Skip to main content

Diameter Quality-of-Service Application
draft-ietf-dime-diameter-qos-15

Revision differences

Document history

Date Rev. By Action
2010-04-02
15 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2010-04-01
15 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2010-04-01
15 (System) IANA Action state changed to In Progress from Waiting on Authors
2010-03-15
15 (System) IANA Action state changed to Waiting on Authors from In Progress
2010-03-09
15 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2010-03-08
15 (System) IANA Action state changed to In Progress
2010-03-08
15 Amy Vezza IESG state changed to Approved-announcement sent
2010-03-08
15 Amy Vezza IESG has approved the document
2010-03-08
15 Amy Vezza Closed "Approve" ballot
2010-03-08
15 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2010-03-07
15 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2010-03-07
15 Alexey Melnikov [Ballot comment]
2010-03-07
15 (System) New version available: draft-ietf-dime-diameter-qos-15.txt
2010-02-21
15 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss by Alexey Melnikov
2010-02-21
15 Alexey Melnikov
[Ballot comment]
[...]

  The authorization token allows the
  authorization decision performed at the application layer can be

s/can/to ?

  associated with a …
[Ballot comment]
[...]

  The authorization token allows the
  authorization decision performed at the application layer can be

s/can/to ?

  associated with a corresponding QoS signaling session.


11.  Security Considerations

  Therefore, sufficient
  information needs to be made available to the Authorizing Entity to
  can make such an authorization decision.

This sentence doesn't read well.
2010-02-21
15 Alexey Melnikov [Ballot discuss]
2010-02-21
14 (System) New version available: draft-ietf-dime-diameter-qos-14.txt
2009-10-26
13 (System) New version available: draft-ietf-dime-diameter-qos-13.txt
2009-10-24
15 Adrian Farrel
[Ballot comment]
Thanks for working hard on my Discusses and Comments.

One minor issue from the Discuss remains, but it is so small that I …
[Ballot comment]
Thanks for working hard on my Discusses and Comments.

One minor issue from the Discuss remains, but it is so small that I have cleared.

If you are working on the I-D for a further spin, through an RFC Editor note, or in Auth48, perhaps you could look at it.

I wrote...

> Section 3.4
>
> This section seems to drift in and out of RFC 2119 language.
> Probably, since this is stating requirements, you should move
> to using 2119 in each bullet point.

In an email exchange I expanded this to highlight the specific paragraphs...

> non-2119 language I see...
>
> Accounting Records
>    The Diameter QoS application may define QoS accounting records
>    containing duration, volume (byte count) usage information and
>    description of the QoS attributes (e.g., bandwidth, delay, loss
>    rate) that were supported for the flow.
>
> Accounting Correlation
>    The Diameter QoS application may support the exchange of
>    sufficient information to allow for correlation between accounting
>    records generated by the NEs and accounting records generated by
>    an AppS.
>
> Interaction with other AAA Applications
>    Interaction with other AAA applications such as Diameter Network
>    Access (NASREQ) application [RFC4005] is required for exchange of
>    authorization, authentication and accounting information.
>
> Looks like may/MAY and required/REQUIRED

I don't think there was any follow-up email on this, so it probably  just got missed.
2009-10-24
15 Adrian Farrel [Ballot discuss]
2009-10-24
15 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel
2009-10-22
15 Alexey Melnikov
[Ballot comment]
[...]

  The authorization token allows the
  authorization decision performed at the application layer can be

s/can/to ?

  associated with a …
[Ballot comment]
[...]

  The authorization token allows the
  authorization decision performed at the application layer can be

s/can/to ?

  associated with a corresponding QoS signaling session.


11.  Security Considerations

  Therefore, sufficient
  information needs to be made available to the Authorizing Entity to
  can make such an authorization decision.

This sentence doesn't read well.
2009-10-22
15 Alexey Melnikov
[Ballot discuss]
Updated as per version 12:

I have several blocking comments, but I believe they should be easy to address:

1).
5.1.  QoS-Authorization Request …
[Ballot discuss]
Updated as per version 12:

I have several blocking comments, but I believe they should be easy to address:

1).
5.1.  QoS-Authorization Request (QAR)

  The message format is defined as follows:

This doesn't tell which formal syntax is used. Please add a reference to
in section 3.2 of RFC 3588:

If you change that not to say "ABNF", then you can also remove the following Normative Reference:
  [RFC4234]  Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
              Specifications: ABNF", RFC 4234, October 2005.

    ::= < Diameter Header: [TBD1], REQ, PXY >
                        < Session-Id >
                        { Auth-Application-Id }
                        { Origin-Host }
                        { Origin-Realm }
                        { Destination-Realm }
                        { Auth-Request-Type }
                        [ Destination-Host ]
                        [ User-Name ]
                      *  [ QoS-Resources ]
                        [ QoS-Authorization-Data ]
                        [ Bound-Auth-Session-Id ]
                      *  [ AVP ]


2). DISCUSS DISCUSS:

The draft defines:

    ::= < Diameter Header: 258, REQ, PXY >
                              < Session-Id >
                              { Auth-Application-Id }
                              { Origin-Host }
                              { Origin-Realm }
                              { Destination-Realm }
                              { Auth-Request-Type }
                              [ Destination-Host ]
                          *  [ QoS-Resources ]
                              [ Session-Timeout ]
                              [ Authorization-Session-Lifetime ]
                              [ Authorization-Grace-Period ]
                              [ Authorization-Session-Volume ]
                          *  [ AVP ]

RFC 3588 defines:
        ::= < Diameter Header: 258, REQ, PXY >
                < Session-Id >
                { Origin-Host }
                { Origin-Realm }
                { Destination-Realm }
                { Destination-Host }
                { Auth-Application-Id }
                { Re-Auth-Request-Type }
                [ User-Name ]
                [ Origin-State-Id ]
              * [ Proxy-Info ]
              * [ Route-Record ]
              * [ AVP ]

Can you explain why "{ Destination-Host }" became "[ Destination-Host ]"?
Also some other optional fields were removed entirely in the draft.

And a similar question in respect to section 5.6 versa RFC 3588, section 8.3.2.

3). DISCUSS DISCUSS:

In Section 10.2:

  Sub-registry: Auth-Application-Id  AVP Values (code 258)
  Registry:
  AVP Values          Attribute Name            Reference
  -------------  -------------------------------------------
  to be assigned    DIAMETER-QOS-NOSUPPORT      Section 5
  to be assigned    DIAMETER-QOS-SUPPORT        Section 5


  Sub-registry: Acct-Application-Id  AVP Values (code 259)
  Registry:
  AVP Values          Attribute Name            Reference
  -------------  -------------------------------------------
  to be assigned    DIAMETER-QOS-NOSUPPORT      Section 5
  to be assigned    DIAMETER-QOS-SUPPORT        Section 5

Is one of these values referenced as [TBD5] in section 5. Which one?
2009-10-22
15 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-10-22
12 (System) New version available: draft-ietf-dime-diameter-qos-12.txt
2009-08-18
15 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Brian Weis.
2009-08-14
15 (System) Removed from agenda for telechat - 2009-08-13
2009-08-13
15 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2009-08-13
15 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-08-13
15 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-08-13
15 Pasi Eronen [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen
2009-08-12
15 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-08-12
15 Robert Sparks
[Ballot comment]
The illustrative flows throughout the document focus on messages where requests succeed. Should there be any discussion of what happens when something fails? …
[Ballot comment]
The illustrative flows throughout the document focus on messages where requests succeed. Should there be any discussion of what happens when something fails? (For a twisted example, consider 4.4.1)

The example in 9.2 suggests the SIP Server delay forwarding the 200 OK
it is processing until the RAR/RAA round completes. Unless that's really what you meant, please consider adding text noting that the 200 could be sent while the NE was being touched. If it _is_ really what you meant, then
more discussion of what to do if that activation fails or takes a long time is in order.
2009-08-12
15 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-08-11
15 Adrian Farrel
[Ballot comment]
Section 1

Would be nice to include a reference to RFC3588 early in this section.

---

Section 2 Network Element (NE)

    …
[Ballot comment]
Section 1

Would be nice to include a reference to RFC3588 early in this section.

---

Section 2 Network Element (NE)

      The Network Element corresponds to the Policy
      Enforcement Point (PEP) [RFC2753].

Not sure I like this interpretation of RFC 2753. Doesn't the NE here
correspond to the "Network Node" in 2753? In 2753, the PEP is located
within the Network Node (but not all Network Nodes contain a PEP).

Indeed, Figure 1 shows NEs without diameter clients.

How about changing to...
     
      The Diameter Client at an NE corresponds to the Policy
      Enforcement Point (PEP) [RFC2753].

---

Section 10.5

It would be helpful (and safer) to used the TBD1, TBD2, etc. as used in
section 5 and onwards.

TBD5 is present in section 5, but I can't correlate it to anything in
section 10.

===

Nits

---

Section 1 para 3

s/this note/this document/

---

Section 2 AAA Cloud                                                       

Can you make it clearer that "AAA" means "authentication, authorization
and accounting"

Perhaps just change the title to...

  Authentication, Authorization and Accounting Cloud (AAA Cloud)


---

Figure 4 is a bit messy around the sides of the AAA cloud.

---

Figures 3, 4, and 5

A bit confusing that the figures show "Entity requesting resource," but
the text refers to the RRE (Resource Requesting Entity".

---

Section 12
Does "Rajith R" have a full name?
2009-08-11
15 Adrian Farrel
[Ballot discuss]
A solid document, but I have a number of Discuss issues and some Comments that follow...

Section 3. Final paragraph.

  If defined …
[Ballot discuss]
A solid document, but I have a number of Discuss issues and some Comments that follow...

Section 3. Final paragraph.

  If defined properly, the interface between the NEs and AAA cloud
  would be identical whether the AE communicates with an AppS or not.
  Routers are therefore insulated from the details of particular
  applications and need not know that Application Servers are involved
  at all.  Also, the AAA cloud would naturally encompass business
  relationships such as those between network operators and third-party
  application providers, enabling flexible intra- or inter-domain
  authorization, accounting, and settlement.

This is a bit messy!

"If defined properly..." Well, have you done it or not? :-)
"Routers are therefore..." Because of the need for proper design?

How about...

  If the interface between the NEs and the AAA cloud is identical
  regardless of whether the AE communicates with an AppS or not,
  routers are insulated from the details of particular applications
  and need not know that Application Servers are involved.

"Also, the AAA cloud..." Does also apply to the interface definition?
"...naturally..." There is nothing natural about computers :-)

I think you should split the paragraph as

  The AAA cloud may also encompass business relationships such as
  those between network operators and third-party application
  providers. This enables flexible intra- or inter-domain
  authorization, accounting, and settlement.

---

Figure 2

Shouldn't the signaling flow be unidirectional in this figure.
As drawn, it appears that the Input Packet Processor is capable of
sending Signaling packets upstream!
                                                                               
It would be nice if you put arrow heads on the signaling flow from
Input Packet Processor, to the two signaling message processors,
and back to the Forwarding Engine.

I'm not clear why you have the signaling flow leaving the router
without classification of scheduling.

---

Section 3.2.2

  For Category 1 and 2 Application Endpoints, Push mode is required.
  For a Category 3 AppE, either Push mode or Pull mode MAY be used.

Either "REQUIRED" or "may".
I suspect that RFC 2119 language is not applicable in this section.

---

Section 3.2.2

  Diffserv-enabled IP/MPLS as defined by
  other SDOs (e.g., ETSI TISPAN and ITU-T}

I am nervous about the statement that other SDOs define DiffServ-enabled
IP/MPLS.

Would it be possible to truncate as

  Diffserv-enabled IP/MPLS.

---

Section 3.3.1

  In the two-party case no Diameter QoS
  protocol interaction is REQUIRED.

I don't think you need 2119 language, but if you do, you should use
"NOT REQUIRED."

---

Figures 3, 4, and 5 and Section 4.3

Each of these figures shows "Financial Settlement" as an interaction, and                                                                       
specifically shows it avoiding the AAA Cloud. Yet the description of the
term does not show up until section 4.3 some considerable time later. You
need to at least include a forward reference.

Or is this the "business relationship, such as a roaming agreement"
immediately after Figure 3?

In any case, I am not comfortable with the concept of an NE being
financially compensated for the services it performs. Surely the
financial compensation takes place between RRE and QosAuthz. We must
also recall that the magnitude of the compensation is part of the
policy consideration.

---

Section 3.4

  Inter-domain support
      In particular, users may roam outside their home network, leading
      to a situation where the NE and AE are in different administrative
      domains.

I'm not sure!

It is actually the AppE roaming that we are interested in, but that is
not important.

You are suggesting that *the* AE may be in different administrative
domain from at least one NE on the media flow. But I find it hard to
believe that a domain adminstator will allow this to be the case. The
only tools that can authorize resource administration in my domain are
my AEs.

This leads to a more complex situation where the RRE might belong to a
different administrative domain from the AE, and where AEs have to
cooperate (one AE acting as RRE for the next AE).

This is such a complex architectural requirement that I wonder why you
dont limit yourselves to a single administrative domain at least until
you have that working.

---

Section 3.4

This section seems to drift in and out of RFC 2119 language. Probably,
since this is stating requirements, you should move to using 2119 in
each bullet point.

---

Figure 10

Why is the QoS Response shown before the STA?
Surely the STA could say "not authorized."

Furthermore, is it really safe to delete the QoS State and send the
QoS Response to the End Host Requesting Reserveation before receiving
the QoS Response from the QoS Responder Node? Compare this with the
setup process in Figure 6 - I expected a degree of symmetry. Including
text to explain the lack of symmetry would be fine.

Additionally, the acronym STA is not explained.

---

BSD license.

The I-D includes ABNF fragments so we will need to include a BSD license.

---

ABNF reference

RFC Editor will catch this, but why not use RFC 5234?
On the other hand, see Alexey's comment. Either way, you need a normative reference to the form of BNF you are using.
2009-08-11
15 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2009-08-11
15 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2009-08-10
15 Alexey Melnikov
[Ballot comment]
3.3.1.  Pull Mode Schemes

  In the 'Two Party Scheme', the QoS RRE is authenticated by the NE and
  the authorization decision …
[Ballot comment]
3.3.1.  Pull Mode Schemes

  In the 'Two Party Scheme', the QoS RRE is authenticated by the NE and
  the authorization decision is made either locally at the NE itself or
  offloaded to a trusted entity (most likely within the same
  administrative domain).  In the two-party case no Diameter QoS
  protocol interaction is REQUIRED.

Last sentence: this doesn't look like a proper use of RFC 2119 keywords,
as the sentence doesn't state any requirement.

[...]

  The authorization token allows the
  authorization decision performed at the application layer can be

s/can/to ?

  associated with a corresponding QoS signaling session.


4.3.  Session Re-authorization

  In addition, the AE may use a RAR to perform re-authorization with

The acronym RAR is mentioned here for the first time, so it should be
expanded.

  the authorized parameters directly when the re-authorization is
  triggered by service request or local events/policy rules.


11.  Security Considerations

  Therefore, sufficient
  information needs to be made available to the Authorizing Entity to
  can make such an authorization decision.

This sentence doesn't read well.
2009-08-10
15 Alexey Melnikov
[Ballot discuss]
I have several blocking comments, but I believe they should be easy to address:

1).
5.1.  QoS-Authorization Request (QAR)

  The message format, …
[Ballot discuss]
I have several blocking comments, but I believe they should be easy to address:

1).
5.1.  QoS-Authorization Request (QAR)

  The message format, presented in ABNF form [RFC4234], is defined as
  follows:

No, this is not a valid ABNF. This is using the format defined
in section 3.2 of RFC 3588, which in its turn is defined using ABNF.

If you change that not to say "ABNF", then you can also remove the following Normative Reference:
  [RFC4234]  Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
              Specifications: ABNF", RFC 4234, October 2005.

    ::= < Diameter Header: [TBD1], REQ, PXY >
                        < Session-Id >
                        { Auth-Application-Id }
                        { Origin-Host }
                        { Origin-Realm }
                        { Destination-Realm }
                        { Auth-Request-Type }
                        [ Destination-Host ]
                        [ User-Name ]
                      *  [ QoS-Resources ]
                        [ QoS-Authorization-Data ]
                        [ Bound-Auth-Session-Id ]
                      *  [ AVP ]


2). DISCUSS DISCUSS:

The draft defines:

    ::= < Diameter Header: 258, REQ, PXY >
                              < Session-Id >
                              { Auth-Application-Id }
                              { Origin-Host }
                              { Origin-Realm }
                              { Destination-Realm }
                              { Auth-Request-Type }
                              [ Destination-Host ]
                          *  [ QoS-Resources ]
                              [ Session-Timeout ]
                              [ Authorization-Session-Lifetime ]
                              [ Authorization-Grace-Period ]
                              [ Authorization-Session-Volume ]
                          *  [ AVP ]

RFC 3588 defines:
        ::= < Diameter Header: 258, REQ, PXY >
                < Session-Id >
                { Origin-Host }
                { Origin-Realm }
                { Destination-Realm }
                { Destination-Host }
                { Auth-Application-Id }
                { Re-Auth-Request-Type }
                [ User-Name ]
                [ Origin-State-Id ]
              * [ Proxy-Info ]
              * [ Route-Record ]
              * [ AVP ]

Can you explain why "{ Destination-Host }" became "[ Destination-Host ]"?
Also some other optional fields were removed entirely in the draft.

And a similar question in respect to section 5.6 versa RFC 3588, section 8.3.2.

3). DISCUSS DISCUSS:

In Section 10.2:

  Sub-registry: Auth-Application-Id  AVP Values (code 258)
  Registry:
  AVP Values          Attribute Name            Reference
  -------------  -------------------------------------------
  to be assigned    DIAMETER-QOS-NOSUPPORT      Section 5
  to be assigned    DIAMETER-QOS-SUPPORT        Section 5


  Sub-registry: Acct-Application-Id  AVP Values (code 259)
  Registry:
  AVP Values          Attribute Name            Reference
  -------------  -------------------------------------------
  to be assigned    DIAMETER-QOS-NOSUPPORT      Section 5
  to be assigned    DIAMETER-QOS-SUPPORT        Section 5

Is one of these values referenced as [TBD5] in section 5. Which one?
2009-08-10
15 Alexey Melnikov
[Ballot discuss]
I have several blocking comments, but I believe they should be easy to address:

1).
5.1.  QoS-Authorization Request (QAR)

  The message format, …
[Ballot discuss]
I have several blocking comments, but I believe they should be easy to address:

1).
5.1.  QoS-Authorization Request (QAR)

  The message format, presented in ABNF form [RFC4234], is defined as
  follows:

No, this is not a valid ABNF. This is using the format defined
in section 3.2 of RFC 3588, which in its turn is defined using ABNF.

    ::= < Diameter Header: [TBD1], REQ, PXY >
                        < Session-Id >
                        { Auth-Application-Id }
                        { Origin-Host }
                        { Origin-Realm }
                        { Destination-Realm }
                        { Auth-Request-Type }
                        [ Destination-Host ]
                        [ User-Name ]
                      *  [ QoS-Resources ]
                        [ QoS-Authorization-Data ]
                        [ Bound-Auth-Session-Id ]
                      *  [ AVP ]


2). DISCUSS DISCUSS:

The draft defines:

    ::= < Diameter Header: 258, REQ, PXY >
                              < Session-Id >
                              { Auth-Application-Id }
                              { Origin-Host }
                              { Origin-Realm }
                              { Destination-Realm }
                              { Auth-Request-Type }
                              [ Destination-Host ]
                          *  [ QoS-Resources ]
                              [ Session-Timeout ]
                              [ Authorization-Session-Lifetime ]
                              [ Authorization-Grace-Period ]
                              [ Authorization-Session-Volume ]
                          *  [ AVP ]

RFC 3588 defines:
        ::= < Diameter Header: 258, REQ, PXY >
                < Session-Id >
                { Origin-Host }
                { Origin-Realm }
                { Destination-Realm }
                { Destination-Host }
                { Auth-Application-Id }
                { Re-Auth-Request-Type }
                [ User-Name ]
                [ Origin-State-Id ]
              * [ Proxy-Info ]
              * [ Route-Record ]
              * [ AVP ]

Can you explain why "{ Destination-Host }" became "[ Destination-Host ]"?
Also some other optional fields were removed entirely in the draft.

And a similar question in respect to section 5.6 versa RFC 3588, section 8.3.2.
2009-08-10
15 Alexey Melnikov [Ballot Position Update] New position, Discuss, has been recorded by Alexey Melnikov
2009-08-06
15 Dan Romascanu [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu
2009-08-06
15 Dan Romascanu Ballot has been issued by Dan Romascanu
2009-08-06
15 Dan Romascanu Created "Approve" ballot
2009-08-06
15 Dan Romascanu State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Dan Romascanu
2009-08-06
15 Dan Romascanu Placed on agenda for telechat - 2009-08-13 by Dan Romascanu
2009-08-05
11 (System) New version available: draft-ietf-dime-diameter-qos-11.txt
2009-08-04
15 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-08-03
15 Samuel Weiler Request for Last Call review by SECDIR is assigned to Brian Weis
2009-08-03
15 Samuel Weiler Request for Last Call review by SECDIR is assigned to Brian Weis
2009-08-02
10 (System) New version available: draft-ietf-dime-diameter-qos-10.txt
2009-07-30
15 Amanda Baber
IANA questions/comments:

- In Action 2 (Section 10.2) the document requests allocation in
nonexistent registries. Do you want to create the
Auth-Application-Id AVP Values (code …
IANA questions/comments:

- In Action 2 (Section 10.2) the document requests allocation in
nonexistent registries. Do you want to create the
Auth-Application-Id AVP Values (code 258) and
Acct-Application-Id AVP Values (code 259) registries? If so,
you will need to specify the registry semantics.

- In Table 1 in Section 4.2.1 you mention "QoS-Authz-Data" but that
AVP is not registered. You probably mean "QoS-Authorization-Data,"
but the short-hand could be confusing to readers. Is this what you
mean? The document use similar shorthands in Figure 6.

- In Section 5 you again use short-hand names for commands. Shouldn't
you be consistent with the names?


IANA Notes: This document depends on the IANA Actions in
ietf-dime-qos-attributes


Action 1 (Section 10.1):

Upon approval of this document, IANA will make the following
assignments in the "AVP Codes" registry at
http://www.iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

AVP Code Attribute Name Reference
-----------------------------------------------------------
TBD QoS-Authorization-Data [RFC-dime-diameter-qos-09]
TBD Bound-Auth-Session-Id [RFC-dime-diameter-qos-09]


Action 2 (Section 10.2):

TBD? (Do you want IANA to create these new registries?)


Action 3 (Section 10.4):

Upon approval of this document, IANA will make the following
assignment in the "Application IDs" registry at
http://www.iana.org/assignments/aaa-parameters/aaa-parameters.xhtml


ID values Name Reference
-----------------------------------------------------------
TBD Diameter QoS application [RFC-dime-diameter-qos-09]


Action 4 (Section 10.5):

Upon approval of this document, IANA will make the following
assignments in the "Command Codes" registry at
http://www.iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Code Value Name Reference
-----------------------------------------------------------
TBD QoS-Authorization-Request (QAR) [RFC-dime-diameter-qos-09]
TBD QoS-Authorization-Answer (QAA) [RFC-dime-diameter-qos-09]
TBD QoS-Install-Request (QIR) [RFC-dime-diameter-qos-09]
TBD QoS-Install-Answer (QIA) [RFC-dime-diameter-qos-09]


We understand the above to be the only IANA Actions for this document.
2009-07-21
15 Cindy Morgan Last call sent
2009-07-21
15 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2009-07-21
15 Dan Romascanu State Changes to Last Call Requested from AD Evaluation::AD Followup by Dan Romascanu
2009-07-21
15 Dan Romascanu Last Call was requested by Dan Romascanu
2009-07-21
15 (System) Ballot writeup text was added
2009-07-21
15 (System) Last call text was added
2009-07-21
15 (System) Ballot approval text was added
2009-07-13
15 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-07-13
09 (System) New version available: draft-ietf-dime-diameter-qos-09.txt
2009-06-24
15 Dan Romascanu State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Dan Romascanu
2009-06-16
15 Dan Romascanu State Changes to AD Evaluation from Publication Requested by Dan Romascanu
2009-05-22
15 Amy Vezza
PROTO WRITEUP for draft-ietf-dime-diameter-qos-08.txt
======================================================

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally …
PROTO WRITEUP for draft-ietf-dime-diameter-qos-08.txt
======================================================

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

The document shepherd is Victor Fajardo. I have personally reviewed the
document and I believe it is ready for publication.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

This document defines a new Diameter QoS application. It is designed to
provide a general method for signaling QoS authorization decisions and
associated QoS parameters. Since it encompasses a very visible and highly
used aspect of the core network, it has had thorough review from WG members
as well as participants from other SDOs who maybe impacted by the work.
The document shepherd has no concerns about the depth of the reviews.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?

There are no concerns with this document.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

There are no concerns with this document. 

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

There is consensus in the WG behind the document. The problem space is
well understood and the solution is acceptable to the WG, as well
as other interested SDOs.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

There is no opposition to this document.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

The document does not contain nits.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

The document has been split into normative and informative references.
There are normative references that are work in progress. These are the
following:

  [I-D.ietf-dime-qos-attributes]
              Korhonen, J., Tschofenig, H., Arumaithurai, M., Jones, M.,
              and A. Lior, "Quality of Service Attributes for Diameter",
              draft-ietf-dime-qos-attributes-08 (work in progress),
              October 2008.

  [I-D.ietf-dime-qos-parameters]
              Korhonen, J. and H. Tschofenig, "Quality of Service
              Parameters for Usage with the AAA Framework",
              draft-ietf-dime-qos-parameters-07 (work in progress),
              November 2008.

It is expected that these referenced documents will complete
standardization
well before the diameter-qos application document. There are no normative
references that are downward referenced.

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?

The document has an IANA considerations section that is consistent with
the body.
The document only request allocations of new Application-Id, Command
codes and AVP
codes in the IETF namespace. Following RFC 3588, IETF consensus is
required for the
block allocations needed in this doc. The consensus process given to
this doc by the
DIME WG serves as consensus for IANA allocation requirements.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

The document contains ABNF rules specified in RFC 3588. The ABNF content
has been validated.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

  Technical Summary

    The document specifies a framework, messages and AVPs for
    performing QoS authorization operations. It defines a QoS Diameter
    application that allows network elements (QoS aware routers) to
    interact with Diameter servers to authorize QoS request. It
    has been designed to operate in both 'Push' or 'Pull' mode
    where QoS authorization state is either sent to the network
    element pro-actively (Push) or the network element directly
    request QoS authorization from the Diameter server.

    A set of commands and AVPs has been defined to support both
    operating modes. A supplemental state machine that augments
    the Diameter base protocol (RFC3588) state machine has also been
    defined to cleanly support Push mode operations. The document
    also describes QoS authorization session establishment as well
    as re-authorization. It provides examples and call flows that
    describes how QoS authorization can be used other applications
    (e.g. NSLP, SIP).

  Working Group Summary

    There was consensus in the WG to publish the document.

  Document Quality

    The document has been sent for review to NSIS and relevant QoS folks.
    This document defines a core component of a Network Operators QoS
    architecture and thus have gone through a long review process
    both within DIME WG and outside of it. It has also traversed
    several re-start iteration before its current acceptable state.

  Personnel

    Victor Fajardo is the document shepherd for this document.
2009-05-22
15 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2009-05-22
15 Amy Vezza [Note]: 'Victor Fajardo [vfajardo@tari.toshiba.com] is the document shepherd for this document.' added by Amy Vezza
2009-05-07
08 (System) New version available: draft-ietf-dime-diameter-qos-08.txt
2008-12-18
07 (System) New version available: draft-ietf-dime-diameter-qos-07.txt
2008-07-13
06 (System) New version available: draft-ietf-dime-diameter-qos-06.txt
2008-02-25
05 (System) New version available: draft-ietf-dime-diameter-qos-05.txt
2008-01-29
04 (System) New version available: draft-ietf-dime-diameter-qos-04.txt
2008-01-24
03 (System) New version available: draft-ietf-dime-diameter-qos-03.txt
2007-11-19
02 (System) New version available: draft-ietf-dime-diameter-qos-02.txt
2007-07-11
01 (System) New version available: draft-ietf-dime-diameter-qos-01.txt
2007-02-28
00 (System) New version available: draft-ietf-dime-diameter-qos-00.txt