diff options
Diffstat (limited to 'doc/rfc/rfc3499.txt')
-rw-r--r-- | doc/rfc/rfc3499.txt | 2131 |
1 files changed, 2131 insertions, 0 deletions
diff --git a/doc/rfc/rfc3499.txt b/doc/rfc/rfc3499.txt new file mode 100644 index 0000000..0d739ce --- /dev/null +++ b/doc/rfc/rfc3499.txt @@ -0,0 +1,2131 @@ + + + + + + +Network Working Group S. Ginoza +Request for Comments: 3499 ISI +Category: Informational December 2003 + + + Request for Comments Summary + + RFC Numbers 3400-3499 + +Status of This Memo + + This RFC is a slightly annotated list of the 100 RFCs from RFC 3400 + through RFC 3499. This is a status report on these RFCs. This memo + provides information for the Internet community. It does not specify + an Internet standard of any kind. Distribution of this memo is + unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2003). All Rights Reserved. + +Note + + Many RFCs, but not all, are Proposed Standards, Draft Standards, or + Standards. Since the status of these RFCs may change during the + standards processing, we note here only that they are on the + standards track. Please see the latest edition of "Internet Official + Protocol Standards" for the current state and status of these RFCs. + In the following, RFCs on the standards track are marked [STANDARDS + TRACK]. + +RFC Author Date Title +--- ------ ---- ----- + +3499 Ginoza Request for Comments Summary + +This memo. + + + + + + + + + + + + + + +Ginoza Informational [Page 1] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3498 Kuhfeld Mar 2003 Definitions of Managed Objects + for Synchronous Optical + Network (SONET) Linear + Automatic Protection Switching + (APS) Architectures + +This memo defines a portion of the Management Information Base (MIB) for +use with network management protocols in TCP/IP based internets. In +particular, it defines objects for managing networks using Synchronous +Optical Network (SONET) linear Automatic Protection Switching (APS) +architectures. [STANDARDS TRACK] + + +3497 Gharai Mar 2003 RTP Payload Format for + Society of Motion Picture and + Television Engineers (SMPTE) + 292M Video + +This memo specifies an RTP payload format for encapsulating uncompressed +High Definition Television (HDTV) as defined by the Society of Motion +Picture and Television Engineers (SMPTE) standard, SMPTE 292M. SMPTE is +the main standardizing body in the motion imaging industry and the SMPTE +292M standard defines a bit-serial digital interface for local area HDTV +transport. [STANDARDS TRACK] + + +3496 Malis Mar 2003 Protocol Extension for Support + of Asynchronous Transfer Mode + (ATM) Service Class-aware + Multiprotocol Label Switching + (MPLS) Traffic Engineering + +This document specifies a Resource ReSerVation Protocol-Traffic +Engineering (RSVP-TE) signaling extension for support of Asynchronous +Transfer Mode (ATM) Service Class-aware Multiprotocol Label Switching +(MPLS) Traffic Engineering. This memo provides information for the +Internet community. + + + + + + + + + + + + + + +Ginoza Informational [Page 2] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3495 Beser Mar 2003 Dynamic Host Configuration + Protocol (DHCP) Option + for CableLabs Client + Configuration + +This document defines a Dynamic Host Configuration Protocol (DHCP) +option that will be used to configure various devices deployed within +CableLabs architectures. Specifically, the document describes DHCP +option content that will be used to configure one class of CableLabs +client device: a PacketCable Media Terminal Adapter (MTA). The option +content defined within this document will be extended as future +CableLabs client devices are developed. [STANDARDS TRACK] + + +3494 Zeilenga Mar 2003 Lightweight Directory Access + Protocol version 2 (LDAPv2) + to Historic Status + +This document recommends the retirement of version 2 of the Lightweight +Directory Access Protocol (LDAPv2) and other dependent specifications, +and discusses the reasons for doing so. This document recommends RFC +1777, 1778, 1779, 1781, and 2559 (as well as documents they superseded) +be moved to Historic status. This memo provides information for the +Internet community. + + +3493 Gilligan Mar 2003 Basic Socket Interface + Extensions for IPv6 + +The de facto standard Application Program Interface (API) for TCP/IP +applications is the "sockets" interface. Although this API was +developed for Unix in the early 1980s it has also been implemented on a +wide variety of non-Unix systems. TCP/IP applications written using the +sockets API have in the past enjoyed a high degree of portability and we +would like the same portability with IPv6 applications. But changes are +required to the sockets API to support IPv6 and this memo describes +these changes. These include a new socket address structure to carry +IPv6 addresses, new address conversion functions, and some new socket +options. These extensions are designed to provide access to the basic +IPv6 features required by TCP and UDP applications, including +multicasting, while introducing a minimum of change into the system and +providing complete compatibility for existing IPv4 applications. +Additional extensions for advanced IPv6 features (raw sockets and access +to the IPv6 extension headers) are defined in another document. This +memo provides information for the Internet community. + + + + + + +Ginoza Informational [Page 3] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3492 Costello Mar 2003 Punycode: A Bootstring + encoding of Unicode for + Internationalized Domain Names + in Applications (IDNA) + +Punycode is a simple and efficient transfer encoding syntax designed for +use with Internationalized Domain Names in Applications (IDNA). It +uniquely and reversibly transforms a Unicode string into an ASCII +string. ASCII characters in the Unicode string are represented +literally, and non-ASCII characters are represented by ASCII characters +that are allowed in host name labels (letters, digits, and hyphens). +This document defines a general algorithm called Bootstring that allows +a string of basic code points to uniquely represent any string of code +points drawn from a larger set. Punycode is an instance of Bootstring +that uses particular parameter values specified by this document, +appropriate for IDNA. [STANDARDS TRACK] + + +3491 Hoffman Mar 2003 Nameprep: A Stringprep Profile + for Internationalized Domain + Names (IDN) + +This document describes how to prepare internationalized domain name +(IDN) labels in order to increase the likelihood that name input and +name comparison work in ways that make sense for typical users +throughout the world. This profile of the stringprep protocol is used +as part of a suite of on-the-wire protocols for internationalizing the +Domain Name System (DNS). [STANDARDS TRACK] + + +3490 Faltstrom Mar 2003 Internationalizing Domain + Names in Applications (IDNA) + +Until now, there has been no standard method for domain names to use +characters outside the ASCII repertoire. This document defines +internationalized domain names (IDNs) and a mechanism called +Internationalizing Domain Names in Applications (IDNA) for handling them +in a standard fashion. IDNs use characters drawn from a large +repertoire (Unicode), but IDNA allows the non-ASCII characters to be +represented using only the ASCII characters already allowed in so-called +host names today. This backward-compatible representation is required +in existing protocols like DNS, so that IDNs can be introduced with no +changes to the existing infrastructure. IDNA is only meant for +processing domain names, not free text. [STANDARDS TRACK] + + + + + + + +Ginoza Informational [Page 4] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3489 Rosenberg Mar 2003 STUN - Simple Traversal of + User Datagram Protocol (UDP) + Through Network Address + Translators (NATs) + +Simple Traversal of User Datagram Protocol (UDP) Through Network Address +Translators (NATs) (STUN) is a lightweight protocol that allows +applications to discover the presence and types of NATs and firewalls +between them and the public Internet. It also provides the ability for +applications to determine the public Internet Protocol (IP) addresses +allocated to them by the NAT. STUN works with many existing NATs, and +does not require any special behavior from them. As a result, it allows +a wide variety of applications to work through existing NAT +infrastructure. [STANDARDS TRACK] + + +3488 Wu Feb 2003 Cisco Systems Router-port + Group Management Protocol + (RGMP) + +This document describes the Router-port Group Management Protocol +(RGMP). This protocol was developed by Cisco Systems and is used +between multicast routers and switches to restrict multicast packet +forwarding in switches to those routers where the packets may be needed. + +RGMP is designed for backbone switched networks where multiple, high +speed routers are interconnected. This memo provides information for +the Internet community. + + +3487 Schulzrinne Feb 2003 Requirements for Resource + Priority Mechanisms for the + Session Initiation Protocol + (SIP) + +This document summarizes requirements for prioritizing access to +circuit-switched network, end system and proxy resources for emergency +preparedness communications using the Session Initiation Protocol (SIP). +This memo provides information for the Internet community. + + +3486 Camarillo Feb 2003 Compressing the Session + Initiation Protocol (SIP) + +This document describes a mechanism to signal that compression is +desired for one or more Session Initiation Protocol (SIP) messages. It +also states when it is appropriate to send compressed SIP messages to a +SIP entity. [STANDARDS TRACK] + + + +Ginoza Informational [Page 5] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3485 Garcia-Martin Feb 2003 The Session Initiation + Protocol (SIP) and Session + Description Protocol + (SDP) Static Dictionary for + Signaling Compression + (SigComp) + +The Session Initiation Protocol (SIP) is a text-based protocol for +initiating and managing communication sessions. The protocol can be +compressed by using Signaling Compression (SigComp). Similarly, the +Session Description Protocol (SDP) is a text-based protocol intended for +describing multimedia sessions for the purposes of session announcement, +session invitation, and other forms of multimedia session initiation. +This memo defines the SIP/SDP-specific static dictionary that SigComp +may use in order to achieve higher efficiency. The dictionary is +compression algorithm independent. [STANDARDS TRACK] + + +3484 Draves Feb 2003 Default Address Selection for + Internet Protocol version 6 + (IPv6) + +This document describes two algorithms, for source address selection and +for destination address selection. The algorithms specify default +behavior for all Internet Protocol version 6 (IPv6) implementations. +They do not override choices made by applications or upper-layer +protocols, nor do they preclude the development of more advanced +mechanisms for address selection. The two algorithms share a common +context, including an optional mechanism for allowing administrators to +provide policy that can override the default behavior. In dual stack +implementations, the destination address selection algorithm can +consider both IPv4 and IPv6 addresses - depending on the available +source addresses, the algorithm might prefer IPv6 addresses over IPv4 +addresses, or vice-versa. + +All IPv6 nodes, including both hosts and routers, must implement default +address selection as defined in this specification. [STANDARDS TRACK] + + + + + + + + + + + + + + +Ginoza Informational [Page 6] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3483 Rawlins Mar 2003 Framework for Policy Usage + Feedback for Common Open + Policy Service with Policy + Provisioning (COPS-PR) + +Common Open Policy Services (COPS) Protocol (RFC 2748), defines the +capability of reporting information to the Policy Decision Point (PDP). +The types of report information are success, failure and accounting of +an installed state. This document focuses on the COPS Report Type of +Accounting and the necessary framework for the monitoring and reporting +of usage feedback for an installed state. This memo provides +information for the Internet community. + + +3482 Foster Feb 2003 Number Portability in the + Global Switched Telephone + Network (GSTN): An Overview + +This document provides an overview of E.164 telephone number portability +(NP) in the Global Switched Telephone Network (GSTN). + +NP is a regulatory imperative seeking to liberalize local telephony +service competition, by enabling end-users to retain telephone numbers +while changing service providers. NP changes the fundamental nature of +a dialed E.164 number from a hierarchical physical routing address to a +virtual address, thereby requiring the transparent translation of the +later to the former. In addition, there are various regulatory +constraints that establish relevant parameters for NP implementation, +most of which are not network technology specific. Consequently, the +implementation of NP behavior consistent with applicable regulatory +constraints, as well as the need for interoperation with the existing +GSTN NP implementations, are relevant topics for numerous areas of IP +telephony works-in-progress with the IETF. This memo provides +information for the Internet community. + + + + + + + + + + + + + + + + + +Ginoza Informational [Page 7] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3481 Inamura, Ed. Feb 2003 TCP over Second (2.5G) + and Third (3G) Generation + Wireless Networks + +This document describes a profile for optimizing TCP to adapt so that it +handles paths including second (2.5G) and third (3G) generation wireless +networks. It describes the relevant characteristics of 2.5G and 3G +networks, and specific features of example deployments of such networks. +It then recommends TCP algorithm choices for nodes known to be starting +or ending on such paths, and it also discusses open issues. The +configuration options recommended in this document are commonly found in +modern TCP stacks, and are widely available standards-track mechanisms +that the community considers safe for use on the general Internet. This +document specifies an Internet Best Current Practices for the Internet +Community, and requests discussion and suggestions for improvements. + + +3480 Kompella Feb 2003 Signalling Unnumbered Links in + CR-LDP (Constraint-Routing + Label Distribution Protocol) + +Current signalling used by Multi-Protocol Label Switching Traffic +Engineering (MPLS TE) does not provide support for unnumbered links. +This document defines procedures and extensions to Constraint-Routing +Label Distribution Protocol (CR-LDP), one of the MPLS TE signalling +protocols that are needed in order to support unnumbered links. +[STANDARDS TRACK] + +3479 Farrel, Ed. Feb 2003 Fault Tolerance for the Label + Distribution Protocol (LDP) + +Multiprotocol Label Switching (MPLS) systems will be used in core +networks where system downtime must be kept to an absolute minimum. +Many MPLS Label Switching Routers (LSRs) may, therefore, exploit Fault +Tolerant (FT) hardware or software to provide high availability of the +core networks. + +The details of how FT is achieved for the various components of an FT +LSR, including Label Distribution Protocol (LDP), the switching hardware +and TCP, are implementation specific. This document identifies issues +in the LDP specification in RFC 3036, "LDP Specification", that make it +difficult to implement an FT LSR using the current LDP protocols, and +defines enhancements to the LDP specification to ease such FT LSR +implementations. + + + + + + + +Ginoza Informational [Page 8] + +RFC 3499 Summary of 3400-3499 December 2003 + + +The issues and extensions described here are equally applicable to RFC +3212, "Constraint-Based LSP Setup Using LDP" (CR-LDP). [STANDARDS +TRACK] + + +3478 Leelanivas Feb 2003 Graceful Restart Mechanism for + Label Distribution Protocol + +This document describes a mechanism that helps to minimize the negative +effects on MPLS traffic caused by Label Switching Router's (LSR's) +control plane restart, specifically by the restart of its Label +Distribution Protocol (LDP) component, on LSRs that are capable of +preserving the MPLS forwarding component across the restart. + +The mechanism described in this document is applicable to all LSRs, both +those with the ability to preserve forwarding state during LDP restart +and those without (although the latter needs to implement only a subset +of the mechanism described in this document). Supporting (a subset of) +the mechanism described here by the LSRs that can not preserve their +MPLS forwarding state across the restart would not reduce the negative +impact on MPLS traffic caused by their control plane restart, but it +would minimize the impact if their neighbor(s) are capable of preserving +the forwarding state across the restart of their control plane and +implement the mechanism described here. + +The mechanism makes minimalistic assumptions on what has to be preserved +across restart - the mechanism assumes that only the actual MPLS +forwarding state has to be preserved; the mechanism does not require any +of the LDP-related states to be preserved across the restart. + +The procedures described in this document apply to downstream +unsolicited label distribution. Extending these procedures to +downstream on demand label distribution is for further study. +[STANDARDS TRACK] + + +3477 Kompella Jan 2003 Signalling Unnumbered Links in + Resource ReSerVation Protocol - + Traffic Engineering (RSVP-TE) + +Current signalling used by Multi-Protocol Label Switching Traffic +Engineering (MPLS TE) does not provide support for unnumbered links. +This document defines procedures and extensions to Resource ReSerVation +Protocol (RSVP) for Label Switched Path (LSP) Tunnels (RSVP-TE), one of +the MPLS TE signalling protocols, that are needed in order to support +unnumbered links. [STANDARDS TRACK] + + + + + +Ginoza Informational [Page 9] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3476 Rajagopalan Mar 2003 Documentation of IANA + Assignments for Label + Distribution Protocol + (LDP), Resource ReSerVation + Protocol (RSVP), and Resource + ReSerVation Protocol-Traffic + Engineering (RSVP-TE) + Extensions for Optical UNI + Signaling + +The Optical Interworking Forum (OIF) has defined extensions to the Label +Distribution Protocol (LDP) and the Resource ReSerVation Protocol (RSVP) +for optical User Network Interface (UNI) signaling. These extensions +consist of a set of new data objects and error codes. This document +describes these extensions. This memo provides information for the +Internet community. + + +3475 Aboul-Magd Mar 2003 Documentation of IANA + assignments for + Constraint-Based LSP setup + using LDP (CR-LDP) Extensions + for Automatic Switched Optical + Network (ASON) + +Automatic Switched Optical Network (ASON) is an architecture, specified +by ITU-T Study Group 15, for the introduction of a control plane for +optical networks. The ASON architecture specifies a set of reference +points that defines the relationship between the ASON architectural +entities. Signaling over interfaces defined in those reference points +can make use of protocols that are defined by the IETF in the context of +Generalized Multi-Protocol Label Switching (GMPLS) work. This document +describes Constraint-Based LSP setup using LDP (CR-LDP) extensions for +signaling over the interfaces defined in the ASON reference points. The +purpose of the document is to request that the IANA assigns code points +necessary for the CR-LDP extensions. The protocol specifications for +the use of the CR-LDP extensions are found in ITU-T documents. This +memo provides information for the Internet community. + + + + + + + + + + + + + +Ginoza Informational [Page 10] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3474 Lin Mar 2003 Documentation of IANA + assignments for Generalized + MultiProtocol Label Switching + (GMPLS) Resource Reservation + Protocol - Traffic Engineering + (RSVP-TE) Usage and Extensions + for Automatically Switched + Optical Network (ASON) + +The Generalized MultiProtocol Label Switching (GMPLS) suite of protocol +specifications has been defined to provide support for different +technologies as well as different applications. These include support +for requesting TDM connections based on Synchronous Optical +NETwork/Synchronous Digital Hierarchy (SONET/SDH) as well as Optical +Transport Networks (OTNs). + +This document concentrates on the signaling aspects of the GMPLS suite +of protocols, specifically GMPLS signaling using Resource Reservation +Protocol - Traffic Engineering (RSVP-TE). It proposes additional +extensions to these signaling protocols to support the capabilities of +an ASON network. + +This document proposes appropriate extensions towards the resolution of +additional requirements identified and communicated by the ITU-T Study +Group 15 in support of ITU's ASON standardization effort. This memo +provides information for the Internet community. + + +3473 Berger Jan 2003 Generalized Multi-Protocol + Label Switching (GMPLS) + Signaling Resource ReserVation + Protocol-Traffic Engineering + (RSVP-TE) Extensions + +This document describes extensions to Multi-Protocol Label Switching +(MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) +signaling required to support Generalized MPLS. Generalized MPLS +extends the MPLS control plane to encompass time-division (e.g., +Synchronous Optical Network and Synchronous Digital Hierarchy, +SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., +incoming port or fiber to outgoing port or fiber). This document +presents a RSVP-TE specific description of the extensions. A generic +functional description can be found in separate documents. [STANDARDS +TRACK] + + + + + + + +Ginoza Informational [Page 11] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3472 Ashwood-Smith Jan 2003 Generalized Multi-Protocol + Label Switching (GMPLS) + Signaling Constraint-based + Routed Label Distribution + Protocol (CR-LDP) Extensions + +This document describes extensions to Multi-Protocol Label Switching +(MPLS) Constraint-based Routed Label Distribution Protocol (CR-LDP) +signaling required to support Generalized MPLS. Generalized MPLS +extends the MPLS control plane to encompass time-division (e.g., +Synchronous Optical Network and Synchronous Digital Hierarchy, +SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., +incoming port or fiber to outgoing port or fiber). This document +presents a CR-LDP specific description of the extensions. A generic +functional description can be found in separate documents. [STANDARDS +TRACK] + + +3471 Berger Jan 2003 Generalized Multi-Protocol + Label Switching (GMPLS) + Signaling Functional + Description + +This document describes extensions to Multi-Protocol Label Switching +(MPLS) signaling required to support Generalized MPLS. Generalized MPLS +extends the MPLS control plane to encompass time-division (e.g., +Synchronous Optical Network and Synchronous Digital Hierarchy, +SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., +incoming port or fiber to outgoing port or fiber). This document +presents a functional description of the extensions. Protocol specific +formats and mechanisms, and technology specific details are specified in +separate documents. [STANDARDS TRACK] + + +3470 Hollenbeck Jan 2003 Guidelines for the Use + of Extensible Markup + Language (XML) + within IETF Protocols + +The Extensible Markup Language (XML) is a framework for structuring +data. While it evolved from Standard Generalized Markup Language (SGML) +-- a markup language primarily focused on structuring documents -- XML +has evolved to be a widely-used mechanism for representing structured +data. + + + + + + + +Ginoza Informational [Page 12] + +RFC 3499 Summary of 3400-3499 December 2003 + + +There are a wide variety of Internet protocols being developed; many +have need for a representation for structured data relevant to their +application. There has been much interest in the use of XML as a +representation method. This document describes basic XML concepts, +analyzes various alternatives in the use of XML, and provides guidelines +for the use of XML within IETF standards-track protocols. This document +specifies an Internet Best Current Practices for the Internet Community, +and requests discussion and suggestions for improvements. + + +3469 Sharma, Ed. Feb 2003 Framework for Multi-Protocol + Label Switching (MPLS)-based + Recovery + +Multi-protocol label switching (MPLS) integrates the label swapping +forwarding paradigm with network layer routing. To deliver reliable +service, MPLS requires a set of procedures to provide protection of the +traffic carried on different paths. This requires that the label +switching routers (LSRs) support fault detection, fault notification, +and fault recovery mechanisms, and that MPLS signaling support the +configuration of recovery. With these objectives in mind, this document +specifies a framework for MPLS based recovery. Restart issues are not +included in this framework. This memo provides information for the +Internet community. + + +3468 Andersson Feb 2003 The Multiprotocol Label + Switching (MPLS) Working Group + decision on MPLS signaling + protocols + +This document documents the consensus reached by the Multiprotocol Label +Switching (MPLS) Working Group within the IETF to focus its efforts on +"Resource Reservation Protocol (RSVP)-TE: Extensions to RSVP for Label- +Switched Paths (LSP) Tunnels" (RFC 3209) as the MPLS signalling protocol +for traffic engineering applications and to undertake no new efforts +relating to "Constraint-Based LSP Setup using Label Distribution +Protocol (LDP)" (RFC 3212). The recommendations of section 6 have been +accepted by the IESG. This memo provides information for the Internet +community. + + + + + + + + + + + +Ginoza Informational [Page 13] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3467 Klensin Feb 2003 Role of the Domain Name System + (DNS) + +This document reviews the original function and purpose of the domain +name system (DNS). It contrasts that history with some of the purposes +for which the DNS has recently been applied and some of the newer +demands being placed upon it or suggested for it. A framework for an +alternative to placing these additional stresses on the DNS is then +outlined. This document and that framework are not a proposed solution, +only a strong suggestion that the time has come to begin thinking more +broadly about the problems we are encountering and possible approaches +to solving them. This memo provides information for the Internet +community. + + +3466 Day Feb 2003 A Model for Content + Internetworking (CDI) + +Content (distribution) internetworking (CDI) is the technology for +interconnecting content networks, sometimes previously called "content +peering" or "CDN peering". A common vocabulary helps the process of +discussing such interconnection and interoperation. This document +introduces content networks and content internetworking, and defines +elements for such a common vocabulary. This memo provides information +for the Internet community. + + +3465 Allman Feb 2003 TCP Congestion Control with + Appropriate Byte Counting + (ABC) + +This document proposes a small modification to the way TCP increases its +congestion window. Rather than the traditional method of increasing the +congestion window by a constant amount for each arriving acknowledgment, +the document suggests basing the increase on the number of previously +unacknowledged bytes each ACK covers. This change improves the +performance of TCP, as well as closes a security hole TCP receivers can +use to induce the sender into increasing the sending rate too rapidly. +This memo defines an Experimental Protocol for the Internet community. + + + + + + + + + + + + +Ginoza Informational [Page 14] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3464 Moore Jan 2003 An Extensible Message Format + for Delivery Status + Notifications + +This memo defines a Multipurpose Internet Mail Extensions (MIME) +content-type that may be used by a message transfer agent (MTA) or +electronic mail gateway to report the result of an attempt to deliver a +message to one or more recipients. This content-type is intended as a +machine-processable replacement for the various types of delivery status +notifications currently used in Internet electronic mail. + +Because many messages are sent between the Internet and other messaging +systems (such as X.400 or the so-called "Local Area Network (LAN)-based" +systems), the Delivery Status Notification (DSN) protocol is designed to +be useful in a multi-protocol messaging environment. To this end, the +protocol described in this memo provides for the carriage of "foreign" +addresses and error codes, in addition to those normally used in +Internet mail. Additional attributes may also be defined to support +"tunneling" of foreign notifications through Internet mail. [STANDARDS +TRACK] + + +3463 Vaudreuil Jan 2003 Enhanced Mail System Status + Codes + +This document defines a set of extended status codes for use within the +mail system for delivery status reports, tracking, and improved +diagnostics. In combination with other information provided in the +Delivery Status Notification (DSN) delivery report, these codes +facilitate media and language independent rendering of message delivery +status. [STANDARDS TRACK] + + +3462 Vaudreuil Jan 2003 The Multipart/Report Content + Type for the Reporting of + Mail System Administrative + Messages + +The Multipart/Report Multipurpose Internet Mail Extensions (MIME) +content-type is a general "family" or "container" type for electronic +mail reports of any kind. Although this memo defines only the use of +the Multipart/Report content-type with respect to delivery status +reports, mail processing programs will benefit if a single content-type +is used to for all kinds of reports. + + + + + + + +Ginoza Informational [Page 15] + +RFC 3499 Summary of 3400-3499 December 2003 + + +This document is part of a four document set describing the delivery +status report service. This collection includes the Simple Mail +Transfer Protocol (SMTP) extensions to request delivery status reports, +a MIME content for the reporting of delivery reports, an enumeration of +extended status codes, and a multipart container for the delivery +report, the original message, and a human-friendly summary of the +failure. [STANDARDS TRACK] + + +3461 Moore Jan 2003 Simple Mail Transfer Protocol + (SMTP) Service Extension + for Delivery Status + Notifications (DSNs) + +This memo defines an extension to the Simple Mail Transfer Protocol +(SMTP) service, which allows an SMTP client to specify (a) that Delivery +Status Notifications (DSNs) should be generated under certain +conditions, (b) whether such notifications should return the contents of +the message, and (c) additional information, to be returned with a DSN, +that allows the sender to identify both the recipient(s) for which the +DSN was issued, and the transaction in which the original message was +sent. [STANDARDS TRACK] + + +3460 Moore Jan 2003 Policy Core Information Model + (PCIM) Extensions + +This document specifies a number of changes to the Policy Core +Information Model (PCIM, RFC 3060). Two types of changes are included. +First, several completely new elements are introduced, for example, +classes for header filtering, that extend PCIM into areas that it did +not previously cover. Second, there are cases where elements of PCIM +(for example, policy rule priorities) are deprecated, and replacement +elements are defined (in this case, priorities tied to associations that +refer to policy rules). Both types of changes are done in such a way +that, to the extent possible, interoperability with implementations of +the original PCIM model is preserved. This document updates RFC 3060. +[STANDARDS TRACK] + + +3459 Burger Jan 2003 Critical Content Multi-purpose + Internet Mail Extensions + (MIME) Parameter + +This document describes the use of a mechanism for identifying body +parts that a sender deems critical in a multi-part Internet mail +message. The mechanism described is a parameter to Content-Disposition, +as described by RFC 3204. + + + +Ginoza Informational [Page 16] + +RFC 3499 Summary of 3400-3499 December 2003 + + +By knowing what parts of a message the sender deems critical, a content +gateway can intelligently handle multi-part messages when providing +gateway services to systems of lesser capability. Critical content can +help a content gateway to decide what parts to forward. It can indicate +how hard a gateway should try to deliver a body part. It can help the +gateway to pick body parts that are safe to silently delete when a +system of lesser capability receives a message. In addition, critical +content can help the gateway chose the notification strategy for the +receiving system. Likewise, if the sender expects the destination to do +some processing on a body part, critical content allows the sender to +mark body parts that the receiver must process. [STANDARDS TRACK] + + +3458 Burger Jan 2003 Message Context for Internet + Mail + +This memo describes a new RFC 2822 message header, "Message-Context". +This header provides information about the context and presentation +characteristics of a message. + +A receiving user agent (UA) may use this information as a hint to +optimally present the message. [STANDARDS TRACK] + + +3457 Kelly Jan 2003 Requirements for IPsec Remote + Access Scenarios + +IPsec offers much promise as a secure remote access mechanism. However, +there are a number of differing remote access scenarios, each having +some shared and some unique requirements. A thorough understanding of +these requirements is necessary in order to effectively evaluate the +suitability of a specific set of mechanisms for any particular remote +access scenario. This document enumerates the requirements for a number +of common remote access scenarios. This memo provides information for +the Internet community. + + + + + + + + + + + + + + + + +Ginoza Informational [Page 17] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3456 Patel Jan 2003 Dynamic Host Configuration + Protocol (DHCPv4) + Configuration of IPsec Tunnel + Mode + +This memo explores the requirements for host configuration in IPsec +tunnel mode, and describes how the Dynamic Host Configuration Protocol +(DHCPv4) may be leveraged for configuration. In many remote access +scenarios, a mechanism for making the remote host appear to be present +on the local corporate network is quite useful. This may be +accomplished by assigning the host a "virtual" address from the +corporate network, and then tunneling traffic via IPsec from the host's +ISP-assigned address to the corporate security gateway. In IPv4, DHCP +provides for such remote host configuration. [STANDARDS TRACK] + + +3455 Garcia-Martin Jan 2003 Private Header (P-Header) + Extensions to the Session + Initiation Protocol (SIP) for + the 3rd-Generation Partnership + Project (3GPP) + +This document describes a set of private Session Initiation Protocol +(SIP) headers (P-headers) used by the 3rd-Generation Partnership Project +(3GPP), along with their applicability, which is limited to particular +environments. The P-headers are for a variety of purposes within the +networks that the partners use, including charging and information about +the networks a call traverses. This memo provides information for the +Internet community. + + +3454 Hoffman Dec 2002 Preparation of + Internationalized Strings + ("stringprep") + +This document describes a framework for preparing Unicode text strings +in order to increase the likelihood that string input and string +comparison work in ways that make sense for typical users throughout the +world. The stringprep protocol is useful for protocol identifier +values, company and personal names, internationalized domain names, and +other text strings. + +This document does not specify how protocols should prepare text +strings. Protocols must create profiles of stringprep in order to fully +specify the processing options. [STANDARDS TRACK] + + + + + + +Ginoza Informational [Page 18] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3453 Luby Dec 2002 The Use of Forward Error + Correction (FEC) in Reliable + Multicast + +This memo describes the use of Forward Error Correction (FEC) codes to +efficiently provide and/or augment reliability for one-to-many reliable +data transport using IP multicast. One of the key properties of FEC +codes in this context is the ability to use the same packets containing +FEC data to simultaneously repair different packet loss patterns at +multiple receivers. Different classes of FEC codes and some of their +basic properties are described and terminology relevant to implementing +FEC in a reliable multicast protocol is introduced. Examples are +provided of possible abstract formats for packets carrying FEC. This +memo provides information for the Internet community. + + +3452 Luby Dec 2002 Forward Error Correction (FEC) + Building Block + +This document generally describes how to use Forward Error Correction +(FEC) codes to efficiently provide and/or augment reliability for data +transport. The primary focus of this document is the application of FEC +codes to one-to-many reliable data transport using IP multicast. This +document describes what information is needed to identify a specific FEC +code, what information needs to be communicated out-of-band to use the +FEC code, and what information is needed in data packets to identify the +encoding symbols they carry. The procedures for specifying FEC codes +and registering them with the Internet Assigned Numbers Authority (IANA) +are also described. This document should be read in conjunction with +and uses the terminology of the companion document titled, "The Use of +Forward Error Correction (FEC) in Reliable Multicast". This memo +defines an Experimental Protocol for the Internet community. + + +3451 Luby Dec 2002 Layered Coding Transport (LCT) + Building Block + +Layered Coding Transport (LCT) provides transport level support for +reliable content delivery and stream delivery protocols. LCT is +specifically designed to support protocols using IP multicast, but also +provides support to protocols that use unicast. LCT is compatible with +congestion control that provides multiple rate delivery to receivers and +is also compatible with coding techniques that provide reliable delivery +of content. This memo defines an Experimental Protocol for the Internet +community. + + + + + + +Ginoza Informational [Page 19] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3450 Luby Dec 2002 Asynchronous Layered Coding + (ALC) Protocol Instantiation + +This document describes the Asynchronous Layered Coding (ALC) protocol, +a massively scalable reliable content delivery protocol. Asynchronous +Layered Coding combines the Layered Coding Transport (LCT) building +block, a multiple rate congestion control building block and the Forward +Error Correction (FEC) building block to provide congestion controlled +reliable asynchronous delivery of content to an unlimited number of +concurrent receivers from a single sender. This memo defines an +Experimental Protocol for the Internet community. + + +3449 Balakrishnan Dec 2002 TCP Performance Implications + of Network Path Asymmetry + +This document describes TCP performance problems that arise because of +asymmetric effects. These problems arise in several access networks, +including bandwidth-asymmetric networks and packet radio subnetworks, +for different underlying reasons. However, the end result on TCP +performance is the same in both cases: performance often degrades +significantly because of imperfection and variability in the ACK +feedback from the receiver to the sender. + +The document details several mitigations to these effects, which have +either been proposed or evaluated in the literature, or are currently +deployed in networks. These solutions use a combination of local link- +layer techniques, subnetwork, and end-to-end mechanisms, consisting of: +(i) techniques to manage the channel used for the upstream bottleneck +link carrying the ACKs, typically using header compression or reducing +the frequency of TCP ACKs, (ii) techniques to handle this reduced ACK +frequency to retain the TCP sender's acknowledgment-triggered self- +clocking and (iii) techniques to schedule the data and ACK packets in +the reverse direction to improve performance in the presence of two-way +traffic. Each technique is described, together with known issues, and +recommendations for use. A summary of the recommendations is provided +at the end of the document. This document specifies an Internet Best +Current Practices for the Internet Community, and requests discussion +and suggestions for improvements. + + + + + + + + + + + + +Ginoza Informational [Page 20] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3448 Handley Jan 2003 TCP Friendly Rate Control + (TFRC): Protocol Specification + +This document specifies TCP-Friendly Rate Control (TFRC). TFRC is a +congestion control mechanism for unicast flows operating in a best- +effort Internet environment. It is reasonably fair when competing for +bandwidth with TCP flows, but has a much lower variation of throughput +over time compared with TCP, making it more suitable for applications +such as telephony or streaming media where a relatively smooth sending +rate is of importance. [STANDARDS TRACK] + + +3447 Jonsson Feb 2003 Public-Key Cryptography + Standards (PKCS) #1: RSA + Cryptography Specifications + Version 2.1 + +This memo represents a republication of PKCS #1 v2.1 from RSA +Laboratories' Public-Key Cryptography Standards (PKCS) series, and +change control is retained within the PKCS process. The body of this +document is taken directly from the PKCS #1 v2.1 document, with certain +corrections made during the publication process. This memo provides +information for the Internet community. + + +3446 Kim Jan 2003 Anycast Rendevous Point (RP) + mechanism using Protocol + Independent Multicast (PIM) + and Multicast Source Discovery + Protocol (MSDP) + + +This document describes a mechanism to allow for an arbitrary number of +Rendevous Points (RPs) per group in a single shared-tree Protocol +Independent Multicast-Sparse Mode (PIM-SM) domain. This memo provides +information for the Internet community. + + + + + + + + + + + + + + + +Ginoza Informational [Page 21] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3445 Massey Dec 2002 Limiting the Scope of the KEY + Resource Record (RR) + +This document limits the Domain Name System (DNS) KEY Resource Record +(RR) to only keys used by the Domain Name System Security Extensions +(DNSSEC). The original KEY RR used sub-typing to store both DNSSEC keys +and arbitrary application keys. Storing both DNSSEC and application +keys with the same record type is a mistake. This document removes +application keys from the KEY record by redefining the Protocol Octet +field in the KEY RR Data. As a result of removing application keys, all +but one of the flags in the KEY record become unnecessary and are +redefined. Three existing application key sub-types are changed to +reserved, but the format of the KEY record is not changed. This +document updates RFC 2535. [STANDARDS TRACK] + + +3444 Pras Jan 2003 On the Difference between + Information Models and Data + Models + +There has been ongoing confusion about the differences between +Information Models and Data Models for defining managed objects in +network management. This document explains the differences between +these terms by analyzing how existing network management model +specifications (from the IETF and other bodies such as the International +Telecommunication Union (ITU) or the Distributed Management Task Force +(DMTF)) fit into the universe of Information Models and Data Models. + +This memo documents the main results of the 8th workshop of the Network +Management Research Group (NMRG) of the Internet Research Task Force +(IRTF) hosted by the University of Texas at Austin. This memo provides +information for the Internet community. + + +3443 Agarwal Jan 2003 Time To Live (TTL) Processing + in Multi-Protocol Label + Switching (MPLS) Networks + +This document describes Time To Live (TTL) processing in hierarchical +Multi-Protocol Label Switching (MPLS) networks and is motivated by the +need to formalize a TTL-transparent mode of operation for an MPLS +label-switched path. It updates RFC 3032, "MPLS Label Stack Encoding". +TTL processing in both Pipe and Uniform Model hierarchical tunnels are +specified with examples for both "push" and "pop" cases. The document +also complements RFC 3270, "MPLS Support of Differentiated Services" and +ties together the terminology introduced in that document with TTL +processing in hierarchical MPLS networks. [STANDARDS TRACK] + + + + +Ginoza Informational [Page 22] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3442 Lemon Dec 2002 The Classless Static Route + Option for Dynamic Host + Configuration Protocol (DHCP) + version 4 + +This document defines a new Dynamic Host Configuration Protocol (DHCP) +option which is passed from the DHCP Server to the DHCP Client to +configure a list of static routes in the client. The network +destinations in these routes are classless - each routing table entry +includes a subnet mask. [STANDARDS TRACK] + + +3441 Kumar Jan 03 Asynchronous Transfer Mode + (ATM) Package for the Media + Gateway Control Protocol + (MGCP) + +This document describes an Asynchronous Transfer Mode (ATM) package for +the Media Gateway Control Protocol (MGCP). This package includes new +Local Connection Options, ATM-specific events and signals, and ATM +connection parameters. Also included is a description of codec and +profile negotiation. It extends the MGCP that is currently being +deployed in a number of products. Implementers should be aware of +developments in the IETF Megaco Working Group and ITU SG16, which are +currently working on a potential successor to this protocol. This memo +provides information for the Internet community. + + +3440 Ly Dec 2002 Definitions of Extension + Managed Objects for Asymmetric + Digital Subscriber Lines + +This memo defines a portion of the Management Information Base (MIB) for +use with network management protocols in the Internet community. In +particular, it describes additional managed objects used for managing +Asymmetric Digital Subscriber Line (ADSL) interfaces not covered by the +ADSL Line MIB (RFC 2662). [STANDARDS TRACK] + + + + + + + + + + + + + + +Ginoza Informational [Page 23] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3439 Bush Dec 2002 Some Internet Architectural + Guidelines and Philosophy + +This document extends RFC 1958 by outlining some of the philosophical +guidelines to which architects and designers of Internet backbone +networks should adhere. We describe the Simplicity Principle, which +states that complexity is the primary mechanism that impedes efficient +scaling, and discuss its implications on the architecture, design and +engineering issues found in large scale Internet backbones. This memo +provides information for the Internet community. + + +3438 Townsley Dec 2002 Layer Two Tunneling Protocol + (L2TP) Internet Assigned + Numbers Authority (IANA) + Considerations Update + +This document describes updates to the Internet Assigned Numbers +Authority (IANA) considerations for the Layer Two Tunneling Protocol +(L2TP). This document specifies an Internet Best Current Practices for +the Internet Community, and requests discussion and suggestions for +improvements. + + +3437 Palter Dec 2002 Layer-Two Tunneling Protocol + Extensions for PPP Link + Control Protocol Negotiation + +This document defines extensions to the Layer Two Tunneling Protocol +(L2TP) for enhanced support of link-specific Point to Point Protocol +(PPP) options. PPP endpoints typically have direct access to the common +physical media connecting them and thus have detailed knowledge about +the media that is in use. When the L2TP is used, the two PPP peers are +no longer directly connected over the same physical media. Instead, +L2TP inserts a virtual connection over some or all of the PPP connection +by tunneling PPP frames over a packet switched network such as IP. +Under some conditions, an L2TP endpoint may need to negotiate PPP Link +Control Protocol (LCP) options at a location which may not have access +to all of the media information necessary for proper participation in +the LCP negotiation. This document provides a mechanism for +communicating desired LCP options between L2TP endpoints in advance of +PPP LCP negotiation at the far end of an L2TP tunnel, as well as a +mechanism for communicating the negotiated LCP options back to where the +native PPP link resides. [STANDARDS TRACK] + + + + + + + +Ginoza Informational [Page 24] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3436 Jungmaier Dec 2002 Transport Layer Security over + Stream Control Transmission + Protocol + +This document describes the usage of the Transport Layer Security (TLS) +protocol, as defined in RFC 2246, over the Stream Control Transmission +Protocol (SCTP), as defined in RFC 2960 and RFC 3309. + +The user of TLS can take advantage of the features provided by SCTP, +namely the support of multiple streams to avoid head of line blocking +and the support of multi-homing to provide network level fault +tolerance. + +Additionally, discussions of extensions of SCTP are also supported, +meaning especially the support of dynamic reconfiguration of IP- +addresses. [STANDARDS TRACK] + + +3435 Andreasen Jan 03 Media Gateway Control Protocol + (MGCP) Version 1.0 + + +This document describes an application programming interface and a +corresponding protocol (MGCP) which is used between elements of a +decomposed multimedia gateway. The decomposed multimedia gateway +consists of a Call Agent, which contains the call control +"intelligence", and a media gateway which contains the media functions, +e.g., conversion from TDM voice to Voice over IP. + +Media gateways contain endpoints on which the Call Agent can create, +modify and delete connections in order to establish and control media +sessions with other multimedia endpoints. Also, the Call Agent can +instruct the endpoints to detect certain events and generate signals. +The endpoints automatically communicate changes in service state to the +Call Agent. Furthermore, the Call Agent can audit endpoints as well as +the connections on endpoints. + +The basic and general MGCP protocol is defined in this document, however +most media gateways will need to implement one or more MGCP packages, +which define extensions to the protocol suitable for use with specific +types of media gateways. Such packages are defined in separate +documents. This memo provides information for the Internet community. + + + + + + + + + +Ginoza Informational [Page 25] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3434 Bierman Dec 2002 Remote Monitoring MIB + Extensions for High Capacity + Alarms + +This memo defines a portion of the Management Information Base (MIB) for +use with network management protocols in the Internet community. In +particular, it describes managed objects for extending the alarm +thresholding capabilities found in the Remote Monitoring (RMON) MIB (RFC +2819), to provide similar threshold monitoring of objects based on the +Counter64 data type. [STANDARDS TRACK] + + +3433 Bierman Dec 2002 Entity Sensor Management + Information Base + +This memo defines a portion of the Management Information Base (MIB) for +use with network management protocols in the Internet community. In +particular, it describes managed objects for extending the Entity MIB +(RFC 2737) to provide generalized access to information related to +physical sensors, which are often found in networking equipment (such as +chassis temperature, fan RPM, power supply voltage). [STANDARDS TRACK] + + +3432 Raisanen Nov 2002 Network performance + measurement with periodic + streams + +This memo describes a periodic sampling method and relevant metrics for +assessing the performance of IP networks. First, the memo motivates +periodic sampling and addresses the question of its value as an +alternative to the Poisson sampling described in RFC 2330. The benefits +include applicability to active and passive measurements, simulation of +constant bit rate (CBR) traffic (typical of multimedia communication, or +nearly CBR, as found with voice activity detection), and several +instances in which analysis can be simplified. The sampling method +avoids predictability by mandating random start times and finite length +tests. Following descriptions of the sampling method and sample metric +parameters, measurement methods and errors are discussed. Finally, we +give additional information on periodic measurements, including security +considerations. [STANDARDS TRACK] + + + + + + + + + + + +Ginoza Informational [Page 26] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3431 Segmuller Dec 2002 Sieve Extension: Relational + Tests + +This document describes the RELATIONAL extension to the Sieve mail +filtering language defined in RFC 3028. This extension extends existing +conditional tests in Sieve to allow relational operators. In addition +to testing their content, it also allows for testing of the number of +entities in header and envelope fields. [STANDARDS TRACK] + + +3430 Schoenwaelder Dec 2002 Simple Network Management + Protocol (SNMP) over + Transmission Control Protocol + (TCP) Transport Mapping + +This memo defines a transport mapping for using the Simple Network +Management Protocol (SNMP) over TCP. The transport mapping can be used +with any version of SNMP. This document extends the transport mappings +defined in STD 62, RFC 3417. This memo defines an Experimental Protocol +for the Internet community. + + +3429 Ohta Nov 2002 Assignment of the 'OAM Alert + Label' forMultiprotocol Label + Switching Architecture (MPLS) + Operation and Maintenance + (OAM) Functions + +This document describes the assignment of one of the reserved label +values defined in RFC 3032 (MPLS label stack encoding) to the 'Operation +and Maintenance (OAM) Alert Label' that is used by user-plane +Multiprotocol Label Switching Architecture (MPLS) OAM functions for +identification of MPLS OAM packets. This memo provides information for +the Internet community. + + +3428 Campbell Dec 2002 Session Initiation Protocol + (SIP) Extension for Instant + Messaging + +Instant Messaging (IM) refers to the transfer of messages between users +in near real-time. These messages are usually, but not required to be, +short. IMs are often used in a conversational mode, that is, the +transfer of messages back and forth is fast enough for participants to +maintain an interactive conversation. + + + + + + +Ginoza Informational [Page 27] + +RFC 3499 Summary of 3400-3499 December 2003 + + +This document proposes the MESSAGE method, an extension to the Session +Initiation Protocol (SIP) that allows the transfer of Instant Messages. +Since the MESSAGE request is an extension to SIP, it inherits all the +request routing and security features of that protocol. MESSAGE +requests carry the content in the form of MIME body parts. MESSAGE +requests do not themselves initiate a SIP dialog; under normal usage +each Instant Message stands alone, much like pager messages. MESSAGE +requests may be sent in the context of a dialog initiated by some other +SIP request. [STANDARDS TRACK] + + +3427 Mankin Dec 2002 Change Process for the Session + Initiation Protocol (SIP) + +This memo documents a process intended to apply architectural discipline +to the future development of the Session Initiation Protocol (SIP). +There have been concerns with regards to new SIP proposals. +Specifically, that the addition of new SIP features can be damaging +towards security and/or greatly increase the complexity of the protocol. +The Transport Area directors, along with the SIP and Session Initiation +Proposal Investigation (SIPPING) working group chairs, have provided +suggestions for SIP modifications and extensions. This document +specifies an Internet Best Current Practices for the Internet Community, +and requests discussion and suggestions for improvements. + + +3426 Floyd Nov 2002 General Architectural and + Policy Considerations + +This document suggests general architectural and policy questions that +the IETF community has to address when working on new standards and +protocols. We note that this document contains questions to be +addressed, as opposed to guidelines or architectural principles to be +followed. This memo provides information for the Internet community. + + +3425 Lawrence Nov 2002 Obsoleting IQUERY + +The IQUERY method of performing inverse DNS lookups, specified in RFC +1035, has not been generally implemented and has usually been +operationally disabled where it has been implemented. Both reflect a +general view in the community that the concept was unwise and that the +widely-used alternate approach of using pointer (PTR) queries and +reverse-mapping records is preferable. Consequently, this document +deprecates the IQUERY operation, declaring it entirely obsolete. This +document updates RFC 1035. [STANDARDS TRACK] + + + + + +Ginoza Informational [Page 28] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3424 Daigle Nov 2002 IAB Considerations for + UNilateral Self-Address Fixing + (UNSAF) Across Network Address + Translation + +As a result of the nature of Network Address Translation (NAT) +Middleboxes, communicating endpoints that are separated by one or more +NATs do not know how to refer to themselves using addresses that are +valid in the addressing realms of their (current and future) peers. +Various proposals have been made for "UNilateral Self-Address Fixing +(UNSAF)" processes. These are processes whereby some originating +endpoint attempts to determine or fix the address (and port) by which it +is known to another endpoint - e.g., to be able to use address data in +the protocol exchange, or to advertise a public address from which it +will receive connections. + +This document outlines the reasons for which these proposals can be +considered at best as short term fixes to specific problems and the +specific issues to be carefully evaluated before creating an UNSAF +proposal. This memo provides information for the Internet community. + + +3423 Zhang Nov 2002 XACCT's Common Reliable + Accounting for Network Element + (CRANE) Protocol Specification + Version 1.0 + +This document defines the Common Reliable Accounting for Network Element +(CRANE) protocol that enables efficient and reliable delivery of any +data, mainly accounting data from Network Elements to any systems, such +as mediation systems and Business Support Systems (BSS)/ Operations +Support Systems (OSS). The protocol is developed to address the +critical needs for exporting high volume of accounting data from NE's +with efficient use of network, storage, and processing resources. + +This document specifies the architecture of the protocol and the message +format, which MUST be supported by all CRANE protocol implementations. +This memo provides information for the Internet community. + + + + + + + + + + + + + +Ginoza Informational [Page 29] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3422 Okamoto Nov 2002 Forwarding Media Access + Control (MAC) Frames over + Multiple Access Protocol over + Synchronous Optical + Network/Synchronous Digital + Hierarchy (MAPOS) + +This memo describes a method for forwarding media access control (MAC) +frames over Multiple Access Protocol over Synchronous Optical +Network/Synchronous Digital Hierarchy (MAPOS), thus providing a way to +unify MAPOS network environment and MAC-based Local Area Network (LAN) +environment. This memo provides information for the Internet community. + + +3421 Zhao Nov 2002 Select and Sort Extensions for + the Service Location Protocol + (SLP) + +This document defines two extensions (Select and Sort) for the Service +Location Protocol (SLP). These extensions allow a User Agent (UA) to +request that the Uniform Resource Locator (URL) entries in a Service +Reply (SrvRply) be limited to the specified number, or be sorted +according to the specified sort key list. Using these two extensions +together can facilitate discovering the best match, such as finding a +service that has the maximum speed or the minimum load. This memo +defines an Experimental Protocol for the Internet community. + + +3420 Sparks Nov 2002 Internet Media Type + message/sipfrag + +This document registers the message/sipfrag Multipurpose Internet Mail +Extensions (MIME) media type. This type is similar to message/sip, but +allows certain subsets of well formed Session Initiation Protocol (SIP) +messages to be represented instead of requiring a complete SIP message. +In addition to end-to-end security uses, message/sipfrag is used with +the REFER method to convey information about the status of a referenced +request. [STANDARDS TRACK] + + + + + + + + + + + + + +Ginoza Informational [Page 30] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3419 Daniele Dec 2002 Textual Conventions for + Transport Addresses + +This document introduces a Management Information Base (MIB) module that +defines textual conventions to represent commonly used transport-layer +addressing information. The definitions are compatible with the concept +of TAddress/TDomain pairs introduced by the Structure of Management +Information version 2 (SMIv2) and support the Internet transport +protocols over IPv4 and IPv6. [STANDARDS TRACK] + + +3418 Presuhn Dec 2002 Management Information Base + (MIB) for the Simple Network + Management Protocol (SNMP) + + +This document defines managed objects which describe the behavior of a +Simple Network Management Protocol (SNMP) entity. This document +obsoletes RFC 1907, Management Information Base for Version 2 of the +Simple Network Management Protocol (SNMPv2). [STANDARDS TRACK] + + +3417 Presuhn Dec 2002 Transport Mappings for + the Simple Network Management + Protocol (SNMP) + +This document defines the transport of Simple Network Management +Protocol (SNMP) messages over various protocols. This document +obsoletes RFC 1906. [STANDARDS TRACK] + + +3416 Presuhn Dec 2002 Version 2 of the Protocol + Operations for the Simple + Network Management Protocol + (SNMP) + +This document defines version 2 of the protocol operations for the +Simple Network Management Protocol (SNMP). It defines the syntax and +elements of procedure for sending, receiving, and processing SNMP PDUs. +This document obsoletes RFC 1905. [STANDARDS TRACK] + + + + + + + + + + + +Ginoza Informational [Page 31] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3415 Wijnen Dec 2002 View-based Access Control + Model (VACM) for the + Simple Network Management + Protocol (SNMP) + +This document describes the View-based Access Control Model (VACM) for +use in the Simple Network Management Protocol (SNMP) architecture. It +defines the Elements of Procedure for controlling access to management +information. This document also includes a Management Information Base +(MIB) for remotely managing the configuration parameters for the View- +based Access Control Model. This document obsoletes RFC 2575. +[STANDARDS TRACK] + + +3414 Blumenthal Dec 2002 User-based Security Model + (USM) for version 3 of the + Simple Network Management + Protocol (SNMPv3) + +This document describes the User-based Security Model (USM) for Simple +Network Management Protocol (SNMP) version 3 for use in the SNMP +architecture. It defines the Elements of Procedure for providing SNMP +message level security. This document also includes a Management +Information Base (MIB) for remotely monitoring/managing the +configuration parameters for this Security Model. This document +obsoletes RFC 2574. [STANDARDS TRACK] + + +3413 Levi Dec 2002 Simple Network Management + Protocol (SNMP) Applications + +This document describes five types of Simple Network Management Protocol +(SNMP) applications which make use of an SNMP engine as described in STD +62, RFC 3411. The types of application described are Command +Generators, Command Responders, Notification Originators, Notification +Receivers, and Proxy Forwarders. + +This document also defines Management Information Base (MIB) modules for +specifying targets of management operations, for notification filtering, +and for proxy forwarding. This document obsoletes RFC 2573. [STANDARDS +TRACK] + + + + + + + + + + +Ginoza Informational [Page 32] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3412 Case Dec 2002 Message Processing and + Dispatching for the Simple + Network Management Protocol + (SNMP) + +This document describes the Message Processing and Dispatching for +Simple Network Management Protocol (SNMP) messages within the SNMP +architecture. It defines the procedures for dispatching potentially +multiple versions of SNMP messages to the proper SNMP Message Processing +Models, and for dispatching PDUs to SNMP applications. This document +also describes one Message Processing Model - the SNMPv3 Message +Processing Model. This document obsoletes RFC 2572. [STANDARDS TRACK] + + +3411 Harrington Dec 2002 An Architecture for Describing + Simple Network Management + Protocol (SNMP) Management + Frameworks + +This document describes an architecture for describing Simple Network +Management Protocol (SNMP) Management Frameworks. The architecture is +designed to be modular to allow the evolution of the SNMP protocol +standards over time. The major portions of the architecture are an SNMP +engine containing a Message Processing Subsystem, a Security Subsystem +and an Access Control Subsystem, and possibly multiple SNMP applications +which provide specific functional processing of management data. This +document obsoletes RFC 2571. [STANDARDS TRACK] + + +3410 Case Dec 2002 Introduction and Applicability + Statements for Internet + Standard Management Framework + +The purpose of this document is to provide an overview of the third +version of the Internet-Standard Management Framework, termed the SNMP +version 3 Framework (SNMPv3). This Framework is derived from and builds +upon both the original Internet-Standard Management Framework (SNMPv1) +and the second Internet-Standard Management Framework (SNMPv2). + +The architecture is designed to be modular to allow the evolution of the +Framework over time. + +The document explains why using SNMPv3 instead of SNMPv1 or SNMPv2 is +strongly recommended. The document also recommends that RFCs 1157, +1441, 1901, 1909 and 1910 be retired by moving them to Historic status. +This document obsoletes RFC 2570. This memo provides information for +the Internet community. + + + + +Ginoza Informational [Page 33] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3409 Svanbro Dec 2002 Lower Layer Guidelines for + Robust RTP/UDP/IP Header + Compression + +This document describes lower layer guidelines for robust header +compression (ROHC) and the requirements ROHC puts on lower layers. The +purpose of this document is to support the incorporation of robust +header compression algorithms, as specified in the ROHC working group, +into different systems such as those specified by Third Generation +Partnership Project (3GPP), 3GPP Project 2 (3GPP2), European Technical +Standards Institute (ETSI), etc. This document covers only lower layer +guidelines for compression of RTP/UDP/IP and UDP/IP headers as specified +in [RFC3095]. Both general guidelines and guidelines specific for +cellular systems are discussed in this document. This memo provides +information for the Internet community. + + +3408 Liu Dec 2002 Zero-byte Support for + Bidirectional Reliable Mode + (R-mode) in Extended + Link-Layer Assisted RObust + Header Compression (ROHC) + Profile + +This document defines an additional mode of the link-layer assisted +RObust Header Compression (ROHC) profile, also known as the zero-byte +profile, beyond the two defined in RFC 3242. Zero-byte header +compression exists in order to prevent the single-octet ROHC header from +pushing a packet voice stream into the next higher fixed packet size for +the radio. It is usable in certain widely deployed older air +interfaces. This document adds the zero-byte operation for ROHC +Bidirectional Reliable mode (R-mode) to the ones specified for +Unidirectional (U-mode) and Bidirectional Optimistic (O-mode) modes of +header compression in RFC 3242. [STANDARDS TRACK] + + +3407 Andreasen Oct 2002 Session Description Protocol + (SDP) Simple Capability + Declaration + +This document defines a set of Session Description Protocol (SDP) +attributes that enables SDP to provide a minimal and backwards +compatible capability declaration mechanism. Such capability +declarations can be used as input to a subsequent session negotiation, +which is done by means outside the scope of this document. This +provides a simple and limited solution to the general capability +negotiation problem being addressed by the next generation of SDP, also +known as SDPng. [STANDARDS TRACK] + + + +Ginoza Informational [Page 34] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3406 Daigle Oct 2002 Uniform Resource Names (URN) + Namespace Definition + Mechanisms + +This document lays out general definitions of and mechanisms for +establishing Uniform Resource Names (URN) "namespaces". The URN WG has +defined a syntax for URNs in RFC 2141, as well as some proposed +mechanisms for their resolution and use in Internet applications in RFC +3401 and RFC 3405. The whole rests on the concept of individual +"namespaces" within the URN structure. Apart from proof-of-concept +namespaces, the use of existing identifiers in URNs has been discussed +in RFC 2288. This document specifies an Internet Best Current Practices +for the Internet Community, and requests discussion and suggestions for +improvements. + + +3405 Mealling Oct 2002 Dynamic Delegation Discovery + System (DDDS) Part Five: + URI.ARPA Assignment Procedures + +This document is fifth in a series that is completely specified in +"Dynamic Delegation Discovery System (DDDS) Part One: The Comprehensive +DDDS" (RFC 3401). It is very important to note that it is impossible to +read and understand any document in this series without reading the +others. This document specifies an Internet Best Current Practices for +the Internet Community, and requests discussion and suggestions for +improvements. + + +3404 Mealling Oct 2002 Dynamic Delegation Discovery + System (DDDS) Part Four: The + Uniform Resource Identifiers + (URI) Resolution Application + +This document describes a specification for taking Uniform Resource +Identifiers (URI) and locating an authoritative server for information +about that URI. The method used to locate that authoritative server is +the Dynamic Delegation Discovery System. + +This document is part of a series that is specified in "Dynamic +Delegation Discovery System (DDDS) Part One: The Comprehensive DDDS" +(RFC 3401). It is very important to note that it is impossible to read +and understand any document in this series without reading the others. +[STANDARDS TRACK] + + + + + + + +Ginoza Informational [Page 35] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3403 Mealling Oct 2002 Dynamic Delegation Discovery + System (DDDS) Part Three: The + Domain Name System (DNS) + Database + +This document describes a Dynamic Delegation Discovery System (DDDS) +Database using the Domain Name System (DNS) as a distributed database of +Rules. The Keys are domain-names and the Rules are encoded using the +Naming Authority Pointer (NAPTR) Resource Record (RR). + +Since this document obsoletes RFC 2915, it is the official specification +for the NAPTR DNS Resource Record. It is also part of a series that is +completely specified in "Dynamic Delegation Discovery System (DDDS) Part +One: The Comprehensive DDDS" (RFC 3401). It is very important to note +that it is impossible to read and understand any document in this series +without reading the others. [STANDARDS TRACK] + + +3402 Mealling Oct 2002 Dynamic Delegation Discovery + System (DDDS) Part Two: The + Algorithm + +This document describes the Dynamic Delegation Discovery System (DDDS) +algorithm for applying dynamically retrieved string transformation rules +to an application-unique string. Well-formed transformation rules will +reflect the delegation of management of information associated with the +string. This document is also part of a series that is completely +specified in "Dynamic Delegation Discovery System (DDDS) Part One: The +Comprehensive DDDS" (RFC 3401). It is very important to note that it is +impossible to read and understand any document in this series without +reading the others. [STANDARDS TRACK] + + +3401 Mealling Oct 2002 Dynamic Delegation Discovery + System (DDDS) Part One: The + Comprehensive DDDS + +This document specifies the exact documents that make up the complete +Dynamic Delegation Discovery System (DDDS). DDDS is an abstract +algorithm for applying dynamically retrieved string transformation rules +to an application-unique string. This document along with RFC 3402, RFC +3403 and RFC 3404 obsolete RFC 2168 and RFC 2915, as well as updates RFC +2276. This memo provides information for the Internet community. + + + + + + + + +Ginoza Informational [Page 36] + +RFC 3499 Summary of 3400-3499 December 2003 + + +3400 Never Issued + +RFC 3400 was never issued. + + +Security Considerations + + Security issues are not discussed in this memo. + +Author's Address + + Sandy Ginoza + University of Southern California + Information Sciences Institute + 4676 Admiralty Way + Marina del Rey, CA 90292 + + Phone: (310) 822-1511 + EMail: ginoza@isi.edu + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Ginoza Informational [Page 37] + +RFC 3499 Summary of 3400-3499 December 2003 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2003). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Ginoza Informational [Page 38] + |