A Differentiated Services Code Point (DSCP) for Capacity-Admitted Traffic
RFC 5865

Note: This ballot was opened for revision 07 and is now closed.

Magnus Westerlund Yes

(Jari Arkko) No Objection

(Ron Bonica) No Objection

Comment (2009-12-17 for -)
No email
send info
I support Dan's DISCUSS.

(Ross Callon) No Objection

(Ralph Droms) No Objection

(Lisa Dusseault) No Objection

(Lars Eggert) No Objection

(Pasi Eronen) No Objection

(Adrian Farrel) No Objection

Comment (2009-12-15 for -)
No email
send info
The Abstract says...

   ...for real-time traffic classes similar to voice...

A nit, but the traffic class is not similar to voice. The Introduction
says this much better. Any chance of polishing the Abstract?


---

Section 1.
Paragraph 3 begins...

   These applications...

Which applications? Is this paragraph intended to be attached to
paragraph 2, or is the whole context of paragraph 1 and paragraph 2
supposed to be applications rather than traffic classes?

The second sentence of the same paragraph reads...

   Reserving capacity for them is important to application performance.

I think you reserve capacity for traffic flows, not for applications?

---

Section 1.1

Do you have a reference for your definition of UNI? It doesn't seem to 
conform completely with the definition I am used to in transport 
networks withint the ITU-T. I think that the main issue I have is that
your definition implies that the use of a UNI indicates that the UNI-C
and UNI-N do not trust each other. Maybe just needs a tweak on the 
wording.

Should your NNI really be termed "E-NNI"?

---

Section 1.2

s/may not be present/might not be present/

---

Section 2.3 says...

   It is the belief of the authors that either PHB implementation

Is this not the work of the TSV Working Group with IETF consensus?
Can this please be rephrased. Either "It is believed that..." or
(preferably) a simple statement of fact.

---

e-911 is used as a term without explanation or reference.

---

Section 4
Rather obviously, you should ask IANA to asign from Pool 1

(Russ Housley) No Objection

(Cullen Jennings) (was Discuss) No Objection

(Alexey Melnikov) No Objection

Comment (2009-12-13 for -)
No email
send info
For a person not familiar with the underlying technology,
I found the Security Consideration section to be insufficiently detailed
about threats. While the list of threats seems to be adequate,
it would be useful to have some pointers to documents describing possible
remedies (for example how to achieve adequately strong proof of identity),
or a clear statement that the protocol doesn't provide such facility.

(Tim Polk) (was No Record, Discuss) No Objection

(Dan Romascanu) (was Discuss) No Objection

(Robert Sparks) No Objection

Comment (2009-12-17 for -)
No email
send info
Support Cullen's discuss (if the draft's intent was to specify the use of these mechanisms in those services. If that wasn't the intent, perhaps the motivation language could be edited to avoid the problem?)