           currently at the transport layer, nodes must trust immediate\n           peers to enforce trust policies.  However, there are\n           situations where a DOIC node cannot determine if an immediate\n           peer supports DOIC.  The authors recommend an expert security\n           review.\n\n\n\n   REQ 29: It MUST be possible for a supporting node to make\n           authorization decisions about what information will be sent\n           to peer nodes based on the identity of those nodes.  This\n           allows a domain administrator who considers the load of their\n           nodes to be sensitive information to restrict access to that\n           information.  Of course, in such cases, there is no\n           expectation that th
 e solution itself will help prevent\n           overload from that peer node.\n\n           *Partially Compliant*. (See response to previous\n           requirement.)\n\n\n\n   REQ 30: The solution MUST NOT interfere with any Diameter-compliant\n           method that a node may use to protect itself from overload\n           from non-supporting nodes or from denial-of-service attacks.\n\n           *Compliant*. The specification recommends that any such\n           protection mechanism needed without DOIC should continue to\n           be employed with DOIC.\n\n\n\nC.6.7.  Flexibility and Extensibility\n\n   REQ 31: There are multiple situations where a Diameter node may be\n           overloaded for some purposes but not others.  For example,\n           this can happen to an agent or server that supports multiple\n           applications, or when a server depends on multiple external\n           resources, some of which may become overloaded while others\n           are fully ava
 ilable.  The solution MUST allow Diameter nodes\n           to indicate overload with sufficient granularity to allow\n           clients to take action based on the overloaded resources\n           without unreasonably forcing available capacity to go unused.\n           The solution MUST support specification of overload\n           information with granularities of at least "Diameter node",\n           "realm", and "Diameter application" and MUST allow\n           extensibility for others to be added in the future.\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 45]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n           *Partially Compliant*. All DOIC overload reports are scoped\n           to the specific application and realm.  Inside that scope,\n           overload can be reported at the specific server or whole\n           realm scope.  As currently specified, DOIC cannot indicate\n           local overload fo
 r an agent.  At the time of this writing,\n           the DIME working group has plans to work on an agent-overload\n           extension.\n\n           DOIC allows new "scopes" through the use of extended report\n           types.\n\n\n\n   REQ 32: The solution MUST provide a method for extending the\n           information communicated and the algorithms used for overload\n           control.\n\n           *Compliant*. DOIC allows new report types and abatement\n           algorithms to be created.  These may be indicated using the\n           OC-Supported-Features AVP.\n\n\n\n   REQ 33: The solution MUST provide a default algorithm that is\n           mandatory to implement.\n\n           *Compliant*. The "loss" algorithm is mandatory to implement.\n\n\n\n   REQ 34: The solution SHOULD provide a method for exchanging overload\n           and load information between elements that are connected by\n           intermediaries that do not support the solution.\n\n           *Partiall
 y Compliant*. DOIC information can traverse non-\n           supporting agents, as long as those agents do not modify\n           certain AVPs. (e.g., Origin-Host).  DOIC does not provide a\n           way for supporting nodes to detect such modification.\n\n\n\nAppendix D.  Considerations for Applications Integrating the DOIC\n             Solution\n\n   This section outlines considerations to be taken into account when\n   integrating the DOIC solution into Diameter applications.\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 46]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nD.1.  Application Classification\n\n   The following is a classification of Diameter applications and\n   request types.  This discussion is meant to document factors that\n   play into decisions made by the Diameter identity responsible for\n   handling overload reports.\n\n   Section 8.1 of [RFC6733] defines two state machines that imply tw
 o\n   types of applications, session-less and session-based applications.\n   The primary difference between these types of applications is the\n   lifetime of Session-Ids.\n\n   For session-based applications, the Session-Id is used to tie\n   multiple requests into a single session.\n\n   The Credit-Control application defined in [RFC4006] is an example of\n   a Diameter session-based application.\n\n   In session-less applications, the lifetime of the Session-Id is a\n   single Diameter transaction, i.e. the session is implicitly\n   terminated after a single Diameter transaction and a new Session-Id\n   is generated for each Diameter request.\n\n   For the purposes of this discussion, session-less applications are\n   further divided into two types of applications:\n\n   Stateless Applications:\n\n      Requests within a stateless application have no relationship to\n      each other.  The 3GPP defined S13 application is an example of a\n      stateless application [S13], where 
 only a Diameter command is\n      defined between a client and a server and no state is maintained\n      between two consecutive transactions.\n\n   Pseudo-Session Applications:\n\n      Applications that do not rely on the Session-Id AVP for\n      correlation of application messages related to the same session\n      but use other session-related information in the Diameter requests\n      for this purpose.  The 3GPP defined Cx application [Cx] is an\n      example of a pseudo-session application.\n\n   The handling of overload reports must take the type of application\n   into consideration, as discussed in Appendix D.2.\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 47]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\nD.2.  Application Type Overload Implications\n\n   This section discusses considerations for mitigating overload\n   reported by a Diameter entity.  This discussion focuses on the type\n   of ap
 plication.  Appendix D.3 discusses considerations for handling\n   various request types when the target server is known to be in an\n   overloaded state.\n\n   These discussions assume that the strategy for mitigating the\n   reported overload is to reduce the overall workload sent to the\n   overloaded entity.  The concept of applying overload treatment to\n   requests targeted for an overloaded Diameter entity is inherent to\n   this discussion.  The method used to reduce offered load is not\n   specified here but could include routing requests to another Diameter\n   entity known to be able to handle them, or it could mean rejecting\n   certain requests.  For a Diameter agent, rejecting requests will\n   usually mean generating appropriate Diameter error responses.  For a\n   Diameter client, rejecting requests will depend upon the application.\n   For example, it could mean giving an indication to the entity\n   requesting the Diameter service that the network is busy and to tr
 y\n   again later.\n\n   Stateless Applications:\n\n      By definition there is no relationship between individual requests\n      in a stateless application.  As a result, when a request is sent\n      or relayed to an overloaded Diameter entity - either a Diameter\n      Server or a Diameter Agent - the sending or relaying entity can\n      choose to apply the overload treatment to any request targeted for\n      the overloaded entity.\n\n   Pseudo-Session Applications:\n\n      For pseudo-session applications, there is an implied ordering of\n      requests.  As a result, decisions about which requests towards an\n      overloaded entity to reject could take the command code of the\n      request into consideration.  This generally means that\n      transactions later in the sequence of transactions should be given\n      more favorable treatment than messages earlier in the sequence.\n      This is because more work has already been done by the Diameter\n      network for those
  transactions that occur later in the sequence.\n      Rejecting them could result in increasing the load on the network\n      as the transactions earlier in the sequence might also need to be\n      repeated.\n\n   Session-Based Applications:\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 48]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      Overload handling for session-based applications must take into\n      consideration the work load associated with setting up and\n      maintaining a session.  As such, the entity sending requests\n      towards an overloaded Diameter entity for a session-based\n      application might tend to reject new session requests prior to\n      rejecting intra-session requests.  In addition, session ending\n      requests might be given a lower probability of being rejected as\n      rejecting session ending requests could result in session status\n      being out of sync between 
 the Diameter clients and servers.\n      Application designers that would decide to reject mid-session\n      requests will need to consider whether the rejection invalidates\n      the session and any resulting session cleanup procedures.\n\nD.3.  Request Transaction Classification\n\n   Independent Request:\n\n      An independent request is not correlated to any other requests\n      and, as such, the lifetime of the session-id is constrained to an\n      individual transaction.\n\n   Session-Initiating Request:\n\n      A session-initiating request is the initial message that\n      establishes a Diameter session.  The ACR message defined in\n      [RFC6733] is an example of a session-initiating request.\n\n   Correlated Session-Initiating Request:\n\n      There are cases when multiple session-initiated requests must be\n      correlated and managed by the same Diameter server.  It is notably\n      the case in the 3GPP PCC architecture [PCC], where multiple\n      apparently i
 ndependent Diameter application sessions are actually\n      correlated and must be handled by the same Diameter server.\n\n   Intra-Session Request:\n\n      An intra-session request is a request that uses the same Session-\n      Id than the one used in a previous request.  An intra-session\n      request generally needs to be delivered to the server that handled\n      the session creating request for the session.  The STR message\n      defined in [RFC6733] is an example of an intra-session request.\n\n   Pseudo-Session Requests:\n\n      Pseudo-session requests are independent requests and do not use\n      the same Session-Id but are correlated by other session-related\n      information contained in the request.  There exists Diameter\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 49]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      applications that define an expected ordering of transactions.\n      This se
 quencing of independent transactions results in a pseudo\n      session.  The AIR, MAR and SAR requests in the 3GPP defined Cx\n      [Cx] application are examples of pseudo-session requests.\n\nD.4.  Request Type Overload Implications\n\n   The request classes identified in Appendix D.3 have implications on\n   decisions about which requests should be throttled first.  The\n   following list of request treatment regarding throttling is provided\n   as guidelines for application designers when implementing the\n   Diameter overload control mechanism described in this document.  The\n   exact behavior regarding throttling is a matter of local policy,\n   unless specifically defined for the application.\n\n   Independent Requests:\n\n      Independent requests can generally be given equal treatment when\n      making throttling decisions, unless otherwise indicated by\n      application requirements or local policy.\n\n   Session-Initiating Requests:\n\n      Session-initiating reques
 ts often represent more work than\n      independent or intra-session requests.  Moreover, session-\n      initiating requests are typically followed by other session-\n      related requests.  Since the main objective of the overload\n      control is to reduce the total number of requests sent to the\n      overloaded entity, throttling decisions might favor allowing\n      intra-session requests over session-initiating requests.  In the\n      absence of local policies or application specific requirements to\n      the contrary, Individual session-initiating requests can be given\n      equal treatment when making throttling decisions.\n\n   Correlated Session-Initiating Requests:\n\n      A Request that results in a new binding, where the binding is used\n      for routing of subsequent session-initiating requests to the same\n      server, represents more work load than other requests.  As such,\n      these requests might be throttled more frequently than other\n      request 
 types.\n\n   Pseudo-Session Requests:\n\n      Throttling decisions for pseudo-session requests can take into\n      consideration where individual requests fit into the overall\n      sequence of requests within the pseudo session.  Requests that are\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 50]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n      earlier in the sequence might be throttled more aggressively than\n      requests that occur later in the sequence.\n\n   Intra-Session Requests:\n\n      There are two types of intra-sessions requests, requests that\n      terminate a session and the remainder of intra-session requests.\n      Implementers and operators may choose to throttle session-\n      terminating requests less aggressively in order to gracefully\n      terminate sessions, allow cleanup of the related resources (e.g.\n      session state) and avoid the need for additional intra-session\n      re
 quests.  Favoring session-termination requests may reduce the\n      session management impact on the overloaded entity.  The default\n      handling of other intra-session requests might be to treat them\n      equally when making throttling decisions.  There might also be\n      application level considerations whether some request types are\n      favored over others.\n\nAuthors\' Addresses\n\n   Jouni Korhonen (editor)\n   Broadcom\n   Porkkalankatu 24\n   Helsinki  FIN-00180\n   Finland\n\n   Email: jouni.nospam@gmail.com\n\n\n   Steve Donovan (editor)\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: srdonovan@usdonovans.com\n\n\n   Ben Campbell\n   Oracle\n   7460 Warren Parkway\n   Frisco, Texas  75034\n   United States\n\n   Email: ben@nostrum.com\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 51]\n_\nInternet-Draft                    DOIC                     December 2014\n\n\n   Lionel Morand\n   
 Orange Labs\n   38/40 rue du General Leclerc\n   Issy-Les-Moulineaux Cedex 9  92794\n   France\n\n   Phone: +33145296257\n   Email: lionel.morand@orange.com\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nKorhonen, et al.          Expires June 18, 2015                [Page 52]\n', 'url1': '', 'submit': 'Generate diff', 'url2': '', '--newcolour': 'green'} -->
--------------000005080501070401070001--


From nobody Fri Dec 26 09:01:10 2014
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF8B21A004E for <dime@ietfa.amsl.com>; Thu, 25 Dec 2014 22:04:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level: 
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zwY9G10AHyfZ for <dime@ietfa.amsl.com>; Thu, 25 Dec 2014 22:04:45 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) by ietfa.amsl.com (Postfix) with ESMTP id DB53F1A3B9B for <dime@ietf.org>; Thu, 25 Dec 2014 22:04:44 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 493B018008C; Thu, 25 Dec 2014 22:03:57 -0800 (PST)
To: vf0213@gmail.com, jari.arkko@ericsson.com, john.loughney@nokia.com, glenzorn@gmail.com, bclaise@cisco.com, joelja@bogus.com, jouni.nospam@gmail.com, lionel.morand@orange.com
X-PHP-Originating-Script: 6000:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20141226060357.493B018008C@rfc-editor.org>
Date: Thu, 25 Dec 2014 22:03:57 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/5Cg8LEZWCWx0XqV4pihbmwqY3x4
X-Mailman-Approved-At: Fri, 26 Dec 2014 09:01:09 -0800
Cc: dime@ietf.org, Hans.Liu@alcatel-lucent.com, rfc-editor@rfc-editor.org
Subject: [Dime] [Technical Errata Reported] RFC6733 (4209)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 06:04:47 -0000

The following errata report has been submitted for RFC6733,
"Diameter Base Protocol".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=6733&eid=4209

--------------------------------------
Type: Technical
Reported by: Hans Liu <Hans.Liu@alcatel-lucent.com>

Section: 5.4.3

Original Text
-------------
      BUSY                              1
         The peerâ€™s internal resources are constrained, and it has
         determined that the transport connection needs to be closed.
         A receiver of a DPR with above result code SHOULD NOT attempt
         reconnection.

Corrected Text
--------------
      BUSY                              1
         The peerâ€™s internal resources are constrained, and it has
         determined that the transport connection needs to be closed.
         A receiver of a DPR with above result code SHOULD either 
         connect to an alternate node, or attempt reconnection
         after a time period.

Notes
-----
In most implementations, the Diameter node will continue to serve its peer after the resources recover and expect reconnection. If the Diameter node won't like reconnection from peer, DO_NOT_WANT_TO_TALK_TO_YOU can be used instead of BUSY.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC6733 (draft-ietf-dime-rfc3588bis-33)
--------------------------------------
Title               : Diameter Base Protocol
Publication Date    : October 2012
Author(s)           : V. Fajardo, Ed., J. Arkko, J. Loughney, G. Zorn, Ed.
Category            : PROPOSED STANDARD
Source              : Diameter Maintenance and Extensions
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Fri Dec 26 09:01:13 2014
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE15C1A3B9B for <dime@ietfa.amsl.com>; Thu, 25 Dec 2014 22:11:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level: 
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ru8hme-Fwkzd for <dime@ietfa.amsl.com>; Thu, 25 Dec 2014 22:11:39 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) by ietfa.amsl.com (Postfix) with ESMTP id 5F8A91A004E for <dime@ietf.org>; Thu, 25 Dec 2014 22:11:39 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id C99B318008C; Thu, 25 Dec 2014 22:10:52 -0800 (PST)
To: vf0213@gmail.com, jari.arkko@ericsson.com, john.loughney@nokia.com, glenzorn@gmail.com, bclaise@cisco.com, joelja@bogus.com, jouni.nospam@gmail.com, lionel.morand@orange.com
X-PHP-Originating-Script: 6000:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20141226061052.C99B318008C@rfc-editor.org>
Date: Thu, 25 Dec 2014 22:10:52 -0800 (PST)
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/EkzOviu7x_rjBrMgVRWdeTRXBTs
X-Mailman-Approved-At: Fri, 26 Dec 2014 09:01:09 -0800
Cc: dime@ietf.org, Hans.Liu@alcatel-lucent.com, rfc-editor@rfc-editor.org
Subject: [Dime] [Editorial Errata Reported] RFC6733 (4210)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 06:11:41 -0000

The following errata report has been submitted for RFC6733,
"Diameter Base Protocol".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=6733&eid=4210

--------------------------------------
Type: Editorial
Reported by: Hans Liu <Hans.Liu@alcatel-lucent.com>

Section: 5.4.3

Original Text
-------------
   The Disconnect-Cause AVP (AVP Code 273) is of type Enumerated.  A
   Diameter node MUST include this AVP in the Disconnect-Peer-Request
   message to inform the peer of the reason for its intention to shut
   down the transport connection.  The following values are supported:
      REBOOTING                         0
         A scheduled reboot is imminent.  A receiver of a DPR with
         above result code MAY attempt reconnection.
      BUSY                              1
         The peerâ€™s internal resources are constrained, and it has
         determined that the transport connection needs to be closed.
         A receiver of a DPR with above result code SHOULD NOT attempt
         reconnection.
      DO_NOT_WANT_TO_TALK_TO_YOU        2
         The peer has determined that it does not see a need for the
         transport connection to exist, since it does not expect any
         messages to be exchanged in the near future.  A receiver of a
         DPR with above result code SHOULD NOT attempt reconnection.

Corrected Text
--------------
   The Disconnect-Cause AVP (AVP Code 273) is of type Enumerated.  A
   Diameter node MUST include this AVP in the Disconnect-Peer-Request
   message to inform the peer of the reason for its intention to shut
   down the transport connection.  The following values are supported:
      REBOOTING                         0
         A scheduled reboot is imminent.  A receiver of a DPR with
         above result code MAY attempt reconnection.
      BUSY                              1
         The internal resources are constrained, and it has
         determined that the transport connection needs to be closed.
         A receiver of a DPR with above result code SHOULD NOT attempt
         reconnection.
      DO_NOT_WANT_TO_TALK_TO_YOU        2
         The node has determined that it does not see a need for the
         transport connection to exist, since it does not expect any
         messages to be exchanged in the near future.  A receiver of a
         DPR with above result code SHOULD NOT attempt reconnection.

Notes
-----
The "peer" in 1st paragraph represents the receiver. However in the descriptions for cause values the "peer" represents the sender.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC6733 (draft-ietf-dime-rfc3588bis-33)
--------------------------------------
Title               : Diameter Base Protocol
Publication Date    : October 2012
Author(s)           : V. Fajardo, Ed., J. Arkko, J. Loughney, G. Zorn, Ed.
Category            : PROPOSED STANDARD
Source              : Diameter Maintenance and Extensions
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Fri Dec 26 10:28:21 2014
Return-Path: <lionel.morand@orange.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E0621A9102 for <dime@ietfa.amsl.com>; Fri, 26 Dec 2014 09:34:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qHODGYB8t-fq for <dime@ietfa.amsl.com>; Fri, 26 Dec 2014 09:34:55 -0800 (PST)
Received: from relais-inet.francetelecom.com (relais-ias245.francetelecom.com [80.12.204.245]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B1CA1A9100 for <dime@ietf.org>; Fri, 26 Dec 2014 09:34:54 -0800 (PST)
Received: from omfeda07.si.francetelecom.fr (unknown [xx.xx.xx.200]) by omfeda10.si.francetelecom.fr (ESMTP service) with ESMTP id 60954374355; Fri, 26 Dec 2014 18:34:52 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfeda07.si.francetelecom.fr (ESMTP service) with ESMTP id 3313F158098; Fri, 26 Dec 2014 18:34:52 +0100 (CET)
Received: from PEXCVZYM13.corporate.adroot.infra.ftgroup ([fe80::cc7e:e40b:42ef:164e]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0210.002; Fri, 26 Dec 2014 18:34:51 +0100
From: <lionel.morand@orange.com>
To: RFC Errata System <rfc-editor@rfc-editor.org>, "vf0213@gmail.com" <vf0213@gmail.com>, "jari.arkko@ericsson.com" <jari.arkko@ericsson.com>, "john.loughney@nokia.com" <john.loughney@nokia.com>, "glenzorn@gmail.com" <glenzorn@gmail.com>, "bclaise@cisco.com" <bclaise@cisco.com>, "joelja@bogus.com" <joelja@bogus.com>, "jouni.nospam@gmail.com" <jouni.nospam@gmail.com>
Thread-Topic: [Editorial Errata Reported] RFC6733 (4210)
Thread-Index: AQHQINLSBW5CLwQOE0muYZ1BflrdvJyiIc9g
Date: Fri, 26 Dec 2014 17:34:51 +0000
Message-ID: <19574_1419615292_549D9C3C_19574_2784_1_6B7134B31289DC4FAF731D844122B36EA6E945@PEXCVZYM13.corporate.adroot.infra.ftgroup>
References: <20141226061052.C99B318008C@rfc-editor.org>
In-Reply-To: <20141226061052.C99B318008C@rfc-editor.org>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.2]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.12.22.200030
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/wSg14IKS3A9pbNTYx7XdftRxszU
X-Mailman-Approved-At: Fri, 26 Dec 2014 10:28:21 -0800
Cc: "dime@ietf.org" <dime@ietf.org>, "Hans.Liu@alcatel-lucent.com" <Hans.Liu@alcatel-lucent.com>
Subject: Re: [Dime] [Editorial Errata Reported] RFC6733 (4210)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Dec 2014 17:34:58 -0000
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From Hans.Liu@alcatel-lucent.com  Sun Dec 28 05:29:51 2014
Return-Path: <Hans.Liu@alcatel-lucent.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 761531AD43C for <dime@ietfa.amsl.com>; Sun, 28 Dec 2014 05:29:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.5
X-Spam-Level: 
X-Spam-Status: No, score=-0.5 tagged_above=-999 required=5 tests=[BAYES_05=-0.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 50MvnqN095mR for <dime@ietfa.amsl.com>; Sun, 28 Dec 2014 05:29:45 -0800 (PST)
Received: from cnshjsmin04.alcatel-sbell.com.cn (cnshjsmin03.alcatel-sbell.com.cn [211.144.215.47]) by ietfa.amsl.com (Postfix) with ESMTP id E8AFE1AD43D for <dime@ietf.org>; Sun, 28 Dec 2014 05:29:43 -0800 (PST)
X-AuditID: ac189298-f79b46d000003ac1-49-54a005c5d8e7
Received: from CNSHJCASHUB02.ad4.ad.alcatel.com (CNSHJCASHUB02.ad4.ad.alcatel.com [135.251.50.72]) by cnshjsmin04.alcatel-sbell.com.cn (Symantec Messaging Gateway) with SMTP id E0.0E.15041.5C500A45; Sun, 28 Dec 2014 21:29:41 +0800 (HKT)
Received: from CNSHJMBX01.ad4.ad.alcatel.com ([135.251.50.101]) by CNSHJCASHUB02.ad4.ad.alcatel.com ([135.251.50.72]) with mapi id 14.03.0123.003; Sun, 28 Dec 2014 21:29:39 +0800
From: LIU Hans <Hans.Liu@alcatel-lucent.com>
To: "lionel.morand@orange.com" <lionel.morand@orange.com>, RFC Errata System <rfc-editor@rfc-editor.org>, "vf0213@gmail.com" <vf0213@gmail.com>, "jari.arkko@ericsson.com" <jari.arkko@ericsson.com>, "john.loughney@nokia.com" <john.loughney@nokia.com>, "glenzorn@gmail.com" <glenzorn@gmail.com>, "bclaise@cisco.com" <bclaise@cisco.com>, "joelja@bogus.com" <joelja@bogus.com>, "jouni.nospam@gmail.com" <jouni.nospam@gmail.com>
Thread-Topic: [Editorial Errata Reported] RFC6733 (4210)
Thread-Index: AQHQINLSBW5CLwQOE0muYZ1BflrdvJyiIc9ggALdfUA=
Date: Sun, 28 Dec 2014 13:29:38 +0000
Message-ID: <B47943693EC09B4EA80CDCC29DF6D17F0134ECF5@cnshjmbx01>
References: <20141226061052.C99B318008C@rfc-editor.org> <19574_1419615292_549D9C3C_19574_2784_1_6B7134B31289DC4FAF731D844122B36EA6E945@PEXCVZYM13.corporate.adroot.infra.ftgroup>
In-Reply-To: <19574_1419615292_549D9C3C_19574_2784_1_6B7134B31289DC4FAF731D844122B36EA6E945@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.24.110.144]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrCIsWRmVeSWpSXmKPExsXS/ts0Uvco64IQgzm7FC2OPpawmNu7gs1i /eRLLBaHevIsXp1aw2hx7OZKJov96xqYLG5vz7Ro2v+VzeJZSz+7A5fH2SMLGD2m/N7I6vHr 61U2j52z7rJ7LFnyk8nj7q1LTB4tz06yeTS0HWMN4IjisklJzcksSy3St0vgytg4cylrwRr7 ijPXlrM2MN6x7WLk5JAQMJGYtHgOM4QtJnHh3nq2LkYuDiGBd4wSky70MEM42xgl1q1YzAZS xSagI/FiWjc7SEJEYDOzRN/dL6wgCWYBZYnZOx6wg9jCAuYSnZ82MoHYIgIWEg/3djJD2FYS 168dA7NZBFQl5h7cBVbPK+AosePZM1aIbZsZJQ5NXcsE4nAKtDFKTJz/C6yKUUBWYtqj+0wQ 28Qlbj2ZzwRxuIDEkj3noZ4QlXj5+B8rhK0k8WL9XaAaDqB6TYn1u/QhWhUlpnQ/hFosKHFy 5hMWiHJJiYMrbrBMYBSfhWTDLITuWUi6ZyHpXsDIsopRITmvOCOrODczz8BILzEnObEkNUe3 OCk1J0cvOT9XLzlvEyMw7tdITJqxg/HsU6dDjAIcjEo8vC9OzA8RYk0sK67MPcQowcGsJMIb 8QQoxJuSWFmVWpQfX1Sak1p8iFGag0VJnDf9TX+IkEA60Ozs1NSC1CKYLBMHp1QDY63u1x+i Tn9uMzX2rSsK6Dox+2mtSs75v1uqpzk7SqrU6vtslnI5UcbaU8bl/Za5xy+Cz2/CUXnL3fay Qp8myO+9Huv/7cePjee4P6nZp5memjFbOMrKOamiw7B32VYT9SXfXsz91MO79//lnW6+/131 j8/ca2rGFL35sdWRV3elOSeFhq+rUmIpzkg01GIuKk4EAHI19j/3AgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/hAy89FmMdvL9t5p2UbZLmKpMPc4
X-Mailman-Approved-At: Sun, 28 Dec 2014 18:20:15 -0800
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] [Editorial Errata Reported] RFC6733 (4210)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Dec 2014 13:34:40 -0000

SGkgTGlvbmVsLA0KDQpUaGFua3MgZm9yIHlvdXIgcXVpY2sgcmVzcG9uc2UuIA0KDQpJIGFncmVl
IHdpdGggeW91IHRoYXQgYSBwZWVyIGNhbiBlaXRoZXIgYmUgYSBzZW5kZXIgb3IgcmVjZWl2ZXIu
IA0KDQpIb3dldmVyIGluIHNhbWUgc2VjdGlvbiBkZXNjcmliaW5nIHVzYWdlIGZvciB0aGUgc2Ft
ZSBBVlAsIHRoZSAxc3QgYXBwZWFyYW5jZSByZXByZXNlbnRzIHRoZSByb2xlIG9mIHJlY2VpdmVy
LCB0aGUgMm5kIGFuZCAzcmQgYXBwZWFyYW5jZXMgaGFzIGNoYW5nZWQgdG8gdGhlIHJvbGUgb2Yg
c2VuZGVycywgaXQncyBjb25mdXNpbmcgbGl0ZXJhbGx5Lg0KDQpUaGFua3MsDQpIYW5zDQoNCi0t
LS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBsaW9uZWwubW9yYW5kQG9yYW5nZS5jb20g
W21haWx0bzpsaW9uZWwubW9yYW5kQG9yYW5nZS5jb21dIA0KU2VudDogMjAxNOW5tDEy5pyIMjfm
l6UgMTozNQ0KVG86IFJGQyBFcnJhdGEgU3lzdGVtOyB2ZjAyMTNAZ21haWwuY29tOyBqYXJpLmFy
a2tvQGVyaWNzc29uLmNvbTsgam9obi5sb3VnaG5leUBub2tpYS5jb207IGdsZW56b3JuQGdtYWls
LmNvbTsgYmNsYWlzZUBjaXNjby5jb207IGpvZWxqYUBib2d1cy5jb207IGpvdW5pLm5vc3BhbUBn
bWFpbC5jb20NCkNjOiBMSVUgSGFuczsgZGltZUBpZXRmLm9yZw0KU3ViamVjdDogUkU6IFtFZGl0
b3JpYWwgRXJyYXRhIFJlcG9ydGVkXSBSRkM2NzMzICg0MjEwKQ0KDQpEaWFtZXRlciBpcyBhIHBl
ZXItdG8tcGVlciBwcm90b2NvbCBhbmQgcGVlcnMgYXJlIERpYW1ldGVyIG5vZGVzIHNoYXJpbmcg
YSBEaWFtZXRlciB0cmFuc3BvcnQgY29ubmVjdGlvbi4gVGhlcmVmb3JlLCBhICJwZWVyIiBjYW4g
YmUgZWl0aGVyIHRoZSBzZW5kZXIgb3IgdGhlIHJlY2VpdmVyIG9mIHRoZSByZXF1ZXN0LCBkZXBl
bmRpbmcgb24gdGhlIGNvbnRleHQuDQpJIGRvbid0IHRoaW5rIHRoYXQgdGhlIHByb3Bvc2VkIGNv
cnJlY3Rpb24gaXMganVzdGlmaWVkLg0KDQpyZWdhcmRzLA0KDQpMaW9uZWwNCg0KLS0tLS1NZXNz
YWdlIGQnb3JpZ2luZS0tLS0tDQpEZcKgOiBSRkMgRXJyYXRhIFN5c3RlbSBbbWFpbHRvOnJmYy1l
ZGl0b3JAcmZjLWVkaXRvci5vcmddDQpFbnZvecOpwqA6IHZlbmRyZWRpIDI2IGTDqWNlbWJyZSAy
MDE0IDA3OjExIMOAwqA6IHZmMDIxM0BnbWFpbC5jb207IGphcmkuYXJra29AZXJpY3Nzb24uY29t
OyBqb2huLmxvdWdobmV5QG5va2lhLmNvbTsgZ2xlbnpvcm5AZ21haWwuY29tOyBiY2xhaXNlQGNp
c2NvLmNvbTsgam9lbGphQGJvZ3VzLmNvbTsgam91bmkubm9zcGFtQGdtYWlsLmNvbTsgTU9SQU5E
IExpb25lbCBJTVQvT0xOIENjwqA6IEhhbnMuTGl1QGFsY2F0ZWwtbHVjZW50LmNvbTsgZGltZUBp
ZXRmLm9yZzsgcmZjLWVkaXRvckByZmMtZWRpdG9yLm9yZyBPYmpldMKgOiBbRWRpdG9yaWFsIEVy
cmF0YSBSZXBvcnRlZF0gUkZDNjczMyAoNDIxMCkNCg0KVGhlIGZvbGxvd2luZyBlcnJhdGEgcmVw
b3J0IGhhcyBiZWVuIHN1Ym1pdHRlZCBmb3IgUkZDNjczMywgIkRpYW1ldGVyIEJhc2UgUHJvdG9j
b2wiLg0KDQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KWW91IG1heSBy
ZXZpZXcgdGhlIHJlcG9ydCBiZWxvdyBhbmQgYXQ6DQpodHRwOi8vd3d3LnJmYy1lZGl0b3Iub3Jn
L2VycmF0YV9zZWFyY2gucGhwP3JmYz02NzMzJmVpZD00MjEwDQoNCi0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tDQpUeXBlOiBFZGl0b3JpYWwNClJlcG9ydGVkIGJ5OiBIYW5z
IExpdSA8SGFucy5MaXVAYWxjYXRlbC1sdWNlbnQuY29tPg0KDQpTZWN0aW9uOiA1LjQuMw0KDQpP
cmlnaW5hbCBUZXh0DQotLS0tLS0tLS0tLS0tDQogICBUaGUgRGlzY29ubmVjdC1DYXVzZSBBVlAg
KEFWUCBDb2RlIDI3MykgaXMgb2YgdHlwZSBFbnVtZXJhdGVkLiAgQQ0KICAgRGlhbWV0ZXIgbm9k
ZSBNVVNUIGluY2x1ZGUgdGhpcyBBVlAgaW4gdGhlIERpc2Nvbm5lY3QtUGVlci1SZXF1ZXN0DQog
ICBtZXNzYWdlIHRvIGluZm9ybSB0aGUgcGVlciBvZiB0aGUgcmVhc29uIGZvciBpdHMgaW50ZW50
aW9uIHRvIHNodXQNCiAgIGRvd24gdGhlIHRyYW5zcG9ydCBjb25uZWN0aW9uLiAgVGhlIGZvbGxv
d2luZyB2YWx1ZXMgYXJlIHN1cHBvcnRlZDoNCiAgICAgIFJFQk9PVElORyAgICAgICAgICAgICAg
ICAgICAgICAgICAwDQogICAgICAgICBBIHNjaGVkdWxlZCByZWJvb3QgaXMgaW1taW5lbnQuICBB
IHJlY2VpdmVyIG9mIGEgRFBSIHdpdGgNCiAgICAgICAgIGFib3ZlIHJlc3VsdCBjb2RlIE1BWSBh
dHRlbXB0IHJlY29ubmVjdGlvbi4NCiAgICAgIEJVU1kgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAxDQogICAgICAgICBUaGUgcGVlcsOi4oKs4oSicyBpbnRlcm5hbCByZXNvdXJjZXMgYXJl
IGNvbnN0cmFpbmVkLCBhbmQgaXQgaGFzDQogICAgICAgICBkZXRlcm1pbmVkIHRoYXQgdGhlIHRy
YW5zcG9ydCBjb25uZWN0aW9uIG5lZWRzIHRvIGJlIGNsb3NlZC4NCiAgICAgICAgIEEgcmVjZWl2
ZXIgb2YgYSBEUFIgd2l0aCBhYm92ZSByZXN1bHQgY29kZSBTSE9VTEQgTk9UIGF0dGVtcHQNCiAg
ICAgICAgIHJlY29ubmVjdGlvbi4NCiAgICAgIERPX05PVF9XQU5UX1RPX1RBTEtfVE9fWU9VICAg
ICAgICAyDQogICAgICAgICBUaGUgcGVlciBoYXMgZGV0ZXJtaW5lZCB0aGF0IGl0IGRvZXMgbm90
IHNlZSBhIG5lZWQgZm9yIHRoZQ0KICAgICAgICAgdHJhbnNwb3J0IGNvbm5lY3Rpb24gdG8gZXhp
c3QsIHNpbmNlIGl0IGRvZXMgbm90IGV4cGVjdCBhbnkNCiAgICAgICAgIG1lc3NhZ2VzIHRvIGJl
IGV4Y2hhbmdlZCBpbiB0aGUgbmVhciBmdXR1cmUuICBBIHJlY2VpdmVyIG9mIGENCiAgICAgICAg
IERQUiB3aXRoIGFib3ZlIHJlc3VsdCBjb2RlIFNIT1VMRCBOT1QgYXR0ZW1wdCByZWNvbm5lY3Rp
b24uDQoNCkNvcnJlY3RlZCBUZXh0DQotLS0tLS0tLS0tLS0tLQ0KICAgVGhlIERpc2Nvbm5lY3Qt
Q2F1c2UgQVZQIChBVlAgQ29kZSAyNzMpIGlzIG9mIHR5cGUgRW51bWVyYXRlZC4gIEENCiAgIERp
YW1ldGVyIG5vZGUgTVVTVCBpbmNsdWRlIHRoaXMgQVZQIGluIHRoZSBEaXNjb25uZWN0LVBlZXIt
UmVxdWVzdA0KICAgbWVzc2FnZSB0byBpbmZvcm0gdGhlIHBlZXIgb2YgdGhlIHJlYXNvbiBmb3Ig
aXRzIGludGVudGlvbiB0byBzaHV0DQogICBkb3duIHRoZSB0cmFuc3BvcnQgY29ubmVjdGlvbi4g
IFRoZSBmb2xsb3dpbmcgdmFsdWVzIGFyZSBzdXBwb3J0ZWQ6DQogICAgICBSRUJPT1RJTkcgICAg
ICAgICAgICAgICAgICAgICAgICAgMA0KICAgICAgICAgQSBzY2hlZHVsZWQgcmVib290IGlzIGlt
bWluZW50LiAgQSByZWNlaXZlciBvZiBhIERQUiB3aXRoDQogICAgICAgICBhYm92ZSByZXN1bHQg
Y29kZSBNQVkgYXR0ZW1wdCByZWNvbm5lY3Rpb24uDQogICAgICBCVVNZICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgMQ0KICAgICAgICAgVGhlIGludGVybmFsIHJlc291cmNlcyBhcmUgY29u
c3RyYWluZWQsIGFuZCBpdCBoYXMNCiAgICAgICAgIGRldGVybWluZWQgdGhhdCB0aGUgdHJhbnNw
b3J0IGNvbm5lY3Rpb24gbmVlZHMgdG8gYmUgY2xvc2VkLg0KICAgICAgICAgQSByZWNlaXZlciBv
ZiBhIERQUiB3aXRoIGFib3ZlIHJlc3VsdCBjb2RlIFNIT1VMRCBOT1QgYXR0ZW1wdA0KICAgICAg
ICAgcmVjb25uZWN0aW9uLg0KICAgICAgRE9fTk9UX1dBTlRfVE9fVEFMS19UT19ZT1UgICAgICAg
IDINCiAgICAgICAgIFRoZSBub2RlIGhhcyBkZXRlcm1pbmVkIHRoYXQgaXQgZG9lcyBub3Qgc2Vl
IGEgbmVlZCBmb3IgdGhlDQogICAgICAgICB0cmFuc3BvcnQgY29ubmVjdGlvbiB0byBleGlzdCwg
c2luY2UgaXQgZG9lcyBub3QgZXhwZWN0IGFueQ0KICAgICAgICAgbWVzc2FnZXMgdG8gYmUgZXhj
aGFuZ2VkIGluIHRoZSBuZWFyIGZ1dHVyZS4gIEEgcmVjZWl2ZXIgb2YgYQ0KICAgICAgICAgRFBS
IHdpdGggYWJvdmUgcmVzdWx0IGNvZGUgU0hPVUxEIE5PVCBhdHRlbXB0IHJlY29ubmVjdGlvbi4N
Cg0KTm90ZXMNCi0tLS0tDQpUaGUgInBlZXIiIGluIDFzdCBwYXJhZ3JhcGggcmVwcmVzZW50cyB0
aGUgcmVjZWl2ZXIuIEhvd2V2ZXIgaW4gdGhlIGRlc2NyaXB0aW9ucyBmb3IgY2F1c2UgdmFsdWVz
IHRoZSAicGVlciIgcmVwcmVzZW50cyB0aGUgc2VuZGVyLg0KDQpJbnN0cnVjdGlvbnM6DQotLS0t
LS0tLS0tLS0tDQpUaGlzIGVycmF0dW0gaXMgY3VycmVudGx5IHBvc3RlZCBhcyAiUmVwb3J0ZWQi
LiBJZiBuZWNlc3NhcnksIHBsZWFzZSB1c2UgIlJlcGx5IEFsbCIgdG8gZGlzY3VzcyB3aGV0aGVy
IGl0IHNob3VsZCBiZSB2ZXJpZmllZCBvciByZWplY3RlZC4gV2hlbiBhIGRlY2lzaW9uIGlzIHJl
YWNoZWQsIHRoZSB2ZXJpZnlpbmcgcGFydHkgKElFU0cpIGNhbiBsb2cgaW4gdG8gY2hhbmdlIHRo
ZSBzdGF0dXMgYW5kIGVkaXQgdGhlIHJlcG9ydCwgaWYgbmVjZXNzYXJ5LiANCg0KLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NClJGQzY3MzMgKGRyYWZ0LWlldGYtZGltZS1y
ZmMzNTg4YmlzLTMzKQ0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NClRp
dGxlICAgICAgICAgICAgICAgOiBEaWFtZXRlciBCYXNlIFByb3RvY29sDQpQdWJsaWNhdGlvbiBE
YXRlICAgIDogT2N0b2JlciAyMDEyDQpBdXRob3IocykgICAgICAgICAgIDogVi4gRmFqYXJkbywg
RWQuLCBKLiBBcmtrbywgSi4gTG91Z2huZXksIEcuIFpvcm4sIEVkLg0KQ2F0ZWdvcnkgICAgICAg
ICAgICA6IFBST1BPU0VEIFNUQU5EQVJEDQpTb3VyY2UgICAgICAgICAgICAgIDogRGlhbWV0ZXIg
TWFpbnRlbmFuY2UgYW5kIEV4dGVuc2lvbnMNCkFyZWEgICAgICAgICAgICAgICAgOiBPcGVyYXRp
b25zIGFuZCBNYW5hZ2VtZW50DQpTdHJlYW0gICAgICAgICAgICAgIDogSUVURg0KVmVyaWZ5aW5n
IFBhcnR5ICAgICA6IElFU0cNCg0KDQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQoNCkNlIG1lc3NhZ2UgZXQgc2VzIHBpZWNl
cyBqb2ludGVzIHBldXZlbnQgY29udGVuaXIgZGVzIGluZm9ybWF0aW9ucyBjb25maWRlbnRpZWxs
ZXMgb3UgcHJpdmlsZWdpZWVzIGV0IG5lIGRvaXZlbnQgZG9uYyBwYXMgZXRyZSBkaWZmdXNlcywg
ZXhwbG9pdGVzIG91IGNvcGllcyBzYW5zIGF1dG9yaXNhdGlvbi4gU2kgdm91cyBhdmV6IHJlY3Ug
Y2UgbWVzc2FnZSBwYXIgZXJyZXVyLCB2ZXVpbGxleiBsZSBzaWduYWxlciBhIGwnZXhwZWRpdGV1
ciBldCBsZSBkZXRydWlyZSBhaW5zaSBxdWUgbGVzIHBpZWNlcyBqb2ludGVzLiBMZXMgbWVzc2Fn
ZXMgZWxlY3Ryb25pcXVlcyBldGFudCBzdXNjZXB0aWJsZXMgZCdhbHRlcmF0aW9uLCBPcmFuZ2Ug
ZGVjbGluZSB0b3V0ZSByZXNwb25zYWJpbGl0ZSBzaSBjZSBtZXNzYWdlIGEgZXRlIGFsdGVyZSwg
ZGVmb3JtZSBvdSBmYWxzaWZpZS4gTWVyY2kuDQoNClRoaXMgbWVzc2FnZSBhbmQgaXRzIGF0dGFj
aG1lbnRzIG1heSBjb250YWluIGNvbmZpZGVudGlhbCBvciBwcml2aWxlZ2VkIGluZm9ybWF0aW9u
IHRoYXQgbWF5IGJlIHByb3RlY3RlZCBieSBsYXc7IHRoZXkgc2hvdWxkIG5vdCBiZSBkaXN0cmli
dXRlZCwgdXNlZCBvciBjb3BpZWQgd2l0aG91dCBhdXRob3Jpc2F0aW9uLg0KSWYgeW91IGhhdmUg
cmVjZWl2ZWQgdGhpcyBlbWFpbCBpbiBlcnJvciwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGFu
ZCBkZWxldGUgdGhpcyBtZXNzYWdlIGFuZCBpdHMgYXR0YWNobWVudHMuDQpBcyBlbWFpbHMgbWF5
IGJlIGFsdGVyZWQsIE9yYW5nZSBpcyBub3QgbGlhYmxlIGZvciBtZXNzYWdlcyB0aGF0IGhhdmUg
YmVlbiBtb2RpZmllZCwgY2hhbmdlZCBvciBmYWxzaWZpZWQuDQpUaGFuayB5b3UuDQoNCg==


From nobody Mon Dec 29 08:33:41 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 256561A8953 for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:33:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.778
X-Spam-Level: 
X-Spam-Status: No, score=0.778 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t0WzMNMpEi3N for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:33:38 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.247.250]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D980A1A894C for <dime@ietf.org>; Mon, 29 Dec 2014 08:33:38 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54275 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y5dG8-0001wS-Tg; Mon, 29 Dec 2014 08:33:36 -0800
Message-ID: <54A1825B.1000503@usdonovans.com>
Date: Mon, 29 Dec 2014 10:33:31 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>, "DOLLY, MARTIN C" <md3135@att.com>
References: <54984D7E.3010405@usdonovans.com> <C56EB464-8F5A-40D5-911F-D87F7B707A1F@nostrum.com> <E42CCDDA6722744CB241677169E83656033813A1@MISOUT7MSGUSRDB.ITServices.sbc.com> <E42CCDDA6722744CB241677169E83656033813F2@MISOUT7MSGUSRDB.ITServices.sbc.com> <26D1E2EC-3DF6-487C-980F-F6DBE6EFDF39@nostrum.com>
In-Reply-To: <26D1E2EC-3DF6-487C-980F-F6DBE6EFDF39@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ERzlpdkjaHSXcAUJFEZ05t-4I7o
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Handling of mandatory sub-avps
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 16:33:40 -0000

Ben,

As you suggesting that just the AVP that isn't understood is ignored or 
the entire grouped AVP it is part of is ignored?  If the "sub-avp" is 
marked as mandatory then it would seem that the entire grouped AVP 
should be ignored.

Steve

On 12/22/14 10:34 PM, Ben Campbell wrote:
> Martin, I think we are violently agreeing. A DOIC "failure" doesn't impact the Diameter transaction.
>
>
>> On Dec 22, 2014, at 8:42 PM, DOLLY, MARTIN C <md3135@att.com> wrote:
>>
>> To be clear, ignore what one does not understand.
>>
>> -----Original Message-----
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of DOLLY, MARTIN C
>> Sent: Monday, December 22, 2014 9:34 PM
>> To: Ben Campbell; Steve Donovan
>> Cc: dime@ietf.org
>> Subject: Re: [Dime] Handling of mandatory sub-avps
>>
>> *** Security Advisory: This Message Originated Outside of AT&T ***.
>> Reference http://cso.att.com/EmailSecurity/IDSP.html for more information.
>>
>> NO, WRONG
>>
>> -----Original Message-----
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of Ben Campbell
>> Sent: Monday, December 22, 2014 7:16 PM
>> To: Steve Donovan
>> Cc: dime@ietf.org
>> Subject: Re: [Dime] Handling of mandatory sub-avps
>>
>> My opinion is that any DOIC error (i.e. something wrong in OC-S-F or OC-OLR) should never cause an error or other failure of the enclosing transaction. Normally the only way DOIC should affect a transaction is via abatement.
>>
>> I would grudgingly accept the ability for a Diameter application spec to say that the application must not be used without DOIC (and potentially certain DOIC features.), as long as such a requirement was explicit (including explicit on _how_ it should fail), but I think that's a different use case.
>>
>>> On Dec 22, 2014, at 10:57 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
>>>
>>> All,
>>>
>>> The following is an open issue from Ben's suggested editorial changes that still needs to be addressed.
>>>
>>> Regards,
>>>
>>> Steve
>>>>> -- 4.3, para 4:
>>>>>
>>>>> We should clarify that this is talking about mandatory to understand for DOIC, but not for the enclosing transaction.
>>>> SRD> i'm not clear on what you are suggesting.
>>> We need to be clear that receiving a DOIC avp with a mandatory AVP that you don't understand means you ignore the DOIC AVPs, but does not cause the Diameter transaction to fail. Or was it your intent to allow an application to say that if you get a DOIC avp that you can't process, you have to fail the Diameter transaction?
>>>
>>>> Do you have suggested wording?
>>> Depends on the answer to the question above.
>>>
>>> _______________________________________________
>>> DiME mailing list
>>> DiME@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dime
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime


From nobody Mon Dec 29 08:38:57 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54BA11A8953 for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:38:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.778
X-Spam-Level: 
X-Spam-Status: No, score=0.778 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YzKNze3jzWbM for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:38:54 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.247.250]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A42601A8949 for <dime@ietf.org>; Mon, 29 Dec 2014 08:38:54 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54284 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y5dLI-00098f-44; Mon, 29 Dec 2014 08:38:53 -0800
Message-ID: <54A1839B.1050009@usdonovans.com>
Date: Mon, 29 Dec 2014 10:38:51 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Ben Campbell <ben@nostrum.com>
References: <79E0AA6A-8F91-45FD-AE8A-EFF9D2A4E9D3@nostrum.com> <5491AEC7.8070307@usdonovans.com> <ECEC60E8-3E83-46F6-834D-D5D615660E4E@nostrum.com> <54984D31.5000201@usdonovans.com> <00328701-E938-444C-B8BC-ADBE05B201CB@nostrum.com>
In-Reply-To: <00328701-E938-444C-B8BC-ADBE05B201CB@nostrum.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/2pIooooEFXVHEasD6rEIiwcZwt0
Cc: dime@ietf.org
Subject: Re: [Dime] DOIC WGLC: Editorial Comments
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 16:38:55 -0000

On 12/22/14 6:11 PM, Ben Campbell wrote:
> Hi, I've removed sections that seem to need no further discussion, where you've suggested moving to separate threads, or where I'm just gonna roll over :-)
>
>> On Dec 22, 2014, at 10:56 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
> [...]
>>>>> -- 4.1.2, para 7: "If it selects a different algorithm, it MUST...:
>>>>>
>>>>> This is also true if it needs to announce some other feature that needs to be indicated.
>>>> SRD> This paragraph is talking specifically about algorithms and is needed because the AVP is optional.  Are you suggesting another sentence, another paragraph?  I'm guessing that the case you talk about is already covered elsewhere.
>>> We say this in 4.1.1 on reacting node behavior. We should make the same statement for reporting node behavior. This is the definitive section on reporting node behavior. If it's repeated elsewhere, we should consider whether _that_ text is redundant.
>> SRD> Again, this paragraph is dealing specifically with rules around which the algorithms supported by the reporting node interact with the OC-Features-Vector AVP.  The statement on other features is three paragraphs later.
> If you mean this paragraph:
>
> "  The reporting node SHOULD indicate support for other DOIC features
>     defined in extension drafts that it supports and that apply to the
>     transaction."
>
> Nothing in that (3 paragraphs later) paragraph says you MUST include OC-Features-Vector to do that. It's left for the reader to infer. We do explicitly say that for reacting nodes in 4.1.1.
SRD>  How about adding ..."it does so using the OC-Feature-Vector AVP" 
to the end of the above paragraph.
>
> [...]
>
>
>


From nobody Mon Dec 29 08:40:54 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0EA11A8963 for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:40:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.579
X-Spam-Level: *
X-Spam-Status: No, score=1.579 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rPKJueWr0EWp for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:40:49 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.247.250]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7BFB1A88B4 for <dime@ietf.org>; Mon, 29 Dec 2014 08:40:49 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54289 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y5dN8-000Bql-1Z for dime@ietf.org; Mon, 29 Dec 2014 08:40:48 -0800
Message-ID: <54A1840D.5050403@usdonovans.com>
Date: Mon, 29 Dec 2014 10:40:45 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: dime@ietf.org
References: <0AF415BD-4AA8-4A4F-942B-29DA6C9E417B@nostrum.com> <549193B8.6000603@usdonovans.com> <CA291819-0B08-4084-8671-F45148D9B739@nostrum.com> <5491B2BB.30709@usdonovans.com> <3543DB65-DFC1-4ADE-8808-7B931F325F92@nostrum.com> <5491CE28.2020205@usdonovans.com> <0E11AEDD-6E90-4D61-8759-557B8596BAFB@nostrum.com> <54920B37.4060201@gmail.com> <2BE199F8-262D-40AB-A567-A857E94B3A6A@nostrum.com> <5BCBA1FC2B7F0B4C9D935572D900066815235C94@DEMUMBX014.nsn-intra.net> <EF4A3B0F-1FA2-49C4-BA33-45C6EFFBAACA@nostrum.com> <E194C2E18676714DACA9C3A2516265D2026F462A@FR712WXCHMBA12.zeu.alcatel-lucent.com>
In-Reply-To: <E194C2E18676714DACA9C3A2516265D2026F462A@FR712WXCHMBA12.zeu.alcatel-lucent.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/ocp1sRHEiARwAVf8Cl3wnoxsrgw
Subject: Re: [Dime] DOIC WGLC: duration unit
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 16:40:51 -0000

It appears that we are moving toward consensus to move back to seconds.  
If we do then I agree that a 24 hour maximum is reasonable.

Does anyone object to moving back to seconds with a 24 hour maximum?

Regards,

Steve

On 12/22/14 3:59 PM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
> Dear all
>
> I am also ,in favor  to take the second as unit (according to Ben 's arguments), and also to have a upper limit. The limit that Ben gives is about 50 days. Is 24 hours too short?
>
> Best regards
>
> JJacques
>
> -----Message d'origine-----
> De : DiME [mailto:dime-bounces@ietf.org] De la part de Ben Campbell
> Envoyé : vendredi 19 décembre 2014 00:47
> À : Wiehe, Ulrich (NSN - DE/Munich)
> Cc : dime@ietf.org
> Objet : Re: [Dime] DOIC WGLC: duration unit
>
> Hi Ulrich,
>
> You bring up a good point that we need to document the limits, or at least describe the implications of choosing to long or short of a duration either way. I suspect 1s is still too short for most situations, and  ( 2^32 - 1 / 1000 )s is probably still too long.
>
> (Don't get me wrong; I still think millisecond resolution for this is silly.)
>
> Thanks!
>
> Ben.
>
>> On Dec 18, 2014, at 11:11 AM, Wiehe, Ulrich (NSN - DE/Munich) <ulrich.wiehe@nsn.com> wrote:
>>
>> Ben,
>>
>> my inclination is to change back to seconds. However, seconds allow a maximum value that is 1000 times higher and may be regarded unreasonably high. In a previous version of the draft we had an upper limit, and maybe when going back to seconds we should re-introduce an upper limit so that the protocol does not allow unreasonably long durations.
>>
>> Ulrich
>>
>>
>> -----Original Message-----
>> From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of ext Ben Campbell
>> Sent: Thursday, December 18, 2014 12:08 AM
>> To: Jouni Korhonen
>> Cc: dime@ietf.org
>> Subject: Re: [Dime] DOIC WGLC: duration unit
>>
>>
>>> On Dec 17, 2014, at 5:01 PM, Jouni Korhonen <jouni.nospam@gmail.com> wrote:
>>>
>>> [snip]
>>>
>>>>> I'll step out of the argument and let someone else be champion for millisecond granularity.
>>>> Any other takers? Are there real use cases for sub-second precision?
>>> I do not really care. We changed that from seconds to milliseconds for some reason.. but no not see a reason to change it back either.
>> I'd argue that we should make it the "right thing", regardless of whether we changed it before. (Although remembering why might go far to answering my last question below.)
>>
>> I've describe why I think it is false precision, and can become harmful. To rephrase it, choosing too small of durations will cause harm by forcing rapid OLR updates (as in many per second.) These updates cause work for both reporting nodes and reacting nodes.
>>
>> We could offer guidance of how to avoid that harm. Or we could choose a resolution that makes it harder to cause such harm in the first place. I think good protocol design favors the later.
>>
>> Do you disagree with the potential for harm? Or do you see some use case for sub-second precision that I've missed?
>>
>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>


From nobody Mon Dec 29 08:43:30 2014
Return-Path: <srdonovan@usdonovans.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38B561A895A for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:43:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.778
X-Spam-Level: 
X-Spam-Status: No, score=0.778 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mHga3_DTMzyv for <dime@ietfa.amsl.com>; Mon, 29 Dec 2014 08:43:27 -0800 (PST)
Received: from biz131.inmotionhosting.com (biz131.inmotionhosting.com [173.247.247.250]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 410AA1A896C for <dime@ietf.org>; Mon, 29 Dec 2014 08:43:27 -0800 (PST)
Received: from cpe-76-187-100-94.tx.res.rr.com ([76.187.100.94]:54292 helo=Steves-MacBook-Air-2.local) by biz131.inmotionhosting.com with esmtpsa (UNKNOWN:RC4-SHA:128) (Exim 4.82) (envelope-from <srdonovan@usdonovans.com>) id 1Y5dPg-0002yY-4E; Mon, 29 Dec 2014 08:43:26 -0800
Message-ID: <54A184AB.8040109@usdonovans.com>
Date: Mon, 29 Dec 2014 10:43:23 -0600
From: Steve Donovan <srdonovan@usdonovans.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: "TROTTIN, JEAN-JACQUES (JEAN-JACQUES)" <jean-jacques.trottin@alcatel-lucent.com>,  Ben Campbell <ben@nostrum.com>, "dime@ietf.org list" <dime@ietf.org>
References: <93DEBE9A-62A4-4637-9BF8-FFCD4195B115@nostrum.com> <54912AA6.2080706@gmail.com> <E194C2E18676714DACA9C3A2516265D2026F460F@FR712WXCHMBA12.zeu.alcatel-lucent.com>
In-Reply-To: <E194C2E18676714DACA9C3A2516265D2026F460F@FR712WXCHMBA12.zeu.alcatel-lucent.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz131.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - usdonovans.com
X-Get-Message-Sender-Via: biz131.inmotionhosting.com: authenticated_id: srd+usdonovans.com/only user confirmed/virtual account not confirmed
Archived-At: http://mailarchive.ietf.org/arch/msg/dime/DV0p8GOzzDePf5JbFiPcToBwt0Y
Subject: Re: [Dime] DOIC WGLC: Implicit values for OC-OLR
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 16:43:28 -0000

JJ,

I had already removed the paragraph based on no apparent objections.  Is 
this acceptable?

Regards,

Steve

On 12/22/14 3:54 PM, TROTTIN, JEAN-JACQUES (JEAN-JACQUES) wrote:
> Hi
>
> I think we can keep the current text as a general statement. This  does not prevmrt from indicating  more explicit meaning in future extensions if needed.
>
> Best regards
>
> JJacques
>
> -----Message d'origine-----
> De : DiME [mailto:dime-bounces@ietf.org] De la part de Jouni Korhonen
> Envoyé : mercredi 17 décembre 2014 08:03
> À : Ben Campbell; dime@ietf.org list; draft-ietf-dime-ovli@tools.ietf.org
> Objet : Re: [Dime] DOIC WGLC: Implicit values for OC-OLR
>
> OK with me.
>
> - Jouni
>
> 12/17/2014 7:11 AM, Ben Campbell kirjoitti:
>> (No, this is not the general rant on implicit values you from me :-)  )
>>
>> In section 6.3, paragraph 1, we have the following sentence:
>>
>> " The OC-OLR AVP does not explicitly contain all information needed by the reacting node to decide whether a subsequent request must undergo abatement using the received reduction percentage."
>>
>> I think this may vary by report type. For example, peer reports might need to include at least  some things explicitly that are implicit for host and realm reports. It's even different between host and realm reports. Therefore, I think we should remove it from this section, and put the specifics in the description of each report type.
>>
>>
>>
>>
>> _______________________________________________
>> DiME mailing list
>> DiME@ietf.org
>> https://www.ietf.org/mailman/listinfo/dime
>>
> _______________________________________________
> DiME mailing list
> DiME@ietf.org
> https://www.ietf.org/mailman/listinfo/dime
>

