Skip to main content

Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks
draft-ietf-ancp-framework-13

Revision differences

Document history

Date Rev. By Action
2012-08-22
13 (System) post-migration administrative database adjustment to the No Objection position for Lisa Dusseault
2012-08-22
13 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
13 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
13 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2010-02-11
(System) Posted related IPR disclosure: Cisco's Statement of IPR relating to draft-ietf-ancp-framework-13
2010-02-07
13 (System) New version available: draft-ietf-ancp-framework-13.txt
2010-01-28
13 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2010-01-28
13 (System) IANA Action state changed to No IC from In Progress
2010-01-28
13 (System) IANA Action state changed to In Progress
2010-01-28
13 Amy Vezza IESG state changed to Approved-announcement sent
2010-01-28
13 Amy Vezza IESG has approved the document
2010-01-28
13 Amy Vezza Closed "Approve" ballot
2010-01-28
13 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2010-01-04
13 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2009-10-20
13 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2009-10-05
12 (System) New version available: draft-ietf-ancp-framework-12.txt
2009-09-14
13 Lisa Dusseault [Ballot Position Update] Position for Lisa Dusseault has been changed to No Objection from Discuss by Lisa Dusseault
2009-07-27
13 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-07-27
13 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-07-27
13 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-07-27
11 (System) New version available: draft-ietf-ancp-framework-11.txt
2009-07-17
13 (System) Removed from agenda for telechat - 2009-07-16
2009-07-16
13 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2009-07-16
13 Lisa Dusseault
[Ballot comment]
More minor comments:

Section 3.2 should expand or explain OPEX

I have no idea what an "element management interface" is

Not sure how …
[Ballot comment]
More minor comments:

Section 3.2 should expand or explain OPEX

I have no idea what an "element management interface" is

Not sure how the shutdown notification requirement is justified
2009-07-16
13 Lisa Dusseault
[Ballot discuss]
I entered some DISCUSS text by the telechat where this was discussed, but as I started with a few open questions, unfortunately this …
[Ballot discuss]
I entered some DISCUSS text by the telechat where this was discussed, but as I started with a few open questions, unfortunately this is going to have to be updated and I'll have to get feedback to make it fully actionable.

Sometimes requirements discussions are used basically to document consensus decisions that have already been made on a concrete solution.  I'm OK with that; the waterfall model has always been an extremely rough model for design, and collaborative protocol design in particular involves many cycles between refining the requirements and designing the actual solution.


OTOH, if there is not a concrete consensus solution already far along development, then the requirements in this document seem too limiting.  The assumptions about a request/response form, atomicity, adjacency and synchronization all assume a particular solution model.  These requirements, as written, preclude certain kinds of solutions that meet the use cases perfectly well. 

I'm hoping for some expert information on the progress of the work in developing ANCP and what decisions have already been made about an ANCP solution.
2009-07-16
13 Lisa Dusseault
[Ballot comment]
Section 3.2 should expand or explain OPEX

I have no idea what an "element management interface" is

Not sure how the shutdown notification …
[Ballot comment]
Section 3.2 should expand or explain OPEX

I have no idea what an "element management interface" is

Not sure how the shutdown notification requirement is justified
2009-07-16
13 Lisa Dusseault
[Ballot discuss]
I'd like to discuss how far along the specific proposals in this space are -- the requirements sound like a specific solution is …
[Ballot discuss]
I'd like to discuss how far along the specific proposals in this space are -- the requirements sound like a specific solution is in mind, particularly assuming adjacency and synchronization rather than other possible models, and requiring a request/response atomic model
2009-07-16
13 Lisa Dusseault [Ballot Position Update] New position, Discuss, has been recorded by Lisa Dusseault
2009-07-16
13 Lisa Dusseault [Ballot comment]
2009-07-16
13 Lisa Dusseault
[Ballot comment]
Section 3.2 should expand or explain OPEX

I have no idea what an "element management interface" is

Not sure how the shutdown notification …
[Ballot comment]
Section 3.2 should expand or explain OPEX

I have no idea what an "element management interface" is

Not sure how the shutdown notification requirement is justified
2009-07-16
13 Lisa Dusseault [Ballot comment]
Section 3.2 should expand or explain OPEX
2009-07-16
13 Dan Romascanu
[Ballot discuss]
1. I cannot relate section 2.4 and especially section 2.4.1 with the management requirements as listed in section 6. The purpose of the …
[Ballot discuss]
1. I cannot relate section 2.4 and especially section 2.4.1 with the management requirements as listed in section 6. The purpose of the policy servers mentioned there is confusing and the issue of multiplemanagers is just mentioned, without any solution being discussed as far as I can see.

2. I believe that the keywords in section 6 need to be capitalized.
2009-07-16
13 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2009-07-16
13 Magnus Westerlund [Ballot comment]
Support Russ discuss that the doc needs to be revised prior to approval.
2009-07-16
13 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2009-07-16
13 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-07-16
13 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2009-07-16
13 Adrian Farrel
[Ballot comment]
Nits

Abstract and Section 1
s/OSS systems/Operational Support Systems (OSSes)./

Section 1
Expand ONU, NAS, and OSS on first use.

Section 1.2
Expand …
[Ballot comment]
Nits

Abstract and Section 1
s/OSS systems/Operational Support Systems (OSSes)./

Section 1
Expand ONU, NAS, and OSS on first use.

Section 1.2
Expand RS on first use.

Section 2.1
Expand CPE and HGW somewhere near the figure.

ITU-T G.993.2 should be included as a reference.
2009-07-16
13 Tim Polk
[Ballot discuss]
This is a trivial discuss but -- the edit proposed by Pat Cain in his secdir review and
agreed to by the authors …
[Ballot discuss]
This is a trivial discuss but -- the edit proposed by Pat Cain in his secdir review and
agreed to by the authors does not appear in this draft or an RFC Editor Note.  As Pat noted,
draft-ietf-ancp-security-threats also develops a number of security requirements that are
not reproduced in this framework document.  The security considerations text should alert
readers to their inclusion in draft-ietf-ancp-security-threats.
2009-07-16
13 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2009-07-15
13 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-07-13
13 Russ Housley
[Ballot discuss]
Please consider the three reviews that all arrived on 29 June 2009:
  - Gen-ART review by Ben Campbell;
  - TSV Directorate …
[Ballot discuss]
Please consider the three reviews that all arrived on 29 June 2009:
  - Gen-ART review by Ben Campbell;
  - TSV Directorate review by Scott Brader; and
  - Security Directorate review by Pat Cain.

  Each of the reviews offers important opporunitites for improvement.
  Taken together, the document should probably be updated prior to
  approval.
2009-07-13
13 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2009-07-03
13 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Patrick Cain.
2009-07-03
13 Ralph Droms State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ralph Droms
2009-06-29
13 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-06-22
13 Ralph Droms Placed on agenda for telechat - 2009-07-16 by Ralph Droms
2009-06-22
13 Ralph Droms [Note]: 'Wojciech Dec (wdec@cisco.com) is the document shepherd.' added by Ralph Droms
2009-06-22
13 Ralph Droms
[Ballot comment]
* Editorial nit - it's worth a comment as it's either a pretty noticeable typo or I'm pretty confused.

In Figure 1, should …
[Ballot comment]
* Editorial nit - it's worth a comment as it's either a pretty noticeable typo or I'm pretty confused.

In Figure 1, should the label "Aggreg. Node" actually read "Aggreg. Network"?

* In section 4.1, second bullet list: the sentence
      This MUST allow
      to retrieve statistics and alarms (e.g. via SNMP) about the
is missing some words

* RFC 2119 terminology is not uniformly capitalized; for example, in section 4.2:

  o  The ANCP MUST support providing multicast conditional access
      information to Access Ports on an Access Node, using Black, Grey
      and White lists.

  o  The ANCP MUST support binding a particular Black, Grey and White
      List to a given Access Port.

  o  Upon receiving a join to a multicast flow which matches the Grey
      List the ANCP MUST allow the AN to query the NAS to request an
      admission decision for replicating that multicast flow to a
      particular Access Port.

  o  The ANCP MUST allow the NAS to send an admission decision to the
      AN indicating whether or not a multicast flow may be replicated to
      a particular Access Port.

  o  The ANCP must allow the NAS to indicate to the AN whether or not
      Admission Control is needed for some multicast flows on a given
      Access Port and where needed whether or not the Access Node is
      authorized to perform Admission Control itself (i.e. whether or
      not AN Bandwidth Delegation applies).

  o  In case of Admission Control without AN Bandwidth Delegation, the
      ANCP must allow the NAS to reply to a query from the AN indicating
      whether or not a multicast flow may be replicated to a particular
      Access Port.

  o  In case of Admission Control with AN Bandwidth Delegation, the
      ANCP must allow the NAS to delegate a certain amount of bandwidth
      to the AN for a given Access Port for multicast services only.

* Section 4.7.8: expand acronym "LAC"
2009-06-22
13 Ralph Droms [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms
2009-06-22
13 Ralph Droms Ballot has been issued by Ralph Droms
2009-06-22
13 Ralph Droms Created "Approve" ballot
2009-06-22
13 Michelle Cotton IANA Last Call Comments:

As described in the IANA Considerations section, we understand this
document to have NO IANA Actions
2009-06-16
13 Samuel Weiler Request for Last Call review by SECDIR is assigned to Patrick Cain
2009-06-16
13 Samuel Weiler Request for Last Call review by SECDIR is assigned to Patrick Cain
2009-06-15
13 Cindy Morgan [Note]: 'Wojciech Dec (wdec@cisco.com) is the document shepherd.' added by Cindy Morgan
2009-06-15
13 Amy Vezza Last call sent
2009-06-15
13 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-06-15
13 Ralph Droms State Changes to Last Call Requested from AD Evaluation by Ralph Droms
2009-06-15
13 Ralph Droms Last Call was requested by Ralph Droms
2009-06-15
13 (System) Ballot writeup text was added
2009-06-15
13 (System) Last call text was added
2009-06-15
13 (System) Ballot approval text was added
2009-06-15
13 Ralph Droms State Changes to AD Evaluation from Publication Requested by Ralph Droms
2009-06-15
13 Ralph Droms
Updated proto shepherd doc...



  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this …
Updated proto shepherd doc...



  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

Wojciech Dec (wdec@cisco.com).
Yes, I have reviewed the document and I believe it is ready for
forwading to the IESG.


  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?

Yes, the document has received adequate review. The document received in
depth review from five reviewers nominated by the WG as well as comments
during WG last call.



  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

No.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or

        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

No specific concerns.


  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

The document represents WG consensus and has been reviewed by a good
number of active WG participants. The WG has arrived at a state of
consus regarding the content of this document.


  (1.f) Has anyone threatened an appeal or otherwise indicated extreme

        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

None indicated.


  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See
        http://www.ietf.org/ID-Checklist.html
  and
        http://tools.ietf.org/tools/idnits/
). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

The document satisfies all ID nits and uses a pre-5378 boilerplate
because it was originally submitted prior to the change in boilerplate
requirements.
This is an informational framework document and as such it was not
subject to MIB doctor or other detailed technology reviews, but it has
been reviewed by the WG.



  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

Yes, the references are split appropriately. The security considerations
includes a reference to a draft intendeded to progress in parallel,
draft-ietf-ancp-security-threats, that will need to be updated as both
documents get published.



  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The IANA considerations section esists and is consient with the content
of the document. No requests to IANA are required.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

There are no sections that use a formal language.


  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

Technical Summary

  The Access Node Control Protocol (ANCP) aims to communicate QoS-
  related, service-related and subscriber-related configurations and
  operations between a Network Access Server (NAS) and an Access Node
  (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)).  The
  main goal of this protocol is to allow the NAS to configure, manage
  and control access equipments including the ability for the access
  nodes to report information to the NAS.
  The draft lays down a framework for the protocol. It describes the
use-cases and likely deployment scenarios as well as outlining the
functionality that the protocol will have to provide to support these.
The document is INFORMATIONAL and is a product of the ANCP working
group.

Working Group Summary

The origin of the draft can be traced back to the WT-147 "Layer 2
Control Protocol" document from the Broadband Forum. The WG spent some
time in revising that draft and fine-tuning use-cases and terminology. A
fair bit of WG discussions occurred regarding the scope of the
"multicast control use-cases", and how these relate to a policy system
architecture. In this, debate mainly focused on the bandwidth admission
control functionality aspects of the Access Node and the NAS. So as to
arrive at rough consensus a number of options ended up being described
in the draft.

Document Quality

The document is a protocol framework, with the protocol being specified
in a separate WG draft (draft-ietf-ancp-protocol). The latter has a
number of implementations.
2009-06-04
13 Ralph Droms


  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …


  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

Wojciech Dec (wdec@cisco.com).
Yes, I have reviewed the document and I believe it is ready for
forwading to the IESG.


  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?

Yes, the document has received adequate review. The document received in
depth review from five reviewers nominated by the WG as well as comments
during WG last call.



  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

No.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or

        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

No specific concerns.


  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

The document represents WG consensus and has been reviewed by a good
number of active WG participants. The WG has arrived at a state of
consus regarding the content of this document.


  (1.f) Has anyone threatened an appeal or otherwise indicated extreme

        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

None indicated.


  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See
        http://www.ietf.org/ID-Checklist.html
  and
        http://tools.ietf.org/tools/idnits/
). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

The document satisfies all ID nits and uses a pre-5378 boilerplate
because it was originally submitted prior to the change in boilerplate
requirements.
This is an informational framework document and as such it was not
subject to MIB doctor or other detailed technology reviews, but it has
been reviewed by the WG.



  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

Yes, the references are split appropriately. The security considerations
includes a reference to a draft intendeded to progress in parallel,
draft-ietf-ancp-security-threats, that will need to be updated as both
documents get published.



  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The IANA considerations section esists and is consient with the content
of the document. No requests to IANA are required.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

There are no sections that use a formal language.


  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

  The Access Node Control Protocol (ANCP) aims to communicate QoS-
  related, service-related and subscriber-related configurations and
  operations between a Network Access Server (NAS) and an Access Node
  (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)).  The
  main goal of this protocol is to allow the NAS to configure, manage
  and control access equipments including the ability for the access
  nodes to report information to the NAS.

The present document lays down an informational framework for the
protocol to follow. It describes the ANCP use-cases and likely usage
scenarios as well as outlining the functionality that the protocol will
have to provide to support these.

  This document is a product of the ANCP working group.

  This document is INFORMATIONAL.
2009-06-04
13 Ralph Droms Draft Added by Ralph Droms in state Publication Requested
2009-05-27
10 (System) New version available: draft-ietf-ancp-framework-10.txt
2009-05-06
09 (System) New version available: draft-ietf-ancp-framework-09.txt
2009-03-31
(System) Posted related IPR disclosure: Deutsche Telekom AG's Statement about IPR related to draft-ietf-ancp-framework-08 and draft-ietf-ancp-protocol-05
2009-02-04
08 (System) New version available: draft-ietf-ancp-framework-08.txt
2008-11-03
07 (System) New version available: draft-ietf-ancp-framework-07.txt
2008-05-09
06 (System) New version available: draft-ietf-ancp-framework-06.txt
2008-02-22
05 (System) New version available: draft-ietf-ancp-framework-05.txt
2007-11-15
04 (System) New version available: draft-ietf-ancp-framework-04.txt
2007-10-03
03 (System) New version available: draft-ietf-ancp-framework-03.txt
2007-07-12
02 (System) New version available: draft-ietf-ancp-framework-02.txt
2007-02-14
01 (System) New version available: draft-ietf-ancp-framework-01.txt
2006-10-16
00 (System) New version available: draft-ietf-ancp-framework-00.txt