TOC 
Diameter Maintanence andV. Fajardo, Ed.
Extensions (DIME)Toshiba America Research Inc.
Internet-DraftT. Asveren
Intended status: InformationalSonus Network
Expires: April 28, 2008H. Tschofenig
 Nokia Siemens Networks
 G. McGregor
 Alcatel-Lucent
 J. Loughney
 Nokia Research Center
 October 26, 2007


Diameter Applications Design Guidelines
draft-ietf-dime-app-design-guide-04.txt

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on April 28, 2008.

Abstract

The Diameter Base protocol provides updated rules on how to extend Diameter by modifying and/or deriving from existing applications or creating entirely new applications. This is a companion document to the Diameter Base protocol which further explains and/or clarify these rules. It is meant as a guidelines document and therefore it does not add, remove or change existing rules.



Table of Contents

1.  Introduction
2.  Terminology
3.  Brief Overview of the Diameter Application Model
4.  Rules on Extending Diameter
    4.1.  Reusing Existing Applications
        4.1.1.  Adding a new command
        4.1.2.  Deleting a command
    4.2.  Reusing Existing Commands
        4.2.1.  Adding AVPs to a command
        4.2.2.  Deleting AVPs from a command
    4.3.  Reusing Existing AVPs
5.  Rules for new Applications
    5.1.  Rules in Allocating new Command Codes
    5.2.  Justifying the Allocation of Application-Id
    5.3.  Use of Application-Id in a Message
    5.4.  Application Specific Session Statemachine
    5.5.  End-to-End Applications Capabilities Exchange
6.  Other Design Considerations
    6.1.  Diameter Accounting Support
    6.2.  Generic Diameter Extensions
    6.3.  Updating an existing Application
    6.4.  System Architecture and Deployment
7.  IANA Considerations
8.  Security Considerations
9.  Acknowledgments
10.  References
    10.1.  Normative References
    10.2.  Informative References
§  Authors' Addresses
§  Intellectual Property and Copyright Statements




 TOC 

1.  Introduction

The Diameter Base protocol document defines rules on how one would extend Diameter (see Section 1.2 of [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.)). In the context of this document, extending Diameter means one of the following:

  1. A new functionality is being added to an existing Diameter application without defining a new application.

  2. A new Diameter application is being defined by reusing an existing application.

  3. A completely new application is being defined that has no dependencies to any existing applications.

  4. A new generic functionality is being defined that can be reused across different applications.

All of these choices are design decisions that can done by any combination of reusing existing or defining new commands, AVPs or AVP values. The objective of this document is the following:

These guidelines are necessary since the existing rules do not cover the ambiguity that exist when some of the design choices overlap. A typical example would be deciding between item one(1) and two(2) above when an application designer requires a new application functionality which has many things in common with an existing application. Certain ambiguous aspects of such cases was not foreseen in the existing extensibility rules; i.e., use of optional AVPs to differentiate new functionality in the old application versus defining a new application and importing the existing set of commands. In this example, it was only based on collective experiences of application designers that the decision to create a new application (item two(2)) is now seen as the cleanest approach.

Along with the gained experience however, additional bad practices have developed as well. Continuing the example above, the decision to create a new application would result in the allocation of a new application ID which often times is foreseen as cumbersome by application designers because of the lengthy process. Designers therefore tend to circumvent the better approach leading to many compromises in the design that eventually lead to interoperability issues (See Section 5.1 (Rules in Allocating new Command Codes)).

The basic issue is that the rules defined in the Diameter Base protocol are not comprehensive enough that one can easily derive good design decisions from them. The effect of this can be seen in various attempts to extend Diameter applications where designers have no clear answer on whether to even define a new application or not. At worst, some existing Diameter applications that had purposely been derived from another existing application resulted in some in-appropriate design decision where both the existing application and the derived applications are no longer interoperable under certain conditions. Note that it is not always possible to offer a complete and concise answer to certain design choices but at the least, this document can be used as a guide to Diameter extensibility.



 TOC 

2.  Terminology

This document reuses the terminology used in [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.).



 TOC 

3.  Brief Overview of the Diameter Application Model

As it is currently interpreted and practiced, the Diameter Base protocol is a two-layer protocol. The lower layer is mainly responsible for managing connections between neighboring peers and for message routing. The upper layer is where the Diameter applications reside. This model is inline with a Diameter node having an application layer and a peer-to-peer delivery layer. The Diameter Base protocol document completely defines the architecture and behavior of the message delivery layer and then provides the framework for designing Diameter applications on the application layer. This framework includes definitions of application sessions and accounting support (see Section 8 and 9 of [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.)). The remainder of this document also treats a Diameter node as a single instance of a Diameter message delivery layer and one or more Diameter applications using it.



 TOC 

4.  Rules on Extending Diameter

Extending Diameter can mean the reuse of commands, AVPs and AVP values in any combination for the purpose of inheriting the features of an existing Diameter applications. This section discusses the rules on how such reuse can be done.

When reusing existing applications, the requirements of the new applications are typically not completely unique and there are existing application's that can be reused to solve some or all of the application requirements. Therefore, there is a greater likelihood of ambiguity on how much of the existing application can be reused, to what extent and what the implications for both the new and existing application. To broadly categorize, the rules for reusing existing applications can be either:

  1. Minimal - which typically means adding optional AVPs to existing commands.

  2. Invasive - where addition or deletion of commands and/or AVPs, and/or AVP values.

Because it can fundamentally change the application, the latter approach has strict repercussions. Specifically, it would result in the definition of a new application and therefore allocation of a new application ID is required. Discussion about the specific Diameter Base protocol rules associated with this approach are covered subsequent sections.

The former approach, although simple, has pitfalls. The problems arise when there is a tendency by applications designers to keep adding optional AVPs to existing command so they can circumvent the rules associated with the latter approach. Specifically, some designers want to circumvent the standardization process associated with these rules and not necessarily the rules themselves. The pitfalls associated with this approach is described further in Section 4.2.1 (Adding AVPs to a command). Additionally, if designers choose this approach, all of the functionality of the existing application will be inherited even if the new usage has no intent of using some of the existing features.



 TOC 

4.1.  Reusing Existing Applications

This section discusses the reuse of existing applications by adding and/or deleting commands from the application. This scenario is categorize as "Invasive" in Section 4 (Rules on Extending Diameter) and would always result in the creation of new applications when the rules are applied.



 TOC 

4.1.1.  Adding a new command

The rules are strict in this case. Adding a command to an application is not allowed and doing so will force a definition of a new application. However, if this is the intent, then the new application can be created by defining a new command for an existing application or importing an existing command from another application so as to inherit some or all of the functionality of that application. In the former case, the decision is straight forward since this is typically a result of adding new functionality that does not yet exist. See Section 5.1 (Rules in Allocating new Command Codes) for rules on how to allocate new command codes for new applications. The latter case would result in a new application but it has a more subtle issue such as deciding whether importing of commands and functionality is really better than simply using the existing application as it is in conjunction with any new application.

A typical example would be the Diameter MIPv6 split scenario (see [2] (Korhonen, J., Tschofenig, H., Bournelle, J., Giaretta, G., and M. Nakhjiri, “Diameter Mobile IPv6: Support for Home Agent to Diameter Server Interaction,” April 2009.)) in which several application models would have been possible during the design phase; one model would reuse existing Diameter EAP application combined with a new Diameter MIPv6 application to form a complete authentication and authorization scheme and another would be to reuse Diameter EAP like commands within the new Diameter MIPv6 application to accomplish the same result. In this case, the latter model was chosen which would permit the reuse of commands and/or AVPs from one application to another. Other applications such as Diameter QoS (see [3] (Sun, D., McCann, P., Tschofenig, H., ZOU), T., Doria, A., and G. Zorn, “Diameter Quality of Service Application,” March 2010.)) would likely face similar decisions.

In general, it is difficult to come to a hard and fast guideline so a case by case study of each application requirement should be applied. Before adding or importing a command, application designers should consider the following:



Note that accounting commands normally require special treatment and would not necessarily fall into this category. See Section 6.1 (Diameter Accounting Support).



 TOC 

4.1.2.  Deleting a command

Although this is not typical, deleting an command from an existing application is fundamentally changing the application. In general, the implications of this approach is the same as Section 4.1.1 (Adding a new command) regardless of whether new commands will also be added to the resulting application. In general, it is unusual to delete an existing command from an existing for the sake of deleting it or the functionality it represents. This design decision would normally be an indication of a flawed designed. An exception might be if the intent of the deletion is to create a newer version of the same application which is somehow simpler than the previous version. In that case, the considerations in Section 6.3 (Updating an existing Application) should apply instead.



 TOC 

4.2.  Reusing Existing Commands

This section deals with a little more granularity than Section 4.1 (Reusing Existing Applications). Specifically, it discusses rules in adding and/or deleting AVPs from an existing command of an existing application. Unlike Section 4.1 (Reusing Existing Applications), the cases in this section may not necessarily result in the creation of new application(s). In some cases, there are a lot of ambiguity. So design considerations have been outline to ease the decision making process.



 TOC 

4.2.1.  Adding AVPs to a command

Based on the rules in [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.), AVPs that are added to an existing command can be categorized into:

The rules are strict in the case where the AVPs to be added is mandatory. A mandatory cannot be added to or deleted from an existing command. [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.) states that doing so would require the definition of a new application. This falls into the "Invasive" category described in Section 4 (Rules on Extending Diameter). Despite the clarity of the rule, ambiguity still arises when trying to decide whether a new AVP being added should be mandatory to begin with. There are several questions that application designers should contemplate when trying to decide:

If one or more of the above conditions are true, the AVP is consider mandatory. These questions are not comprehensive in any way but in all cases the semantics of the application must change to justify the use of mandatory AVPs.

The rules are less restrictive when adding Non-mandatory, optional AVPs. This falls into the "Minimal" category described in Section 4 (Rules on Extending Diameter). However, care should also be taken when opting for optional AVPs instead of mandatory AVPs simply to avoid the process of creating a new applications. Optional AVPs that answers any of the questions above also have consequences. Some of the issues associated with using optional AVPs are:

All of these practices generally result in interoperability problems so they should be avoided as much as possible.



 TOC 

4.2.2.  Deleting AVPs from a command

Although this scenario is not as common, the deletion of AVPs from a command ABNF is significant when trying to extend an existing application. Deletion can again be categorized between mandatory and non-mandatory optional AVPs described in Section 4.2.1 (Adding AVPs to a command).

In the unlikely event that an application designer would require that mandatory AVPs must be deleted then it constitutes a fundamental change to an existing application. Though not specified in [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.), deletion of mandatory would require the definition of a new application since it dictates changes in the behavior and semantics of an application.

Instead of deleting commands, a better alternative would be to define a new command that would represent the new behavior. Reusing the same command code for different use cases can lead to more confusion since the command will have different semantics depending on usage. This is especially true to base protocol commands (session related commands, ASR/ASA, STR/STA, RAR/RAA defined in [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.)) where they are being used by many different applications.

The deletion of an optional AVP may not necessarily indicate allocation of a new application. Deletion of non-mandatory optional AVPs with a zero(0) minimum occurrence in the commands ABNF would not require a new application. In the case where an optional AVP has a minimum occurrence of at least one(1) in the commands ABNF, then deletion of the AVP would effectively change the behavior of the application. It would be similar to the deletion of mandatory AVPs. Such cases are highly dubious to begin with since those AVPs already exhibits properties of mandatory AVPs. Extra consideration should be given as to why it was not defined as mandatory in the first place and that decision may have to be corrected as well.

In other cases, it is recommended that application designers reuse the command ABNF without modification and simply ignore (but not delete) any optional AVP that will not be used. This is to maintain compatibility with existing applications that will not know about the new functionality as well as maintain the integrity of existing dictionaries.



 TOC 

4.3.  Reusing Existing AVPs

This section deals with even more granularity than Section 4.1 (Reusing Existing Applications) and Section 4.2 (Reusing Existing Commands). Specifically, it discusses rules in adding, deleting or modifying the specified values of an AVP. The rules state that modifying the value of an AVP is allowed only if it does not change the semantics of the AVP and the application using it. Otherwise, the change can be consider "Invasive" as described in Section 4 (Rules on Extending Diameter) and require definition of a new application. Note that designers should consider Section 5.2 (Justifying the Allocation of Application-Id) when contemplating on these types of changes.

Typically, the data types of the AVPs in question are scalar in nature and each ordinal value represent a specific semantic behavior of the application. An example is CC-Request-Type AVP of [4] (Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J. Loughney, “Diameter Credit-Control Application,” August 2005.). Adding, deleting or modifying known values of this AVP can modify the behavior of the application itself. Additionally, the mandatory and optional AVPs rules are inherited from Section 4.2 (Reusing Existing Commands). So this affects the decision for defining new applications as well.



 TOC 

5.  Rules for new Applications

The general theme of Diameter extensibility is to reuse commands, AVPs and AVP values as much as possible. However, some of the extensibility rules described in the previous section also apply to scenarios where a designer is trying to define a completely new Diameter application.

This section discusses the case where new applications have requirements that cannot be filled by existing applications and would require definition of completely new commands, AVPs and/or AVP values. Typically, there is little ambiguity about the decision to create these types of applications. Some examples are the interfaces defined for the IP Multimedia Subsystem of 3GPP, i.e.; Cx/Dx ([5] (3GPP, “IMS Cx and Dx interfaces : signalling flows and message contents,” .) and [6] (3GPP, “IMS Cx and Dx interfaces based on the Diameter protocol; Protocol details,” .)), Sh ([7] (3GPP, “IMS Sh interface : signalling flows and message content,” .) and [8] (3GPP, “IMS Sh interface based on the Diameter protocol; Protocol details,” .)) etc.

Application design should also follow the theme of Diameter extensibility which in this case may mean importing of existing AVPs and AVP values for any newly defined commands. In certain cases where accounting will be used, the models described in Section 6.1 (Diameter Accounting Support) should also be considered. Though some decisions may be clear, designers should also consider certain aspects of defining a new application. Some of these are described in following sections.



 TOC 

5.1.  Rules in Allocating new Command Codes

[Editor's note: The expert review process for command code allocation is being introduced to hasten the allocation process itself. Hopefully this will lessen the tendency to circumvent this process. The core rules for this process will be introduced in rfc3588bis and full description will be added in this section in the next rev of this document]



 TOC 

5.2.  Justifying the Allocation of Application-Id

Application designers should avoid justifying the allocation of an application ID for each new functionality or any change that is made to an existing application. Proliferation of application ID can lead to confusion and an in-efficient use of the application ID namespaces. Application designers should always use Section 4 (Rules on Extending Diameter) as a basis for justifying allocation of a new application ID.



 TOC 

5.3.  Use of Application-Id in a Message

When designing new applications, designers should specify that the application ID carried in all session level messages must be the application ID of the application using those messages. This includes the session level messages defined in base protocol, i.e., RAR/RAA, STR/STA, ASR/ASA and possibly ACR/ACA in the coupled accounting model, see Section 6.1 (Diameter Accounting Support). Existing specifications may not adhere to this rule for historical or other reasons. However, this scheme is followed to avoid possible routing problems for these messages.

In general, when a new application has been allocated with a new application id and it also reuses existing commands with or without modifications (Sec 4.1), it must use the newly allocated application id in the header and in all relevant application id AVPs (Auth-Application-Id or Acct-Application-Id) present in the commands message body.

Additionally, application designs using Vendor-Specific-Application-Id AVP should note use the Vendor-Id AVP to further dissect or differentiate the vendor-specification application id. It should also not be used as an additional input for routing or delivery of messages.



 TOC 

5.4.  Application Specific Session Statemachine

Section 8 of [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.) provides session statemachines for authentication, authorization and accounting (AAA) services. When a new application is being defined that cannot clearly be categorized into any of these services it is recommended that the application itself defines its own session statemachine. The existing session statemachines defined by [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.) is not intended for general use beyond AAA services therefore any behavior not covered by that category would not fit well. Support for server initiated request is a clear example where an application specific session statemachine would be needed; i.e. Rw interface for ITU-T push model.



 TOC 

5.5.  End-to-End Applications Capabilities Exchange

It is also possible that applications can use a type of optional capabilities exchange AVPs as a way to convey support for specific application features. These AVPs are exchanged on an end-to-end basis and known only by the application supporting them. The use of such AVPs must obviously be limited to convey functionality of the applications itself. Examples of this can be found in [2] (Korhonen, J., Tschofenig, H., Bournelle, J., Giaretta, G., and M. Nakhjiri, “Diameter Mobile IPv6: Support for Home Agent to Diameter Server Interaction,” April 2009.) and [3] (Sun, D., McCann, P., Tschofenig, H., ZOU), T., Doria, A., and G. Zorn, “Diameter Quality of Service Application,” March 2010.).

This method can be used to resolve some of the problems described in Section 6.3 (Updating an existing Application) and Section 6.2 (Generic Diameter Extensions). It is also useful in providing some restrictions and/or guidelines on the how the other functionality related AVPs can be include in a command to avoid issues described in Section 4.2.1 (Adding AVPs to a command). Such end-to-end capabilities AVPs can aid in the following cases:

Note that this list is not meant to be comprehensive.



 TOC 

6.  Other Design Considerations

The following are some of the design considerations that apply to a Diameter application.



 TOC 

6.1.  Diameter Accounting Support

Accounting can be treated as an auxiliary application which is used in support of other applications. In most cases, accounting support is required when defining new applications. However, the lack of clarity in the base protocol document has prevented easy use the base accounting messages (ACR/ACA). This document provides two(2) possible models for using accounting:

Split Accounting Model

In this model, the accounting messages will use the Diameter base accounting application ID (value of 3). The design implication for this is that the accounting is treated as an independent application, especially during routing. This means that accounting commands emanating from an application may be routed separately from the rest of the other application messages. This also implies that the messages generally end up in a central accounting server. A split accounting model is a good design choice when:

  • The application itself will not define its own unique accounting commands.

  • The overall system architecture permits the use of centralized accounting for one or more Diameter applications.


From a Diameter architecture perspective, this model should be the typical design choice. Note that when using this model, the accounting server must use the Acct-Application-Id AVP to determine which application is being accounted for. Therefore, the application designer should specify the proper values used in Acct-Application-Id AVP when sending ACR messages.

Coupled Accounting Model

In this model, the accounting messages will use the application ID of the application using the accounting service. The design implication for this is that the accounting messages is tightly coupled with the application itself; meaning that accounting messages will be routed like any other application messages. It would then be the responsibility of the application server (application entity receiving the ACR message) to send the accounting records carried by the accounting messages to the proper accounting server. The application server is also responsible for formulating a proper response (ACA). A coupled accounting model is a good design choice when:

  • The system architecture or deployment will not provide an accounting server that supports Diameter.

  • The system architecture or deployment requires that the accounting service for the specific application should be handled by the application itself.

  • The application server is provisioned to use a different protocol to access the accounting server; i.e., via LDAP, XML etc. This includes attempting to support older accounting systems that are not Diameter aware.

In all cases above, there will generally be no direct Diameter access to the accounting server.

These models provide a basis for using accounting messages. Application designers may obviously deviate from these models provided that the factors being addressed here have also been taken into account. Though it is not recommended, examples of other methods would be defining a new set of commands to carry application specific accounting records.

Additionally, the application ID in the message header and Accounting-Application-Id AVP are populated depending on the accounting model used for a specific application, as described in [1] (Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” April 2010.). Therefore, application designers have to specify the accounting model used to guarantee proper routing of accounting requests.



 TOC 

6.2.  Generic Diameter Extensions

Generic Diameter extensions are AVPs, commands or applications that are designed to support other Diameter applications. They are auxiliary applications meant to improve or enhance the Diameter protocol itself or Diameter applications/functionality. Some examples include the extensions to support auditing and redundancy (see [10] (Calhoun, P., “Diameter Resource Management Extensions,” March 2001.)), improvements in duplicate detection scheme (see [11] (Asveren, T., “Diameter Duplicate Detection Cons.,” August 2006.)), and piggybacking of QoS attributes (see [9] (Korhonen, J., Tschofenig, H., Arumaithurai, M., Jones, M., and A. Lior, “Traffic Classification and Quality of Service Attributes for Diameter,” December 2009.)).

Since generic extensions can cover many aspects of Diameter and Diameter applications, it is not possible to enumerate all the probable scenarios in this document. However, some of the most common considerations are as follows:

In practice, it is often the case that the generic extensions use optional AVPs because its simple and not intrusive to the application that would carry it. Peers that do not support the generic extensions need not understand nor recognize these optional AVPs. However, it is recommended that the authors of the extension specify the context or usage of the optional AVPs. As an example, in the case that the AVP can be used only by a specific set of applications then the specification must enumerate these applications and the scenarios when the optional AVPs will be used. In the case where the optional AVPs can be carried by any application, it is should be sufficient to specify such a use case and perhaps provide specific examples of applications using them.

In most cases, these optional AVPs piggybacked by applications would be defined as a Grouped AVP and it would encapsulate all the functionality of the generic extension. In practice, it is not uncommon that the Grouped AVP will encapsulate an existing AVP that has previously been defined as mandatory ('M'-bit set); i.e. 3GPP IMS Cx / Dx interfaces ([5] (3GPP, “IMS Cx and Dx interfaces : signalling flows and message contents,” .) and [6] (3GPP, “IMS Cx and Dx interfaces based on the Diameter protocol; Protocol details,” .)). In previous revisions of the Diameter base protocol, the Grouped AVP itself would also have to be mandatory ('M'-bit set) which defeats the purpose of a non intrusive optional AVP. This restriction has been lifted in the latest revision of the Diameter base protocol. This gives more flexibility to authors of generic extensions with regards to the use of optional Grouped AVPs.



 TOC 

6.3.  Updating an existing Application

An application that is being upgraded must follow the same rules mentioned Section 4 (Rules on Extending Diameter). Even if the new version is fundamentally the same application, allocation of a new application ID is possible if it meets those criteria.

Optional AVPs can also be used to indicate version differences. If this approach is chosen, it is recommended that the optional AVP is used specifically to indicate version information only and nothing else. Additionally, the use of too many optional AVPs to carry application enhancements should be avoided since such approach has a tendency to become unmanageable and introduce interoperability issues. These pitfalls are discussed in Section 4.2.1 (Adding AVPs to a command)

For the same reason, care should be taken in attempting to justify allocation of new application ID for every change. The pitfalls of this approach is discussed in Section 5.3 (Use of Application-Id in a Message).

Acceptable techniques can be used to provide feature upgrades to existing applications. One of these is described in Section 5.5 (End-to-End Applications Capabilities Exchange).



 TOC 

6.4.  System Architecture and Deployment

The following are some of the architecture considerations that applications designers should contemplate when defining new applications:



 TOC 

7.  IANA Considerations

This document does not require actions by IANA.



 TOC 

8.  Security Considerations

This document does provides guidelines and considerations for extending Diameter and Diameter applications. It does not define nor address security related protocols or schemes.



 TOC 

9.  Acknowledgments

We greatly appreciate the insight provided by Diameter implementers who have highlighted the issues and concerns being addressed by this document.



 TOC 

10.  References



 TOC 

10.1. Normative References

[1] Fajardo, V., Arkko, J., Loughney, J., and G. Zorn, “Diameter Base Protocol,” draft-ietf-dime-rfc3588bis-20 (work in progress), April 2010 (TXT).
[2] Korhonen, J., Tschofenig, H., Bournelle, J., Giaretta, G., and M. Nakhjiri, “Diameter Mobile IPv6: Support for Home Agent to Diameter Server Interaction,” draft-ietf-dime-mip6-split-17 (work in progress), April 2009 (TXT).
[3] Sun, D., McCann, P., Tschofenig, H., ZOU), T., Doria, A., and G. Zorn, “Diameter Quality of Service Application,” draft-ietf-dime-diameter-qos-15 (work in progress), March 2010 (TXT).
[4] Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J. Loughney, “Diameter Credit-Control Application,” RFC 4006, August 2005 (TXT).
[5] 3GPP, “IMS Cx and Dx interfaces : signalling flows and message contents,” 3GPP TS 29.228 Version 7.0.0 2006.
[6] 3GPP, “IMS Cx and Dx interfaces based on the Diameter protocol; Protocol details,” 3GPP TS 29.229 Version 7.0.0 2006.
[7] 3GPP, “IMS Sh interface : signalling flows and message content,” 3GPP TS 29.328 Version 6.8.0 2005.
[8] 3GPP, “IMS Sh interface based on the Diameter protocol; Protocol details,” 3GPP TS 29.329 Version 6.6.0 2005.
[9] Korhonen, J., Tschofenig, H., Arumaithurai, M., Jones, M., and A. Lior, “Traffic Classification and Quality of Service Attributes for Diameter,” draft-ietf-dime-qos-attributes-15 (work in progress), December 2009 (TXT).


 TOC 

10.2. Informative References

[10] Calhoun, P., “Diameter Resource Management Extensions,” draft-calhoun-diameter-res-mgmt-08.txt (work in progress), March 2001 (TXT).
[11] Asveren, T., “Diameter Duplicate Detection Cons.,” draft-asveren-dime-dupcons-00 (work in progress), August 2006 (TXT).


 TOC 

Authors' Addresses

  Victor Fajardo (editor)
  Toshiba America Research Inc.
  One Telcordia Drive
  Piscataway, NJ 08854
  USA
Email:  vfajardo@tari.toshiba.com
  
  Tolga Asveren
  Sonus Network
  4400 Route 9 South
  Freehold, NJ, 07728
  USA
Email:  tasveren@sonusnet.com
  
  Hannes Tschofenig
  Nokia Siemens Networks
  Otto-Hahn-Ring 6
  Munich, Bavaria 81739
  Germany
Phone:  +49 89 636 40390
Email:  Hannes.Tschofenig@nsn.com
URI:  http://www.tschofenig.com
  
  Glenn McGregor
  Alcatel-Lucent
  USA
Email:  glenn@aaa.lucent.com
  
  John Loughney
  Nokia Research Center
  USA
Email:  john.loughney@nokia.com


 TOC 

Full Copyright Statement

Intellectual Property