summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4542.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4542.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4542.txt')
-rw-r--r--doc/rfc/rfc4542.txt2355
1 files changed, 2355 insertions, 0 deletions
diff --git a/doc/rfc/rfc4542.txt b/doc/rfc/rfc4542.txt
new file mode 100644
index 0000000..06944de
--- /dev/null
+++ b/doc/rfc/rfc4542.txt
@@ -0,0 +1,2355 @@
+
+
+
+
+
+
+Network Working Group F. Baker
+Request for Comments: 4542 J. Polk
+Category: Informational Cisco Systems
+ May 2006
+
+
+ Implementing an Emergency Telecommunications Service (ETS) for
+ Real-Time Services in the Internet Protocol Suite
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2006).
+
+Abstract
+
+ RFCs 3689 and 3690 detail requirements for an Emergency
+ Telecommunications Service (ETS), of which an Internet Emergency
+ Preparedness Service (IEPS) would be a part. Some of these types of
+ services require call preemption; others require call queuing or
+ other mechanisms. IEPS requires a Call Admission Control (CAC)
+ procedure and a Per Hop Behavior (PHB) for the data that meet the
+ needs of this architecture. Such a CAC procedure and PHB is
+ appropriate to any service that might use H.323 or SIP to set up
+ real-time sessions. The key requirement is to guarantee an elevated
+ probability of call completion to an authorized user in time of
+ crisis.
+
+ This document primarily discusses supporting ETS in the context of
+ the US Government and NATO, because it focuses on the Multi-Level
+ Precedence and Preemption (MLPP) and Government Emergency
+ Telecommunication Service (GETS) standards. The architectures
+ described here are applicable beyond these organizations.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 1]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+Table of Contents
+
+ 1. Overview of the Internet Emergency Preference Service
+ Problem and Proposed Solutions ..................................3
+ 1.1. Emergency Telecommunications Services ......................3
+ 1.1.1. Multi-Level Preemption and Precedence ...............4
+ 1.1.2. Government Emergency Telecommunications Service .....6
+ 1.2. Definition of Call Admission ...............................6
+ 1.3. Assumptions about the Network ..............................7
+ 1.4. Assumptions about Application Behavior .....................7
+ 1.5. Desired Characteristics in an Internet Environment .........9
+ 1.6. The Use of Bandwidth as a Solution for QoS ................10
+ 2. Solution Proposal ..............................................11
+ 2.1. Call Admission/Preemption Procedure .......................12
+ 2.2. Voice Handling Characteristics ............................15
+ 2.3. Bandwidth Admission Procedure .............................17
+ 2.3.1. RSVP Admission Using Policy for Both
+ Unicast and Multicast Sessions .....................17
+ 2.3.2. RSVP Scaling Issues ................................19
+ 2.3.3. RSVP Operation in Backbones and Virtual
+ Private Networks (VPNs) ............................19
+ 2.3.4. Interaction with the Differentiated
+ Services Architecture ..............................21
+ 2.3.5. Admission Policy ...................................21
+ 2.4. Authentication and Authorization of Calls Placed ..........23
+ 2.5. Defined User Interface ....................................23
+ 3. Security Considerations ........................................24
+ 4. Acknowledgements ...............................................24
+ 5. References .....................................................25
+ 5.1. Normative References ......................................25
+ 5.2. Informative References ....................................27
+ Appendix A. 2-Call Preemption Example using RSVP .................29
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 2]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+1. Overview of the Internet Emergency Preference Service Problem and
+ Proposed Solutions
+
+ [RFC3689] and [RFC3690] detail requirements for an Emergency
+ Telecommunications Service (ETS), of which an Internet Emergency
+ Preference Service (IEPS) would be a part. Some of these types of
+ services require call preemption; others require call queuing or
+ other mechanisms. The key requirement is to guarantee an elevated
+ probability of call completion to an authorized user in time of
+ crisis.
+
+ IEPS requires a Call Admission Control procedure and a Per Hop
+ Behavior for the data that meet the needs of this architecture. Such
+ a CAC procedure and PHB is appropriate to any service that might use
+ H.323 or SIP to set up real-time sessions. These obviously include
+ but are not limited to Voice and Video applications, although at this
+ writing the community is mostly thinking about Voice on IP, and many
+ of the examples in the document are taken from that environment.
+
+ In a network where a call permitted initially is not denied or
+ rejected at a later time, capacity admission procedures performed
+ only at the time of call setup may be sufficient. However, in a
+ network where session status can be reviewed by the network and
+ preempted or denied due to changes in routing (when the new routes
+ lack capacity to carry calls switched to them) or changes in offered
+ load (where higher precedence calls supersede existing calls),
+ maintaining a continuing model of the status of the various calls is
+ required.
+
+1.1. Emergency Telecommunications Services
+
+ Before doing so, however, let us discuss the problem that ETS (and
+ therefore IEPS) is intended to solve and the architecture of the
+ system. The Emergency Telecommunications Service [ITU.ETS.E106] is a
+ successor to and generalization of two services used in the United
+ States: Multi-Level Precedence and Preemption (MLPP), and the
+ Government Emergency Telecommunication Service (GETS). Services
+ based on these models are also used in a variety of countries
+ throughout the world, both Public Switched Telephone Network (PSTN)
+ and Global System for Mobile Communications (GSM)-based. Both of
+ these services are designed to enable an authorized user to obtain
+ service from the telephone network in times of crisis. They differ
+ primarily in the mechanisms used and number of levels of precedence
+ acknowledged.
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 3]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+1.1.1. Multi-Level Preemption and Precedence
+
+ The Assured Service is designed as an IP implementation of an
+ existing ITU-T/NATO/DoD telephone system architecture known as
+ Multi-Level Precedence and Preemption [ITU.MLPP.1990]
+ [ANSI.MLPP.Spec] [ANSI.MLPP.Supp], or MLPP. MLPP is an architecture
+ for a prioritized call handling service such that in times of
+ emergency in the relevant NATO and DoD commands, the relative
+ importance of various kinds of communications is strictly defined,
+ allowing higher-precedence communication at the expense of lower-
+ precedence communications. This document describes NATO and US
+ Department of Defense uses of MLPP, but the architecture and standard
+ are applicable outside of these organizations.
+
+ These precedences, in descending order, are:
+
+ Flash Override Override: used by the Commander in Chief, Secretary
+ of Defense, and Joint Chiefs of Staff, commanders of combatant
+ commands when declaring the existence of a state of war.
+ Commanders of combatant commands when declaring Defense Condition
+ One or Defense Emergency or Air Defense Emergency and other
+ national authorities that the President may authorize in
+ conjunction with Worldwide Secure Voice Conferencing System
+ conferences. Flash Override Override cannot be preempted. This
+ precedence level is not enabled on all DoD networks.
+
+ Flash Override: used by the Commander in Chief, Secretary of
+ Defense, and Joint Chiefs of Staff, commanders of combatant
+ commands when declaring the existence of a state of war.
+ Commanders of combatant commands when declaring Defense Condition
+ One or Defense Emergency and other national authorities the
+ President may authorize. Flash Override cannot be preempted in
+ the DSN.
+
+ Flash: reserved generally for telephone calls pertaining to command
+ and control of military forces essential to defense and
+ retaliation, critical intelligence essential to national survival,
+ conduct of diplomatic negotiations critical to the arresting or
+ limiting of hostilities, dissemination of critical civil alert
+ information essential to national survival, continuity of federal
+ government functions essential to national survival, fulfillment
+ of critical internal security functions essential to national
+ survival, or catastrophic events of national or international
+ significance.
+
+ Immediate: reserved generally for telephone calls pertaining to
+ situations that gravely affect the security of national and allied
+ forces, reconstitution of forces in a post-attack period,
+
+
+
+Baker & Polk Informational [Page 4]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ intelligence essential to national security, conduct of diplomatic
+ negotiations to reduce or limit the threat of war, implementation
+ of federal government actions essential to national survival,
+ situations that gravely affect the internal security of the
+ nation, Civil Defense actions, disasters or events of extensive
+ seriousness having an immediate and detrimental effect on the
+ welfare of the population, or vital information having an
+ immediate effect on aircraft, spacecraft, or missile operations.
+
+ Priority: reserved generally for telephone calls requiring
+ expeditious action by called parties and/or furnishing essential
+ information for the conduct of government operations.
+
+ Routine: designation applied to those official government
+ communications that require rapid transmission by telephonic means
+ but do not require preferential handling.
+
+ MLPP is intended to deliver a higher probability of call completion
+ to the more important calls. The rule, in MLPP, is that more
+ important calls override less important calls when congestion occurs
+ within a network. Station-based preemption is used when a more
+ important call needs to be placed to either party in an existing
+ call. Trunk-based preemption is used when trunk bandwidth needs to
+ be reallocated to facilitate a higher-precedence call over a given
+ path in the network. In both station- and trunk-based preemption
+ scenarios, preempted parties are positively notified, via preemption
+ tone, that their call can no longer be supported. The same
+ preemption tone is used, regardless of whether calls are terminated
+ for the purposes of station- of trunk-based preemption. The
+ remainder of this discussion focuses on trunk-based preemption
+ issues.
+
+ MLPP is built as a proactive system in which callers must assign one
+ of the precedence levels listed above at call initiation; this
+ precedence level cannot be changed throughout that call. If an
+ elevated status is not assigned by a user at call initiation time,
+ the call is assumed to be "routine". If there is end-to-end capacity
+ to place a call, any call may be placed at any time. However, when
+ any trunk group (in the circuit world) or interface (in an IP world)
+ reaches a utilization threshold, a choice must be made as to which
+ calls to accept or allow to continue. The system will seize the
+ trunk(s) or bandwidth necessary to place the more important calls in
+ preference to less important calls by preempting an existing call (or
+ calls) of lower precedence to permit a higher-precedence call to be
+ placed.
+
+
+
+
+
+
+Baker & Polk Informational [Page 5]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ More than one call might properly be preempted if more trunks or
+ bandwidth is necessary for this higher precedence call. A video call
+ (perhaps of 384 KBPS, or 6 trunks) competing with several lower-
+ precedence voice calls is a good example of this situation.
+
+1.1.2. Government Emergency Telecommunications Service
+
+ A US service similar to MLPP and using MLPP signaling technology, but
+ built for use in civilian networks, is the Government Emergency
+ Telecommunications Service (GETS). This differs from MLPP in two
+ ways: it does not use preemption, but rather reserves bandwidth or
+ queues calls to obtain a high probability of call completion, and it
+ has only two levels of service: "Routine" and "Priority".
+
+ GETS is described here as another example. Similar architectures are
+ applied by other governments and organizations.
+
+1.2. Definition of Call Admission
+
+ Traditionally, in the PSTN, Call Admission Control (CAC) has had the
+ responsibility of implementing bandwidth available thresholds (e.g.,
+ to limit resources consumed by some traffic) and determining whether
+ a caller has permission (e.g., is an identified subscriber, with
+ identify attested to by appropriate credentials) to use an available
+ circuit. IEPS, or any emergency telephone service, has additional
+ options that it may employ to improve the probability of call
+ completion:
+
+ o The call may be authorized to use other networks that it would not
+ normally use;
+
+ o The network may preempt other calls to free bandwidth;
+
+ o The network may hold the call and place it when other calls
+ complete; or
+
+ o The network may use different bandwidth availability thresholds
+ than are used for other calls.
+
+ At the completion of CAC, however, the caller either has a circuit
+ that he or she is authorized to use or has no circuit. Since the act
+ of preemption or consideration of alternative bandwidth sources is
+ part and parcel of the problem of providing bandwidth, the
+ authorization step in bandwidth provision also affects the choice of
+ networks that may be authorized to be considered. The three cannot
+ be separated. The CAC procedure finds available bandwidth that the
+ caller is authorized to use and preemption may in some networks be
+ part of making that happen.
+
+
+
+Baker & Polk Informational [Page 6]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+1.3. Assumptions about the Network
+
+ IP networks generally fall into two categories: those with
+ constrained bandwidth, and those that are massively over-provisioned.
+ In a network where over any interval that can be measured (including
+ sub-second intervals) capacity exceeds offered load by at least 2:1,
+ the jitter and loss incurred in transit are nominal. This is
+ generally a characteristic of properly engineered Ethernet LANs and
+ of optical networks (networks that measure their link speeds in
+ multiples of 51 MBPS); in the latter, circuit-switched networking
+ solutions such as Asynchronous Transfer Mode (ATM), MPLS, and GMPLS
+ can be used to explicitly place routes, which improves the odds a
+ bit.
+
+ Between those networks, in places commonly called "inter-campus
+ links", "access links", or "access networks", for various reasons
+ including technology (e.g., satellite links) and cost, it is common
+ to find links whose offered load can approximate or exceed the
+ available capacity. Such events may be momentary or may occur for
+ extended periods of time.
+
+ In addition, primarily in tactical deployments, it is common to find
+ bandwidth constraints in the local infrastructure of networks. For
+ example, the US Navy's network afloat connects approximately 300
+ ships, via satellite, to five network operation centers (NOCs), and
+ those NOCs are in turn interconnected via the Defense Information
+ Systems Agency (DISA) backbone. A typical ship may have between two
+ and six radio systems aboard, often at speeds of 64 KBPS or less. In
+ US Army networks, current radio technology likewise limits tactical
+ communications to links below 100 KBPS.
+
+ Over this infrastructure, military communications expect to deploy
+ voice communication systems (30-80 KBPS per session) and video
+ conferencing using MPEG 2 (3-7 MBPS) and MPEG 4 (80 KBPS to 800
+ KBPS), in addition to traditional mail, file transfer, and
+ transaction traffic.
+
+1.4. Assumptions about Application Behavior
+
+ Parekh and Gallagher published a series of papers [Parekh1] [Parekh2]
+ analyzing what is necessary to ensure a specified service level for a
+ stream of traffic. In a nutshell, they showed that to predict the
+ behavior of a stream of traffic in a network, one must know two
+ things:
+
+ o the rate and arrival distribution with which traffic in a class is
+ introduced to the network, and
+
+
+
+
+Baker & Polk Informational [Page 7]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ o what network elements will do, in terms of the departure
+ distribution, injected delay jitter, and loss characteristics,
+ with the traffic they see.
+
+ For example, TCP tunes its effective window (the amount of data it
+ sends per round trip interval) so that the ratio of the window and
+ the round trip interval approximate the available capacity in the
+ network. As long as the round trip delay remains roughly stable and
+ loss is nominal (which are primarily behaviors of the network), TCP
+ is able to maintain a predictable level of throughput. In an
+ environment where loss is random or in which delays wildly vary, TCP
+ behaves in a far less predictable manner.
+
+ Voice and video systems, in the main, are designed to deliver a fixed
+ level of quality as perceived by the user. (Exceptions are systems
+ that select rate options over a broad range to adapt to ambient loss
+ characteristics. These deliver broadly fluctuating perceived quality
+ and have not found significant commercial applicability.) Rather,
+ they send traffic at a rate specified by the codec depending on what
+ it perceives is required. In an MPEG-4 system, for example, if the
+ camera is pointed at a wall, the codec determines that an 80 KBPS
+ data stream will describe that wall and issues that amount of
+ traffic. If a person walks in front of the wall or the camera is
+ pointed an a moving object, the codec may easily send 800 KBPS in its
+ effort to accurately describe what it sees. In commercial broadcast
+ sports, which may line up periods in which advertisements are
+ displayed, the effect is that traffic rates suddenly jump across all
+ channels at certain times because the eye-catching ads require much
+ more bandwidth than the camera pointing at the green football field.
+
+ As described in [RFC1633], when dealing with a real-time application,
+ there are basically two things one must do to ensure Parekh's first
+ requirement. To ensure that one knows how much offered load the
+ application is presenting, one must police (measure load offered and
+ discard excess) traffic entering the network. If that policing
+ behavior has a debilitating effect on the application, as non-
+ negligible loss has on voice or video, one must admit sessions
+ judiciously according to some policy. A key characteristic of that
+ policy must be that the offered load does not exceed the capacity
+ dedicated to the application.
+
+ In the network, the other thing one must do is ensure that the
+ application's needs are met in terms of loss, variation in delay, and
+ end-to-end delay. One way to do this is to supply sufficient
+ bandwidth so that loss and jitter are nominal. Where that cannot be
+ accomplished, one must use queuing technology to deterministically
+ apply bandwidth to accomplish the goal.
+
+
+
+
+Baker & Polk Informational [Page 8]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+1.5. Desired Characteristics in an Internet Environment
+
+ The key elements of the Internet Emergency Preference Service include
+ the following:
+
+ Precedence Level Marking each call: Call initiators choose the
+ appropriate precedence level for each call based on the user-
+ perceived importance of the call. This level is not to be changed
+ for the duration of the call. The call before and the call after
+ are independent with regard to this level choice.
+
+ Call Admission/Preemption Policy: There is likewise a clear policy
+ regarding calls that may be in progress at the called instrument.
+ During call admission (SIP/H.323), if they are of lower
+ precedence, they must make way according to a prescribed
+ procedure. All callers on the preempted call must be informed
+ that the call has been preempted, and the call must make way for
+ the higher-precedence call.
+
+ Bandwidth Admission Policy: There is a clear bandwidth admission
+ policy: sessions may be placed that assert any of several levels
+ of precedence, and in the event that there is demand and
+ authorization is granted, other sessions will be preempted to make
+ way for a call of higher precedence.
+
+ Authentication and Authorization of calls placed: Unauthorized
+ attempts to place a call at an elevated status are not permitted.
+ In the telephone system, this is managed by controlling the policy
+ applied to an instrument by its switch plus a code produced by the
+ caller identifying himself or herself to the switch. In the
+ Internet, such characteristics must be explicitly signaled.
+
+ Voice handling characteristics: A call made, in the telephone
+ system, gets a circuit and provides the means for the callers to
+ conduct their business without significant impact as long as their
+ call is not preempted. In a VoIP system, one would hope for
+ essentially the same service.
+
+ Defined User Interface: If a call is preempted, the caller and the
+ callee are notified via a defined signal, so that they know that
+ their call has been preempted and that at this instant there is no
+ alternative circuit available to them at that precedence level.
+
+ A VoIP implementation of the Internet Emergency Preference Service
+ must, by definition, provide those characteristics.
+
+
+
+
+
+
+Baker & Polk Informational [Page 9]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+1.6. The Use of Bandwidth as a Solution for QoS
+
+ There is a discussion in Internet circles concerning the relationship
+ of bandwidth to QoS procedures, which needs to be put to bed before
+ this procedure can be adequately analyzed. The issue is that it is
+ possible and common in certain parts of the Internet to solve the
+ problem with bandwidth. In LAN environments, for example, if there
+ is significant loss between any two switches or between a switch and
+ a server, the simplest and cheapest solution is to buy the next
+ faster interface: substitute 100 MBPS for 10 MBPS Ethernet, 1 gigabit
+ for 100 MBPS, or, for that matter, upgrade to a 10-gigabit Ethernet.
+ Similarly, in optical networking environments, the simplest and
+ cheapest solution is often to increase the data rate of the optical
+ path either by selecting a faster optical carrier or deploying an
+ additional lambda. In places where the bandwidth can be over-
+ provisioned to a point where loss or queuing delay are negligible,
+ 10:1 over-provisioning is often the cheapest and surest solution and,
+ by the way, offers a growth path for future requirements. However,
+ there are many places in communication networks where the provision
+ of effectively infinite bandwidth is not feasible, including many
+ access networks, satellite communications, fixed wireless, airborne
+ and marine communications, island connections, and connections to
+ regions in which fiber optic connections are not cost-effective. It
+ is in these places where the question of resource management is
+ relevant. Specifically, we do not recommend the deployment of
+ significant QoS procedures on links in excess of 100 MBPS apart from
+ the provision of aggregated services that provide specific protection
+ to the stability of the network or the continuity of real-time
+ traffic as a class, as the mathematics of such circuits do not
+ support this as a requirement.
+
+ In short, the fact that we are discussing this class of policy
+ control says that such constrictions in the network exist and must be
+ dealt with. However much we might like to, in those places we are
+ not solving the problem with bandwidth.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 10]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+2. Solution Proposal
+
+ A typical voice or video network, including a backbone domain, is
+ shown in Figure 1.
+
+ ............... ......................
+ . . . .
+ . H H H H . . H H H H .
+ . /----------/ . . /----------/ .
+ . R SIP . . R R .
+ . \ . . / \ .
+ . R H H H . ....... / \ .
+ . /----------/ .. ../ R SIP .
+ . R .. /. /----------/ .
+ ..... ..\. R-----R . H H H H .
+ ...... .\ / \ . .
+ . \ / \ . .
+ . R-----------R ....................
+ . \ / .
+ . \ / .
+ . R-----R .
+ . .
+ ............
+
+ SIP = SIP Proxy
+ H = SIP-enabled Host (Telephone, call gateway or PC)
+ R = Router
+ /---/ = Ethernet or Ethernet Switch
+
+ Figure 1: Typical VoIP or Video/IP Network
+
+ Reviewing the figure above, it becomes obvious that Voice/IP and
+ Video/IP call flows are very different than call flows in the PSTN.
+ In the PSTN, call control traverses a switch, which in turn controls
+ data handling services like ATM or Time Division Multiplexing (TDM)
+ switches or multiplexers. While they may not be physically co-
+ located, the control plane software and the data plane services are
+ closely connected; the switch routes a call using bandwidth that it
+ knows is available. In a voice/video-on-IP network, call control is
+ completely divorced from the data plane: It is possible for a
+ telephone instrument in the United States to have a Swedish telephone
+ number if that is where its SIP proxy happens to be, but on any given
+ call for it to use only data paths in the Asia/Pacific region, data
+ paths provided by a different company, and, often, data paths provided
+ by multiple companies/providers.
+
+
+
+
+
+
+Baker & Polk Informational [Page 11]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ Call management therefore addresses a variety of questions, all of
+ which must be answered:
+
+ o May I make this call from an administrative policy perspective?
+ Am I authorized to make this call?
+
+ o What IP address correlates with this telephone number or SIP URI?
+
+ o Is the other instrument "on hook"? If it is busy, under what
+ circumstances may I interrupt?
+
+ o Is there bandwidth available to support the call?
+
+ o Does the call actually work, or do other impairments (loss, delay)
+ make the call unusable?
+
+2.1. Call Admission/Preemption Procedure
+
+ Administrative Call Admission is the objective of SIP and H.323. It
+ asks fundamental questions like "What IP address is the callee at?"
+ and "Did you pay your bill?".
+
+ For a specialized policy like call preemption, two capabilities are
+ necessary from an administrative perspective: [RFC4412] provides a
+ way to communicate policy-related information regarding the
+ precedence of the call; and [RFC4411] provides a reason code when a
+ call fails or is refused, indicating the cause of the event. If it
+ is a failure, it may make sense to redial the call. If it is a
+ policy-driven preemption, even if the call is redialed it may not be
+ possible to place the call. Requirements for this service are
+ further discussed in [RFC3689].
+
+ The SIP Communications Resource Priority Header (or RP Header) serves
+ the call setup process with the precedence level chosen by the
+ initiator of the call. The syntax is in the form:
+
+ Resource Priority: namespace.priority level
+
+ The "namespace" part of the syntax ensures the domain of significance
+ to the originator of the call, and this travels end-to-end to the
+ destination (called) device (telephone). If the receiving phone does
+ not support the namespace, it can easily ignore the setup request.
+ This ability to denote the domain of origin allows Service Level
+ Agreements (SLAs) to be in place to limit the ability of an unknown
+ requester to gain preferential treatment into an IEPS domain.
+
+
+
+
+
+
+Baker & Polk Informational [Page 12]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ For the DSN infrastructure, the header would look like this for a
+ routine precedence level call:
+
+ Resource Priority: dsn.routine
+
+ The precedence level chosen in this header would be compared to the
+ requester's authorization profile to use that precedence level. This
+ would typically occur in the SIP first-hop Proxy, which can challenge
+ many aspects of the call setup request including the requester's
+ choice of precedence levels (verifying that they are not using a
+ level they are not authorized to use).
+
+ The DSN has 5 precedence levels of IEPS, in descending order:
+
+ dsn.flash-override
+
+ dsn.flash
+
+ dsn.immediate
+
+ dsn.priority
+
+ dsn.routine
+
+ The US Defense Red Switched Network (DRSN), as another example that
+ was IANA-registered in [RFC4412], has 6 levels of precedence. The
+ DRSN simply adds one precedence level higher than flash-override to
+ be used by the President and a select few others:
+
+ drsn.flash-override-override
+
+ Note that the namespace changed for this level. The lower 5 levels
+ within the DRSN would also have this as their namespace for all
+ DRSN-originated call setup requests.
+
+ The Resource-Priority Header (RPH) informs both the use of
+ Differentiated Services Code Points (DSCPs) by the callee (who needs
+ to use the same DSCP as the caller to obtain the same data path
+ service) and to facilitate policy-based preemption of calls in
+ progress, when appropriate.
+
+ Once a call is established in an IEPS domain, the Reason Header for
+ Preemption, described in [RFC4411], ensures that all SIP nodes are
+ synchronized to a preemption event occurring either at the endpoint
+ or in a router that experiences congestion. In SIP, the normal
+ indication for the end of a session is for one end system to send a
+ BYE Method request as specified in [RFC3261]. This, too, is the
+ proper means for signaling a termination of a call due to a
+
+
+
+Baker & Polk Informational [Page 13]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ preemption event, as it essentially performs a normal termination
+ with additional information informing the peer of the reason for the
+ abrupt end: it indicates that a preemption occurred. This will be
+ used to inform all relevant SIP entities, and whether this was an
+ endpoint-generated preemption event, or that the preemption event
+ occurred within a router along the communications path (described in
+ Section 2.3.1).
+
+ Figure 2 is a simple example of a SIP call setup that includes the
+ layer 7 precedence of a call between Alice and Bob. After Alice
+ successfully sets up a call to Bob at the "Routine" precedence level,
+ Carol calls Bob at a higher precedence level (Immediate). At the SIP
+ layer (this has nothing to do with RSVP yet; that example, involving
+ SIP and RSVP signaling, is in the appendix), once Bob's user agent
+ (phone) receives the INVITE message from Carol, his UA needs to make
+ a choice between retaining the call to Alice and sending Carol a
+ "busy" indication, or preempting the call to Alice in favor of
+ accepting the call from Carol. That choice in IEPS networks is a
+ comparison of Resource Priority headers. Alice, who controlled the
+ precedence level of the call to Bob, sent the precedence level of her
+ call to him at "Routine" (the lowest level within the network).
+ Carol, who controls the priority of the call signal to Bob, sent her
+ priority level to "Immediate" (higher than "Routine"). Bob's UA
+ needs to (under IEPS policy) preempt the call from Alice (and provide
+ her with a preemption indication in the call termination message).
+ Bob needs to successfully answer the call setup from Carol.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 14]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ UA Alice UA Bob UA Carol
+ | INVITE (RP: Routine) | |
+ |--------------------------->| |
+ | 200 OK | |
+ |<---------------------------| |
+ | ACK | |
+ |--------------------------->| |
+ | RTP | |
+ |<==========================>| |
+ | | |
+ | | INVITE (RP: Immediate) |
+ | |<----------------------------|
+ | ************************************************ |
+ | *Resource Priority value comparison by Bob's UA* |
+ | ************************************************ |
+ | | |
+ | BYE (Reason: UA preemption) |
+ |<---------------------------| |
+ | | 200 OK |
+ | |---------------------------->|
+ | 200 OK (BYE) | |
+ |--------------------------->| |
+ | | ACK |
+ | |<----------------------------|
+ | | RTP |
+ | |<===========================>|
+ | | |
+
+ Figure 2: Priority Call Establishment and Termination at SIP Layer
+
+ Nothing in this example involved mechanisms other than SIP. It is
+ also assumed each user agent recognized the Resource-Priority header
+ namespace value in each message. Therefore, it is assumed that the
+ domain allowed Alice, Bob, and Carol to communicate. Authentication
+ and Authorization are discussed later in this document.
+
+2.2. Voice Handling Characteristics
+
+ The Quality of Service architecture used in the data path is that of
+ [RFC2475]. Differentiated Services uses a flag in the IP header
+ called the DSCP [RFC2474] to identify a data stream, and then applies
+ a procedure called a Per Hop Behavior, or PHB, to it. This is
+ largely as described in [RFC2998].
+
+ In the data path, the Expedited Forwarding PHB [RFC3246] [RFC3247]
+ describes the fundamental needs of voice and video traffic. This PHB
+ entails ensuring that sufficient bandwidth is dedicated to real-time
+ traffic to ensure that variation in delay and loss rate are minimal,
+
+
+
+Baker & Polk Informational [Page 15]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ as codecs are hampered by excessive loss [G711.1] [G711.3]. In parts
+ of the network where bandwidth is heavily over-provisioned, there may
+ be no remaining concern. In places in the network where bandwidth is
+ more constrained, this may require the use of a priority queue. If a
+ priority queue is used, the potential for abuse exists, meaning that
+ it is also necessary to police traffic placed into the queue to
+ detect and manage abuse. A fundamental question is "where does this
+ policing need to take place?". The obvious places would be the
+ first-hop routers and any place where converging data streams might
+ congest a link.
+
+ Some proposals mark traffic with various code points appropriate to
+ the service precedence of the call. In normal service, if the
+ traffic is all in the same queue and EF service requirements are met
+ (applied capacity exceeds offered load, variation in delay is
+ minimal, and loss is negligible), details of traffic marking should
+ be irrelevant, as long as packets get into the right service class.
+ Then, the major issues are appropriate policing of traffic,
+ especially around route changes, and ensuring that the path has
+ sufficient capacity.
+
+ The real-time voice/video application should be generating traffic at
+ a rate appropriate to its content and codec, which is either a
+ constant bit rate stream or a stream whose rate is variable within a
+ specified range. The first-hop router should be policing traffic
+ originated by the application, as is performed in traditional virtual
+ circuit networks like Frame Relay and ATM. Between these two checks
+ (at what some networks call the Data Terminal Equipment (DTE) and
+ Data Communications Equipment (DCE)), the application traffic should
+ be guaranteed to be within acceptable limits. As such, given
+ bandwidth-aware call admission control, there should be minimal
+ actual loss. The cases where loss would occur include cases where
+ routing has recently changed and CAC has not caught up, or cases
+ where statistical thresholds are in use in CAC and the data streams
+ happen to coincide at their peak rates.
+
+ If it is demonstrated that routing transients and variable rate beat
+ frequencies present a sufficient problem, it is possible to provide a
+ policing mechanism that isolates intentional loss among an ordered
+ set of classes. While the ability to do so, by various algorithms,
+ has been demonstrated, the technical requirement has not. If
+ dropping random packets from all calls is not appropriate,
+ concentrating random loss in a subset of the calls makes the problem
+ for those calls worse; a superior approach would reject or preempt an
+ entire call.
+
+ Parekh's second condition has been met: we must know what the network
+ will do with the traffic. If the offered load exceeds the available
+
+
+
+Baker & Polk Informational [Page 16]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ bandwidth, the network will remark and drop the excess traffic. The
+ key questions become "How does one limit offered load to a rate less
+ than or equal to available bandwidth?" and "How much traffic does one
+ admit with each appropriate marking?"
+
+2.3. Bandwidth Admission Procedure
+
+ Since many available voice and video codecs require a nominal loss
+ rate to deliver acceptable performance, Parekh's first requirement is
+ that offered load be within the available capacity. There are
+ several possible approaches.
+
+ An approach that is commonly used in H.323 networks is to limit the
+ number of calls simultaneously accepted by the gatekeeper. SIP
+ networks do something similar when they place a stateful SIP proxy
+ near a single ingress/egress to the network. This is able to impose
+ an upper bound on the total number of calls in the network or the
+ total number of calls crossing the significant link. However, the
+ gatekeeper has no knowledge of routing, so the engineering must be
+ very conservative and usually presumes a single ingress/egress or the
+ failure of one of its data paths. While this may serve as a short-
+ term work-around, it is not a general solution that is readily
+ deployed. This limits the options in network design.
+
+ [RFC1633] provides for signaled admission for the use of capacity.
+ The recommended approach is explicit capacity admission, supporting
+ the concepts of preemption. An example of such a procedure uses the
+ Resource Reservation Protocol [RFC2205] [RFC2209] (RSVP). The use of
+ Capacity Admission using RSVP with SIP is described in [RFC3312].
+ While call counting is specified in H.323, network capacity admission
+ is not integrated with H.323 at this time.
+
+2.3.1. RSVP Admission Using Policy for Both Unicast and Multicast
+ Sessions
+
+ RSVP is a resource reservation setup protocol providing the one-way
+ (at a time) setup of resource reservations for multicast and unicast
+ flows. Each reservation is set up in one direction (meaning one
+ reservation from each end system; in a multicast environment, N
+ senders set up N reservations). These reservations complete a
+ communication path with a deterministic bandwidth allocation through
+ each router along that path between end systems. These reservations
+ set up a known quality of service for end-to-end communications and
+ maintain a "soft-state" within a node. The meaning of the term "soft
+ state" is that in the event of a network outage or change of routing,
+ these reservations are cleared without manual intervention, but must
+ be periodically refreshed. In RSVP, the refresh period is by default
+ 30 seconds, but may be as long as is appropriate.
+
+
+
+Baker & Polk Informational [Page 17]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ RSVP is a locally-oriented process, not a globally- or domain-
+ oriented one like a routing protocol or H.323 Call Counting.
+ Although it uses the local routing databases to determine the routing
+ path, it is only concerned with the quality of service for a
+ particular or aggregate flow through a device. RSVP is not aware of
+ anything other than the local goal of QoS and its RSVP-enabled
+ adjacencies, operating below the network layer. The process by
+ itself neither requires nor has any end-to-end network knowledge or
+ state. Thus, RSVP can be effective when it is enabled at some nodes
+ in a network without the need to have every node participate.
+
+ HOST ROUTER
+ _____________________________ ____________________________
+ | _______ | | |
+ | | | _______ | | _______ |
+ | |Appli- | | | |RSVP | | | |
+ | | cation| | RSVP <---------------------------> RSVP <---------->
+ | | <--> | | | _______ | | |
+ | | | |process| _____ | ||Routing| |process| _____ |
+ | |_._____| | -->Policy| || <--> -->Policy||
+ | | |__.__._| |Cntrl|| ||process| |__.__._| |Cntrl||
+ | |data | | |_____|| ||__.____| | | |_____||
+ |===|===========|==|==========| |===|==========|==|==========|
+ | | --------| | _____ | | | --------| | _____ |
+ | | | | ---->Admis|| | | | | ---->Admis||
+ | _V__V_ ___V____ |Cntrl|| | _V__V_ __V_____ |Cntrl||
+ | | | | | |_____|| | | | | ||_____||
+ | |Class-| | Packet | | | |Class-| | Packet | |
+ | | ifier|==>Schedulr|================> ifier|==>Schedulr|=========>
+ | |______| |________| |data | |______| |________| data
+ | | | |
+ |_____________________________| |____________________________|
+
+ Figure 3: RSVP in Hosts and Routers
+
+ Figure 3 shows the internal process of RSVP in both hosts (end
+ systems) and routers, as shown in [RFC2209].
+
+ RSVP uses the phrase "traffic control" to describe the mechanisms of
+ how a data flow receives quality of service. There are 3 different
+ mechanisms to traffic control (shown in Figure 2 in both hosts and
+ routers). They are:
+
+ A packet classifier mechanism: This resolves the QoS class for each
+ packet; this can determine the route as well.
+
+
+
+
+
+
+Baker & Polk Informational [Page 18]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ An admission control mechanism: This consists of two decision
+ modules: admission control and policy control. Determining
+ whether there are satisfactory resources for the requested QoS is
+ the function of admission control. Determining whether the user
+ has the authorization to request such resources is the function of
+ policy control. If the parameters carried within this flow fail,
+ either of these two modules errors the request using RSVP.
+
+ A packet scheduler mechanism: At each outbound interface, the
+ scheduler attains the guaranteed QoS for that flow.
+
+2.3.2. RSVP Scaling Issues
+
+ As originally written, there was concern that RSVP had scaling
+ limitations due to its data plane behavior [RFC2208]. This either
+ has not proven to be the case or has in time largely been corrected.
+ Telephony services generally require peak call admission rates on the
+ order of thousands of calls per minute and peak call levels
+ comparable to the capacities of the lines in question, which is
+ generally on the order of thousands to tens of thousands of calls.
+ Current RSVP implementations admit calls at the rate of hundreds of
+ calls per second and maintain as many calls in progress as memory
+ configurations allow.
+
+ In edge networks, RSVP is used to signal for individual microflows,
+ admitting the bandwidth. However, Differentiated Services is used
+ for the data plane behavior. Admission and policing may be performed
+ anywhere, but need only be performed in the first-hop router (which,
+ if the end system sending the traffic is a DTE, constitutes a DCE for
+ the remaining network) and in routers that have interfaces threatened
+ by congestion. In Figure 1, these would normally be the links that
+ cross network boundaries.
+
+2.3.3. RSVP Operation in Backbones and Virtual Private Networks (VPNs)
+
+ In backbone networks, networks that are normally awash in bandwidth,
+ RSVP and its affected data flows may be carried in a variety of ways.
+ If the backbone is a maze of tunnels between its edges (true of MPLS
+ networks, networks that carry traffic from an encryptor to a
+ decryptor, and also VPNs), applicable technologies include [RFC2207],
+ [RFC2746], and [RFC2983]. An IP tunnel is, simplistically put, a IP
+ packet enveloped inside another IP packet as a payload. When IPv6 is
+ transported over an IPv4 network, encapsulating the entire v6 packet
+ inside a v4 packet is an effective means to accomplish this task. In
+ this type of tunnel, the IPv6 packet is not read by any of the
+ routers while inside the IPv4 envelope. If the inner packet is RSVP
+
+
+
+
+
+Baker & Polk Informational [Page 19]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ enabled, there must be an active configuration to ensure that all
+ relevant backbone nodes read the RSVP fields; [RFC2746] describes
+ this.
+
+ This is similar to how IPsec tunnels work. Encapsulating an RSVP
+ packet inside an encrypted packet for security purposes without
+ copying or conveying the RSVP indicators in the outside IP packet
+ header would make RSVP inoperable while in this form of a tunnel.
+ [RFC2207] describes how to modify an IPsec packet header to allow for
+ RSVP awareness by nodes that need to provide QoS for the flow or
+ flows inside a tunnel.
+
+ Other networks may simply choose to aggregate the reservations across
+ themselves as described in [RFC3175]. The problem with an individual
+ reservation architecture is that each flow requires a non-trivial
+ amount of message exchange, computation, and memory resources in each
+ router between each endpoint. Aggregation of flows reduces the
+ number of completely individual reservations into groups of
+ individual flows that can act as one for part or all of the journey
+ between end systems. Aggregates are not intended to be from the
+ first router to the last router within a flow, but to cover common
+ paths of a large number of individual flows.
+
+ Examples of aggregated data flows include streams of IP data that
+ traverse common ingress and egress points in a network and also
+ include tunnels of various kinds. MPLS LSPs, IPsec Security
+ Associations between VPN edge routers, IP/IP tunnels, and Generic
+ Routing Encapsulation (GRE) tunnels all fall into this general
+ category. The distinguishing factor is that the system injecting an
+ aggregate into the aggregated network sums the PATH and RESV
+ statistical information on the un-aggregated side and produces a
+ reservation for the tunnel on the aggregated side. If the bandwidth
+ for the tunnel cannot be expanded, RSVP leaves the existing
+ reservation in place and returns an error to the aggregator, which
+ can then apply a policy such as IEPS to determine which session to
+ refuse. In the data plane, the DSCP for the traffic must be copied
+ from the inner to the outer header, to preserve the PHB's effect.
+
+ One concern with this approach is that this leaks information into
+ the aggregated zone concerning the number of active calls or the
+ bandwidth they consume. In fact, it does not, as the data itself is
+ identifiable by aggregator address, deaggregator address, and DSCP.
+ As such, even if it is not advertised, such information is
+ measurable.
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 20]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+2.3.4. Interaction with the Differentiated Services Architecture
+
+ In the PATH message, the DCLASS object described in [RFC2996] is used
+ to carry the determined DSCP for the precedence level of that call in
+ the stream. This is reflected back in the RESV message. The DSCP
+ will be determined from the authorized SIP message exchange between
+ end systems by using the R-P header. The DCLASS object permits both
+ bandwidth admission within a class and the building up of the various
+ rates or token buckets.
+
+2.3.5. Admission Policy
+
+ RSVP's basic admission policy, as defined, is to grant any user
+ bandwidth if there is bandwidth available within the current
+ configuration. In other words, if a new request arrives and the
+ difference between the configured upper bound and the currently
+ reserved bandwidth is sufficiently large, RSVP grants use of that
+ bandwidth. This basic policy may be augmented in various ways, such
+ as using a local or remote policy engine to apply AAA procedures and
+ further qualify the reservation.
+
+2.3.5.1. Admission for Variable Rate Codecs
+
+ For certain applications, such as broadcast video using MPEG-1 or
+ voice without activity detection and using a constant bit rate codec
+ such as G.711, this basic policy is adequate apart from AAA. For
+ variable rate codecs, such as MPEG-4 or a voice codec with Voice
+ Activity Detection, however, this may be deemed too conservative. In
+ such cases, two basic types of statistical policy have been studied
+ and reported on in the literature: simple over-provisioning, and
+ approximation to ambient load.
+
+ Simple over-provisioning sets the bandwidth admission limit higher
+ than the desired load, on the assumption that a session that admits a
+ certain bandwidth will in fact use a fraction of the bandwidth. For
+ example, if MPEG-4 data streams are known to use data rates between
+ 80 and 800 KBPS and there is no obvious reason that sessions would
+ synchronize (such as having commercial breaks on 15 minute
+ boundaries), one could imagine estimating that the average session
+ consumes 400 KBPS and treating an admission of 800 KBPS as actually
+ consuming half the amount.
+
+ One can also approximate to average load, which is perhaps a more
+ reliable procedure. In this case, one maintains a variable that
+ measures actual traffic through the admitted data's queue,
+ approximating it using an exponentially weighted moving average.
+ When a new reservation request arrives, if the requested rate is less
+ than the difference between the configured upper bound and the
+
+
+
+Baker & Polk Informational [Page 21]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ current value of the moving average, the reservation is accepted, and
+ the moving average is immediately increased by the amount of the
+ reservation to ensure that the bandwidth is not promised out to
+ several users simultaneously. In time, the moving average will decay
+ from this guard position to an estimate of true load, which may offer
+ a chance to another session to be reserved that would otherwise have
+ been refused.
+
+ Statistical reservation schemes such as these are overwhelmingly
+ dependent on the correctness of their configuration and its
+ appropriateness for the codecs in use. However, they offer the
+ opportunity to take advantage of statistical multiplexing gains that
+ might otherwise be missed.
+
+2.3.5.2. Interaction with Complex Admission Policies, AAA, and
+ Preemption of Bandwidth
+
+ Policy is carried and applied as described in [RFC2753]. Figure 4,
+ below, is the basic conceptual model for policy decisions and
+ enforcement in an Integrated Services model. This model was created
+ to provide the ability to monitor and control reservation flows based
+ on user identify, specific traffic and security requirements, and
+ conditions that might change for various reasons, including a
+ reaction to a disaster or emergency event involving the network or
+ its users.
+
+ Network Node Policy server
+ ______________
+ | ______ |
+ | | | | _____
+ | | PEP | | | |------------->
+ | |______|<---|---->| PDP |May use LDAP,SNMP,COPS...for accessing
+ | ^ | | | policy database, authentication, etc.
+ | | | |_____|------------->
+ | __v___ |
+ | | | | PDP = Policy Decision Point
+ | | LPDP | | PEP = Policy Enforcement Point
+ | |______| | LPDP = Local Policy Decision Point
+ |______________|
+
+ Figure 4: Conceptual Model for Policy Control of Routers
+
+ The Network Node represents a router in the network. The Policy
+ Server represents the point of admission and policy control by the
+ network operator. Policy Enforcement Point (PEP) (the router) is
+ where the policy action is carried out. Policy decisions can be
+ either locally present in the form of a Local Policy Decision Point
+ (LPDP), or in a separate server on the network called the Policy
+
+
+
+Baker & Polk Informational [Page 22]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ Decision Point. The easier the instruction set of rules, the more
+ likely this set can reside in the LPDP for speed of access reasons.
+ The more complex the rule set, the more likely this is active on a
+ remote server. The PDP will use other protocols (LDAP, SNMP, etc.)
+ to request information (e.g., user authentication and authorization
+ for precedence level usage) to be used in creating the rule sets of
+ network components. This remote PDP should also be considered where
+ non-reactive policies are distributed out to the LPDPs.
+
+ Taking the above model as a framework, [RFC2750] extends RSVP's
+ concept of a simple reservation to include policy controls, including
+ the concepts of Preemption [RFC3181] and Identity [RFC3182],
+ specifically speaking to the usage of policies that preempt calls
+ under the control of either a local or remote policy manager. The
+ policy manager assigns a precedence level to the admitted data flow.
+ If it admits a data flow that exceeds the available capacity of a
+ system, the expectation is that the RSVP-affected RSVP process will
+ tear down a session among the lowest precedence sessions it has
+ admitted. The RESV Error resulting from that will go to the receiver
+ of the data flow and be reported to the application (SIP or H.323).
+ That application is responsible for disconnecting its call, with a
+ reason code of "bandwidth preemption".
+
+2.4. Authentication and Authorization of Calls Placed
+
+ It will be necessary, of course, to ensure that any policy is applied
+ to an authenticated user; the capabilities assigned to an
+ authenticated user may be considered authorized for use in the
+ network. For bandwidth admission, this will require the utilization
+ of [RFC2747] [RFC3097]. In SIP and H.323, AAA procedures will also
+ be needed.
+
+2.5. Defined User Interface
+
+ The user interface -- the chimes and tones heard by the user --
+ should ideally remain the same as in the PSTN for those indications
+ that are still applicable to an IP network. There should be some new
+ effort generated to update the list of announcements sent to the user
+ that don't necessarily apply. All indications to the user, of
+ course, depend on positive signals, not unreliable measures based on
+ changing measurements.
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 23]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+3. Security Considerations
+
+ This document outlines a networking capability composed entirely of
+ existing specifications. It has significant security issues, in the
+ sense that a failure of the various authentication or authorization
+ procedures can cause a fundamental breakdown in communications.
+ However, the issues are internal to the various component protocols
+ and are covered by their various security procedures.
+
+4. Acknowledgements
+
+ This document was developed with the knowledge and input of many
+ people, far too numerous to be mentioned by name. However, key
+ contributors of thoughts include Francois Le Faucheur, Haluk
+ Keskiner, Rohan Mahy, Scott Bradner, Scott Morrison, Subha Dhesikan,
+ and Tony De Simone. Pete Babendreier, Ken Carlberg, and Mike Pierce
+ provided useful reviews.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 24]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+5. References
+
+5.1. Normative References
+
+ [RFC3689] Carlberg, K. and R. Atkinson, "General Requirements
+ for Emergency Telecommunication Service (ETS)", RFC
+ 3689, February 2004.
+
+ [RFC3690] Carlberg, K. and R. Atkinson, "IP Telephony
+ Requirements for Emergency Telecommunication
+ Service (ETS)", RFC 3690, February 2004.
+
+ Integrated Services Architecture References
+
+ [RFC1633] Braden, B., Clark, D., and S. Shenker, "Integrated
+ Services in the Internet Architecture: an
+ Overview", RFC 1633, June 1994.
+
+ [RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and
+ S. Jamin, "Resource ReSerVation Protocol (RSVP) --
+ Version 1 Functional Specification", RFC 2205,
+ September 1997.
+
+ [RFC2207] Berger, L. and T. O'Malley, "RSVP Extensions for
+ IPSEC Data Flows", RFC 2207, September 1997.
+
+ [RFC2208] Mankin, A., Baker, F., Braden, B., Bradner, S.,
+ O'Dell, M., Romanow, A., Weinrib, A., and L. Zhang,
+ "Resource ReSerVation Protocol (RSVP) Version 1
+ Applicability Statement Some Guidelines on
+ Deployment", RFC 2208, September 1997.
+
+ [RFC2209] Braden, B. and L. Zhang, "Resource ReSerVation
+ Protocol (RSVP) -- Version 1 Message Processing
+ Rules", RFC 2209, September 1997.
+
+ [RFC2746] Terzis, A., Krawczyk, J., Wroclawski, J., and L.
+ Zhang, "RSVP Operation Over IP Tunnels", RFC 2746,
+ January 2000.
+
+ [RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP
+ Cryptographic Authentication", RFC 2747, January
+ 2000.
+
+ [RFC2750] Herzog, S., "RSVP Extensions for Policy Control",
+ RFC 2750, January 2000.
+
+
+
+
+
+Baker & Polk Informational [Page 25]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ [RFC2753] Yavatkar, R., Pendarakis, D., and R. Guerin, "A
+ Framework for Policy-based Admission Control", RFC
+ 2753, January 2000.
+
+ [RFC2996] Bernet, Y., "Format of the RSVP DCLASS Object", RFC
+ 2996, November 2000.
+
+ [RFC2998] Bernet, Y., Ford, P., Yavatkar, R., Baker, F.,
+ Zhang, L., Speer, M., Braden, R., Davie, B.,
+ Wroclawski, J., and E. Felstaine, "A Framework for
+ Integrated Services Operation over Diffserv
+ Networks", RFC 2998, November 2000.
+
+ [RFC3097] Braden, R. and L. Zhang, "RSVP Cryptographic
+ Authentication -- Updated Message Type Value", RFC
+ 3097, April 2001.
+
+ [RFC3175] Baker, F., Iturralde, C., Le Faucheur, F., and B.
+ Davie, "Aggregation of RSVP for IPv4 and IPv6
+ Reservations", RFC 3175, September 2001.
+
+ [RFC3181] Herzog, S., "Signaled Preemption Priority Policy
+ Element", RFC 3181, October 2001.
+
+ [RFC3182] Yadav, S., Yavatkar, R., Pabbati, R., Ford, P.,
+ Moore, T., Herzog, S., and R. Hess, "Identity
+ Representation for RSVP", RFC 3182, October 2001.
+
+ [RFC3312] Camarillo, G., Marshall, W., and J. Rosenberg,
+ "Integration of Resource Management and Session
+ Initiation Protocol (SIP)", RFC 3312, October 2002.
+
+ Differentiated Services Architecture References
+
+ [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
+ "Definition of the Differentiated Services Field
+ (DS Field) in the IPv4 and IPv6 Headers", RFC 2474,
+ December 1998.
+
+ [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E.,
+ Wang, Z., and W. Weiss, "An Architecture for
+ Differentiated Services", RFC 2475, December 1998.
+
+ [RFC2983] Black, D., "Differentiated Services and Tunnels",
+ RFC 2983, October 2000.
+
+
+
+
+
+
+Baker & Polk Informational [Page 26]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ [RFC3246] Davie, B., Charny, A., Bennet, J., Benson, K., Le
+ Boudec, J., Courtney, W., Davari, S., Firoiu, V.,
+ and D. Stiliadis, "An Expedited Forwarding PHB
+ (Per-Hop Behavior)", RFC 3246, March 2002.
+
+ [RFC3247] Charny, A., Bennet, J., Benson, K., Boudec, J.,
+ Chiu, A., Courtney, W., Davari, S., Firoiu, V.,
+ Kalmanek, C., and K. Ramakrishnan, "Supplemental
+ Information for the New Definition of the EF PHB
+ (Expedited Forwarding Per-Hop Behavior)", RFC 3247,
+ March 2002.
+
+ Session Initiation Protocol and Related References
+
+ [RFC2327] Handley, M. and V. Jacobson, "SDP: Session
+ Description Protocol", RFC 2327, April 1998.
+
+ [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G.,
+ Johnston, A., Peterson, J., Sparks, R., Handley,
+ M., and E. Schooler, "SIP: Session Initiation
+ Protocol", RFC 3261, June 2002.
+
+ [RFC4411] Polk, J., "Extending the Session Initiation
+ Protocol (SIP) Reason Header for Preemption
+ Events", RFC 4411, February 2006.
+
+ [RFC4412] Schulzrinne, H. and J. Polk, "Communications
+ Resource Priority for the Session Initiation
+ Protocol (SIP)", RFC 4412, February 2006.
+
+5.2. Informative References
+
+ [ANSI.MLPP.Spec] American National Standards Institute,
+ "Telecommunications - Integrated Services Digital
+ Network (ISDN) - Multi-Level Precedence and
+ Preemption (MLPP) Service Capability", ANSI
+ T1.619-1992 (R1999), 1992.
+
+ [ANSI.MLPP.Supp] American National Standards Institute, "MLPP
+ Service Domain Cause Value Changes", ANSI ANSI
+ T1.619a-1994 (R1999), 1990.
+
+ [G711.1] Viola Networks, "Netally VoIP Evaluator", January
+ 2003, <http://www.brainworks.de/Site/hersteller/
+ viola_networks/Dokumente/Compr_Report_Sample.pdf>.
+
+
+
+
+
+
+Baker & Polk Informational [Page 27]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ [G711.3] Nortel Networks, "Packet Loss and Packet Loss
+ Concealment", 2000, <http://www.nortelnetworks.com/
+ products/01/succession/es/collateral/
+ tb_pktloss.pdf>.
+
+ [ITU.ETS.E106] International Telecommunications Union,
+ "International Emergency Preference Scheme for
+ disaster relief operations (IEPS)", ITU-T
+ Recommendation E.106, October 2003.
+
+ [ITU.MLPP.1990] International Telecommunications Union, "Multilevel
+ Precedence and Preemption Service (MLPP)", ITU-T
+ Recommendation I.255.3, 1990.
+
+ [Parekh1] Parekh, A. and R. Gallager, "A Generalized
+ Processor Sharing Approach to Flow Control in
+ Integrated Services Networks: The Multiple Node
+ Case", INFOCOM 1993: 521-530, 1993.
+
+ [Parekh2] Parekh, A. and R. Gallager, "A Generalized
+ Processor Sharing Approach to Flow Control in
+ Integrated Services Networks: The Single Node
+ Case", INFOCOM 1992: 915-924, 1992.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 28]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+Appendix A. 2-Call Preemption Example Using RSVP
+
+ This appendix will present a more complete view of the interaction
+ among SIP, SDP, and RSVP. The bulk of the material is referenced
+ from [RFC2327], [RFC3312], [RFC4411], and [RFC4412]. There will be
+ some discussion on basic RSVP operations regarding reservation paths;
+ this will be mostly from [RFC2205].
+
+ SIP signaling occurs at the Application Layer, riding on a UDP/IP or
+ TCP/IP (including TLS/TCP/IP) transport that is bound by routing
+ protocols such as BGP and OSPF to determine the route the packets
+ traverse through a network between source and destination devices.
+ RSVP is riding on top of IP as well, which means RSVP is at the mercy
+ of the IP routing protocols to determine a path through the network
+ between endpoints. RSVP is not a routing protocol. In this
+ appendix, there will be an escalation of building blocks getting to
+ how the many layers are involved in SIP. QoS Preconditions require
+ successful RSVP signaling between endpoints prior to SIP successfully
+ acknowledging the setup of the session (for voice, video, or both).
+ Then we will present what occurs when a network overload occurs
+ (congestion), causing a SIP session to be preempted.
+
+ Three diagrams in this appendix show multiple views of the same
+ example of connectivity for discussion throughout this appendix. The
+ first diagram (Figure 5) is of many routers between many endpoints
+ (SIP user agents, or UAs). There are 4 UAs of interest; those are
+ for users Alice, Bob, Carol, and Dave. When a user (the human) of a
+ UA gets involved and must do something to a UA to progress a SIP
+ process, this will be explicitly mentioned to avoid confusion;
+ otherwise, when Alice is referred to, it means Alice's UA (her
+ phone).
+
+ RSVP reserves bandwidth in one direction only (the direction of the
+ RESV message), as has been discussed, IP forwarding of packets are
+ dictated by the routing protocol for that portion of the
+ infrastructure from the point of view of where the packet is to go
+ next.
+
+ The RESV message traverses the routers in the reverse path taken by
+ the PATH message. The PATH message establishes a record of the route
+ taken through a network portion to the destination endpoint, but it
+ does not reserve resources (bandwidth). The RESV message back to the
+ original requester of the RSVP flow requests for the bandwidth
+ resources. This means the endpoint that initiates the RESV message
+ controls the parameters of the reservation. This document specifies
+ in the body text that the SIP initiator (the UAC) establishes the
+ parameters of the session in an INVITE message, and that the INVITE
+ recipient (the UAS) must follow the parameters established in that
+
+
+
+Baker & Polk Informational [Page 29]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ INVITE message. One exception to this is which codec to use if the
+ UAC offered more than one to the UAS. This exception will be shown
+ when the INVITE message is discussed in detail later in the appendix.
+ If there was only one codec in the SDP of the INVITE message, the
+ parameters of the reservation will follow what the UAC requested
+ (specifically to include the Resource-Priority header namespace and
+ priority value).
+
+ Here is the first figure with the 4 UAs and a meshed routed
+ infrastructure between each. For simplicity of this explanation,
+ this appendix will only discuss the reservations from Alice to Bob
+ (one direction) and from Carol to Dave (one direction). An
+ interactive voice service will require two one-way reservations that
+ end in each UA. This gives the appearance of a two-way reservation,
+ when indeed it is not.
+
+ Alice -----R1----R2----R3----R4------ Bob
+ | \ / \ / \ / |
+ | \/ \/ \/ |
+ | /\ /\ /\ |
+ | / \ / \ / \ |
+ Carol -----R5----R6----R7----R8------ Dave
+
+ Figure 5: Complex Routing and Reservation Topology
+
+ The PATH message from Alice to Bob (establishing the route for the
+ RESV message) will be through routers:
+
+ Alice -> R1 -> R2 -> R3 -> R4 -> Bob
+
+ The RESV message (and therefore the reservation of resources) from
+ Bob to Alice will be through routers:
+
+ Bob -> R4 -> R3 -> R2 -> R1 -> Alice
+
+ The PATH message from Carol to Dave (establishing the route for the
+ RESV message) will be through routers:
+
+ Carol -> R5 -> R2 -> R3 -> R8 -> Dave
+
+ The RESV message (and therefore the reservation of resources) from
+ Dave to Carol will be through routers:
+
+ Dave -> R8 -> R3 -> R2 -> R5 -> Carol
+
+ The reservations from Alice to Bob traverse a common router link:
+ between R3 and R2 and thus a common interface at R2. Here is where
+ there will be congestion in this example, on the link between R2 and
+
+
+
+Baker & Polk Informational [Page 30]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ R3. Since the flow of data (in this case voice media packets)
+ travels the direction of the PATH message, and RSVP establishes
+ reservation of resources at the egress interface of a router, the
+ interface in Figure 6 shows that Int7 will be what first knows about
+ a congestion condition.
+
+ Alice Bob
+ \ /
+ \ /
+ +--------+ +--------+
+ | | | |
+ | R2 | | R3 |
+ | Int7-------Int5 |
+ | | | |
+ +--------+ +--------+
+ / \
+ / \
+ Carol Dave
+
+ Figure 6: Reduced Reservation Topology
+
+ Figure 6 illustrates how the messaging between the UAs and the RSVP
+ messages between the relevant routers can be shown to understand the
+ binding that was established in [RFC3312] (more suitably titled "SIP
+ Preconditions for QoS" from this document's point of view).
+
+ We will assume all devices have powered up and received whatever
+ registration or remote policy downloads were necessary for proper
+ operation. The routing protocol of choice has performed its routing
+ table update throughout this part of the network. Now we are left to
+ focus only on end-to-end communications and how that affects the
+ infrastructure between endpoints.
+
+ The next diagram (Figure 7) (nearly identical to Figure 1 from
+ [RFC3312]) shows the minimum SIP messaging (at layer 7) between Alice
+ and Bob for a good-quality voice call. The SIP messages are numbered
+ to identify special qualities of each. During the SIP signaling,
+ RSVP will be initiated. That messaging will also be discussed below.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 31]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ UA Alice UA Bob
+ | |
+ | |
+ |-------------(1) INVITE SDP1--------------->|
+ | | Note 1
+ |<------(2) 183 Session Progress SDP2--------| |
+ ***|********************************************|***<-+
+ * |----------------(3) PRACK------------------>| *
+ * | | * Where
+ * |<-----------(4) 200 OK (PRACK)--------------| * RSVP
+ * | | * is
+ * | | * signaled
+ ***|********************************************|***
+ |-------------(5) UPDATE SDP3--------------->|
+ | |
+ |<--------(6) 200 OK (UPDATE) SDP4-----------|
+ | |
+ |<-------------(7) 180 Ringing---------------|
+ | |
+ |-----------------(8) PRACK----------------->|
+ | |
+ |<------------(9) 200 OK (PRACK)-------------|
+ | |
+ | |
+ |<-----------(10) 200 OK (INVITE)------------|
+ | |
+ |------------------(11) ACK----------------->|
+ | |
+ | RTP (within the reservation) |
+ |<==========================================>|
+ | |
+
+ Figure 7: SIP Reservation Establishment Using Preconditions
+
+ The session initiation starts with Alice wanting to communicate with
+ Bob. Alice decides on an IEPS precedence level for their call (the
+ default is the "routine" level, which is for normal everyday calls,
+ but a priority level has to be chosen for each call). Alice puts
+ into her UA Bob's address and precedence level and (effectively) hits
+ the send button. This is reflected in SIP with an INVITE Method
+ Request message [M1]. Below is what SIP folks call a well-formed SIP
+ message (meaning it has all the headers that are mandatory to
+ function properly). We will pick on the US Marine Corps (USMC) for
+ the addressing of this message exchange.
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 32]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ [M1 - INVITE from Alice to Bob, RP=Routine, QOS=e2e and mandatory]
+ INVITE sip:bob@usmc.example.mil SIP/2.0
+ Via: SIP/2.0/TCP pc33.usmc.example.mil:5060
+ ;branch=z9hG4bK74bf9
+ Max-Forwards: 70
+ From: Alice <sip:alice@usmc.example.mil>;tag=9fxced76sl
+ To: Bob <sip:bob@usmc.example.mil>
+ Call-ID: 3848276298220188511@pc33.usmc.example.mil
+ CSeq: 31862 INVITE
+ Require: 100rel, preconditions, resource-priority
+ Resource-Priority: dsn.routine
+ Contact: <sip:alice@usmc.example.mil>
+ Content-Type: application/sdp
+ Content-Length: 191
+
+ v=0
+ o=alice 2890844526 2890844526 IN IP4 usmc.example.mil
+ c=IN IP4 10.1.3.33
+ t=0 0
+ m=audio 49172 RTP/AVP 0 4 8
+ a=rtpmap:0 PCMU/8000
+ a=curr:qos e2e none
+ a=des:qos mandatory e2e sendrecv
+
+ From the INVITE above, Alice is inviting Bob to a session. The upper
+ half of the lines (above the line "v=0") is SIP headers and header
+ values, and the lower half is Session Description Protocol (SDP)
+ lines. SIP headers (after the first line, called the Status line)
+ are not mandated in any particular order, with one exception: the Via
+ header. It is a SIP hop (through a SIP Proxy) route path that has a
+ new Via header line added by each SIP element this message traverses
+ towards the destination UA. This is similar in function to an RSVP
+ PATH message (building a reverse path back to the originator of the
+ message). At any point in the message's path, a SIP element knows
+ the path to the originator of the message. There will be no SIP
+ Proxies in this example, because for Preconditions, Proxies only make
+ more messages that look identical (with the exception of the Via and
+ Max-Forwards headers), and it is not worth the space here to
+ replicate what has been done in SIP RFCs already.
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 33]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ SIP headers that are used for Preconditions are as follows:
+
+ o Require header, which contains 3 option tags: "100rel" mandates a
+ reliable provisional response message to the conditions requesting
+ in this INVITE (knowing they are special), "preconditions"
+ mandates that preconditions are attempted, and "resource-priority"
+ mandates support for the Resource-Priority header. Each of these
+ option tags can be explicitly identified in a message failure
+ indication from the called UA to tell the calling UA exactly what
+ was not supported.
+
+ Provided that this INVITE message is received as acceptable, this
+ will result in the 183 "Session Progress" message from Bob's UA, a
+ reliable confirmation that preconditions are required for this
+ call.
+
+ o Resource-Priority header, which denotes the domain namespace and
+ precedence level of the call on an end-to-end basis.
+
+ This completes SIP's functions in session initiation. Preconditions
+ are requested, required, and signaled for in the SDP portion of the
+ message. SDP is carried in what's called a SIP message body (much
+ like the text in an email message is carried). SDP has special
+ properties (see [RFC2327] for more on SDP, or the MMUSIC WG for
+ ongoing efforts regarding SDP). SDP lines are in a specific order
+ for parsing by end systems. Dialog-generating (or call-generating)
+ SDP message bodies all must have an "m=" line (or media description
+ line). Following the "m=" line are zero or more "a=" lines (or
+ Attribute lines). The "m=" line in Alice's INVITE calls for a voice
+ session (this is where video is identified also) using one of 3
+ different codecs that Alice supports (0 = G.711, 4 = G.723, and 18 =
+ G.729) that Bob gets to choose from for this session. Bob can choose
+ any of the 3. The first a=rtpmap line is specific to the type of
+ codec these 3 are (PCMU). The next two "a=" lines are the only
+ identifiers that RSVP is to be used for this call. The second "a="
+ line:
+
+ a=curr:qos e2e none
+
+ identifies the "current" status of qos at Alice's UA. Note:
+ everything in SDP is with respect to the sender of the SDP message
+ body (Alice will never tell Bob how his SDP is; she will only tell
+ Bob about her SDP).
+
+ "e2e" means that capacity assurance is required from Alice's UA to
+ Bob's UA; thus, a lack of available capacity assurance in either
+ direction will fail the call attempt.
+
+
+
+
+Baker & Polk Informational [Page 34]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ "none" means there is no reservation at Alice's UA (to Bob) at
+ this time.
+
+ The final "a=" line (a=des) identifies the "desired" level of qos:
+
+ a=des:qos mandatory e2e sendrecv
+
+ "mandatory" means this request for qos MUST be successful, or the
+ call fails.
+
+ "e2e" means RSVP is required from Alice's UA to Bob's UA.
+
+ "sendrecv" means the reservation is in both directions.
+
+ As discussed, RSVP does not reserve bandwidth in both directions, and
+ it is up to the endpoints to have 2 one-way reservations if that
+ particular application (here, voice) requires it. Voice between
+ Alice and Bob requires 2 one-way reservations. The UAs will be the
+ focal points for both reservations in both directions.
+
+ Message 2 is the 183 "Session Progress" message sent by Bob to Alice,
+ which indicates to Alice that Bob understands that preconditions are
+ required for this call.
+
+ [M2 - 183 "Session Progress"]
+ SIP/2.0 183 Session Progress
+ Via: SIP/2.0/TCP pc33.usmc.example.mil:5060
+ ;branch=z9hG4bK74bf9 ;received=10.1.3.33
+ From: Alice <sip:alice@usmc.example.mil>;tag=9fxced76sl
+ To: Bob <sip:bob@usmc.example.mil>;tag=8321234356
+ Call-ID: 3848276298220188511@pc33.usmc.example.mil
+ CSeq: 31862 INVITE
+ RSeq: 813520
+ Resource-Priority: dsn.routine
+ Contact: <sip:bob@usmc.example.mil>
+ Content-Type: application/sdp
+ Content-Length: 210
+
+ v=0
+ o=bob 2890844527 2890844527 IN IP4 usmc.example.mil
+ c=IN IP4 10.100.50.51
+ t=0 0
+ m=audio 3456 RTP/AVP 0
+ a=rtpmap:0 PCMU/8000
+ a=curr:qos e2e none
+ a=des:qos mandatory e2e sendrecv
+ a=conf:qos e2e recv
+
+
+
+
+Baker & Polk Informational [Page 35]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ The only interesting header in the SIP portion of this message is the
+ RSeq header, which is the "Reliable Sequence" header. The value is
+ incremented for every Reliable message that's sent in this call setup
+ (to make sure none are lost or to ignore duplicates).
+
+ Bob's SDP indicates several "a=" line statuses and picks a codec for
+ the call. The codec picked is in the m=audio line (the "0" at the
+ end of this line means G.711 will be the codec).
+
+ The a=curr line gives Alice Bob's status with regard to RSVP
+ (currently "none").
+
+ The a=des line also states the desire for mandatory qos e2e in both
+ directions.
+
+ The a=conf line is new. This line means Bob wants confirmation that
+ Alice has 2 one-way reservations before Bob's UA proceeds with the
+ SIP session setup.
+
+ This is where "Note-1" applies in Figure 7. At the point that Bob's
+ UA transmits this 183 message, Bob's UA (the one that picked the
+ codec, so it knows the amount of bandwidth to reserve) transmits an
+ RSVP PATH message to Alice's UA. This PATH message will take the
+ route previously discussed in Figure 5:
+
+ Bob -> R4 -> R3 -> R2 -> R1 -> Alice
+
+ This is the path of the PATH message, and the reverse will be the
+ path of the reservation setup RESV message, or:
+
+ Alice -> R1 -> R2 -> R3 -> R4 -> Bob
+
+ Immediately after Alice transmits the RESV message towards Bob, Alice
+ sends her own PATH message to initiate the other one-way reservation.
+ Bob, receiving that PATH message, will reply with a RESV.
+
+ All this is independent of SIP. However, during this time of
+ reservation establishment, a Provisional Acknowledgement (PRACK) [M3]
+ is sent from Alice to Bob to confirm the request for confirmation of
+ 2 one-way reservations at Alice's UA. This message is acknowledged
+ with a normal 200 OK message [M4]. This is shown in Figure 7.
+
+ As soon as the RSVP is successfully completed at Alice's UA (knowing
+ that it was the last in the two-way cycle or reservation
+ establishment), at the SIP layer an UPDATE message [M5] is sent to
+ Bob's UA to inform his UA that the current status of RSVP (or qos) is
+ "e2e" and "sendrecv".
+
+
+
+
+Baker & Polk Informational [Page 36]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ [M5 - UPDATE to Bob that Alice has qos e2e and sendrecv]
+ UPDATE sip:bob@usmc.example.mil SIP/2.0
+ Via: SIP/2.0/TCP pc33.usmc.example.mil:5060
+ ;branch=z9hG4bK74bfa
+ From: Alice <sip:alice@usmc.example.mil>;tag=9fxced76sl
+ To: Bob <sip:bob@usmc.example.mil>
+ Call-ID: 3848276298220188511@pc33.usmc.example.mil
+ Resource-Priority: dsn.routine
+ Contact: <sip:alice@usmc.example.mil>
+ CSeq: 10197 UPDATE
+ Content-Type: application/sdp
+ Content-Length: 191
+
+ v=0
+ o=alice 2890844528 2890844528 IN IP4 usmc.example.mil
+ c=IN IP4 10.1.3.33
+ t=0 0
+ m=audio 49172 RTP/AVP 0
+ a=rtpmap:0 PCMU/8000
+ a=curr:qos e2e send
+ a=des:qos mandatory e2e sendrecv
+
+ This is shown by the matching table that can be built from the a=curr
+ line and a=des line. If the two lines match, then no further
+ signaling needs take place with regard to "qos". [M6] is the 200 OK
+ acknowledgement of this synchronization between the two UAs.
+
+ [M6 - 200 OK to the UPDATE from Bob indicating synchronization]
+ SIP/2.0 200 OK sip:bob@usmc.example.mil
+ Via: SIP/2.0/TCP pc33.usmc.example.mil:5060
+ ;branch=z9hG4bK74bfa
+ From: Alice <sip:alice@usmc.example.mil>;tag=9fxced76sl
+ To: Bob <sip:bob@usmc.example.mil>
+ Call-ID: 3848276298220188511@pc33.usmc.example.mil
+ Resource-Priority: dsn.routine
+ Contact: < sip:alice@usmc.example.mil >
+ CSeq: 10197 UPDATE
+ Content-Type: application/sdp
+ Content-Length: 195
+
+ v=0
+ o=alice 2890844529 2890844529 IN IP4 usmc.example.mil
+ c=IN IP4 10.1.3.33
+ t=0 0
+ m=audio 49172 RTP/AVP 0
+ a=rtpmap:0 PCMU/8000
+ a=curr:qos e2e sendrecv
+ a=des:qos mandatory e2e sendrecv
+
+
+
+Baker & Polk Informational [Page 37]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ At this point, the reservation is operational and both UAs know it.
+ Bob's UA now rings, telling Bob the user that Alice is calling him.
+ ([M7] is the SIP indication to Alice that this is taking place).
+ Nothing up until now has involved Bob the user. Bob picks up the
+ phone (generating [M10], from which Alice's UA responds with the
+ final ACK), and RTP is now operating within the reservations between
+ the two UAs.
+
+ Now we get to Carol calling Dave. Figure 6 shows a common router
+ interface for the reservation between Alice to Bob, and one that will
+ also be the route for one of the reservations between Carol to Dave.
+ This interface will experience congestion in our example.
+
+ Carol is now calling Dave at a Resource-Priority level of
+ "Immediate", which is higher in priority than Alice to Bob's
+ "routine". In this continuing example, Router 2's Interface-7 is
+ congested and cannot accept any more RSVP traffic. Perhaps the
+ offered load is at interface capacity. Perhaps Interface-7 is
+ configured with a fixed amount of bandwidth it can allocate for RSVP
+ traffic, and it has reached its maximum without one of the
+ reservations going away through normal termination or forced
+ termination (preemption).
+
+ Interface-7 is not so full of offered load that it cannot transmit
+ signaling packets, such as Carol's SIP messaging to set up a call to
+ Dave. This should be by design (that not all RSVP traffic can starve
+ an interface from signaling packets). Carol sends her own INVITE
+ with the following important characteristics:
+
+ [M1 - INVITE from Carol to Dave, RP=Immediate, QOS=e2e and mandatory]
+
+ This packet does *not* affect the reservations between Alice and Bob
+ (SIP and RSVP are at different layers, and all routers are passing
+ signaling packets without problems). Dave sends his M2:
+
+ [M2 - 183 "Session Progress"]
+
+ with the SDP chart of:
+
+ a=curr:qos e2e none
+
+ a=des:qos mandatory e2e sendrecv
+
+ a=conf:qos e2e recv
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 38]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ indicating he understands RSVP reservations are required e2e for this
+ call to be considered successful. Dave sends his PATH message. The
+ PATH message does *not* affect Alice's reservation; it merely
+ establishes a path for the RESV reservation setup message to take.
+
+ To keep this example simple, the PATH message from Dave to Carol took
+ this route (which we make different from the route in the reverse
+ direction):
+
+ Dave -> R8 -> R7 -> R6 -> R5 -> Carol
+
+ causing the reservation to be this route:
+
+ Carol -> R5 -> R6 -> R7 -> R8 -> Dave
+
+ The Carol-to-Dave reservation above will not traverse any of the same
+ routers as the Alice-to-Bob reservation. When Carol transmits her
+ RESV message towards Dave, she immediately transmits her PATH message
+ to set up the complementary reservation.
+
+ The PATH message from Carol to Dave be through routers:
+
+ Carol -> R5 -> R2 -> R3 -> R8 -> Dave
+
+ Thus, the RESV message will be through routers:
+
+ Dave -> R8 -> R3 -> R2 -> R5 -> Carol
+
+ This RESV message will traverse the same routers, R3 and R2, as the
+ Alice-to-Bob reservation. This RESV message, when received at
+ Interface-7 of R2, will create a congestion situation such that R2
+ will need to make a decision on whether:
+
+ o to keep the Alice-to-Bob reservation and error the new RESV from
+ Dave, or
+
+ o to error the reservation from Alice to Bob in order to make room
+ for the Carol-to-Dave reservation.
+
+ Alice's reservation was set up in SIP at the "routine" precedence
+ level. This will equate to a comparable RSVP priority number (RSVP
+ has 65,535 priority values, or 2*32 bits per [RFC3181]). Dave's RESV
+ equates to a precedence value of "immediate", which is a higher
+ priority. Thus, R2 will preempt the reservation from Alice to Bob
+ and allow the reservation request from Dave to Carol. The proper
+ RSVP error is the ResvErr that indicates preemption. This message
+ travels downstream towards the originator of the RESV message (Bob).
+ This clears the reservation in all routers downstream of R2 (meaning
+
+
+
+Baker & Polk Informational [Page 39]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+ R3 and R4). Once Bob receives the ResvErr message indicating
+ preemption has occurred on this reservation, Bob's UA transmits a SIP
+ preemption indication back towards Alice's UA. This accomplishes two
+ things: first, it informs all SIP Servers that were in the session
+ setup path that wanted to remain "dialog stateful" per [RFC3261], and
+ second, it informs Alice's UA that this was a purposeful termination,
+ and to play a preemption tone. The proper indication in SIP of this
+ termination due to preemption is a BYE Method message that includes a
+ Reason Header indicating why this occurred (in this case, "Reserved
+ Resources Preempted"). Here is the message from Bob to Alice that
+ terminates the call in SIP.
+
+ BYE sip:alice@usmc.example.mil SIP/2.0
+ Via: SIP/2.0/TCP swp34.usmc.example.mil
+ ;branch=z9hG4bK776asegma
+ To: Alice <sip:alice@usmc.example.mil>
+ From: Bob <sip:bob@usmc.example.mil>;tag=192820774
+ Reason: preemption ;cause=2 ;text=reserved resourced preempted
+ Call-ID: 3848276298220188511@pc33.usmc.example.mil
+ CSeq: 6187 BYE
+ Contact: <sip:bob@usmc.example.mil>
+
+ When Alice's UA receives this message, her UA terminates the call,
+ sends a 200 OK to Bob to confirm reception of the BYE message, and
+ plays a preemption tone to Alice the user.
+
+ The RESV message from Dave successfully traverses R2, and Carol's UA
+ receives it. Just as with the Alice-to-Bob call setup, Carol sends
+ an UPDATE message to Dave, confirming she has QoS "e2e" in "sendrecv"
+ directions. Bob acknowledges this with a 200 OK that gives his
+ current status (QoS "e2e" and "sendrecv"), and the call setup in SIP
+ continues to completion.
+
+ In summary, Alice set up a call to Bob with RSVP at a priority level
+ of Routine. When Carol called Dave at a high priority, their call
+ would have preempted any lower priority calls if there were a
+ contention for resources. In this case, it occurred and affected the
+ call between Alice and Bob. A router at this congestion point
+ preempted Alice's call to Bob in order to place the higher-priority
+ call between Carol and Dave. Alice and Bob were both informed of the
+ preemption event. Both Alice and Bob's UAs played preemption
+ indications. What was not mentioned in this appendix was that this
+ document RECOMMENDS that router R2 (in this example) generate a
+ syslog message to the domain administrator to properly manage and
+ track such events within this domain. This will ensure that the
+ domain administrators have recorded knowledge of where such events
+ occur, and what the conditions were that caused them.
+
+
+
+
+Baker & Polk Informational [Page 40]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+Authors' Addresses
+
+ Fred Baker
+ Cisco Systems
+ 1121 Via Del Rey
+ Santa Barbara, California 93117
+ USA
+
+ Phone: +1-408-526-4257
+ Fax: +1-413-473-2403
+ EMail: fred@cisco.com
+
+
+ James Polk
+ Cisco Systems
+ 2200 East President George Bush Turnpike
+ Richardson, Texas 75082
+ USA
+
+ Phone: +1-817-271-3552
+ EMail: jmpolk@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 41]
+
+RFC 4542 ETS in an IP Network May 2006
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2006).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is provided by the IETF
+ Administrative Support Activity (IASA).
+
+
+
+
+
+
+
+Baker & Polk Informational [Page 42]
+