diff options
Diffstat (limited to 'doc/rfc/rfc4222.txt')
-rw-r--r-- | doc/rfc/rfc4222.txt | 843 |
1 files changed, 843 insertions, 0 deletions
diff --git a/doc/rfc/rfc4222.txt b/doc/rfc/rfc4222.txt new file mode 100644 index 0000000..78662ff --- /dev/null +++ b/doc/rfc/rfc4222.txt @@ -0,0 +1,843 @@ + + + + + + +Network Working Group G. Choudhury, Ed. +Request for Comments: 4222 AT&T +BCP: 112 October 2005 +Category: Best Current Practice + + + Prioritized Treatment of Specific OSPF Version 2 + Packets and Congestion Avoidance + +Status of This Memo + + This document specifies an Internet Best Current Practices for the + Internet Community, and requests discussion and suggestions for + improvements. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + This document recommends methods that are intended to improve the + scalability and stability of large networks using Open Shortest Path + First (OSPF) Version 2 protocol. The methods include processing OSPF + Hellos and Link State Advertisement (LSA) Acknowledgments at a higher + priority compared to other OSPF packets, and other congestion + avoidance procedures. + +Table of Contents + + 1. Introduction...................................................2 + 2. Recommendations................................................3 + 3. Security Considerations........................................6 + 4. Acknowledgments................................................6 + 5. Normative References...........................................6 + 6. Informative References.........................................7 + Appendix A. LSA Storm: Causes and Impact..........................8 + Appendix B. List of Variables and Values.........................10 + Appendix C. Other Recommendations and Suggestions................11 + + + + + + + + + + + + +Choudhury, Ed. Best Current Practice [Page 1] + +RFC 4222 Prioritized Treatment October 2005 + + +1. Introduction + + In this document, OSPF refers to OSPFv2 [Ref1]. The scalability and + stability improvement techniques described here may also apply to + OSPFv3 [Ref2], but that will require further study and operational + experience. + + A large network running OSPF protocol may occasionally experience the + simultaneous or near-simultaneous update of a large number of link + state advertisements, or LSAs. This is particularly true if OSPF + traffic engineering extension [Ref3] is used that may significantly + increase the number of LSAs in the network. We call this event an + LSA storm and it may be initiated by an unscheduled failure or a + scheduled maintenance event. The failure may be hardware, software, + or procedural in nature. + + The LSA storm causes high CPU and memory utilization at the router + causing incoming packets to be delayed or dropped. Delayed + acknowledgments (beyond the retransmission timer value) result in + retransmissions, and delayed Hello packets (beyond the router-dead + interval) result in neighbor adjacencies being declared down. The + retransmissions and additional LSA originations result in further CPU + and memory usage, essentially causing a positive feedback loop, + which, in the extreme case, may drive the network to an unstable + state. + + The default value of the retransmission timer is 5 seconds and that + of the router-dead interval is 40 seconds. However, recently there + has been a lot of interest in significantly reducing OSPF convergence + time. As part of that plan, much shorter (sub-second) Hello and + router-dead intervals have been proposed [Ref4]. In such a scenario, + it will be more likely for Hello packets to be delayed beyond the + router-dead interval during network congestion caused by an LSA + storm. + + In order to improve the scalability and stability of networks, we + recommend steps for prioritizing critical OSPF packets and avoiding + congestion. The details of the recommendations are given in Section + 2. A simulation study is reported in [Ref13] that quantifies the + congestion phenomenon and its impact. It also studies several of the + recommendations and shows that they indeed improve the scalability + and stability of networks using OSPF protocol. [Ref13] is available + on request by contacting the editor or one of the authors. + + + + + + + + +Choudhury, Ed. Best Current Practice [Page 2] + +RFC 4222 Prioritized Treatment October 2005 + + + Appendix A explains in more detail LSA storm scenarios, their impact, + and points out a few real-life examples of control-message storms. + Appendix B provides a list of variables used in the recommendations + and their example values. Appendix C provides some further + recommendations and suggestions with similar goals. + +2. Recommendations + + The recommendations below are intended to improve the scalability and + stability of large networks using OSPF protocol. During periods of + network congestion, they would reduce retransmissions, avoid an + adjacency to be declared down due to Hello packets being delayed + beyond the RouterDeadInterval, and take other congestion avoidance + steps. The recommendations are unordered except that Recommendation + 2 is to be implemented only if Recommendation 1 is not implemented. + + (1) Classify all OSPF packets in two classes: a "high priority" class + comprising OSPF Hello packets and Link State Acknowledgement + packets, and a "low priority" class comprising all other packets. + The classification is accomplished by examining the OSPF packet + header. While receiving a packet from a neighbor and while + transmitting a packet to a neighbor, try to process a "high + priority" packet ahead of a "low priority" packet. + + The prioritized processing while transmitting may cause OSPF + packets from a neighbor to be received out of sequence. If + Cryptographic Authentication (AuType = 2) is used (as specified + in [Ref1]), then successive received valid OSPF packets from a + neighbor need to have a non-decreasing "Cryptographic sequence + number". To comply with this requirement, we recommend that in + case Cryptographic Authentication (AuType = 2) is used [Ref1], + prioritized processing not be done at the transmitter. This will + avoid packets arriving at the receiver out of sequence. However, + after security processing at the receiver (including sequence + number checking) is complete, the OSPF packets may be kept in a + "high priority" queue or a "low priority" queue based on their + class and processed accordingly. The benefit of prioritized + processing is clearly higher in the absence of Cryptographic + Authentication since in that case prioritization can be + implemented both at the transmitter and at the receiver. + However, even with Cryptographic Authentication it will be + beneficial to have prioritization only at the receiver (following + security processing). + + (2) If Recommendation 1 cannot be implemented, then reset the + inactivity timer for an adjacency whenever any OSPF unicast + packet or any OSPF packet sent to AllSPFRouters over a point-to- + point link is received over that adjacency instead of resetting + + + +Choudhury, Ed. Best Current Practice [Page 3] + +RFC 4222 Prioritized Treatment October 2005 + + + the inactivity timer only on receipt of the Hello packet. So + OSPF would declare the adjacency to be down only if no OSPF + unicast packets or no OSPF packets sent to AllSPFRouters over a + point-to-point link are received over that adjacency for a period + equaling or exceeding the RouterDeadInterval. The reason for not + recommending this proposal in conjunction with Recommendation 1 + is to avoid potential undesirable side effects. One such effect + is the delay in discovering the down status of an adjacency in a + case where no high priority Hello packets are being received but + the inactivity timer is being reset by other stale packets in the + low priority queue. + + (3) Use an exponential backoff algorithm for determining the value of + the LSA retransmission interval (RxmtInterval). Let R(i) + represent the RxmtInterval value used during the i-th + retransmission of an LSA. Use the following algorithm to compute + R(i). + + R(1) = Rmin + R(i+1) = Min(KR(i),Rmax) for i>=1 + + where K, Rmin, and Rmax are constants and the function Min(.,.) + represents the minimum value of its two arguments. Example + values for K, Rmin, and Rmax may be 2, 5, and 40 seconds, + respectively. Note that the example value for Rmin, the initial + retransmission interval, is the same as the sample value of + RxmtInterval in [Ref1]. + + This recommendation is motivated by the observation that during a + network congestion event caused by control messages, a major + source for sustaining the congestion is the repeated + retransmission of LSAs. The use of an exponential backoff + algorithm for the LSA retransmission interval reduces the rate of + LSA retransmissions while the network experiences congestion + (during which it is more likely that multiple retransmissions of + the same LSA would happen). This in turn helps the network get + out of the congested state. + + (4) Implicit Congestion Detection and Action Based on That: If there + is control message congestion at a router, its neighbors do not + know about that explicitly. However, they can implicitly detect + it based on the number of unacknowledged LSAs to this router. If + this number exceeds a certain "high-water mark", then the rate at + which LSAs are sent to this router should be reduced + progressively using an exponential backoff mechanism but not + below a certain minimum rate. At a future time, if the number of + unacknowledged LSAs to this router falls below a certain "low- + water mark", then the rate of sending LSAs to this router should + + + +Choudhury, Ed. Best Current Practice [Page 4] + +RFC 4222 Prioritized Treatment October 2005 + + + be increased progressively, again using an exponential backoff + mechanism but not above a certain maximum rate. The whole + algorithm is given below. Note that this algorithm is to be + applied independently to each neighbor and only for unicast LSAs + sent to a neighbor or LSAs sent to AllSPFRouters over a point- + to-point link. + + Let, + U(t) = Number of unacknowledged LSAs to neighbor at time t. + H = A high-water mark (in units of number of unacknowledged + LSAs). + L = A low-water mark (in units of number of unacknowledged LSAs). + G(t) = Gap between sending successive LSAs to neighbor at time t. + F = The factor by which the above gap is to be increased during + congestion and decreased after coming out of congestion. + T = Minimum time that has to elapse before the existing gap + is considered for change. + Gmin = Minimum allowed value of gap. + Gmax = Maximum allowed value of gap. + + The equation below shows how the gap is to be changed after a + time T has elapsed since the last change: + _ + | + | Min(FG(t),Gmax) if U(t+T) > H + G(t+T) = | G(t) if H >= U(t+T) >= L + | Max(G(t)/F,Gmin) if U(t+T) < L + |_ + + Min(.,.) and Max(.,.) represent the minimum and maximum values of + the two arguments, respectively. + + Example values for the various parameters of the algorithm are as + follows: H = 20, L = 10, F = 2, T = 1 second, Gmin = 20 ms, Gmax + = 1 second. + + Recommendations 3 and 4 both slow down LSAs to congested + neighbors based on implicitly detecting the congestion, but they + have important differences. Recommendation 3 progressively slows + down successive retransmissions of the same LSA, whereas + Recommendation 4 progressively slows down all LSAs (new or + retransmission) to a congested neighbor. + + (5) Throttling Adjacencies to Be Brought Up Simultaneously: If a + router tries to bring up a large number of adjacencies to its + neighbors simultaneously, then that may cause severe congestion + due to database synchronization and LSA flooding activities. It + is recommended that during such a situation no more than "n" + + + +Choudhury, Ed. Best Current Practice [Page 5] + +RFC 4222 Prioritized Treatment October 2005 + + + adjacencies should be brought up simultaneously. Once a subset + of adjacencies has been brought up successfully, newer + adjacencies may be brought up as long as the number of + simultaneous adjacencies being brought up does not exceed "n". + The appropriate value of "n" would depend on the router + processing power, total bandwidth available for control plane + traffic, and propagation delay. The value of "n" should be + configurable. + + In the presence of throttling, an important issue is the order in + which adjacencies are to be formed. We recommend a First Come + First Served (FCFS) policy based on the order in which the + request for adjacency formation arrives. Requests may either be + from neighbors or self-generated. Among the self-generated + requests, a priority list may be used to decide the order in + which the requests are to be made. However, once an adjacency + formation process starts it is not to be preempted except for + unusual circumstances such as errors or time-outs. + + In some of the recommendations above, we refer to point-to-point + links. Those references should also include cases where a broadcast + network is to be treated as a point-to-point connection from the + standpoint of IP routing [Ref5] + +3. Security Considerations + + This memo does not create any new security issues for the OSPF + protocol. + +4. Acknowledgments + + We would like to acknowledge the support and helpful comments from + OSPF WG chairs Rohit Dube, Acee Lindem, and John Moy; Routing Area + directors Alex Zinin and Bill Fenner; and IESG reviewers. We + acknowledge Vivek Dube, Mitchell Erblich, Mike Fox, Tony Przygienda, + and Krishna Rao for comments on previous versions of the document. + We also acknowledge Margaret Chiosi, Elie Francis, Jeff Han, Beth + Munson, Roshan Rao, Moshe Segal, Mike Wardlow, and Pat Wirth for + collaboration and encouragement in our scalability improvement + efforts for Link State Protocol-based networks. + +5. Normative References + + [Ref1] Moy, J., "OSPF Version 2", STD 54, RFC 2328, April 1998. + + [Ref2] Coltun, R., Ferguson, D., and J. Moy, "OSPF for IPv6", RFC + 2740, December 1999. + + + + +Choudhury, Ed. Best Current Practice [Page 6] + +RFC 4222 Prioritized Treatment October 2005 + + +6. Informative References + + [Ref3] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering + (TE) Extensions to OSPF Version 2", RFC 3630, September 2003. + + [Ref4] C. Alaettinoglu, V. Jacobson and H. Yu, "Towards Millisecond + IGP Convergence", Work in Progress. + + [Ref5] N. Shen, A. Lindem, J. Yuan, A. Zinin, R. White and S. + Previdi, "Point-to-point operation over LAN in link-state + routing protocols", Work in Progress. + + [Ref6] Pappalardo, D., "AT&T, customers grapple with ATM net + outage", Network World, February 26, 2001. + + [Ref7] "AT&T announces cause of frame-relay network outage," AT&T + Press Release, April 22, 1998. + + [Ref8] Cholewka, K., "MCI Outage Has Domino Effect", Inter@ctive + Week, August 20, 1999. + + [Ref9] Jander, M., "In Qwest Outage, ATM Takes Some Heat", Light + Reading, April 6, 2001. + + [Ref10] A. Zinin and M. Shand, "Flooding Optimizations in Link-State + Routing Protocols", Work in Progress. + + [Ref11] Pillay-Esnault, P., "OSPF Refresh and Flooding Reduction in + Stable Topologies", RFC 4136, July 2005. + + [Ref12] G. Ash, G. Choudhury, V. Sapozhnikova, M. Sherif, A. Maunder, + V. Manral, "Congestion Avoidance & Control for OSPF + Networks", Work in Progress. + + [Ref13] G. Choudhury, G. Ash, V. Manral, A. Maunder and V. + Sapozhnikova, "Prioritized Treatment of Specific OSPF Packets + and Congestion Avoidance: Algorithms and Simulations", AT&T + Technical Report, August 2003. + + [Ref14] Nichols, K., Blake, S., Baker, F., and D. Black, "Definition + of the Differentiated Services Field (DS Field) in the IPv4 + and IPv6 Headers", RFC 2474, December 1998. + + + + + + + + + +Choudhury, Ed. Best Current Practice [Page 7] + +RFC 4222 Prioritized Treatment October 2005 + + +Appendix A. LSA Storm: Causes and Impact + + An LSA storm may be initiated due to many reasons. Here are some + examples: + + (a) one or more link failures due to fiber cuts, + + (b) one or more router failures for some reason, e.g., software crash + or some type of disaster (including power outage) in an office + complex hosting many routers, + + (c) link/router flapping, + + (d) requirement of taking down and later bringing back many routers + during a software/hardware upgrade, + + (e) near synchronization of the periodic 1800-second LSA refreshes of + a subset of LSAs, + + (f) refresh of all LSAs in the system during a change in software + version, + + (g) injecting a large number of external routes to OSPF due to a + procedural error, + + (h) Router ID changes causing a large number of LSA re-originations + (possibly LSA purges as well depending on the implementation). + + In addition to the LSAs originated as a direct result of link/router + failures, there may be other indirect LSAs as well. One example in + MPLS networks is traffic engineering LSAs [Ref3] originated at other + links as a result of significant changes in reserved bandwidth. + These result from rerouting of Label Switched Paths (LSPs) that went + down during the link/router failure. The LSA storm causes high CPU + and memory utilization at the router processor causing incoming + packets to be delayed or dropped. Delayed acknowledgments (beyond + the retransmission timer value) results in retransmissions, and + delayed Hello packets (beyond the Router-Dead interval) results in + links being declared down. A trunk-down event causes router LSA + origination by its end-point routers. If traffic engineering LSAs + are used for each link, then that type of LSA would also be + originated by the end-point routers and potentially elsewhere as well + due to significant changes in reserved bandwidths at other links + caused by the failure and reroute of LSPs originally using the failed + trunk. Eventually, when the link recovers that would also trigger + additional router LSAs and traffic engineering LSAs. + + + + + +Choudhury, Ed. Best Current Practice [Page 8] + +RFC 4222 Prioritized Treatment October 2005 + + + The retransmissions and additional LSA originations result in further + CPU and memory usage, essentially causing a positive feedback loop. + We define the LSA storm size as the number of LSAs in the original + storm, not counting any additional LSAs resulting from the feedback + loop described above. If the LSA storm is too large, then the + positive feedback loop mentioned above may be large enough to + indefinitely sustain a large CPU and memory utilization at many + routers in the network, thereby driving the network to an unstable + state. In the past, network outage events have been reported in IP + and ATM networks using link-state protocols such as OSPF, + Intermediate System to Intermediate System (IS-IS), Private Network- + Network Interface (PNNI), or some proprietary variants. See for + example [Ref6-Ref9]. In many of these examples, large-scale flooding + of LSAs or other similar control messages (either naturally or + triggered by some bug or inappropriate procedure) have been partly or + fully responsible for network instability and outage. + + In [Ref13], a simulation model is used to show that there is a + certain LSA storm size threshold above which the network may show + unstable behavior caused by a large number of retransmissions, link + failures due to missed Hello packets, and subsequent link recoveries. + It is also shown that the LSA storm size causing instability may be + substantially increased by providing prioritized treatment to Hello + and LSA Acknowledgment packets and by using an exponential backoff + algorithm for determining the LSA retransmission interval. If it is + not possible to prioritize Hello packets, then resetting the + inactivity timer on receiving any valid OSPF packets can also provide + the same benefit. Furthermore, if we prioritize Hello packets, then + even when the network operates somewhat above the stability + threshold, links are not declared down due to missed Hellos. This + implies that even though there is control plane congestion due to + many retransmissions, the data plane stays up and no new LSAs are + originated (besides the ones in the original storm and the + refreshes). These observations support the first three + recommendations in Section 2. The authors of this document have also + done simulations to verify that the other recommendations in Section + 2 help avoid congestion and allow a graceful exit from a congested + state. + + One might argue that the scalability issue of large networks should + be solved solely by dividing the network hierarchically into multiple + areas so that flooding of LSAs remains localized within areas. + However, this approach increases the network management and design + complexity and may result in less optimal routing between areas. + Also, Autonomous System External (ASE) LSAs are flooded throughout + the AS, and it may be a problem if there are large numbers of them. + Furthermore, a large number of summary LSAs may need to be flooded + across areas, and their numbers would increase significantly if + + + +Choudhury, Ed. Best Current Practice [Page 9] + +RFC 4222 Prioritized Treatment October 2005 + + + multiple Area Border Routers are employed for the purpose of + reliability. Thus, it is important to allow the network to grow + towards as large a size as possible under a single area. + + The recommendations in the document are synergistic with a broader + set of scalability and stability improvement proposals. [Ref10] + proposes flooding overhead reduction in case more than one interface + goes to the same neighbor. [Ref11] proposes a mechanism for greatly + reducing LSA refreshes in stable topologies. + + [Ref12] proposes a wide range of congestion control and failure + recovery mechanisms (some of those ideas are covered in this + document, but [Ref12] has other ideas not covered here). + +Appendix B. List of Variables and Values + + F = The factor by which the gap between sending successive LSAs to + a neighbor is to be increased during congestion and decreased + after coming out of congestion (used in Recommendation 4). + Example value is 2. + + G(t) = Gap between sending successive LSAs to a neighbor at time t + (used in Recommendation 4). + + Gmax = Maximum allowed value of gap between sending successive LSAs + to a neighbor (used in Recommendation 4). Example value is 1 + second. + + Gmin = Minimum allowed value of gap between sending successive LSAs + to a neighbor (used in Recommendation 4). Example value is 20 + ms. + + H = A high-water mark (in units of number of unacknowledged LSAs). + Exceeding this mark would trigger a potential increase in the + gap between sending successive LSAs to a neighbor. (used in + Recommendation 4). Example value is 20. + + K = A multiplicative constant used in increasing the RxmtInterval + value used during successive retransmissions of the same LSA + (used in Recommendation 3). Example value is 2. + + L = A low-water mark (in units of number of unacknowledged LSAs) + Dropping below this mark would trigger a potential decrease in + the gap between sending successive LSAs to a neighbor. (used + in Recommendation 4). Example value is 10. + + n = Upper limit on the number of adjacencies to be brought up + simultaneously (used in Recommendation 5). + + + +Choudhury, Ed. Best Current Practice [Page 10] + +RFC 4222 Prioritized Treatment October 2005 + + + R(i) = RxmtInterval value used during the i-th retransmission of an + LSA (used in Recommendation 3). + + Rmax = The maximum allowed value of RxmtInterval (used in + Recommendation 3). Example value is 40 seconds. + + Rmin = The minimum allowed value of RxmtInterval (used in + Recommendation 3). Example value is 5 seconds. + + T = Minimum time that has to elapse before the existing gap + between sending successive LSAs to a neighbor is considered + for change (used in Recommendation 4). Example value is 1 + second. + + U(t) = Number of unacknowledged LSAs to a neighbor at time t (used in + Recommendation 4). + +Appendix C. Other Recommendations and Suggestions + + (1) Explicit Marking: In Section 2, we recommended that OSPF packets + be classified to "high" and "low" priority classes based on + examining the OSPF packet header. In some cases (particularly in + the receiver), this examination may be computationally costly. + An alternative would be the use of different TOS/Precedence field + settings for the two priority classes. [Ref1] recommends setting + the TOS field to 0 and the Precedence field to 6 for all OSPF + packets. We recommend this same setting for the "low" priority + OSPF packets and a different setting for the "high" priority OSPF + packets in order to be able to classify them separately without + having to examine the OSPF packet header. Two examples are given + below: + + Example 1: For "low" priority packets, set TOS field to 0 and + Precedence field to 6, and for "high" priority packets + set TOS field to 4 and Precedence field to 6. + + Example 2: For "low" priority packets, set TOS field to 0 and + Precedence field to 6, and for "high" priority packets + set TOS field to 0 and Precedence field to 7. + + Note that the TOS/Precedence bits have been redefined by Diffserv + (RFC 2474, [Ref14]). Also note that the different TOS/Precedence + field settings suggested above only need to be agreed among the + systems on the link. This recommendation is not needed to be + followed if it is easy to examine the OSPF packet header and + thereby separately classify "high" and "low" priority packets. + + + + + +Choudhury, Ed. Best Current Practice [Page 11] + +RFC 4222 Prioritized Treatment October 2005 + + + (2) Further Prioritization of OSPF Packets: Besides the packets + designated as "high" priority in Recommendation 1 of Section 2, + there may be a need for further priority separation among the + "low" priority OSPF packets. We recommend the use of three + priority classes: "high", "medium" and "low". While receiving a + packet from a neighbor and while transmitting a packet to a + neighbor, try to process a "high priority" packet ahead of + "medium" and "low" priority packets and a "medium" priority + packet ahead of "low priority" packets. The "high" priority + packets are as designated in Recommendation 1 of Section 2. We + provide below two candidate examples for "medium" priority + packets. All OSPF packets not designated as "high" or "medium" + priority are "low" priority. If Cryptographic Authentication + (AuType = 2) is used (as specified in [Ref1]), then prioritized + treatment is to be provided only at the receiver and after + security processing, but not at the transmitter since that may + cause packets to arrive out of sequence and violate the + requirements of "Autype = 2". + + One example of "medium" priority packet is the Database + Description (DBD) packet from a slave (during the database + synchronization process) that is used as an acknowledgment. + + A second example is an LSA carrying intra-area topology change + information (this may trigger SPF calculation and rerouting of + Label Switched Paths, so fast processing of this packet may + improve OSPF/Label Distribution Protocol (LDP) convergence + times). However, if the processing cost of identifying and + separately queueing the LSA in this example is deemed to be high, + then the implementer may decide not to do it. + + (3) Processing a Large Number of LSA Purges: Occasionally, some + events in the network, such as router ID changes, may result in a + large number of LSA re-originations and LSA purges. In such a + scenario, one may consider processing LSAs in different order, + e.g., processing LSA purges ahead of LSA originations. We, + however, do not recommend out-of-order LSA processing for several + reasons. First, detecting the LSA type ahead of queueing may be + computationally expensive. Out-of-order processing may also + cause subtle bugs. We do not want to recommend a major change in + the LSA processing paradigm for a relatively rare event such as + router ID change. However, a router with a changing ID may flush + the old LSAs gradually without causing a storm. + + + + + + + + +Choudhury, Ed. Best Current Practice [Page 12] + +RFC 4222 Prioritized Treatment October 2005 + + +Contributing Authors and Their Addresses + + In addition to the editor, several people contributed to this + document. The names and contact information of all authors are given + below. + + Anurag S. Maunder + Erlang Technology + 2880 Scott Boulevard + Santa Clara, CA 95052 + USA + + Phone: (408) 420-7617 + EMail: anuragm@erlangtech.com + + + Gerald R. Ash + AT&T + Room D5-2A01 + 200 Laurel Avenue + Middletown, NJ, 07748 + USA + + Phone: (732) 420-4578 + EMail: gash@att.com + + + Vishwas Manral + Sinett Corp, + 2/1 Embassy Icon Annex, + Infantry Road, + Bangalore 560 001 + India + + Phone: +91-(805)-137-7023 + EMail: vishwas@sinett.com + + + Vera D. Sapozhnikova + AT&T + Room C5-2C29 + 200 Laurel Avenue + Middletown, NJ, 07748 + USA + + Phone: (732) 420-2653 + EMail: sapozhnikova@att.com + + + + +Choudhury, Ed. Best Current Practice [Page 13] + +RFC 4222 Prioritized Treatment October 2005 + + +Editor's Address + + Gagan L. Choudhury + AT&T + Room D5-3C21 + 200 Laurel Avenue + Middletown, NJ, 07748 + USA + + Phone: (732) 420-3721 + EMail: gchoudhury@att.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Choudhury, Ed. Best Current Practice [Page 14] + +RFC 4222 Prioritized Treatment October 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Choudhury, Ed. Best Current Practice [Page 15] + |