< draft-ietf-nsis-req-01.txt   draft-ietf-nsis-req-02.txt >
NSIS Working Group NSIS Working Group
Internet Draft M. Brunner (Editor) Internet Draft M. Brunner (Editor)
Document: draft-ietf-nsis-req-01.txt NEC Document: draft-ietf-nsis-req-02.txt NEC
Expires: October 2002 April 2002 Expires: November 2002 May 2002
Requirements for QoS Signaling Protocols Requirements for QoS Signaling Protocols
<draft-ietf-nsis-req-01.txt> <draft-ietf-nsis-req-02.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance This document is an Internet-Draft and is in full conformance
with all provisions of Section 10 of RFC2026. with all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
Internet-Drafts are draft documents valid for a maximum of six Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
Abstract Abstract
This document defines requirements for signaling QoS across This document defines requirements for signaling QoS across
different network environments. To achieve wide applicability of the different network environments. To achieve wide applicability of the
requirements, the starting point is a diverse set of scenarios/use requirements, the starting point is a diverse set of scenarios/use
cases concerning various types of networks and application cases concerning various types of networks and application
interactions. We also provide an outline structure for the problem, interactions. We also provide an outline structure for the problem,
including QoS related terminology. Taken with the scenarios, this including QoS related terminology. Taken with the scenarios, this
allows us to focus more precisely on which parts of the overall QoS allows us to focus more precisely on which parts of the overall QoS
problem needs to be solved. We present the assumptions and the problem needs to be solved. We present the assumptions and the
aspects not considered within scope before listing the requirements aspects not considered within scope before listing the requirements
grouped according to areas such as architecture and design goals, grouped according to areas such as architecture and design goals,
skipping to change at page 9, line 12 skipping to change at page 9, line 12
implies the need for the translation of information into QoS domain implies the need for the translation of information into QoS domain
specific format as well. specific format as well.
4. We assume that the service definitions a QoS initiator can ask 4. We assume that the service definitions a QoS initiator can ask
for are known in advance of the signaling protocol running. Service for are known in advance of the signaling protocol running. Service
definition includes QoS parameters, life-time of QoS guarantee etc. definition includes QoS parameters, life-time of QoS guarantee etc.
There are many ways a service requester get to know about it. There There are many ways a service requester get to know about it. There
might be standardized services, the definition can be negotiated might be standardized services, the definition can be negotiated
together with a contract, the service definition is published at a together with a contract, the service definition is published at a
Web-page, etc. Web-page, etc.
5. We assume that there are means for the discovery of NSIS entities 5. We assume that there are means for the discovery of NSIS entities
in order to know the signaling peers (solutions include static in order to know the signaling peers (solutions include static
configuration, automatically discovered, or implicitly runs over the configuration, automatically discovered, or implicitly runs over the
right nodes, etc.) right nodes, etc.)
4.2 Exclusions 4.2 Exclusions
1. Development of specific mechanisms and algorithms for application 1. Development of specific mechanisms and algorithms for application
and transport layer adaptation are not considered, nor are the and transport layer adaptation are not considered, nor are the
protocols that would support it. protocols that would support it.
2. Specific mechanisms (APIs and so on) for interaction between 2. Specific mechanisms (APIs and so on) for interaction between
transport/applications and the network layer are not considered, transport/applications and the network layer are not considered,
except to clarify the requirements on the negotiation capabilities except to clarify the requirements on the negotiation capabilities
and information semantics that would be needed of the signaling and information semantics that would be needed of the signaling
protocol. The same applies to application adaptation mechanisms. protocol. The same applies to application adaptation mechanisms.
3. Specific mechanisms for QoS provisioning within a 3. Specific mechanisms for QoS provisioning within a
domain/subdomain are not considered. It should be possible to domain/subdomain are not considered. It should be possible to
exploit these mechanisms optimally within the end to end context. exploit these mechanisms optimally within the end to end context.
Consideration of how to do this might generate new requirements for Consideration of how to do this might generate new requirements for
NSIS however. For example, the information needed by an QoS NSIS however. For example, the information needed by an QoS
controller to manage a radio subnetwork needs to be provided by the controller to manage a radio subnetwork needs to be provided by the
NSIS solution. NSIS solution.
4. Specific mechanisms (APIs and so on) for interaction between the 4. Specific mechanisms (APIs and so on) for interaction between the
network layer and underlying QoS provisioning mechanisms are not network layer and underlying QoS provisioning mechanisms are not
considered. considered.
5. Interaction with QoS administration capabilities is not 5. Interaction with QoS administration capabilities is not
considered. Standard protocols should be used for this (e.g. COPS). considered. Standard protocols should be used for this (e.g. COPS).
This may imply requirements for the sort of information that should This may imply requirements for the sort of information that should
be exchanged between the NSIS network QoS entities. be exchanged between the NSIS network QoS entities.
6. Security issues related to multicasting are outside the scope of 6. Security issues related to multicasting are outside the scope of
the QoS signaling protocol. the QoS signaling protocol.
Since multicasting is currently not an issue for the QoS protocol, Since multicasting is currently not an issue for the QoS protocol,
security issues related to multicast are outside the scope. security issues related to multicast are outside the scope.
Multicast security may additionally be an application issue that is Multicast security may additionally be an application issue that is
also outside the scope of the QoS protocol. also outside the scope of the QoS protocol.
7. Protection of non-QoS signaling messages is outside the scope of 7. Protection of non-QoS signaling messages is outside the scope of
the QoS protocol the QoS protocol
Security protection of data messages transmitted along the Security protection of data messages transmitted along the
established QoS path is outside the scope of the QoS protocol. These established QoS path is outside the scope of the QoS protocol. These
security properties are likely to be application specific and may be security properties are likely to be application specific and may be
provided by the corresponding application layer protocol. provided by the corresponding application layer protocol.
8. Service definitions and QoS classes are out of scope. Together 8. Service definitions and QoS classes are out of scope. Together
with the service definition any definition of service specific with the service definition any definition of service specific
parameters are not considered in this draft. Only the base NSIS parameters are not considered in this draft. Only the base NSIS
signaling protocol for transporting the QoS/service information are signaling protocol for transporting the QoS/service information are
handled. handled.
9. Similarly, specific methods, protocols, and ways to express QoS 9. Similarly, specific methods, protocols, and ways to express QoS
information in the Application/Session level are not considered information in the Application/Session level are not considered
(e.g., SDP, SIP, RTSP, etc.). (e.g., SDP, SIP, RTSP, etc.).
10. The specification of any extensions needed to signal QoS 10. The specification of any extensions needed to signal QoS
information via application level protocols (e.g. SDP(ng)), and the information via application level protocols (e.g. SDP(ng)), and the
mapping on NSIS information are considered outside of the scope of mapping on NSIS information are considered outside of the scope of
NSIS working group, as this work is in the direct scope of other NSIS working group, as this work is in the direct scope of other
IETF working groups (e.g. MMUSIC). IETF working groups (e.g. MMUSIC).
5 Requirements 5 Requirements
This section defines more detailed requirements for a QoS signaling This section defines more detailed requirements for a QoS signaling
solution, derived from consideration of the use cases/scenarios, and solution, derived from consideration of the use cases/scenarios, and
respecting the framework, scoping assumptions, and terminology respecting the framework, scoping assumptions, and terminology
considered earlier. The requirements are in subsections, grouped considered earlier. The requirements are in subsections, grouped
roughly according to general technical aspects: architecture and roughly according to general technical aspects: architecture and
design goals, topology issues, QoS parameters, performance, design goals, topology issues, QoS parameters, performance,
security, information, and flexibility. security, information, and flexibility.
Two general (and potentially contradictory) goals for the solution Two general (and potentially contradictory) goals for the solution
are that it should be applicable in a very wide range of scenarios, are that it should be applicable in a very wide range of scenarios,
and at the same time lightweight in implementation complexity and and at the same time lightweight in implementation complexity and
resource requirements in nodes. One approach to this is that the resource requirements in nodes. One approach to this is that the
solution could deal with certain requirements via modular components solution could deal with certain requirements via modular components
or capabilities, which are optional to implement in individual or capabilities, which are optional to implement in individual
nodes. nodes.
Some of the requirements are technically contradictory. Depending on Some of the requirements are technically contradictory. Depending on
the scenarios a solution applies to, one or the other requirement is the scenarios a solution applies to, one or the other requirement is
applicable. applicable.
Find in Section 6 the MUSTs, SHOULDs, and MAYs Find in Section 6 the MUSTs, SHOULDs, and MAYs
5.1 Architecture and Design Goals 5.1 Architecture and Design Goals
This section contains requirements related to desirable overall This section contains requirements related to desirable overall
characteristics of a solution, e.g. enabling flexibility, or characteristics of a solution, e.g. enabling flexibility, or
independence of parts of the framework. independence of parts of the framework.
5.1.1
Applicability for different QoS technologies. 5.1.1 Applicability for different QoS technologies.
The QoS signaling protocol must work with various QoS technologies. The QoS signaling protocol must work with various QoS technologies.
The information exchanged over the signaling protocol must be in The information exchanged over the signaling protocol must be in
such detail and quantity that it is useful for various QoS such detail and quantity that it is useful for various QoS
technologies. technologies.
5.1.2
Resource availability information on request 5.1.2 Resource availability information on request
In some scenarios, e.g., the mobile terminal scenario, it is In some scenarios, e.g., the mobile terminal scenario, it is
required to query, whether resources are available, without required to query, whether resources are available, without
performing a reservation on the resource. One solution might be a performing a reservation on the resource. One solution might be a
feedback mechanism based on which a QoS inferred handover can take feedback mechanism based on which a QoS inferred handover can take
place. place.
5.1.3
Modularity 5.1.3 Modularity
A modular design allows for more lightweight implementations, if A modular design allows for more lightweight implementations, if
fewer features are needed. Mutually exclusive solutions are fewer features are needed. Mutually exclusive solutions are
supported. Examples for modularity: supported. Examples for modularity:
- Work over any kind of network (narrowband / broadband, error-prone - Work over any kind of network (narrowband / broadband, error-prone
/ reliable...) - This implies low bandwidth signaling and redundant / reliable...) - This implies low bandwidth signaling and redundant
information must be supported if necessary. information must be supported if necessary.
- In case QoS requirements are soft (e.g. banking transactions, - In case QoS requirements are soft (e.g. banking transactions,
gaming), fast and lightweight signaling (e.g., not more than one gaming), fast and lightweight signaling (e.g., not more than one
round-trip time) round-trip time)
- Uni- and bi-directional reservations are possible - Uni- and bi-directional reservations are possible
5.1.4
Decoupling of protocol and information it is carrying 5.1.4 Decoupling of protocol and information it is carrying
The signaling protocol(s) used must be clearly separated from the The signaling protocol(s) used must be clearly separated from the
QoS control information being transported. This provides for the QoS control information being transported. This provides for the
independent development of these two aspects of the solution, and independent development of these two aspects of the solution, and
allows for this control information to be carried within other allows for this control information to be carried within other
protocols, including application layer ones, existing ones or those protocols, including application layer ones, existing ones or those
being developed in the future. The gained flexibility in the being developed in the future. The gained flexibility in the
information transported allows for the applicability of the same information transported allows for the applicability of the same
protocol in various scenarios. protocol in various scenarios.
However, note that the information carried needs to be the same. However, note that the information carried needs to be the same.
Otherwise interoperability is difficult to achieve. Otherwise interoperability is difficult to achieve.
5.1.5
Reuse of existing QoS provisioning 5.1.5 Reuse of existing QoS provisioning
Reuse existing QoS functions and protocols for QoS provisioning Reuse existing QoS functions and protocols for QoS provisioning
within a domain/subdomain unchanged. (Motivation: 'Don't re-invent within a domain/subdomain unchanged. (Motivation: 'Don't re-invent
the wheel'.) the wheel'.)
5.1.6
Avoid duplication of [sub]domain signaling functions 5.1.6 Independence of signaling and provisioning paradigm
The specification of the NSIS signaling protocol should be optimized
to avoid duplication of existing [sub]domain QoS signaling and to
minimize the overall complexity. (Motivation: we don't want to
introduce duplicate feedback or negotiation mechanisms, or
complicate the work by including all possible existing QoS signaling
in some form. The function will be placed in the new part if it has
to be end-to-end, universal to all network types
('simple/lightweight'), or if it has to be protected by upper layer
security mechanisms.)
The point here is that the QoS technology (lower layer stuff) gets
re-used unchanged, and we have new signaling above it. But, in many
cases the local QoS technology will contain equivalent functions to
the NSIS-required ones, just in a technology specific form. Examples
of these functions would be error/QoS violation notifications,
ability to query for resources and so on. So, there is a danger that
our 'lightweight' signaling ends up trying to carry all this
information all over again, and (even worse) that the
initiator/controller functions have to weigh up nearly equivalent
information coming from two directions. However, the basic problem
here is that the boundary between new and re-used stuff is pretty
shaky. The requirement is trying to scope our problem (a) to
eliminate the potential overlap, and (b) to keep the new NSIS stuff
simple.
However, we are aware that it is very difficult to judge what is
duplicated, if we want to run the protocol in various environments.
5.1.7
Independence of signaling and provisioning paradigm
The QoS signaling should be independent of the paradigm and The QoS signaling should be independent of the paradigm and
mechanism of QoS provisioning. The independence allows for using the mechanism of QoS provisioning. The independence allows for using the
NSIS protocol together with various QoS technologies. NSIS protocol together with various QoS technologies.
5.2 Signaling Flows 5.2 Signaling Flows
This section contains requirements related to the possible signaling This section contains requirements related to the possible signaling
flows that should be supported, e.g. over what parts of the flow flows that should be supported, e.g. over what parts of the flow
path, between what entities (end-systems, routers, middleboxes, path, between what entities (end-systems, routers, middleboxes,
management systems), in which direction. management systems), in which direction.
5.2.1
Free placement of QoS Initiator and QoS Controllers functions 5.2.1 Free placement of QoS Initiator and QoS Controllers functions
The protocol(s) must work in various scenarios such as host-to- The protocol(s) must work in various scenarios such as host-to-
network-to-host, edge-to-edge, (e.g., just within one providers network-to-host, edge-to-edge, (e.g., just within one providers
domain), user-to-network (from end system into the network, ending, domain), user-to-network (from end system into the network, ending,
e.g., at the entry to the network and vice versa), network-to- e.g., at the entry to the network and vice versa), network-to-
network (e.g., between providers). network (e.g., between providers).
Placing the QoS controller and initiator functions at different Placing the QoS controller and initiator functions at different
locations allows for various scenarios to work with the same or locations allows for various scenarios to work with the same or
similar protocols. similar protocols.
5.2.2
No constraint of the QoS signaling and QoS Controllers to be in 5.2.2 No constraint of the QoS signaling and QoS Controllers to be in
the data path. the data path.
There is a set of scenarios, where QoS signaling is not on the data There is a set of scenarios, where QoS signaling is not on the data
path. The QoS Controller being in the data path is one extreme case path. The QoS Controller being in the data path is one extreme case
and useful in certain cases. and useful in certain cases.
There are going to be cases where a centralized entity will take a There are going to be cases where a centralized entity will take a
decision about QoS requests. In this case, there's no question there decision about QoS requests. In this case, there's no question there
is no need to have data follow the signalling path. is no need to have data follow the signalling path.
There are going to be cases wiout a centralized entity managing There are going to be cases wiout a centralized entity managing
resources and the signaling will be used as a tool for resource resources and the signaling will be used as a tool for resource
management. For various reasons (such as efficient use of expensive management. For various reasons (such as efficient use of expensive
bandwidth), one will want to have fine-grained, fast, and very bandwidth), one will want to have fine-grained, fast, and very
dynamic control of the resources in the network. - dynamic control of the resources in the network. -
There are going to be cases where there will be neither signaling There are going to be cases where there will be neither signaling
nor a centralized entity (overprovisioning). Nothing has to be done nor a centralized entity (overprovisioning). Nothing has to be done
anyway. anyway.
One can capture the requirement with the following wording: If one One can capture the requirement with the following wording: If one
views the domain with a QoS technology as a virtual router then NSIS views the domain with a QoS technology as a virtual router then NSIS
signaling used between those virtual routers must follow the same signaling used between those virtual routers must follow the same
path as the data. path as the data.
Routing the signaling protocol along an independent path is desired Routing the signaling protocol along an independent path is desired
by network operators/designers. Ideally, the capability to route the by network operators/designers. Ideally, the capability to route the
protocol along an independent path would give the network protocol along an independent path would give the network
designer/operator the option to manage bandwidth utilization through designer/operator the option to manage bandwidth utilization through
the topology. the topology.
There are other possibilities as well. An NSIS protocol must accept There are other possibilities as well. An NSIS protocol must accept
all of these possibilities. all of these possibilities.
5.2.3
Concealment of topology and technology information 5.2.3 Concealment of topology and technology information
The QoS protocol should allow hiding the internal structure of a QoS The QoS protocol should allow hiding the internal structure of a QoS
domain from end-nodes and from other networks. Hence an adversary domain from end-nodes and from other networks. Hence an adversary
should not be able to learn the internal structure of a network with should not be able to learn the internal structure of a network with
the help of the QoS protocol. the help of the QoS protocol.
In various scenarios, topology information should be hidden for In various scenarios, topology information should be hidden for
various reasons. From a business point of view, some administrations various reasons. From a business point of view, some administrations
don't want to reveal the topology and technology used. don't want to reveal the topology and technology used.
5.2.4
Optional transparency of QoS signaling to network 5.2.4 Optional transparency of QoS signaling to network
It should be possible that the QoS signaling for some flows traverse It should be possible that the QoS signaling for some flows traverse
path segments transparently, i.e., without interpretation at QoS path segments transparently, i.e., without interpretation at QoS
controllers within the network. An example would be a subdomain controllers within the network. An example would be a subdomain
within a core network, which only interpreted signaling for within a core network, which only interpreted signaling for
aggregates established at the domain edge, with the flow-related aggregates established at the domain edge, with the flow-related
signaling passing transparently through it. signaling passing transparently through it.
5.3 Additional information beyond signaling of QoS information 5.3 Additional information beyond signaling of QoS information
This section contains the desired signaling (messages) for other This section contains the desired signaling (messages) for other
purposes other than that for conveying QoS parameters. purposes other than that for conveying QoS parameters.
5.3.1
Explicit release of resources 5.3.1 Explicit release of resources
When a QoS reservation is no longer necessary, e.g. because the When a QoS reservation is no longer necessary, e.g. because the
application terminates, or because a mobile host experienced a hand- application terminates, or because a mobile host experienced a hand-
off, it must be possible to explicitly release resources. off, it must be possible to explicitly release resources.
5.3.2
Possibility for automatic release of resources after failure 5.3.2 Possibility for automatic release of resources after failure
When the QoS Initiator goes down, the resources it requested should
be released, since they will no longer be necessary. When the QoS Initiator goes down, the resources it requested in the
5.3.3 network should be released, since they will no longer be necessary.
Possibility for automatic re-setup of resources after recovery
After detection of a failure in the network, any QoS
controller/initiator must be able to release a reservation it is
involved in. For example, this may require signaling of the "Release
after Failure" message upstream as well as downstream, or soft state
timing out of reservations.
Note that this might need to work together with a notification
mechanism.
5.3.3 Possibility for automatic re-setup of resources after recovery
In case of a failure, the reservation can get setup again In case of a failure, the reservation can get setup again
automatically. It enables sort of a persistent reservation, if the automatically. It enables sort of a persistent reservation, if the
QoS Initiator requests it. In scenarios where the reservations are QoS Initiator requests it. In scenarios where the reservations are
on a longer time scale, this could make sense to reduce the on a longer time scale, this could make sense to reduce the
signaling load in case of failure and recovery. signaling load in case of failure and recovery.
5.3.4
Prompt notification of QoS violation in case of error / failure to 5.3.4 Prompt notification of QoS violation in case of error/failure to
QoS Initiator and QoS Controllers QoS Initiator and QoS Controllers
5.3.5
Feedback about success of request for QoS guarantees QoS Controllers should be able to notify the QoS Initiator, if there
is an error inside the network. There are two types of network
errors:
Recoverable errors: This type error can be locally repaired by the
network nodes. The network nodes do not have to notify the users of
the error immediately. This is a condition when the danger of
degradation (or actual short term degradation) of the provided QoS
was overcome by the network (QoS controller) itself.
Unrecoverable errors: the network nodes cannot handle this type of
error, and have to notify the users as soon as possible.
5.3.5 Feedback about success of request for QoS guarantees
A request for QoS must be answered at least with yes or no. However, A request for QoS must be answered at least with yes or no. However,
it might be useful in case of a negative answer to also get a it might be useful in case of a negative answer to also get a
description of what might be the QoS one can successfully request description of what might be the QoS one can successfully request
etc. So it might be useful to include an opaque element into the etc. So it might be useful to include an opaque element into the
answer. The element heavily depends on the service requested. answer. The element heavily depends on the service requested.
5.3.6 Allow local QoS information exchange between nodes of the same
administrative domain
The QoS signaling protocol must be able to exchange local QoS
information between QoS controllers located within one single
domain. Local QoS information might, for example, be IP addresses,
severe congestion notification, notification of successful or
erroneous processing of QoS signaling messages.
In some cases, the NSIS QoS signalling protocol may carry
identification of the QoS controllers located at the boundaries of a
domain. However, the identification of edge should not be visible to
the end host (QoS initiator) and only applies within one QoS
administrative domain.
5.4 Layering 5.4 Layering
This section contains requirements related to the way the signaling This section contains requirements related to the way the signaling
being considered interacts with upper layer functions (users, being considered interacts with upper layer functions (users,
applications, and QoS administration), and lower layer QoS applications, and QoS administration), and lower layer QoS
technologies. technologies.
5.4.1
The signaling protocol and QoS control information should be 5.4.1 The signaling protocol and QoS control information should be
application independent. application independent.
However, opaque application information might get transported in the However, opaque application information might get transported in the
signaling message, without being handled in the network. Development signaling message, without being handled in the network. Development
and deployment of new applications should be possible without and deployment of new applications should be possible without
impacting the network infrastructure. Additionally, QoS protocols impacting the network infrastructure. Additionally, QoS protocols
are expected to conform to the Internet principles. are expected to conform to the Internet principles.
5.5 QoS Control Information 5.5 QoS Control Information
This section contains requirements related to the QoS control This section contains requirements related to the QoS control
information that needs to be exchanged. information that needs to be exchanged.
5.5.1
Mutability information on parameters 5.5.1 Mutability information on parameters
It should be possible for the initiator to control the mutability of It should be possible for the initiator to control the mutability of
the QSC information. This prevents from being changed in a non- the QSC information. This prevents from being changed in a non-
recoverable way. The initiator should be able to control what is recoverable way. The initiator should be able to control what is
requested end to end, without the request being gradually mutated as requested end to end, without the request being gradually mutated as
it passes through a sequence of domains. This implies that in case it passes through a sequence of domains. This implies that in case
of changes made on the parameters, the original requested ones must of changes made on the parameters, the original requested ones must
still be available. still be available.
Note that we do not require anything about particular QoS paramters Note that we do not require anything about particular QoS paramters
being changed. being changed.
5.5.2
Possibility to add and remove local domain information 5.5.2 Possibility to add and remove local domain information
It should be possible for the QoS control functions to add and It should be possible for the QoS control functions to add and
remove local scope elements. E.g., at the entrance to a QoS domain remove local scope elements. E.g., at the entrance to a QoS domain
domain-specific information is added, which is used in this domain domain-specific information is added, which is used in this domain
only, and the information is removed again when a signaling message only, and the information is removed again when a signaling message
leaves the domain. The motivation is in the economy of re-use the leaves the domain. The motivation is in the economy of re-use the
protocol for domain internal signaling of various information. Where protocol for domain internal signaling of various information. Where
additional information is needed for QoS control within a particular additional information is needed for QoS control within a particular
domain, it should be possible to carry this at the same time as the domain, it should be possible to carry this at the same time as the
'end to end' information.) 'end to end' information.)
5.5.3
Independence of reservation identifier 5.5.3 Independence of reservation identifier
A reservation identifier must be used, which is independent of the A reservation identifier must be used, which is independent of the
flow identifier, the IP address of the QoS Initiator, and the flow flow identifier, the IP address of the QoS Initiator, and the flow
end-points. Various scenarios in the mobility area require this end-points. Various scenarios in the mobility area require this
independence because flows resulting from handoff might have changed independence because flows resulting from handoff might have changed
end-points etc. but still have the same QoS requirement. end-points etc. but still have the same QoS requirement.
5.5.4
Seamless modification of already reserved QoS 5.5.4 Seamless modification of already reserved QoS
In many case, the reservation needs to be updated (up or downgrade). In many case, the reservation needs to be updated (up or downgrade).
This must happen seamlessly without service interruption. At least This must happen seamlessly without service interruption. At least
the signaling protocol must allow for it, even if some data path the signaling protocol must allow for it, even if some data path
elements might not be capable of doing so. elements might not be capable of doing so.
5.5.5
Signaling must support quantitative, qualitative, and relative QoS 5.5.5 Signaling must support quantitative, qualitative, and relative
specifications QoS specifications
5.6 Performance 5.6 Performance
This section discusses performance requirements and evaluation This section discusses performance requirements and evaluation
criteria and the way in which these could and should be traded off criteria and the way in which these could and should be traded off
against each other in various parts of the solution. against each other in various parts of the solution.
Scalability is a must anyway. However, depending on the scenario the Scalability is a must anyway. However, depending on the scenario the
question to which extends the protocol must be scalable. question to which extends the protocol must be scalable.
5.6.1 5.6.1 Scalability in the number of messages received by a signaling
Scalability in the number of messages received by a signaling
communication partner (QoS initiator and controller) communication partner (QoS initiator and controller)
5.6.2
Scalability in number of hand-offs 5.6.2 Scalability in number of hand-offs
5.6.3
Scalability in the number of interactions for setting up a 5.6.3 Scalability in the number of interactions for setting up a
reservation reservation
5.6.4
Scalability in the number of state per entity (QoS initiators and 5.6.4 Scalability in the number of state per entity (QoS initiators and
QoS controllers) QoS controllers)
5.6.5
Scalability in CPU use (end terminal and intermediate nodes) 5.6.5 Scalability in CPU use (end terminal and intermediate nodes)
5.6.6
Low latency in setup 5.6.6 Low latency in setup
Low latency is only needed in scenarios, where reservations are in a Low latency is only needed in scenarios, where reservations are in a
short time scale (e.g. mobile environments), or where human short time scale (e.g. handover in mobile environments), or where
interaction is immediately concerned (e.g., voice communication human interaction is immediately concerned (e.g., voice
setup delay) communication setup delay)
5.6.7
Allow for low bandwidth consumption for signaling protocol 5.6.7 Allow for low bandwidth consumption for signaling protocol
Again only small sets of scenarios call for low bandwidth, mainly Again only small sets of scenarios call for low bandwidth, mainly
those where wireless links are involved. those where wireless links are involved.
Note that many of the performance issues are heavily dependent on Note that many of the performance issues are heavily dependent on
the scenario assumed and are normally a trade-off between speed, the scenario assumed and are normally a trade-off between speed,
reliability, complexity, and scalability. The trade-off varies in reliability, complexity, and scalability. The trade-off varies in
different parts of the network. For example, in radio access different parts of the network. For example, in radio access
networks low bandwidth consumption will overweight the low latency networks low bandwidth consumption will overweight the low latency
requirement, while in core networks it may be reverse. requirement, while in core networks it may be reverse.
5.6.8
Ability to constrain load on devices 5.6.8 Ability to constrain load on devices
The NSIS architecture should give the ability to constrain the load The NSIS architecture should give the ability to constrain the load
(CPU load, memory space, signaling bandwidth consumption and (CPU load, memory space, signaling bandwidth consumption and
signaling intensity) on devices where it is needed. This can be signaling intensity) on devices where it is needed. One of the
achieved by many different methods, for example message aggregation, reasons is that the protocol handling should have a minimal impact
by ignoring signaling message, header compression or minimizing on interior (core) nodes.
functionality. The architecture may choose any of these methods as
long as the requirement is met. This can be achieved by many different methods. Examples, and this
are only examples, include message aggregation, by ignoring
signaling message, header compression, or minimizing functionality.
The framework may choose any method as long as the requirement is
met.
5.6.9 Highest possible network utilization
There are networking environments that require high network
utilization for various reasons, and the signaling protocol should
to its best ability support high resource utilization while
maintaining appropriate QoS.
In networks where resources are very expensive (as is the case for
many wireless networks), efficient network utilization is of
critical financial importance. On the other hand there are other
parts of the network where high utilization is not required.
5.7 Flexibility 5.7 Flexibility
This section lists the various ways the protocol can flexibly be This section lists the various ways the protocol can flexibly be
employed. employed.
5.7.1
Aggregation capability, including the capability to select and 5.7.1 Aggregation capability, including the capability to select and
change the level of aggregation. change the level of aggregation.
5.7.2
Flexibility in the placement of the QoS initiator 5.7.2 Flexibility in the placement of the QoS initiator
It might be the sender or the receiver of content. But also network- It might be the sender or the receiver of content. But also network-
initiated reservations are required in various scenarios. initiated reservations are required in various scenarios.
5.7.3
Flexibility in the initiation of re-negotiation (QoS change 5.7.3 Flexibility in the initiation of re-negotiation (QoS change
requests) requests)
Again the sender or the receiver of content might initiate a re- Again the sender or the receiver of content might initiate a re-
negotiation due to various reasons, such as local resource shortage negotiation due to various reasons, such as local resource shortage
(CPU, memory on end-system) or a user changed application (CPU, memory on end-system) or a user changed application
preference/profiles. But also network-initiated re-negotiation is preference/profiles. But also network-initiated re-negotiation is
required in cases, where the network is not able to further required in cases, where the network is not able to further
guarantee resources etc. guarantee resources etc.
5.7.4
Uni / bi-directional reservation 5.7.4 Uni / bi-directional reservation
Both uni-directonal as well as bi-direction reservations must be Both uni-directonal as well as bi-direction reservations must be
possible. possible.
5.8 Security 5.8 Security
This section discusses security-related requirements. First a list This section discusses security-related requirements. First a list
of security threats is given. of security threats is given.
5.8.1
The QoS protocol must provide strong authentication 5.8.1 The QoS protocol must provide strong authentication
A QoS protocol must make provision for enabling various entities to A QoS protocol must make provision for enabling various entities to
be authenticated against each other using data origin and/or entity be authenticated against each other using data origin and/or entity
authentication. The QoS protocol must enable mutual authentication authentication. The QoS protocol must enable mutual authentication
between the two communicating entities. The term strong between the two communicating entities. The term strong
authentication points to the fact that weak plain-text password authentication points to the fact that weak plain-text password
mechanisms must not be used for authentication. mechanisms must not be used for authentication.
5.8.2
The QoS protocol must provide means to authorize resource requests 5.8.2 The QoS protocol must provide means to authorize resource
requests
This requirement demands a hook to interact with a policy entity to This requirement demands a hook to interact with a policy entity to
request authorization data. This allows an authenticated entity to request authorization data. This allows an authenticated entity to
be associated with authorization data and to verify the resource be associated with authorization data and to verify the resource
request. Authorization prevents reservations by unauthorized request. Authorization prevents reservations by unauthorized
entities, reservations violating policies, theft of service and entities, reservations violating policies, theft of service and
additionally limits denial of service attacks against parts of the additionally limits denial of service attacks against parts of the
network or the entire network. Additionally it might be helpful to network or the entire network. Additionally it might be helpful to
provide some means to inform other protocols of participating nodes provide some means to inform other protocols of participating nodes
within the same administrative domain about a previous successful within the same administrative domain about a previous successful
authorization event. authorization event.
5.8.3
The QoS signaling messages must provide integrity protection. 5.8.3 The QoS signaling messages must provide integrity protection.
The integrity protection of the transmitted signaling messages The integrity protection of the transmitted signaling messages
prevent an adversary from modifying parts of the QoS signaling prevent an adversary from modifying parts of the QoS signaling
message and from mounting denial of service attacks against network message and from mounting denial of service attacks against network
elements participating in the QoS protocol. elements participating in the QoS protocol.
5.8.4 5.8.4 The QoS signaling messages must be replay protected.
The QoS signaling messages must be replay protected.
To prevent replay of previous signaling messages the QoS protocol To prevent replay of previous signaling messages the QoS protocol
must provide means to detect old messages. A solution must cover must provide means to detect old messages. A solution must cover
issues of synchronization problems in the case of a restart or a issues of synchronization problems in the case of a restart or a
crash of a participating network element. The use of replay crash of a participating network element. The use of replay
mechanism apart from sequence numbers should be investigated. mechanism apart from sequence numbers should be investigated.
5.8.5
The QoS signaling protocol must allow for hop-by-hop security. 5.8.5 The QoS signaling protocol must allow for hop-by-hop security.
Hop-by-Hop security is a well known and proven concept in QoS Hop-by-Hop security is a well known and proven concept in QoS
protocols that allows intermediate nodes that actively participate protocols that allows intermediate nodes that actively participate
in the QoS protocol to modify the messages as required by the QoS in the QoS protocol to modify the messages as required by the QoS
processing. Note that this requirement does not exclude end-to-end processing. Note that this requirement does not exclude end-to-end
or network-to-network security of a QoS reservation request. End-to- or network-to-network security of a QoS reservation request. End-to-
end security between the initiator and the responder may be used to end security between the initiator and the responder may be used to
provide protection of non-mutable data fields. Network-to-network provide protection of non-mutable data fields. Network-to-network
security refers to the protection of messages over various hops but security refers to the protection of messages over various hops but
not in an end-to-end manner i.e. protected over a particular not in an end-to-end manner i.e. protected over a particular
network. network.
5.8.6
The QoS protocol should allow identity confidentiality and 5.8.6 The QoS protocol should allow identity confidentiality and
location privacy. location privacy.
Identity confidentiality enables privacy and avoids profiling of Identity confidentiality enables privacy and avoids profiling of
entities by adversary eavesdropping the signaling traffic along the entities by adversary eavesdropping the signaling traffic along the
path. The identity used in the process of authentication may also be path. The identity used in the process of authentication may also be
hidden to a limited extent from a network to which the initiator is hidden to a limited extent from a network to which the initiator is
attached. It is however required that the identity provide enough attached. It is however required that the identity provide enough
information for the access network to collect accounting data. information for the access network to collect accounting data.
Location privacy is an issue for the initiator who triggers the QoS Location privacy is an issue for the initiator who triggers the QoS
protocol. In some scenarios the initiator may not be willing to protocol. In some scenarios the initiator may not be willing to
reveal location information to the responder. reveal location information to the responder.
5.8.7
The QoS protocol should prevent denial-of-service attacks against 5.8.7 The QoS protocol should prevent denial-of-service attacks against
signaling entities. signaling entities.
To effectively prevent denial-of-service attacks the QoS protocol To effectively prevent denial-of-service attacks the QoS protocol
and the used security mechanisms should not force to do heavy and the used security mechanisms should not force to do heavy
computation to verify a resource request prior authenticating the computation to verify a resource request prior authenticating the
requesting entity. Additionally the QoS protocol and the used requesting entity. Additionally the QoS protocol and the used
security mechanisms should not require large resource consumption security mechanisms should not require large resource consumption
(for example main memory or other additional message exchanges) (for example main memory or other additional message exchanges)
before a successful authentication was done. before a successful authentication was done.
5.8.8
The QoS protocol should support confidentiality of signaling 5.8.8 The QoS protocol should support confidentiality of signaling
messages. messages.
Based on the signaling information exchanged between nodes Based on the signaling information exchanged between nodes
participating in the QoS protocol an adversary may learn both the participating in the QoS protocol an adversary may learn both the
identities and the content of the QoS messages. To prevent this from identities and the content of the QoS messages. To prevent this from
happening, confidentiality of the QoS requests in a hop-by-hop happening, confidentiality of the QoS requests in a hop-by-hop
manner should be provided. Note that hop-by-hop is always required manner should be provided. Note that hop-by-hop is always required
whenever entities actively participating in the protocol must be whenever entities actively participating in the protocol must be
able to read and eventually modify the content of the QoS messages. able to read and eventually modify the content of the QoS messages.
This does not exclude the case where one or more network elements This does not exclude the case where one or more network elements
are not required to read the information of the transmitted QoS are not required to read the information of the transmitted QoS
messages. messages.
5.8.9
The QoS protocol should provide hooks to interact with protocols 5.8.9 The QoS protocol should provide hooks to interact with protocols
that allow the negotiation of authentication and key management that allow the negotiation of authentication and key management
protocols. protocols.
The negotiation of an authentication and key management protocols The negotiation of an authentication and key management protocols
within the QoS protocol is outside the scope of the QoS protocol. within the QoS protocol is outside the scope of the QoS protocol.
This requirement originates from the fact that more than one key This requirement originates from the fact that more than one key
management protocol may be used to provide security associations. So management protocol may be used to provide security associations. So
both entities must be capable to use the same protocol which may be both entities must be capable to use the same protocol which may be
difficult in a mobile environment with different requirements and difficult in a mobile environment with different requirements and
different protocols. The goal of such a negotiation step is to different protocols. The goal of such a negotiation step is to
determine which authentication and key management protocol to use is determine which authentication and key management protocol to use is
executed prior to the execution of the chosen key management executed prior to the execution of the chosen key management
protocol. The used key management protocol must however be able to protocol. The used key management protocol must however be able to
create a security association that matches with the one used in the create a security association that matches with the one used in the
QoS protocol. A QoS protocol should however provide a way to QoS protocol. A QoS protocol should however provide a way to
interact with these negotiation protocols. interact with these negotiation protocols.
5.8.10 The QoS protocol should provide means to interact with key
5.8.10 The QoS protocol should provide means to interact with key
management protocols management protocols
Key management protocols typically require a larger number of Key management protocols typically require a larger number of
messages to be transmitted to allow a session key and the messages to be transmitted to allow a session key and the
corresponding security association to be derived. To avoid the corresponding security association to be derived. To avoid the
complex issue of mapping individual authentication and key complex issue of mapping individual authentication and key
management protocols to a QoS protocol such a protocol is outside management protocols to a QoS protocol such a protocol is outside
the scope of the QoS protocol. Although the key management protocol the scope of the QoS protocol. Although the key management protocol
may be independent there must be a way for the QoS protocol to may be independent there must be a way for the QoS protocol to
exploit existing security associations to avoid executing a separate exploit existing security associations to avoid executing a separate
key management protocol (or instance of the same protocol) for key management protocol (or instance of the same protocol) for
skipping to change at page 19, line 40 skipping to change at page 20, line 17
complex issue of mapping individual authentication and key complex issue of mapping individual authentication and key
management protocols to a QoS protocol such a protocol is outside management protocols to a QoS protocol such a protocol is outside
the scope of the QoS protocol. Although the key management protocol the scope of the QoS protocol. Although the key management protocol
may be independent there must be a way for the QoS protocol to may be independent there must be a way for the QoS protocol to
exploit existing security associations to avoid executing a separate exploit existing security associations to avoid executing a separate
key management protocol (or instance of the same protocol) for key management protocol (or instance of the same protocol) for
protocols that closely operate together. If no such security protocols that closely operate together. If no such security
association exists then there should be means for the QoS protocol association exists then there should be means for the QoS protocol
to trigger a key management protocol to dynamically create the to trigger a key management protocol to dynamically create the
required security associations. required security associations.
5.9 Mobility 5.9 Mobility
5.9.1 Allow efficient QoS re-establishment after handover
Handover is an essential function in wireless networks. After
handover, QoS may need to be completely or partially re-established
due to route changes. The re-establishment may be requested by the
mobile node itself or triggered by the access point that the mobile
node is attached to. In the first case, the QoS signalling should
allow efficient QoS re-establishment after handover. Re-
establishment of QoS after handover should be as quick as possible
so that the mobile node does not experience service interruption or
QoS degradation. The re-establishment should be localized, and not
require end-to-end signalling, if possible.
TBD TBD
5.10 Interworking with other protocols and techniques 5.10 Interworking with other protocols and techniques
Hooks must be provided to enable efficient interworking between Hooks must be provided to enable efficient interworking between
various protocols and techniques including: various protocols and techniques including:
5.10.1 Interworking with IP tunneling
5.10.1 Interworking with IP tunneling
IP tunneling for various applications must be supported. More IP tunneling for various applications must be supported. More
specifically tunneling for IPSec tunnels are of importance. This specifically tunneling for IPSec tunnels are of importance. This
mainly impacts the identification of flows. Additionally, care needs mainly impacts the identification of flows. Additionally, care needs
to be taken using IPSec for signaling message. to be taken using IPSec for signaling message.
5.10.2 The solution should not constrain either to IPv4 or IPv6
5.10.3 Independence from charging model 5.10.2 The solution should not constrain either to IPv4 or IPv6
5.10.3 Independence from charging model
Signaling must not be constrained by charging models or the charging Signaling must not be constrained by charging models or the charging
infrastructure used. However, the end-system should be able to query infrastructure used. However, the end-system should be able to query
current pay statistics and to specify user cost functions. current pay statistics and to specify user cost functions.
5.10.4 The QoS protocol should provide hooks for AAA protocols
5.10.4 The QoS protocol should provide hooks for AAA protocols
The security mechanism should be developed with respect to be able The security mechanism should be developed with respect to be able
to collect usage records from one or more network elements. to collect usage records from one or more network elements.
5.11 Operational 5.11 Operational
5.11.1 Ability to assign transport quality to signaling messages
5.11.1 Ability to assign transport quality to signaling messages
The NSIS architecture should allow the network operator to assign The NSIS architecture should allow the network operator to assign
the NSIS protocol messages a certain transport quality. As signaling the NSIS protocol messages a certain transport quality. As signaling
opens up for possible denial-of-service attacks, this requirement opens up for possible denial-of-service attacks, this requirement
gives the network operator a mean, but also the obligation, to gives the network operator a mean, but also the obligation, to
trade-off between signaling latency and the impact (from the trade-off between signaling latency and the impact (from the
signaling messages) on devices within his/her network. From protocol signaling messages) on devices within his/her network. From protocol
design this requirement states that the protocol messages should be design this requirement states that the protocol messages should be
detectable, at least where the control and assignment of the detectable, at least where the control and assignment of the
messages priority is done. messages priority is done.
6 The MUSTs, SHOULDs, and MAYs 6 The MUSTs, SHOULDs, and MAYs
In order to prioritize the various requirements from Section 5, we In order to prioritize the various requirements from Section 5, we
define different 'parts of the network'. In the different parts of define different 'parts of the network'. In the different parts of
the network a particular requirement might have a different the network a particular requirement might have a different
priority. priority.
The parts of the networks we differentiate are the host-to-first The parts of the networks we differentiate are the host-to-first
router, the access network, and the core network. The host to first router, the access network, and the core network. The host to first
router part includes all the layer 2 technologies to access to the router part includes all the layer 2 technologies to access to the
Internet. In many cases, there is an application and/or user running Internet. In many cases, there is an application and/or user running
on the host initiating QoS signaling. The access network can be on the host initiating QoS signaling. The access network can be
characterized by low capacity links, meadium speed IP processing characterized by low capacity links, meadium speed IP processing
capabilities, and it might consist of a complete layer 2 network as capabilities, and it might consist of a complete layer 2 network as
well. The core network characteristics include high-speed forwarding well. The core network characteristics include high-speed forwarding
capacities and interdomain QoS issues. All of them are not strictly capacities and interdomain QoS issues. All of them are not strictly
defined and should not be regarded as that, but should give a defined and should not be regarded as that, but should give a
skipping to change at page 20, line 42 skipping to change at page 21, line 39
router part includes all the layer 2 technologies to access to the router part includes all the layer 2 technologies to access to the
Internet. In many cases, there is an application and/or user running Internet. In many cases, there is an application and/or user running
on the host initiating QoS signaling. The access network can be on the host initiating QoS signaling. The access network can be
characterized by low capacity links, meadium speed IP processing characterized by low capacity links, meadium speed IP processing
capabilities, and it might consist of a complete layer 2 network as capabilities, and it might consist of a complete layer 2 network as
well. The core network characteristics include high-speed forwarding well. The core network characteristics include high-speed forwarding
capacities and interdomain QoS issues. All of them are not strictly capacities and interdomain QoS issues. All of them are not strictly
defined and should not be regarded as that, but should give a defined and should not be regarded as that, but should give a
feeling about where in the network we have different requirements feeling about where in the network we have different requirements
concerning QoS signaling. concerning QoS signaling.
Note that the requirement titles are listed for better reading. Note that the requirement titles are listed for better reading.
5.1 Architecture and Design Goals 5.1 Architecture and Design Goals
5.1.1 Applicability for different QoS technologies. 5.1.1 Applicability for different QoS technologies.
5.1.2 Resource availability information on request 5.1.2 Resource availability information on request
5.1.3 Modularity 5.1.3 Modularity
5.1.4 Decoupling of protocol and information it is carrying 5.1.4 Decoupling of protocol and information it is carrying
5.1.5 Reuse of existing QoS provisioning 5.1.5 Reuse of existing QoS provisioning
5.1.6 Avoid duplication of [sub]domain signaling functions 5.1.6 Independence of signaling and provisioning paradigm
5.1.7 Independence of signaling and provisioning paradigm
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.1 | | | | 5.1.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.2 | | | | 5.1.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.3 | | | | 5.1.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.4 | | | | 5.1.4 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.5 | | | | 5.1.5 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.6 | | | | 5.1.6 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.1.7 | | | |
----------------------+-------------+-------------+------------+
5.2 Signaling Flows 5.2 Signaling Flows
5.2.1 Free placement of QoS Initiator and QoS Controllers functions 5.2.1 Free placement of QoS Initiator and QoS Controllers functions
5.2.2 No constraint of the QoS signaling and QoS Controllers to be 5.2.2 No constraint of the QoS signaling and QoS Controllers to be
in the data path. in the data path.
5.2.3 Concealment of topology and technology information 5.2.3 Concealment of topology and technology information
5.2.4 Optional transparency of QoS signaling to network 5.2.4 Optional transparency of QoS signaling to network
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.1 | | | | 5.2.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.2 | | | | 5.2.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.3 | | | | 5.2.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.4 | | | | 5.2.4 | | | |
skipping to change at page 22, line 4 skipping to change at page 22, line 31
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.1 | | | | 5.2.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.2 | | | | 5.2.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.3 | | | | 5.2.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.2.4 | | | | 5.2.4 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3 Additional information beyond signaling of QoS information 5.3 Additional information beyond signaling of QoS information
5.3.1 Explicit release of resources 5.3.1 Explicit release of resources
5.3.2 Possibility for automatic release of resources after failure 5.3.2 Possibility for automatic release of resources after failure
5.3.3 Possibility for automatic re-setup of resources after recovery 5.3.3 Possibility for automatic re-setup of resources after recovery
5.3.4 Prompt notification of QoS violation in case of error / 5.3.4 Prompt notification of QoS violation in case of error /
failure to QoS Initiator and QoS Controllers failure to QoS Initiator and QoS Controllers
5.3.5 Feedback about success of request for QoS guarantees 5.3.5 Feedback about success of request for QoS guarantees
5.3.6 Allow local QoS information exchange between nodes of the same
administrative domain
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3.1 | | | | 5.3.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3.2 | | | | 5.3.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3.3 | | | | 5.3.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3.4 | | | | 5.3.4 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3.5 | | | | 5.3.5 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.3.6 | | | |
----------------------+-------------+-------------+------------+
5.4 Layering 5.4 Layering
5.4.1 The signaling protocol and QoS control information should be 5.4.1 The signaling protocol and QoS control information should be
application independent. application independent.
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.4.1 | | | | 5.4.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5 QoS Control Information 5.5 QoS Control Information
5.5.1 Mutability information on parameters 5.5.1 Mutability information on parameters
5.5.2 Possibility to add and remove local domain information 5.5.2 Possibility to add and remove local domain information
5.5.3 Independence of reservation identifier 5.5.3 Independence of reservation identifier
5.5.4 Seamless modification of already reserved QoS 5.5.4 Seamless modification of already reserved QoS
5.5.5 Signaling must support quantitative, qualitative, and relative 5.5.5 Signaling must support quantitative, qualitative, and relative
QoS specifications QoS specifications
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.1 | | | | 5.5.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.2 | | | | 5.5.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.3 | | | | 5.5.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.4 | | | | 5.5.4 | | | |
skipping to change at page 23, line 4 skipping to change at page 23, line 37
5.5.1 | | | | 5.5.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.2 | | | | 5.5.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.3 | | | | 5.5.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.4 | | | | 5.5.4 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.5.5 | | | | 5.5.5 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6 Performance 5.6 Performance
5.6.1 Scalability in the number of messages received by a signaling 5.6.1 Scalability in the number of messages received by a signaling
communication partner (QoS initiator and controller) communication partner (QoS initiator and controller)
5.6.2 Scalability in number of hand-offs 5.6.2 Scalability in number of hand-offs
5.6.3 Scalability in the number of interactions for setting up a 5.6.3 Scalability in the number of interactions for setting up a
reservation reservation
5.6.4 Scalability in the number of state per entity (QoS initiators 5.6.4 Scalability in the number of state per entity (QoS initiators
and QoS controllers) and QoS controllers)
5.6.5 Scalability in CPU use (end terminal and intermediate nodes) 5.6.5 Scalability in CPU use (end terminal and intermediate nodes)
5.6.6 Low latency in setup 5.6.6 Low latency in setup
5.6.7 Allow for low bandwidth consumption for signaling protocol 5.6.7 Allow for low bandwidth consumption for signaling protocol
5.6.8 Ability to constrain load on devices 5.6.8 Ability to constrain load on devices
5.6.9 Highest possible network utilization
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.1 | | | | 5.6.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.2 | | | | 5.6.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.3 | | | | 5.6.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.4 | | | | 5.6.4 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.5 | | | | 5.6.5 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.6 | | | | 5.6.6 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.7 | | | | 5.6.7 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.8 | | | | 5.6.8 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.6.9 | | | |
----------------------+-------------+-------------+------------+
5.7 Flexibility 5.7 Flexibility
5.7.1 Aggregation capability, including the capability to select and 5.7.1 Aggregation capability, including the capability to select and
change the level of aggregation. change the level of aggregation.
5.7.2 Flexibility in the placement of the QoS initiator 5.7.2 Flexibility in the placement of the QoS initiator
5.7.3 Flexibility in the initiation of re-negotiation (QoS change 5.7.3 Flexibility in the initiation of re-negotiation (QoS change
requests) requests)
5.7.4 Uni / bi-directional reservation 5.7.4 Uni / bi-directional reservation
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.7.1 | | | | 5.7.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.7.2 | | | | 5.7.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.7.3 | | | | 5.7.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.7.4 | | | | 5.7.4 | | | |
skipping to change at page 24, line 45 skipping to change at page 25, line 34
5.8.6 | | | | 5.8.6 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.8.7 | | | | 5.8.7 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.8.8 | | | | 5.8.8 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.8.9 | | | | 5.8.9 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.8.10 | | | | 5.8.10 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.9 Mobility 5.9 Mobility
5.9.1 Allow efficient QoS re-establishment after handover
----------------------+-------------+-------------+------------+
| host-to-net | access | core |
----------------------+-------------+-------------+------------+
5.9.1 | | | |
----------------------+-------------+-------------+------------+
5.10 Interworking with other protocols and techniques 5.10 Interworking with other protocols and techniques
5.10.1 Interworking with IP tunneling 5.10.1 Interworking with IP tunneling
5.10.2 The solution should not constrain either to IPv4 or IPv6 5.10.2 The solution should not constrain either to IPv4 or IPv6
5.10.3 Independence from charging model 5.10.3 Independence from charging model
5.10.4 The QoS protocol should provide hooks for AAA protocols 5.10.4 The QoS protocol should provide hooks for AAA protocols
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.1 | | | | 5.10.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.2 | | | | 5.10.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.3 | | | | 5.10.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.4 | | | | 5.10.4 | | | |
skipping to change at page 25, line 14 skipping to change at page 26, line 9
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.1 | | | | 5.10.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.2 | | | | 5.10.2 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.3 | | | | 5.10.3 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.10.4 | | | | 5.10.4 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.11 Operational 5.11 Operational
5.11.1 Ability to assign transport quality to signaling messages 5.11.1 Ability to assign transport quality to signaling messages
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
| host-to-net | access | core | | host-to-net | access | core |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
5.11.1 | | | | 5.11.1 | | | |
----------------------+-------------+-------------+------------+ ----------------------+-------------+-------------+------------+
7 References 7 References
[1] Kempf, J., "Dormant Mode Host Alerting ("IP Paging") Problem [1] Kempf, J., "Dormant Mode Host Alerting ("IP Paging") Problem
Statement", RFC 3132, June 2001. Statement", RFC 3132, June 2001.
[2] Chaskar, H., "Requirements of a QoS Solution for Mobile IP", [2] Chaskar, H., "Requirements of a QoS Solution for Mobile IP",
draft-ietf-mobileip-qos-requirements-01.txt, Work in Progress, draft-ietf-mobileip-qos-requirements-01.txt, Work in Progress,
August 2001 August 2001
[3] Manner. J., et al, "Mobility Related Terminology", draft-manner- [3] Manner. J., et al, "Mobility Related Terminology", draft-manner-
seamoby-terms-02.txt, Work In Progress, July 2001. seamoby-terms-02.txt, Work In Progress, July 2001.
[4] 3GPP, "General Packet Radio Service (GPRS); Service Description [4] 3GPP, "General Packet Radio Service (GPRS); Service Description
Stage 2 v 7.7.0", TS 03.60, June 2001 Stage 2 v 7.7.0", TS 03.60, June 2001
[5] 3GPP2, "Network Reference Model for cdma2000 Spread Spectrum [5] 3GPP2, "Network Reference Model for cdma2000 Spread Spectrum
System, revision B", S.R0005-B, May 2001 System, revision B", S.R0005-B, May 2001
[6] Bradner, S., Mankin, A., "Report of the Next Steps in Signaling [6] Bradner, S., Mankin, A., "Report of the Next Steps in Signaling
BOF", draft-bradner-nsis-bof-00.txt, Work in Progress, July 2001 BOF", draft-bradner-nsis-bof-00.txt, Work in Progress, July 2001
[7] Partain, D., et al, "Resource Reservation Issues in Cellular [7] Partain, D., et al, "Resource Reservation Issues in Cellular
Radio Access Networks", draft-westberg-rmd-cellular-issues-00.txt, Radio Access Networks", draft-westberg-rmd-cellular-issues-00.txt,
Work in Progress, June 2001. Work in Progress, June 2001.
[8] YESSIR - YEt another Sender Session Internet Reservations, [8] YESSIR - YEt another Sender Session Internet Reservations,
h http://www.cs.columbia.edupingpan/projects/yessir.html
ttp://www.cs.columbia.edupingpan/projects/yessir.htm
l
[9] Braden, R., Zhang, L., Berson, S., Herzog, A., Jamin, S., [9] Braden, R., Zhang, L., Berson, S., Herzog, A., Jamin, S.,
"Resource ReSerVation Protocol (RSVP) -- Version 1 Functional "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional
Specification", IETF RFC 2205, 1997. Specification", IETF RFC 2205, 1997.
[10] Westberg, L., Jacobsson, M., Partain, D., Karagiannis, G., [10] Westberg, L., Jacobsson, M., Partain, D., Karagiannis, G.,
Oosthoek, S., Rexhepi, V., Szabo, R., Wallentin, P., "Resource Oosthoek, S., Rexhepi, V., Szabo, R., Wallentin, P., "Resource
Management in Diffserv Framework", Internet draft, work in progress, Management in Diffserv Framework", Internet draft, work in progress,
draft-westberg-rmd-framework-xx.txt, 2002. draft-westberg-rmd-framework-xx.txt, 2002.
[11] Kempf, J., McCann, P., Roberts, P., "IP Mobility and the CDMA [11] Kempf, J., McCann, P., Roberts, P., "IP Mobility and the CDMA
Radio Access Network", IETF Draft, draft-kempf-cdma-appl-02.txt, Radio Access Network", IETF Draft, draft-kempf-cdma-appl-02.txt,
Work in progress, September 2001. Work in progress, September 2001.
8 Appendix: Scenarios/Use cases 8 Appendix: Scenarios/Use cases
In the following we describe scenarios, which are important to In the following we describe scenarios, which are important to
cover, and which allow us to discuss various requirements. Some cover, and which allow us to discuss various requirements. Some
regard this as use cases to be covered defining the use of a QoS regard this as use cases to be covered defining the use of a QoS
signaling protocol. signaling protocol.
8.1 Scenario: Terminal Mobility 8.1 Scenario: Terminal Mobility
The scenario we are looking at is the case where a mobile terminal The scenario we are looking at is the case where a mobile terminal
(MT) changes from one access point to another access point. The (MT) changes from one access point to another access point. The
access points are located in separate QoS domains. We assume Mobile access points are located in separate QoS domains. We assume Mobile
IP to handle mobility on the network layer in this scenario and IP to handle mobility on the network layer in this scenario and
consider the various extensions (i.e., IETF proposals) to Mobile IP, consider the various extensions (i.e., IETF proposals) to Mobile IP,
in order to provide 'fast handover' for roaming Mobile Terminals. in order to provide 'fast handover' for roaming Mobile Terminals.
The goal to be achieved lies in providing, keeping, and adapting the The goal to be achieved lies in providing, keeping, and adapting the
requested QoS for the ongoing IP sessions in case of handover. requested QoS for the ongoing IP sessions in case of handover.
Furthermore, the negotiation of QoS parameters with the new domain Furthermore, the negotiation of QoS parameters with the new domain
via the old connection might be needed, in order to support the via the old connection might be needed, in order to support the
skipping to change at page 35, line 8 skipping to change at page 36, line 4
At the edge router (i.e., border node), the flow is admitted, again At the edge router (i.e., border node), the flow is admitted, again
with an optional authentication process, possibly involving an with an optional authentication process, possibly involving an
external policy server. Note that the relationship between the PSTN external policy server. Note that the relationship between the PSTN
GW and the policy server and the routers and the policy server is GW and the policy server and the routers and the policy server is
outside the scope of NSIS. The edge router then admits the flow into outside the scope of NSIS. The edge router then admits the flow into
the core of the network, possibly using some aggregation technique. the core of the network, possibly using some aggregation technique.
At the interior nodes, the NSIS host-to-host signaling should either At the interior nodes, the NSIS host-to-host signaling should either
be ignored or invisible as the Edge router performed the admission be ignored or invisible as the Edge router performed the admission
control decision to some aggregate. control decision to some aggregate.
At the inter-provider router (i.e., border node), again the NSIS At the inter-provider router (i.e., border node), again the NSIS
host-to-host signaling should either be ignored or invisible as the host-to-host signaling should either be ignored or invisible as the
Edge router has performed an admission control decision about an Edge router has performed an admission control decision about an
aggregate across a carrier network. aggregate across a carrier network.
8.9 PSTN trunking gateway 8.9 PSTN trunking gateway
One of the use cases for the NSIS signaling protocol is the scenario One of the use cases for the NSIS signaling protocol is the scenario
of interconnecting PSTN gateways with an IP network that supports of interconnecting PSTN gateways with an IP network that supports
QoS. QoS.
Four different scenarios are considered here. Four different scenarios are considered here.
1. 1. In-band QoS signaling is used. In this case the Media Gateway
In-band QoS signaling is used. In this case the Media Gateway
(MG) will be acting as the QoS Initiator and the Edge Router (MG) will be acting as the QoS Initiator and the Edge Router
(ER) will be the QoS Controller. Hence, the ER should do (ER) will be the QoS Controller. Hence, the ER should do
admission control (into pre-provisioned traffic trunks) for the admission control (into pre-provisioned traffic trunks) for the
individual traffic flows. This scenario is not further individual traffic flows. This scenario is not further
considered here. considered here.
2. 2. Out-of-band signaling in a single domain, the QoS Controller is
Out-of-band signaling in a single domain, the QoS Controller is
integrated in the MGC. In this case no NSIS protocol is integrated in the MGC. In this case no NSIS protocol is
required. required.
3. 3. Out-of-band signaling in a single domain, the QoS Controller is
Out-of-band signaling in a single domain, the QoS Controller is
a separate box. In this case NSIS signaling is used between the a separate box. In this case NSIS signaling is used between the
MGC and the QoS Controller. MGC and the QoS Controller.
4. 4. Out-of-band signaling between multiple domains, the QoS
Out-of-band signaling between multiple domains, the QoS
Controller (which may be integrated in the MGC) triggers the Controller (which may be integrated in the MGC) triggers the
QoS Controller of the next domain. QoS Controller of the next domain.
When the out-of-band QoS signaling is used the Media Gateway When the out-of-band QoS signaling is used the Media Gateway
Controller (MGC) will be acting as the QoS Initiator. Controller (MGC) will be acting as the QoS Initiator.
In the second scenario the voice provider manages a set of traffic In the second scenario the voice provider manages a set of traffic
trunks that are leased from a network provider. The MGC does the trunks that are leased from a network provider. The MGC does the
admission control in this case. Since the QoS Controller acts both admission control in this case. Since the QoS Controller acts both
as a QoS Initiator and a QoS Controller, no NSIS signaling is as a QoS Initiator and a QoS Controller, no NSIS signaling is
required. This scenario is shown in figure 1. required. This scenario is shown in figure 1.
+-------------+ ISUP/SIGTRAN +-----+ +-----+ +-------------+ ISUP/SIGTRAN +-----+ +-----+
| SS7 network |---------------------| MGC |--------------| SS7 | | SS7 network |---------------------| MGC |--------------| SS7 |
+-------------+ +-------+-----+---------+ +-----+ +-------------+ +-------+-----+---------+ +-----+
: / : \ : / : \
: / : \ : / : \
: / +--------:----------+ \ : / +--------:----------+ \
: MEGACO / / : \ \ : MEGACO / / : \ \
: / / +-----+ \ \ : / / +-----+ \ \
: / / | NMS | \ \ : / / | NMS | \ \
: / | +-----+ | \ : / | +-----+ | \
skipping to change at page 37, line 17 skipping to change at page 38, line 17
Quite a number of people have been involved in the discussion of the Quite a number of people have been involved in the discussion of the
draft, adding some ideas, requirements, etc. We list them without a draft, adding some ideas, requirements, etc. We list them without a
guarantee on completeness: Changpeng Fan (Siemens), Krishna Paul guarantee on completeness: Changpeng Fan (Siemens), Krishna Paul
(NEC), Maurizio Molina (NEC), Mirko Schramm (Siemens), Andreas (NEC), Maurizio Molina (NEC), Mirko Schramm (Siemens), Andreas
Schrader (NEC), Hannes Hartenstein (NEC), Ralf Schmitz (NEC), Schrader (NEC), Hannes Hartenstein (NEC), Ralf Schmitz (NEC),
Juergen Quittek (NEC), Morihisa Momona (NEC), Holger Karl (Technical Juergen Quittek (NEC), Morihisa Momona (NEC), Holger Karl (Technical
University Berlin), Xiaoming Fu (Technical University Berlin), Hans- University Berlin), Xiaoming Fu (Technical University Berlin), Hans-
Peter Schwefel (Siemens), Mathias Rautenberg (Siemens), Christoph Peter Schwefel (Siemens), Mathias Rautenberg (Siemens), Christoph
Niedermeier (Siemens), Andreas Kassler (University of Ulm), Ilya Niedermeier (Siemens), Andreas Kassler (University of Ulm), Ilya
Freytsis. Freytsis.
Some text and/or ideas for text, requirements, scenarios have been Some text and/or ideas for text, requirements, scenarios have been
taken from a draft written by the following authors: David Partain taken from a draft written by the following authors: David Partain
(Ericsson), Anders Bergsten (Telia Research), Marc Greis (Nokia), (Ericsson), Anders Bergsten (Telia Research), Marc Greis (Nokia),
Georgios Karagiannis (Ericsson), Jukka Manner (University of Georgios Karagiannis (Ericsson), Jukka Manner (University of
Helsinki), Ping Pan (Juniper), Vlora Rexhepi (Ericsson), Lars Helsinki), Ping Pan (Juniper), Vlora Rexhepi (Ericsson), Lars
Westberg (Ericsson), Haihong Zheng (Nokia). Westberg (Ericsson), Haihong Zheng (Nokia). Some of those have
actively contributed new text to the draft as well.
Another draft impacting this draft has been written by Sven Van den
Bosch, Maarten Buchli, and Danny Goderis. These people contributed
also with new text.
10 Author's Addresses 10 Author's Addresses
Marcus Brunner (Editor) Marcus Brunner (Editor)
NEC Europe Ltd. NEC Europe Ltd.
Network Laboratories Network Laboratories
Adenauerplatz 6 Adenauerplatz 6
D-69115 Heidelberg D-69115 Heidelberg
Germany Germany
E-Mail: brunner@ccrle.nec.de (contact) E-Mail: brunner@ccrle.nec.de (contact)
Robert Hancock, Eleanor Hepworth Robert Hancock, Eleanor Hepworth
Roke Manor Research Ltd Roke Manor Research Ltd
Romsey, Hants, SO51 0ZN Romsey, Hants, SO51 0ZN
United Kingdom United Kingdom
E-Mail: [robert.hancock|eleanor.hepworth]@roke.co.uk E-Mail: [robert.hancock|eleanor.hepworth]@roke.co.uk
Cornelia Kappler Cornelia Kappler
Siemens AG Siemens AG
Berlin 13623 Berlin 13623
Germany Germany
E-Mail: cornelia.kappler@icn.siemens.de E-Mail: cornelia.kappler@icn.siemens.de
Hannes Tschofenig Hannes Tschofenig
Siemens AG Siemens AG
Otto-Hahn-Ring 6 Otto-Hahn-Ring 6
81739 Munchen 81739 Munchen
Germany Germany
Email: Hannes.Tschofenig@mchp.siemens.de Email: Hannes.Tschofenig@mchp.siemens.de
Full Copyright Statement Full Copyright Statement
Copyright (C) The Internet Society (2000). All Rights Reserved. Copyright (C) The Internet Society (2000). All Rights Reserved.
This document and translations of it may be copied and furnished to This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for developing Internet standards in which case the procedures for
skipping to change at page 38, line 26 skipping to change at page 39, line 27
followed, or as required to translate it into languages other than followed, or as required to translate it into languages other than
English. English.
The limited permissions granted above are perpetual and will not be The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns. revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDIN TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDIN
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Open Issues/To Dos Open Issues/To Dos
1) (OPEN) add Scenarios 1) (OPEN) add Scenarios
Do we need to add, remove, or change the scenarios? Do we need to add, remove, or change the scenarios?
- added scenario on QoS signalling between PSTN gateways and - added scenario on QoS signalling between PSTN gateways and
backbone routers backbone routers
- added: Application request end-to-end QoS path from the network - added: Application request end-to-end QoS path from the network
We can what ever scenario we want. The more the better to understand We can what ever scenario we want. The more the better to understand
the issues. Nevertheless, we have to take care that we are future the issues. Nevertheless, we have to take care that we are future
prove as well. prove as well.
2) (OPEN) Sender/receiver initiation 2) (OPEN) Sender/receiver initiation
What is the requirement concerning data sender or data receiver or What is the requirement concerning data sender or data receiver or
both to initiate a QoS request. both to initiate a QoS request.
- does it matter who pays?
- terminology text added Terminology text added
open issue, what is a potential req (currently we say "both must be open issue, what is a potential req (currently we say "both must be
possible") possible")
Proposals:
1)should be optimized for sender initiated
2) remove the requirement, because it is not relevant if we allow
for third party QoS initiators
3) SHOULD support sender initiated, MAY support reciever initiated
Issues:
- does it matter who pays?
- for sender initiated, can we support implicit signaling
(bundling the QoS requests with other signaling - registration,
etc.)?
- For reciever initiated, do we need protection against spamming -
how do we protect against unwanted changes?
3) (CLOSED) Draft organization 3) (CLOSED) Draft organization
The proposed changes include The proposed changes include
- put all the scenarios into an appendix - put all the scenarios into an appendix
- In Section 6 add text describing 3 different "parts of the - In Section 6 add text describing 3 different "parts of the
network" network"
-Host to first hop -Host to first hop
-access network -access network
-core networks -core networks
better names are welcome, but I don't want to be religious about better names are welcome, but I don't want to be religious about
it it
- Prioritize the requirements according to the "parts of the - Prioritize the requirements according to the "parts of the
network" (This means the the tables in Section 6 of the current network" (This means the the tables in Section 6 of the current
draft will get three colums with the MUST, SHOULDs, and MAYs for draft will get three colums with the MUST, SHOULDs, and MAYs for
each requirement each requirement
4) (OPEN) MUSTs, SHOULDs, MAY needs discussion 4) (OPEN) MUSTs, SHOULDs, MAY needs discussion
5) (CLOSED) Framework text. 5) (CLOSED) Framework text.
The figures have been removed, because they seamed to be misleading. The figures have been removed, because they seamed to be misleading.
the text has been revisited. I regard the issue closed until we have the text has been revisited. I regard the issue closed until we have
a clear picture about what the NSIS framework draft is about. a clear picture about what the NSIS framework draft is about.
6) (CLOSED) The requirement organization 6) (CLOSED) The requirement organization
I heard some voices on the list that the grouping should be more I heard some voices on the list that the grouping should be more
along the lines of host-to-edge, edge to edge etc. along the lines of host-to-edge, edge to edge etc.
So far I have not changed it, because I though that the requirements So far I have not changed it, because I though that the requirements
heavily depend on the scenario we are looking at. heavily depend on the scenario we are looking at.
closed, by the change in the draft organisation (issue 3) closed, by the change in the draft organisation (issue 3)
7) (OPEN) Hemant Chaskar: Section 3.1, items 1) Handoff decision and 7) (OPEN) Hemant Chaskar: Section 3.1, items 1) Handoff decision and
2) Trigger sources: The handoff decision and trigger sources should 2) Trigger sources: The handoff decision and trigger sources should
be out of scope of NSIS. NSIS should rather focus only on be out of scope of NSIS. NSIS should rather focus only on
"establishing" QoS along the packet path after handoff. "establishing" QoS along the packet path after handoff.
needs more WG discussion, potentially even cross-WG needs more WG discussion, potentially even cross-WG
8) (OPEN) bi-directional data path setup with one QoS request 8) (OPEN) bi-directional data path setup with one QoS request
I have not seen consensus on whether to require bi-directional data I have not seen consensus on whether to require bi-directional data
path setup with QoS. path setup with QoS.
- How can we actually perform bi-directional reservations when the
Q: How can we actually perform bi-directional reservations when the
forward and reverse paths are not reciprocal, with respect to forward and reverse paths are not reciprocal, with respect to
routing topology and routing policy of network domains between routing topology and routing policy of network domains between
sender and receiver? sender and receiver?
A: bi-directional data path setup does not need to use the same
return path as the forwarding path. The only requirement to achieve
a bi-directional reservation is that the sender for the forwarding
path is also the receiver for the return path and that the receiver
for the forwarding path is also the sender for the return path.
- The need to ensure that the return path is the same as the - The need to ensure that the return path is the same as the
forwarding path is one of the problems with RSVP, particularly in a forwarding path is one of the problems with RSVP, particularly in a
mobile environment. mobile environment.
9) (CLOSED) Potential requirement: must be implementable in user 9) (CLOSED) Potential requirement: must be implementable in user
space (on end hosts) space (on end hosts)
has not been included in the req list because it seams to be has not been included in the req list because it seams to be
implementation specific. implementation specific.
10) (CLOSED) Potential requirement: must provide support for 10) (CLOSED) Potential requirement: must provide support for
globally defined services as well as private services (Ruediger) globally defined services as well as private services (Ruediger)
replaced by issue 17 and 18, closed replaced by issue 17 and 18, closed
11) (CLOSED) Potential requirement: Flexibility in the granularity 11) (CLOSED) Potential requirement: Flexibility in the granularity
of reservation (I don't remember who brought it up, but I assume it of reservation (I don't remember who brought it up, but I assume it
refers to the flexibility in terms of what size the flow has. Where refers to the flexibility in terms of what size the flow has. Where
size can be bandwidth etc.) size can be bandwidth etc.)
The assumption that QoS classes as well as service definitions are The assumption that QoS classes as well as service definitions are
out of scope for this draft, also the flexibility is. out of scope for this draft, also the flexibility is.
12) (CLOSED) text replacing scalability reqs 12) (CLOSED) text replacing scalability reqs
"The nsis architecture should give the ability to constrain the load "The nsis architecture should give the ability to constrain the load
(CPU load, memory space, signaling bandwidth consumption and (CPU load, memory space, signaling bandwidth consumption and
signaling intensity) on devices where it is needed. This can be signaling intensity) on devices where it is needed. This can be
achieved by many different methods, for example message aggregation, achieved by many different methods, for example message aggregation,
by ignoring signaling message, header compression or minimizing by ignoring signaling message, header compression or minimizing
functionality. The architecture may choose any of these methods as functionality. The architecture may choose any of these methods as
long as the requirement is met." long as the requirement is met."
Editor: added the above text, but did not remove scalability reqs
Editor: added the draft text, but did not remove scalability reqs
13) (CLOSED) add operator req "Ability to assign transport quality 13) (CLOSED) add operator req "Ability to assign transport quality
to signaling messages" to signaling messages"
"The nsis architecture should allow the network operator to assign "The nsis architecture should allow the network operator to assign
the nsis protocol messages a certain transport quality. As signaling the nsis protocol messages a certain transport quality. As signaling
opens up for possible denial-of-service attacks, this requirement opens up for possible denial-of-service attacks, this requirement
gives the network operator a mean, but also the obligation, to gives the network operator a mean, but also the obligation, to
trade-off between signaling latency and the impact (from the trade-off between signaling latency and the impact (from the
signaling messages) on devices within his/her network. From protocol signaling messages) on devices within his/her network. From protocol
design this requirement states that the protocol messages should be design this requirement states that the protocol messages should be
detectable, at least where the control and assignment of the detectable, at least where the control and assignment of the
skipping to change at page 40, line 42 skipping to change at page 42, line 22
add "support grouping of microflows (possibly only for feedback)" add "support grouping of microflows (possibly only for feedback)"
"As a consequence of the optimization for the interactive multimedia "As a consequence of the optimization for the interactive multimedia
services, the signaling should allow one unique request for several services, the signaling should allow one unique request for several
micro flows having the same origination and destination IP micro flows having the same origination and destination IP
addresses. This is usually the case for multimedia SIP calls where addresses. This is usually the case for multimedia SIP calls where
the voice and video micro flows follow the same path. This grouping the voice and video micro flows follow the same path. This grouping
of requests allows optimization of the QoS processing. Note that of requests allows optimization of the QoS processing. Note that
this may be detrimental for the call setup time. The use of grouping this may be detrimental for the call setup time. The use of grouping
for microflows may be restricted to teardown and/or notification for microflows may be restricted to teardown and/or notification
messages when call setup time is a concern." messages when call setup time is a concern."
open issue: first resolve the bi-directional issue which is somewhat open issue: first resolve the bi-directional issue which is somewhat
related, because it seams to be an optimization as well related, because it seams to be an optimization as well
Should not be restrict to teardown and/or notification, it might be
useful also for the procedure that refreshes reservation states
15) (CLOSED) Support for preemption of sessions 15) (CLOSED) Support for preemption of sessions
-might play into the fault/ error handling case -might play into the fault/ error handling case
-is regarded as service-specific, whether existing sessions can be -is regarded as service-specific, whether existing sessions can be
pre-empted pre-empted
Conclusion: it is network policy to determine how to do pre-emption, Conclusion: it is network policy to determine how to do pre-emption,
not a protocol issue. not a protocol issue.
16) (OPEN) Req: 5.1.9 change provisioning into better term, since 16) (OPEN) Req: 5.1.9 change provisioning into better term, since
different people understand different thing with provisioning different people understand different thing with provisioning
open action for Anders open action for Anders
17) (CLOSED) add assumption that QoS classes/service definitions are 17) (CLOSED) add assumption that QoS classes/service definitions are
already known to all the parties involved in signaling before hand already known to all the parties involved in signaling before hand
(before a signalling session even starts (before a signalling session even starts
added text in Section 4.1 added text in Section 4.1
18) (CLOSED) add exclusion of methods, protocols, and ways to 18) (CLOSED) add exclusion of methods, protocols, and ways to
express QoS express QoS
Even so, this might be covered by saying that we are independent of Even so, this might be covered by saying that we are independent of
QoS classes and service description etc. (see issue 17), I added two QoS classes and service description etc. (see issue 17), I added two
points to the exclusion Section 4.2. points to the exclusion Section 4.2.
Implications: issue 20, 23, Implications: issue 20, 23,
19) (CLOSED) remove req 5.2.5 IP fragmentation 19) (CLOSED) remove req 5.2.5 IP fragmentation
20) (CLOSED) remove req 5.3.2 Ability to signal life-time of a 20) (CLOSED) remove req 5.3.2 Ability to signal life-time of a
reservation reservation
is regarded service-specific therefore part of the service is regarded service-specific therefore part of the service
description description
added some reservation life time text service description assumption added some reservation life time text service description assumption
text and removed the req text and removed the req
21) (CLOSED) remove req 5.5.4 Aggregation method specification 21) (CLOSED) remove req 5.5.4 Aggregation method specification
Concerns Concerns
-QI not able to know the impact of aggregation -QI not able to know the impact of aggregation
-to far down the implementation/ service definition road -to far down the implementation/ service definition road
-leave it to the provider how a service is realized -leave it to the provider how a service is realized
removed removed
22) (CLOSED) remove 5.3.7 Automatic notification on available 22) (CLOSED) remove 5.3.7 Automatic notification on available
resources not been granted before resources not been granted before
regarded to complex and is heavily dependend on the service regarded to complex and is heavily dependend on the service
description description
removed removed
23) (CLOSED) remove 5.5.3 Simple mapping to lower-layer QoS 23) (CLOSED) remove 5.5.3 Simple mapping to lower-layer QoS
provisioning parameters provisioning parameters
this heavily depends on service definition and therefore is out of this heavily depends on service definition and therefore is out of
scope of this document scope of this document
removed removed
24) (CLOSED) Replacing req 5.3.6 "Feedback about the actually 24) (CLOSED) Replacing req 5.3.6 "Feedback about the actually
received level of QoS guarantees" with two requirements: 1) the received level of QoS guarantees" with two requirements: 1) the
feedback of a request MUST include yes and no (MUST respond yes or feedback of a request MUST include yes and no (MUST respond yes or
no) 2) in case of no it MAY include an opaque service-specific no) 2) in case of no it MAY include an opaque service-specific
information about what would be possible information about what would be possible
It is still only one requirement, but the text has been replaced. It is still only one requirement, but the text has been replaced.
25) (CLOSED) remove req 5.10.3 Combination with Mobility management 25) (CLOSED) remove req 5.10.3 Combination with Mobility management
However the integration should not be a priori excluded, there is However the integration should not be a priori excluded, there is
explicitly no statemant about independence of mobility management. explicitly no statemant about independence of mobility management.
There is more discussion for the mobility case needed anyway. There is more discussion for the mobility case needed anyway.
26) (OPEN) interaction of NSIS with seamoby (context transfer and 26) (OPEN) interaction of NSIS with seamoby (context transfer and
CAR discovery) CAR discovery)
27) (CLOSED) remove req 5.5.10 QoS conformance specification 27) (CLOSED) remove req 5.5.10 QoS conformance specification
Motivation: this heavily depends on the service definition and is Motivation: this heavily depends on the service definition and is
therefore out of scope therefore out of scope
removed removed
28) (OPEN) new requirement on "asynchronous events from the network" 28) (OPEN) new requirement on "asynchronous events from the network"
The content of the message might be very service specific, but the The content of the message might be very service specific, but the
protocol support for asynchronous events from the network might be a protocol support for asynchronous events from the network might be a
valuable requirement. valuable requirement. We have something about notification in case
of errors/failures.
29) (OPEN) NSIS in case of handovers 29) (OPEN) NSIS in case of handovers
The whole mobility area needs to be defined
30) (CLOSED) remove 5.1.7 Avoid modularity with large overhead (in 30) (CLOSED) remove 5.1.7 Avoid modularity with large overhead (in
various dimensions) various dimensions)
removed because it seams to be obvious removed because it seams to be obvious
31) (CLOSED) remove 5.1.8 Possibility to use the signaling protocol 31) (CLOSED) remove 5.1.8 Possibility to use the signaling protocol
for existing local technologies for existing local technologies
It is contradictory to 5.1.9 and the intention behind the It is contradictory to 5.1.9 and the intention behind the
requirement is covered by the requierement that the QoS controller requirement is covered by the requierement that the QoS controller
can be placed wherever needed. can be placed wherever needed.
32) (CLOSED) add assumption: there are means for discovery of nsis 32) (CLOSED) add assumption: there are means for discovery of nsis
entities in order to know the signaling peers (solutions include entities in order to know the signaling peers (solutions include
static configuration, or automatically discovered etc.) static configuration, or automatically discovered etc.)
33) (OPEN) add req " highest possible network utilization"
33) (CLOSED) add req " highest possible network utilization"
"There are networking environments that require high network "There are networking environments that require high network
utilization for various reasons, and the signaling protocol should utilization for various reasons, and the signaling protocol should
to its best ability support high resource utilization while to its best ability support high resource utilization while
maintaining appropriate QoS. maintaining appropriate QoS.
In networks where resources are very expensive (as is the case for In networks where resources are very expensive (as is the case for
many wireless networks), efficient network utilization is of many wireless networks), efficient network utilization is of
critical financial importance. On the other hand there are other critical financial importance. On the other hand there are other
parts of the network where high utilization is not required. parts of the network where high utilization is not required.
" "
34) (OPEN)_difference between "UMTS access scenario" "cellular
req added
34) (CLOSED)_difference between "UMTS access scenario" "cellular
network scenario", and "Wired part of wireless network" (Section network scenario", and "Wired part of wireless network" (Section
8.2, 8.3, and 8.4) 8.2, 8.3, and 8.4)
currently all three are included
what are the essential issues? all three are included.
35) (OPEN) difference between the two PSTN gateway scenarios The only common point between the three scenarios is that they are
related to cellular networks. Section 8.4 is introducing the
scenario used in the radio access network of cellular networks.
Sections 8.2 and Section 8.3 are discussing other parts of the
cellular network.
35) (CLOSED) difference between the two PSTN gateway scenarios
(Section 8.8 and 8.9) (Section 8.8 and 8.9)
currently both are included
what are the essential issues? currently both are included, they might be merged, sionce one seams
36) req "Independence of reservation identifier" to be more general than the other
36) (OPEN) req "Independence of reservation identifier"
issue here is that this might only be valuable in mobile issue here is that this might only be valuable in mobile
environments, and complicate the protocol for other environemnts. environments, and complicate the protocol for other environemnts.
there related issues (37,38,
37) ownership of a reservation there are related issues (37,38,
37) (OPEN) ownership of a reservation
The issue here is that a known party owns reservations done in the The issue here is that a known party owns reservations done in the
network. (which might include that the party also pays). The network. (which might include that the party also pays). The
question arose who is allowed to tear-down, receive asynchronous question arose who is allowed to tear-down, receive asynchronous
notifications in case of network initiated tear-down, etc. notifications in case of network initiated tear-down, etc.
This also relates to how certain service granted is This also relates to how certain service granted is
named/identified. named/identified.
38) (OPEN) definition of security threats 38) (OPEN) definition of security threats
39) (OPEN) simplify security requirements section 39) (OPEN) simplify security requirements section
40) (OPEN) add mobility related requirements 40) (OPEN) add mobility related requirements
41) (CLOSED) remove req 5.5.1 Mutability information on parameters 41) (CLOSED) remove req 5.5.1 Mutability information on parameters
removed because it is service-specific removed because it is service-specific
42) (OPEN) add an assumption that QoS nmonitoring is application- 42) (OPEN) add an assumption that QoS nmonitoring is application-
specific and with it out of scope of the WG specific and with it out of scope of the WG
43) (OPEN) asynchronous notification of QoS Initiator, Controller, 43) (OPEN) asynchronous notification of QoS Initiator, Controller,
Receiver, there are security issues related. Basically, an ownership Receiver, there are security issues related. Basically, an ownership
issue. Nevertheless, an asynch notifcation in case of an error, issue. Nevertheless, an asynch notifcation in case of an error,
network failure etc. is specifically in areas, where longer lived network failure etc. is specifically in areas, where longer lived
sessions are setup, essential in order to notify upper layes sessions are setup, essential in order to notify upper layes
(appluications etc. as well. (appluications etc. as well.
44) (OPEN) req 5.1.2 resource availability info on request come back 44) (OPEN) req 5.1.2 resource availability info on request come back
to it as soon as we have a more clear idea about service description to it as soon as we have a more clear idea about service description
issue issue
45) (OPEN) 5.3.4 Possibility for automatic re-setup of resources 45) (OPEN) 5.3.4 Possibility for automatic re-setup of resources
after recovery after recovery
- more thoughts in failure conditions potentially - more thoughts in failure conditions potentially
- better text - better text
- operation under overload - operation under overload
plays into issue 46) plays into issue 46)
46) (OPEN) we need multiple scenario for failure and recovery cases 46) (OPEN) we need multiple scenario for failure and recovery cases
to derive requirements. Or a list failre cases might be a start as to derive requirements. Or a list failre cases might be a start as
well. well.
47) (OPEN) traffic engineering and route pinning 47) (OPEN) traffic engineering and route pinning
I assume this would result in operational type of requirements I assume this would result in operational type of requirements
Opinions on that? Opinions on that?
48) (CLOSED) req 5.5.5 remove Multiple levels of detail 48) (CLOSED) req 5.5.5 remove Multiple levels of detail
"The QSC should allow for multiple levels of detail in description. "The QSC should allow for multiple levels of detail in description.
(Motivation: someone interpreting the request can tune its own level (Motivation: someone interpreting the request can tune its own level
of complexity by going down to more or less levels of detail. A of complexity by going down to more or less levels of detail. A
lightweight implementation within the core could consider only the lightweight implementation within the core could consider only the
coarsest level.)" coarsest level.)"
removed, because it is service-specific removed, because it is service-specific
49) (CLOSED) remove req 5.5.9 Signaling must support quantitative, 49) (CLOSED) remove req 5.5.9 Signaling must support quantitative,
qualitative, and relative QoS specifications qualitative, and relative QoS specifications
removed because it is service-specific removed because it is service-specific
50) (CLOSED) req 5.5.6 remove Ranges in specification 50) (CLOSED) req 5.5.6 remove Ranges in specification
The QSC should allow for specification of minimum required QoS The QSC should allow for specification of minimum required QoS
and/or desirable QoS. (Motivation: The QoS Service Classes should and/or desirable QoS. (Motivation: The QoS Service Classes should
allow for ranges to be indicated, to minimize negotiation latency allow for ranges to be indicated, to minimize negotiation latency
and suppress error notifications during handover events.) and suppress error notifications during handover events.)
removed, is service specific removed, is service specific
51) (OPEN) remove 5.1.6 Avoid duplication of [sub]domain signaling
51) (CLOSED) remove 5.1.6 Avoid duplication of [sub]domain signaling
functions functions
we might to use the text somewhere else
we might use the requirement text somewhere else:
Heading: Avoid duplication of [sub]domain signaling functions
The specification of the NSIS signaling protocol should be optimized
to avoid duplication of existing [sub]domain QoS signaling and to
minimize the overall complexity. (Motivation: we don't want to
introduce duplicate feedback or negotiation mechanisms, or
complicate the work by including all possible existing QoS signaling
in some form. The function will be placed in the new part if it has
to be end-to-end, universal to all network types
('simple/lightweight'), or if it has to be protected by upper layer
security mechanisms.)
The point here is that the QoS technology (lower layer stuff) gets
re-used unchanged, and we have new signaling above it. But, in many
cases the local QoS technology will contain equivalent functions to
the NSIS-required ones, just in a technology specific form. Examples
of these functions would be error/QoS violation notifications,
ability to query for resources and so on. So, there is a danger that
our 'lightweight' signaling ends up trying to carry all this
information all over again, and (even worse) that the
initiator/controller functions have to weigh up nearly equivalent
information coming from two directions. However, the basic problem
here is that the boundary between new and re-used stuff is pretty
shaky. The requirement is trying to scope our problem (a) to
eliminate the potential overlap, and (b) to keep the new NSIS stuff
simple.
However, we are aware that it is very difficult to judge what is
duplicated, if we want to run the protocol in various environments.
52) (OPEN) New requirement: interaction with policy 52) (OPEN) New requirement: interaction with policy
this most likely is covered by an opaque token for authentication this most likely is covered by an opaque token for authentication
dependency on security changes dependency on security changes
53) (OPEN) add req 5.1.16. of draft-partain-...-00 Error handling
and redundancy considerations 53) (OPEN) Section 5.3. Error handling
Border nodes should be able to notify the users if there is an error
inside the network. There are two types of network errors:
- Recoverable errors: this type error can be locally repaired
by the network nodes. The network nodes do not have to
notify the users of the error immediately.
- Unrecoverable errors: the network nodes cannot handle this
type of error, and have to notify the users as soon as
possible.
Comments: Comments:
1) notification of user in case of unrecoverable errors (has been 1) notification of user in case of unrecoverable errors (has been
done by notification req, or will be done by asynch notification done by notification requirement, or will be done by asynch
2) recoverable error (might need to be added) req 5.3.4 is going notification, issue 43)
into this direction A description of both types of errors (recoverable, unrecoverable)
3) what does this mean for different parts of the network are listed in Section 5.3.4.
in different parts of the network)
4) hop-by-hop? OR right to the end? 2) hop-by-hop? OR right to the end?
3) What is potential value to notify about recoverable errors?
Proposal: not hop by hop, but QoS controller to QoS initiator
54) (CLOSED) add req 5.1.17. to assumption "Identification 54) (CLOSED) add req 5.1.17. to assumption "Identification
requirement" requirement"
assumption say that the discovery of QI, QC, QR is out-of-scope of assumption say that the discovery of QI, QC, QR is out-of-scope of
the draft the draft
55) (OPEN) 5.2.2. Allow local QoS information exchange between two
border nodes 55) (CLOSED) add from draft-partain-nsis-requirements-00.txt req
5.2.2. Allow local QoS information exchange between two border
nodes
"The QoS signalling protocol must be able to exchange local QoS "The QoS signalling protocol must be able to exchange local QoS
information between edge nodes. Local QoS information might, for information between edge nodes. Local QoS information might, for
example, be IP addresses, severe congestion notification, example, be IP addresses, severe congestion notification,
notification of succesful or erroneous processing of QoS signalling notification of succesful or erroneous processing of QoS signalling
messages at one border node. messages at one border node.
In some domains, the NSIS QoS signalling protocol MAY carry In some domains, the NSIS QoS signalling protocol MAY carry
identification of the ingress and egress edge between the ingress- identification of the ingress and egress edge between the ingress-
egress edges. However, the identification of edges should not be egress edges. However, the identification of edges should not be
visible to the end host and only applies within one QoS visible to the end host and only applies within one QoS
administrative domain. administrative domain.
" "
Comments: Comments:
- service mapping is more service-specific (layering,tunneling) - service mapping is more service-specific (layering,tunneling)
- the scenario to look at is a complicated service description -> in - the scenario to look at is a complicated service description -> in
part of the network you want to change the message to something more part of the network you want to change the message to something more
easy, and at the other end go back to the more complicated part. easy, and at the other end go back to the more complicated part.
-QI being everywhere might be enough -QI being everywhere might be enough
-and we have already a requirement saying that intermediate node -and we have already a requirement saying that intermediate node
MUST be able to add/remove domain-specific information to/from MUST be able to add/remove domain-specific information to/from
signaling messages signaling messages
56) (CLOSED) add req 5.3.1.3 of draft-partain-..-00 56) (CLOSED) add req 5.3.1.3 of draft-partain-..-00
-already added a req to the scalability section (issue ???), which -already added a req to the scalability section (issue ???), which
has been provided by Anders has been provided by Anders
57) (OPEN) potentially better title for text from issue 56) e.g.
(?minimal impact on core?) 57) (CLOSED) potentially better title for text from issue 56) e.g.
(ôminimal impact on coreö)
58) (CLOSED) add req 5.3.2 from draft-partain-...-00 58) (CLOSED) add req 5.3.2 from draft-partain-...-00
- the fast establishment req is handled by the low setup latency - the fast establishment req is handled by the low setup latency
req, and the scalability in handover req req, and the scalability in handover req
- added the text to the teminal mobility scenario - added the text to the teminal mobility scenario
- added text " time scale (e.g., handover in mobile environments),"
to req
59) (OPEN) add req: ability to deal with severe congestion (req 59) (OPEN) add req: ability to deal with severe congestion (req
5.3.4 of draft-partain-..-00 5.3.4 of draft-partain-..-00
issues are: issues are:
- the use in highly utilized networks - occurs in a highly utilised network and if it is not solved very
fast then the network performance will quickly collapse
- deos it belong to failure recovery (I would assume from a service - deos it belong to failure recovery (I would assume from a service
point of view this is failure point of view this is failure
- hop by hop problem (issue from Jorge) - hop by hop problem (issue from Jorge)
60) (OPEN) add req 5.4.3. from draft-partain-...-00 "Allow efficient - What difference does it make (from the QoS perspective) if the
QoS re-establishment after handover" provided QoS degraded due to hardware failure on a device or due to
congestion caused by failures on some other devices? What is
required from the protocol is to signal this failure to other
participants (QCs or QI) in the hope that they can do something
meaningful (e.g. re-routing) to correct the problem or tear down the
flow.
60) (CLOSED) add req 5.4.3. from draft-partain-...-00 "Allow
efficient QoS re-establishment after handover"
"Handover is an essential function in wireless networks. After "Handover is an essential function in wireless networks. After
handover, QoS may need to be completely or partially re-established handover, QoS may need to be completely or partially re-established
due to route changes. The re-establishment may be requested by the due to route changes. The re-establishment may be requested by the
mobile node itself or triggered by the access point that the mobile mobile node itself or triggered by the access point that the mobile
node is attached to. In the first case, the QoS signalling should node is attached to. In the first case, the QoS signalling should
allow efficient QoS re-establishment after handover. Re- allow efficient QoS re-establishment after handover. Re-
establishment of QoS after handover should be as quick as possible establishment of QoS after handover should be as quick as possible
so that the mobile node does not experience service interruption or so that the mobile node does not experience service interruption or
QoS degradation. The re-establishment should be localized, and not QoS degradation. The re-establishment should be localized, and not
require end-to-end signalling, if possible." require end-to-end signalling, if possible."
most likely it is already cover, please check again, whether there
- most likely it is already cover, please check again, whether there
is something missing is something missing
- added it again under the mobility requiremments
61) (OPEN) add req: 6.1.8 from draft-bucheli-...-00 on multicast 61) (OPEN) add req: 6.1.8 from draft-bucheli-...-00 on multicast
"Multicast consideration should not impact the protocol complexity "Multicast consideration should not impact the protocol complexity
for unicast flows. Multicast support is not considered as a for unicast flows. Multicast support is not considered as a
priority, because the targeted interactive multimedia services are priority, because the targeted interactive multimedia services are
mainly unicast. For this reason, if considered in the solution, mainly unicast. For this reason, if considered in the solution,
multicast should not bring complexity in the unicast scenario." multicast should not bring complexity in the unicast scenario."
Opinions? Opinions?
---------------------------------------------------
starting from -02 version
---------------------------------------------------
62) (OPEN) Request to add VPN scenario
- Related to issue 1)
- Difference of VPN scenario compared to what we already have is
missing
63) (CLOSED) added Sven Van den Bosch, Maarten Buchli, and Danny
Goderis to acknowledgement section.
64) (OPEN) Request to add req: Backwards compatibility
A later version of an NSIS protocol must be backwards compatible
with earlier versions of an NSIS protocol.
65) (OPEN) Request to add req: Unexpected situations and error
restistance
An NSIS protocol must define behaviour of NSIS signaling units
during unexpected situations. Unexpected situtions are unknown
messages, parameters and parameter settings as well as receiption of
unexpected messages (e.g. a "Reservation Confirmation" without prior
"Reservation Request").
Related to Open issues (53) and requirement 5.3.4.
This requirement is emphasizing to many details that might not be
necessary
Req 5.3.4 refers to behaviour in the case of problems in the data
plane. My suggestion here is about unexpected events/errors in the
control plane. If you think that this point carries to many details,
let's split it up in several individual requirements.
66) (OPEN) Request to add req: Default behaviour
An NSIS protocol must define default behaviours and parameter
settings wherever applicable.
67) (OPEN) Request to add req: Extendability
An NSIS protocol must provide means to enhance a protocol with
future procedures, messages, parameters and parameter settings.
This was refering mostly to the service specific part of the
protocol.
could be a part of the modularity requirement 5.1.3
68) (OPEN) Request to add req: Preventation of stale state
An NSIS signalling protocol must provide means for an NSIS signaling
unit to discover and remove local stale state. This may for example
be done by means like soft state and periodic flooding or by a
polling mechanism and hard state signaling.
Might already be covered in other requirements, could also be that
the solutions known are solutions for different problems. I think
distributed garbage collection could also be a solution.
69) (OPEN) Request to add req: Reliable Communication
NSIS signaling procedures, connectivity between units involved in
NSIS signaling as well as the basic transport protocol used by NSIS
must provide a maximum of communication reliability. Procedures must
define how an NSIS signaling systems behaves if some kind of request
it sent stays without answer (this could require e.g. be timers,
number of message retransmits and release messages).
An NSIS signaling unit must be able to check its connectivity to an
adjacent NSIS signaling unit at any time (this requirement must
however not result in a DoS attack tool - the frequency of these
checks must be limited, and flow control may be useful).
The basic transport protocol to be used between adjacent NSIS units
must ensure message integrity and reliable transport.
MUST/SHOULD ensure error- and loss free transmission of signaling
information.
Do we really require this? Isn't this a soft state versus hard state
issue?
70) (OPEN) Request to add req: Smooth breakdown
A unit participating in NSIS signaling must no cause further damage
to other systems involved in NSIS signaling when it has to go out of
service.
71) (CLOSED) Changed text "5.6.8: Ability to constrain load on
devices" to
The NSIS architecture should give the ability to constrain the load
(CPU load, memory space, signaling bandwidth consumption and
signaling intensity) on devices where it is needed. This can be
achieved by many different methods. Examples, and this are only
examples, include message aggregation, by ignoring signaling
message, header compression, or minimizing functionality. The
framework may choose any method as long as the requirement is met.
72) (OPEN) request to add "Error notification and error location"
"An NSIS signaling node rejecting or releasing a reservation must
indicate its identity. NSIS signalling should indicate why a
requested resource is not or no longer available. "
Compared to 5.3.4 this is about problems on the control plane
------------------------------------------------------
Change Log Version 01 -> 02
- added issues 62-72
- added some discussion text to open issues
- req " highest possible network utilization" added (issue 33,
closed)
- issues closed: 34 (UMTS scenarios), 35 (PSTN gatway scenarios),
- removed req "Avoid duplication of [sub]domain signaling
functions", issue 51
- Section 5.3.4: added explanation of recoverable and unrecoverable
errors (issue 53)
- added the following requirement: (closed issue 55) Allow local QoS
information exchange between nodes of the saeme administrative
domain
The QoS signaling protocol must be able to exchange local QoS
information between QoS controllers located within one single
domain. Local QoS information might, for example, be IP addresses,
severe congestion notification, notification of successful or
erroneous processing of QoS signaling messages.
In some cases, the NSIS QoS signalling protocol may carry
identification of the QoS controllers located at the boundaries of a
domain. However, the identification of edge should not be visible to
the end host (QoS initiator) and only applies within one QoS
administrative domain.
- closed issue 57: add text about "Minimal impact on interior (core)
nodes" to requirement 5.6.8 "Ability to constrain load on devices"
- added requirement "Allow efficient QoS re-establishment after
handover", closed issue 60.
- changed text in 5.3.2
 End of changes. 277 change blocks. 
189 lines changed or deleted 574 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/