Generic Connection Admission Control (GCAC) Algorithm Specification for IP/MPLS Networks
RFC 6601
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2016-11-30
|
04 | David Harrington | Closed request for Telechat review by TSVDIR with state 'Unknown' |
2015-12-31
|
04 | Jean Mahoney | Closed request for Last Call review by GENART with state 'No Response' |
2015-10-14
|
04 | (System) | Notify list changed from gash5107@yahoo.com, dave.mcdysan@verizon.com, draft-ash-gcac-algorithm-spec@ietf.org, leeyoung@huawei.com to leeyoung@huawei.com |
2012-08-22
|
04 | (System) | post-migration administrative database adjustment to the No Objection position for Robert Sparks |
2012-04-30
|
04 | (System) | RFC published |
2012-03-13
|
04 | (System) | IANA Action state changed to No IC |
2012-03-09
|
04 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2012-03-08
|
04 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent |
2012-03-08
|
04 | Amy Vezza | IESG has approved the document |
2012-03-08
|
04 | Amy Vezza | Closed "Approve" ballot |
2012-03-08
|
04 | Amy Vezza | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2012-03-08
|
04 | Adrian Farrel | Ballot approval text was generated |
2012-03-08
|
04 | Adrian Farrel | Ballot approval text was generated |
2012-03-08
|
04 | Adrian Farrel | Ballot writeup was changed |
2012-03-05
|
04 | Robert Sparks | [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss |
2012-01-23
|
04 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Rob Austein. |
2012-01-19
|
04 | Cindy Morgan | Removed from agenda for telechat |
2012-01-19
|
04 | Cindy Morgan | State changed to IESG Evaluation::AD Followup from IESG Evaluation. |
2012-01-19
|
04 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-19
|
04 | Amy Vezza | Ballot writeup text changed |
2012-01-19
|
04 | Jari Arkko | [Ballot comment] Agree with Robert's points in his discuss. I also found this document in general difficult to read, and hard to convince myself that … [Ballot comment] Agree with Robert's points in his discuss. I also found this document in general difficult to read, and hard to convince myself that it actually works as expected. |
2012-01-19
|
04 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-18
|
04 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-18
|
04 | Wesley Eddy | [Ballot comment] I concur with Robert's DISCUSS points |
2012-01-18
|
04 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-18
|
04 | Robert Sparks | [Ballot comment] The document calls out VOIP as an example of traffic that might be used as an input to this algorithm, but the current … [Ballot comment] The document calls out VOIP as an example of traffic that might be used as an input to this algorithm, but the current language implies it's the ONLY traffic that's expected, and that the only things generating that traffic will be IP/PBXs and SIP/RTP end devices. Please make it clear that this traffic is only a motivational example. The interoperability issue exposed at the top of page 11 deserves more discussion. What goes wrong when different administrative domains use different constraint models? Are there symptoms that can be observed to know that somethings going wrong? Can the document make a stronger statement about the appropriate configuration of a experimental test bed? This sentence needs clarification: "Let DBWi be the additional bandwidth capacity needed to carry the flow with aggregate bandwidth DBWi." As written it defines a term in terms of itself. I'm skeptical of the brevity of the security consideration section, but yield to the shepherd to double-check that there is nothing beyond the marking of emergency traffic to discuss. |
2012-01-18
|
04 | Robert Sparks | [Ballot discuss] (Updated to add point 3 below) The document says that the algorithm might have negative effects on live deployments (by implication, up to … [Ballot discuss] (Updated to add point 3 below) The document says that the algorithm might have negative effects on live deployments (by implication, up to and including failing to complete an emergenc call) but then says experimentation in production networks needs to be treated with caution. Was "experimentation in production networks is NOT RECOMMENDED", or even "expereiments MUST NOT be performed on production networks" considered and rejected? If so, can the document explain why? (Related - can the document explain what experimenting "in a controlled manner" means?) The security consideration section's discussion of the risks of using possibly unprotected marks to identify emergency traffic should incorporate or reference the related discussion from ECRIT and (if I remember correctly) the RSVP document suite. This is much harder problem than the current text signals. Example A.2 needs to be updated to reflect that NSIS has concluded. |
2012-01-18
|
04 | Robert Sparks | [Ballot comment] The document calls out VOIP as an example of traffic that might be used as an input to this algorithm, but the current … [Ballot comment] The document calls out VOIP as an example of traffic that might be used as an input to this algorithm, but the current language implies it's the ONLY traffic that's expected, and that the only things generating that traffic will be IP/PBXs and SIP/RTP end devices. Please make it clear that this traffic is only a motivational example. The interoperability issue exposed at the top of page 11 deserves more discussion. What goes wrong when different administrative domains use different constraint models? Are there symptoms that can be observed to know that somethings going wrong? Can the document make a stronger statement about the appropriate configuration of a experimental test bed? This sentence needs clarification: "Let DBWi be the additional bandwidth capacity needed to carry the flow with aggregate bandwidth DBWi." As written it defines a term in terms of itself. I'm skeptical of the brevity of the security consideration section, but yield to the shepherd to double-check that there is nothing beyond the marking of emergency traffic to discuss. |
2012-01-18
|
04 | Robert Sparks | [Ballot discuss] The document says that the algorithm might have negative effects on live deployments (by implication, up to and including failing to complete an … [Ballot discuss] The document says that the algorithm might have negative effects on live deployments (by implication, up to and including failing to complete an emergenc call) but then says experimentation in production networks needs to be treated with caution. Was "experimentation in production networks is NOT RECOMMENDED", or even "expereiments MUST NOT be performed on production networks" considered and rejected? If so, can the document explain why? (Related - can the document explain what experimenting "in a controlled manner" means?) The security consideration section's discussion of the risks of using possibly unprotected marks to identify emergency traffic should incorporate or reference the related discussion from ECRIT and (if I remember correctly) the RSVP document suite. This is much harder problem than the current text signals. |
2012-01-18
|
04 | Robert Sparks | [Ballot Position Update] New position, Discuss, has been recorded |
2012-01-18
|
04 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-18
|
04 | Stephen Farrell | [Ballot comment] 1) VARk = BWMck**2/VFck could be mis-read, suggest adding parenthesis or using another couple of lines like eq(2). 2) Surely there's a DoS … [Ballot comment] 1) VARk = BWMck**2/VFck could be mis-read, suggest adding parenthesis or using another couple of lines like eq(2). 2) Surely there's a DoS vector here too - couldn't someone in principle provide bad inputs so that the algorithm denies service? Not sure how best to note that, but I'd say its worth a mention in the security considerations. |
2012-01-18
|
04 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-17
|
04 | Peter Saint-Andre | [Ballot comment] As with all Experimental specifications, it would be nice to define some parameters for the experiment (success criteria, guidelines for those who implement … [Ballot comment] As with all Experimental specifications, it would be nice to define some parameters for the experiment (success criteria, guidelines for those who implement and deploy the technology, etc.). |
2012-01-17
|
04 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-17
|
04 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-16
|
04 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2012-01-11
|
04 | Adrian Farrel | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2012-01-11
|
04 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2012-01-05
|
04 | Adrian Farrel | Ballot writeup text changed |
2011-12-28
|
04 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel |
2011-12-28
|
04 | Adrian Farrel | Ballot has been issued |
2011-12-28
|
04 | Adrian Farrel | Created "Approve" ballot |
2011-12-12
|
04 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Rob Austein |
2011-12-12
|
04 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Rob Austein |
2011-12-09
|
04 | Amanda Baber | We understand that this document doesn't require any IANA actions. |
2011-12-08
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Kathleen Moriarty |
2011-12-08
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Kathleen Moriarty |
2011-12-07
|
04 | Wesley Eddy | Request for Telechat review by TSVDIR is assigned to Allison Mankin |
2011-12-07
|
04 | Wesley Eddy | Request for Telechat review by TSVDIR is assigned to Allison Mankin |
2011-12-07
|
04 | Amy Vezza | Last call sent |
2011-12-07
|
04 | Amy Vezza | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Subject: Last Call: (Generic Connection Admission Control (GCAC) Algorithm Specification for IP/MPLS Networks) to Experimental RFC The IESG has received a request from an individual submitter to consider the following document: - 'Generic Connection Admission Control (GCAC) Algorithm Specification for IP/MPLS Networks' as an Experimental RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-01-11. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document presents a generic connection admission control (GCAC) reference model and algorithm for IP/MPLS-based networks. Service provider (SP) IP/MPLS networks need an MPLS GCAC mechanism, for example, to reject voice over Internet Protocol (VoIP) calls when additional calls would adversely affect calls already in progress. Without MPLS GCAC, connections on congested links will suffer degraded quality. The MPLS GCAC algorithm can be optionally implemented in vendor equipment and deployed by service providers. MPLS GCAC interoperates between vendor equipment and across multiple service provider domains. The MPLS GCAC algorithm uses available standard mechanisms for MPLS based networks, such as RSVP, DSTE, PCE, NSIS, DiffServ, and OSPF. The MPLS GCAC algorithm does not include aspects of CAC that might be considered vendor proprietary implementations, such as detailed path selection mechanisms. MPLS GCAC functions are implemented in a distributed manner to deliver the objective QoS for specified QoS constraints. The objective is that the source is able to compute a source route with high likelihood that MPLS GCAC via elements along the selected path will in fact admit the request. In some cases (e.g., multiple AS) this objective cannot always be met, but the document summarizes methods that partially meet this objective. MPLS GCAC is applicable to any service or flow that must meet an objective QoS (delay, jitter, packet loss rate) for a specified quantity of traffic. The file can be obtained via http://datatracker.ietf.org/doc/draft-ash-gcac-algorithm-spec/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ash-gcac-algorithm-spec/ No IPR declarations have been submitted directly on this I-D. |
2011-12-07
|
04 | Adrian Farrel | Setting stream while adding document to the tracker |
2011-12-07
|
04 | Adrian Farrel | Stream changed to IETF from |
2011-12-07
|
04 | Adrian Farrel | Placed on agenda for telechat - 2012-01-19 |
2011-12-07
|
04 | Adrian Farrel | Last Call was requested |
2011-12-07
|
04 | (System) | Ballot writeup text was added |
2011-12-07
|
04 | (System) | Last call text was added |
2011-12-07
|
04 | Adrian Farrel | State changed to Last Call Requested from AD Evaluation::AD Followup. |
2011-12-07
|
04 | Adrian Farrel | Last Call text changed |
2011-12-07
|
04 | Adrian Farrel | Ballot writeup text changed |
2011-12-07
|
04 | Adrian Farrel | Last Call text changed |
2011-12-07
|
04 | Adrian Farrel | Last Call text changed |
2011-12-05
|
04 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-12-05
|
03 | (System) | New version available: draft-ash-gcac-algorithm-spec-03.txt |
2011-11-24
|
04 | Adrian Farrel | State changed to AD Evaluation::Revised ID Needed from AD Evaluation. Here are my comments on your draft. It is well written and clear and my … State changed to AD Evaluation::Revised ID Needed from AD Evaluation. Here are my comments on your draft. It is well written and clear and my comments are relatively small. The most important is more of a geopolitical issue than a technical one, but I think it has to be addressed. I will put the I-D into "revised I-D needed" state. When you post a new revision I will get kicked automagically and will start the IETF last call. Cheers, Adrian --- I am missing some discussion of why this is Experimental, how the experiment may be conducted (and constrained), and how we will judge the experiment. This would belong at the bottom of Section 1. I suggest something like the following (although you may munge the text as you like). This document is Experimental. It is intended that service providers and venders experiment with the GCAC concept and the algorithm described in this document in a controlled manner to determine the benefits of such a mechanism. The results of such experiments may be fed back to the IETF community to refine this document and to move it to the Standards Track (probably within the MPLS working group) if the experimental results are positive. It should be noted that the algorithm might have negative effects on live deployments if the experiment is a failure. Effects might include blocking traffic that would normally be handled, or by allowing excessive traffic on a link. For these reasons, experimentation in production networks needs to be treated with caution. --- There are a number of terms in the Legend to Figure 1 that don't appear in the figure. Is this correct? BW: bandwidth COS: class of service GCF: GCAC core function I/F: interface MAR: maximum allocation with reservation --- Section 2.1 omits the context that some of the parameters apply to the specific flow/LSP being calculated, and some apply to the calculation method. --- Section 2 says: Figure 1 illustrates the GEF to GEF MPLS GCAC algorithm to determine whether there is sufficient bandwidth to complete a connection. I think that figure 1 is a reference model for MPLS GCAC --- Section 2.2 2. Use [BGP-TE] to advertise ULBCck parameters via BGP to the originating GEF for the full topology of adjacent domains/areas/AS's. In this manner the originating GEF can implement the MPLS GCAC algorithm described in Section 3 across multiple domains/areas/AS's. However, network providers may be reluctant to divulge full topology and capacity usage information to other providers. I don't think that [BGP-TE] was ever intended to provide full TE topology distribution across ASBRs. Such a mechanism would neither be stable nor scalable. The referenced I-D has been superseded by draft-gredler-idr-ls-distribution which has a narrower scope. I would suggest to keep this option in your list, but to add to the reasons for rejecting it. But you might also usefully add the fourth option of using a PCE to solve the problem. While you say later in the section that "path computation is not part of the GCAC algorithm" it seems to me that the topic (viz. "there are several options to enable MPLS GCAC to be implemented in") is precisely a computation problem where you are not selecting a precise path, but are determining which high-level path can supply the requested bandwidth. --- Section 2.2 "DiffServ based on EXP bits" These are now called the TC bits per RFC 5462 --- Section 3.1 "RBT typically = .05 * MRBk" Is that RBTk ? --- Section 3.2 I struggled for a while to parse the notation in some of the equations such as (3). It might be clearer to write pseudocode such as if (ULBCck >= DBWi) then include link k; else exclude link k (3) --- Section 3.2 The RFC Editor will prefer you to use round braces in place of square ones if you can. I think that in these equations it is pretty much OK --- Section 4 - Only some user groups (e.g., the police are authorized to set the Missing close parenthesis |
2011-11-20
|
04 | Adrian Farrel | Ballot writeup text changed |
2011-10-22
|
04 | Adrian Farrel | Ballot writeup text changed |
2011-10-10
|
04 | Adrian Farrel | State changed to AD Evaluation from Publication Requested. |
2011-10-10
|
04 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Young Lee. I think this document is ready for forwarding to the IESG for publication. (1.b) Has the document had adequate review both from key members of the interested community and others? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? I believe this draft has been circulated in MPLS and Routing Area WGs. But I have not seen any reviews or comments for this draft. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? Not identified. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the interested community has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There seems to be no major issues with this document. (1.e) How solid is the consensus of the interested community behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the interested community as a whole understand and agree with it? I don't have enough data to be able to judge the consensus of the interested community behind this document. Based on my limited source of contact with carrier experts on MPLS, the MPLS GCAC mechanism specified in this document might be helpful for certain applications where high-priority traffic needs to receive preferential treatment. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) I am not aware of such. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. There is no error reported by the idnits tool. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes. There is no issue here. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggested a reasonable name for the new registry? See [I-D.narten-iana-considerations-rfc2434bis]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? This is an experimental draft, so there is no need for the IANA consideration. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The document has no issues with this area. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Writeup? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document presents a generic connection admission control (GCAC) reference model and algorithm for IP/MPLS-based networks. Service provider (SP) IP/MPLS networks need an MPLS GCAC mechanism, for example, to reject voice over Internet Protocol (VoIP) calls when additional calls would adversely affect calls already in progress. Working Group Summary This document did not go through a normal WG process. This is an individual submission to the IESG for publication. So this section does not apply for this document. Document Quality I am not aware of any information on the implementation of the algorithm mentioned in this document. |
2011-10-10
|
04 | Cindy Morgan | Draft added in state Publication Requested |
2011-10-10
|
04 | Cindy Morgan | [Note]: 'Young Lee (leeyoung@huawei.com) is the document shepherd.' added |
2011-09-20
|
02 | (System) | New version available: draft-ash-gcac-algorithm-spec-02.txt |
2011-07-04
|
01 | (System) | New version available: draft-ash-gcac-algorithm-spec-01.txt |
2011-01-10
|
00 | (System) | New version available: draft-ash-gcac-algorithm-spec-00.txt |