[Search] [txt|pdfized|bibtex] [Tracker] [Email] [Nits]
Versions: 00 01 02                                                      
Internet Engineering Task Force
Internet Draft                                          Polk/Schulzrinne
draft-polk-sip-resource-00.txt                         Cisco/Columbia U.
November 13, 2001
Expires: May 2002


              SIP Communications Resource Priority Header

STATUS OF THIS MEMO

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress".

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   To view the list Internet-Draft Shadow Directories, see
   http://www.ietf.org/shadow.html.

Abstract

   This document defines a new SIP header field for communications
   resource priority, called "Resource-Priority". This header field
   influences the behavior of gateways and SIP proxies.


1 Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALLNOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [1].

2 Introduction

   This document defines a new SIP [2] header field for communications
   resource priority, called "Resource-Priority". This header MAY be
   used by GSTN gateways and SIP proxy servers to influence their



Polk/Schulzrinne                                              [Page 1]


Internet Draft             Resource Priority           November 13, 2001


   treatment of SIP requests, including the priority afforded to GSTN
   calls. For GSTN gateways, the behavior translates into the ITU
   Recommendation Q.735.3 [3] prioritization mechanism, in both GSTN-
   to-IP and IP-to-GSTN directions. For IP networks, proxies may offer
   mechanisms beyond the scope of this document to influence, for
   example, admission control or IP packet marking.

   The Resource-Priority header field may be inserted by proxies and SIP
   user agents.

   The Resource-Priority header field may be used in several situations:

        1.   Carrying information from one multi-level priority domain,
             e.g., using the facilities of Q.735.3 [3], to another,
             without the proxies themselves inspecting the header field.

        2.   Indicating signaling priority in SIP proxies and back-to-
             back user agents, with higher priorities displacing
             existing signaling requests or bypassing capacity limits in
             effect for lower priorities.

        3.   Requesting elevated priority for access to PSTN gateway
             resources such as trunk circuits.

   This header is related to, but differs in semantics from, the
   Priority header field (RFC 2543, Section 6.25). The Priority header
   field describes the priority that the SIP request should have to the
   receiving human or its agent. For example, it may be factored into
   decisions about call routing and acceptance. It does not influence
   the use of communications resources.

   SIP entities supporting this specification MUST be able to generate
   and process this header.

3 The Resource-Priority Header Field

   This document defines the Resource-Priority general header field.



        Resource-Priority _  "Resource-Priority" HCOLON Resource-value
        Resource-value    _  "critic-ecp" / "flash-override" /
                             "flash" / "immediate" / "priority" /
                             "routine" / extension-parameter


   As a response header, the value indicates the actual priority
   selected by the recipient. This priority value may be lower or higher



Polk/Schulzrinne                                              [Page 2]


Internet Draft             Resource Priority           November 13, 2001


   than the request header value.

   If the header field is missing, the SIP request is treated as if it
   had the Resource-Priority value of "routine".

   The values are adopted from RFC 791 [4], omitting the levels "network
   control" and "internetwork control", as these are inappropriate here.

   The values are prioritized in the order "critic-ecp" (highest),
   "flash-override", "flash", "immediate", "priority" and "routine"
   (lowest). Additional values in the extension parameter are treated as
   "routine" by entities that do not understand the value.

   The value "critic-ecp" stands for "Critical and Emergency Call
   Processing" [4]. This value SHOULD only be utilized for Government
   Emergency Telecommunications Service (GETS) [5] and similar
   government emergency preparedness or reactionary implementations.


   Header field       where  proxy  ACK  BYE  CAN  INV  OPT  REG
   _____________________________________________________________
   Resource-Priority    c     ar     -    -    -    o    -    -


   Proxies MAY downgrade the Resource-Priority of unauthenticated
   requests. Details are specific to each administrative domain and
   beyond the scope of this document. Proxies SHOULD NOT reject requests
   with such headers but instead downgrade the resource priority value.

   A proxy or user agent MAY return status code 503 (Service
   Unavailable) if there are insufficient resources at the resource
   priority level specified. The response MAY also include a Warning
   header with warning code 370 (Insufficient Bandwidth) if the request
   failed due to insufficient capacity for the media streams, rather
   than insufficient signaling capacity.

4 IANA Considerations

   Additional header field parameters can be registered with IANA. The
   registration MUST indicate the relative precedence level, expressed
   in relationship to existing adjacent values, e.g., "between urgent
   and normal".

5 Security Considerations

   The Resource-Priority header field can be abused to consume scarce
   communications resources. Thus, authentication of the requester is of
   particular importance. Authentication MAY be SIP-based.



Polk/Schulzrinne                                              [Page 3]


Internet Draft             Resource Priority           November 13, 2001


6 Bibliography

   [1] M. Hamilton and R. Wright, "Use of DNS aliases for network
   services," Request for Comments 2219, Internet Engineering Task
   Force, Oct. 1997.

   [2] M. Handley, H. Schulzrinne, E. Schooler, and J. Rosenberg, "SIP:
   session initiation protocol," Request for Comments 2543, Internet
   Engineering Task Force, Mar. 1999.

   [3] International Telecommunication Union, "Stage 3 description for
   community of interest supplementary services using signalling system
   no. 7: Multi-level precedence and preemption," Recommendation
   Q.735.3, Telecommunication Standardization Sector of ITU, Geneva,
   Switzerland, Mar. 1993.

   [4] J. Postel, "Internet protocol," Request for Comments 791,
   Internet Engineering Task Force, Sept. 1981.

   [5] K. Carlberg and I. Brown, "Framework for supporting IEPS in IP
   telephony," Internet Draft, Internet Engineering Task Force, Oct.
   2001.  Work in progress.

7 Acknowledgements

   TBD.

8 Authors' Addresses

   James Polk
   Cisco Systems
   2200 East President George Bush Turnpike
   Richardson, TX 75082 USA
   electronic mail:  jmpolk@cisco.com

   Henning Schulzrinne
   Dept. of Computer Science
   Columbia University
   1214 Amsterdam Avenue
   New York, NY 10027
   USA
   electronic mail:  schulzrinne@cs.columbia.edu




                           Table of Contents




Polk/Schulzrinne                                              [Page 4]


Internet Draft             Resource Priority           November 13, 2001


   1          Conventions used in this document ...................    1
   2          Introduction ........................................    1
   3          The Resource-Priority Header Field ..................    2
   4          IANA Considerations .................................    3
   5          Security Considerations .............................    3
   6          Bibliography ........................................    4
   7          Acknowledgements ....................................    4
   8          Authors' Addresses ..................................    4











































Polk/Schulzrinne                                              [Page 5]