| < draft-ietf-ieprep-ets-telephony-06.txt | draft-ietf-ieprep-ets-telephony-07.txt > | |||
|---|---|---|---|---|
| Internet Engineering Task Force Ken Carlberg | Internet Engineering Task Force Ken Carlberg | |||
| INTERNET DRAFT UCL | INTERNET DRAFT UCL | |||
| Sept 8, 2003 Ran Atkinson | November 28, 2003 Ran Atkinson | |||
| Extreme Networks | Extreme Networks | |||
| IP Telephony Requirements for | IP Telephony Requirements for | |||
| Emergency Telecommunication Service | Emergency Telecommunication Service | |||
| <draft-ietf-ieprep-ets-telephony-06.txt> | <draft-ietf-ieprep-ets-telephony-07.txt> | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026 [1]. | all provisions of Section 10 of RFC2026 [1]. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that other | Task Force (IETF), its areas, and its working groups. Note that other | |||
| groups may also distribute working documents as Internet-Drafts. | groups may also distribute working documents as Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet- Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft | http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft | |||
| Shadow Directories can be accessed at | Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| For potential updates to the above required-text see: | For potential updates to the above required-text see: | |||
| http://www.ietf.org/ietf/1id-guidelines.txt | http://www.ietf.org/ietf/1id-guidelines.txt | |||
| skipping to change at page 3, line 45 ¶ | skipping to change at page 3, line 45 ¶ | |||
| infrastructure (traditional PSTN over some portion(s) of the path, | infrastructure (traditional PSTN over some portion(s) of the path, | |||
| Internet telephony over some other portion(s) of the path) can | Internet telephony over some other portion(s) of the path) can | |||
| carry the labels end-to-end with appropriate translation at | carry the labels end-to-end with appropriate translation at | |||
| PSTN/Internet boundaries. Absence of a mapping means that the | PSTN/Internet boundaries. Absence of a mapping means that the | |||
| signaling reverts to a default service (presumably one attributed | signaling reverts to a default service (presumably one attributed | |||
| to the general public). | to the general public). | |||
| 4) Application layer IP telephony capabilities MUST NOT preclude | 4) Application layer IP telephony capabilities MUST NOT preclude | |||
| the ability to do application layer accounting. | the ability to do application layer accounting. | |||
| Accounting is a useful feature in support of billing and tracking | ||||
| down abuse of service. If specific solutions or protocols in | ||||
| support of ETS require accounting, then this will be articulated | ||||
| in future document(s). | ||||
| 5) Application layer mechanisms in gateways and stateful proxies | 5) Application layer mechanisms in gateways and stateful proxies | |||
| that are specifically in place to recognize ETS type labels MUST | that are specifically in place to recognize ETS type labels MUST | |||
| be able to support "best available" service (this will probably be | be able to support "best available" service (this will probably be | |||
| realized as better than best effort). These labels MAY exist in | realized as better than best effort). These labels MAY exist in | |||
| ^L | ||||
| the application layer headers of data (i.e., bearer) traffic or | the application layer headers of data (i.e., bearer) traffic or | |||
| signaling traffic used for call completion. | signaling traffic used for call completion. | |||
| The support for best available service SHOULD focus on | The support for best available service SHOULD focus on | |||
| probability of forwarding packets. Probability MAY reach 100% | probability of forwarding packets. Probability MAY reach 100% | |||
| ^L | ||||
| depending on the local policy associated with the label. Local | depending on the local policy associated with the label. Local | |||
| policy MUST also be used to determine if better than best effort | policy MUST also be used to determine if better than best effort | |||
| is to be applied to a specific label (or related set of labels). | is to be applied to a specific label (or related set of labels). | |||
| Additional comments on this topic are presented below in item 2 | Additional comments on this topic are presented below in item 2 | |||
| of section 4. | of section 4. | |||
| The above paragraphs MUST be taken in their entirety. The ability | The above paragraphs MUST be taken in their entirety. The ability | |||
| to support best available service does not mean that the | to support best available service does not mean that the | |||
| application layer mechanism is expected to be activated. Further, | application layer mechanism is expected to be activated. Further, | |||
| we do not define the means by which best available service is | we do not define the means by which best available service is | |||
| realized. Application layer mechanisms that do not recognize | realized. Application layer mechanisms that do not recognize | |||
| ETS ytype labels are not subject to this requirement. | ETS type labels are not subject to this requirement. | |||
| 4. Issues | 4. Issues | |||
| This section presents issues that arise in considering solutions for | This section presents issues that arise in considering solutions for | |||
| the telephony requirements that have been defined for ETS. This | the telephony requirements that have been defined for ETS. This | |||
| section does not specify solutions nor is it to be confused with | section does not specify solutions nor is it to be confused with | |||
| requirements. Subsequent documents that articulate a more specific | requirements. Subsequent documents that articulate a more specific | |||
| set of requirements for a particular service may make a statement | set of requirements for a particular service may make a statement | |||
| about the following issues. | about the following issues. | |||
| skipping to change at page 4, line 48 ¶ | skipping to change at page 5, line 4 ¶ | |||
| causes IP packets to travel the best current path. The Internet | causes IP packets to travel the best current path. The Internet | |||
| network infrastructure does not have the concept of a "call" or | network infrastructure does not have the concept of a "call" or | |||
| the concept of "call setup", though IP telephony applications | the concept of "call setup", though IP telephony applications | |||
| might have application layer awareness of calls or the call | might have application layer awareness of calls or the call | |||
| setup concept. | setup concept. | |||
| 2) Application of Best Available Service | 2) Application of Best Available Service | |||
| In item 5 of section 3 above, we discuss the requirement of | In item 5 of section 3 above, we discuss the requirement of | |||
| supporting best available service. We note that in this | supporting best available service. We note that in this | |||
| ^L | ||||
| document, the scope of that support is constrained to the | document, the scope of that support is constrained to the | |||
| application layer and flows that traverse that layer. This | application layer and flows that traverse that layer. This | |||
| may involve direct support for the flow containing the ETS | may involve direct support for the flow containing the ETS | |||
| type label, or may involve indirect support (e.g., ETS labels | type label, or may involve indirect support (e.g., ETS labels | |||
| in signaling messages that causes an effect on corresponding | in signaling messages that causes an effect on corresponding | |||
| ^L | ||||
| data or bearer flows). | data or bearer flows). | |||
| It is critical to understand that how the support for best | It is critical to understand that how the support for best | |||
| available service can be realized is outside the scope of this | available service can be realized is outside the scope of this | |||
| document. In addition, the perceived effectiveness of a given | document. In addition, the perceived effectiveness of a given | |||
| approach or implementation also outside the scope of this | approach or implementation also outside the scope of this | |||
| document. | document. | |||
| 5. Security | 5. Security | |||
| skipping to change at page 5, line 29 ¶ | skipping to change at page 5, line 34 ¶ | |||
| strong end-to-end integrity during their transmission through the | strong end-to-end integrity during their transmission through the | |||
| telephony systems. Finally, in cases where labels are expected to be | telephony systems. Finally, in cases where labels are expected to be | |||
| acted upon by operators, these operators SHOULD have the capability | acted upon by operators, these operators SHOULD have the capability | |||
| of authenticating the label on a received message or transmission in | of authenticating the label on a received message or transmission in | |||
| order to prevent theft of service and reduce risk of denial of | order to prevent theft of service and reduce risk of denial of | |||
| service (e.g. by unauthorized users consuming any limited resources). | service (e.g. by unauthorized users consuming any limited resources). | |||
| Security is also discussed in the general requirements of [2], which | Security is also discussed in the general requirements of [2], which | |||
| applies to section 3 above. | applies to section 3 above. | |||
| 6. References | Normative References | |||
| There are no Normative References because this is an Informational | ||||
| document. | ||||
| Informative References | ||||
| 1 Bradner, S., "The Internet Standards Process -- Revision 3", BCP | 1 Bradner, S., "The Internet Standards Process -- Revision 3", BCP | |||
| 9, RFC 2026, October 1996. | 9, RFC 2026, October 1996. | |||
| 2 Carlberg, K., Atkinson, R., "General System Requirements for | 2 Carlberg, K., Atkinson, R., "General System Requirements for | |||
| Emergency Telecommunications Service", Internet Draft, | Emergency Telecommunications Service", Internet Draft, | |||
| Work In Progress, September, 2002 | Work In Progress, September, 2002 | |||
| 3 Schulzrinne, H., "Requirements for Resource Priority Mechanisms | 3 Schulzrinne, H., "Requirements for Resource Priority Mechanisms | |||
| for the Session Initiation Protocol (SIP)", RFC 3487, February, | for the Session Initiation Protocol (SIP)", RFC 3487, February, | |||
| 2003. | 2003. | |||
| ^L | ||||
| 4 ANSI, "Signaling System No. 7(SS7): High Probability of | 4 ANSI, "Signaling System No. 7(SS7): High Probability of | |||
| Completion (HPC) Network Capability", ANSI T1.631, 1993. | Completion (HPC) Network Capability", ANSI T1.631, 1993. | |||
| 5 Bradner, S., "Key words for use in RFCs to Indicate Requirement | 5 Bradner, S., "Key words for use in RFCs to Indicate Requirement | |||
| Levels", RFC 2119, March 1997. | Levels", RFC 2119, March 1997. | |||
| ^L | Author's Addresses | |||
| 7. Author's Addresses | ||||
| Ken Carlberg Ran Atkinson | Ken Carlberg Ran Atkinson | |||
| University College London Extreme Networks | University College London Extreme Networks | |||
| Department of Computer Science 3585 Monroe Street | Department of Computer Science 3585 Monroe Street | |||
| Gower Street Santa Clara, CA | Gower Street Santa Clara, CA | |||
| London, WC1E 6BT 95051 USA | London, WC1E 6BT 95051 USA | |||
| United Kingdom | United Kingdom | |||
| k.carlberg@cs.ucl.ac.uk rja@extremenetworks.com | k.carlberg@cs.ucl.ac.uk rja@extremenetworks.com | |||
| Full Copyright Statement | Full Copyright Statement | |||
| End of changes. 12 change blocks. | ||||
| 12 lines changed or deleted | 22 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||