Internet DRAFT - draft-tommasi-nsis-semipro

draft-tommasi-nsis-semipro






Next Steps in Signaling                                       F. Tommasi
Internet-Draft                                              S. Molendini
Expires: February 2007                                         A. Tricco
                                                              E. Scialpi
                                                     University of Lecce
                                                             August 2006

                  Semi-Proactive QoS Re-establishment
                  <draft-tommasi-nsis-semipro-01.txt>


Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire in February, 2007.

Copyright Notice

   Copyright (C) The Internet Society (2006).


















F.Tommasi, et al.            Expires February 2007                [Page 1]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006


Abstract

   Re-establishment of the QoS after a Mobile Node handover must be done 
   as quickly as possible in order to reduce degradation or interruption 
   of the QoS and it is especially useful when realtime applications are 
   used. 
   We propose a Semi-Proactive procedure for a fast QoS re-establishment 
   in environments where there are Mobile Nodes. The basic idea of this 
   procedure is to perform as many operation as possible before the 
   handover (in a proactive way). Resources are reserved only after 
   the handover on the effective new data path, in order to avoid their
   waste.
   Moreover, we propose to buffer at the Candidate CRossover Node - 
   CCRN (an intermediate node on end-to-end data path) the packets 
   directed to the Mobile Node during the handover. In this way the 
   total QoS re-establishment time is reduced. This buffering also 
   guarantees, for the buffered packets, the same QoS treatment of the 
   other packets (the no-buffered ones).


Table of Contents

   1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . .   2
   2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . .   4
   3 Semi-Proactive Procedure from the NSLP point of view. . . . . . .   4
     3.1 Introduction to the procedure . . . . . . . . . . . . . . . .   4
     3.2 Triggering section. . . . . . . . . . . . . . . . . . . . . .   8
     3.3 Proactive section . . . . . . . . . . . . . . . . . . . . . .   8
        3.3.1 Classification of the end-points . . . . . . . . . . . .   8
        3.3.2 Receiver-initiated reservation . . . . . . . . . . . . .   9
        3.3.3 Sender-initiated reservation . . . . . . . . . . . . . .   9
        3.3.4 Proactive selection of the CAR . . . . . . . . . . . . .   9
     3.4 Reactive section. . . . . . . . . . . . . . . . . . . . . . .   9
   4 Semi-Proactive Procedure by the GIST point of view. . . . . . . .  10
     4.1 CCRN e CRN. . . . . . . . . . . . . . . . . . . . . . . . . .  11
     4.2 CCRN Discovery. . . . . . . . . . . . . . . . . . . . . . . .  11
   5 The new buffering . . . . . . . . . . . . . . . . . . . . . . . .  12
   6 Security Considerations . . . . . . . . . . . . . . . . . . . . .  12
   7 References. . . . . . . . . . . . . . . . . . . . . . . . . . . .  12



1 Introduction

   Mobile IP [1][2] is a protocol that allows a Mobile Node(MN) to 
   communicate to other Internet nodes after changing its link-layer 
   point of attachment without loosing its IP address.
   Thus, the Mobile IP provides the node to maintain a higher-layer 
   connection while moving.
   NSIS Working Group[3] uses a two layer architecture for a signaling 
   protocol:
     - NTLP (GIST) [4] carries signaling messages between neighboring 
       peers; 
     - QoS-NSLP [5] manages resource reservation.



F.Tommasi, et al.            Expires February 2007                [Page 2]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



   In order to allow the signal packets to have a secure path, GIST 
   provides the modality "connection" creating the GIST state so that
   there is an association between the adjacent GIST nodes. This 
   association is known as Messaging Association.

   According to the regular specification of the NSIS protocols the re-
   establishment of the QoS occurs after the handover, the so called
   reactive way. This means that both NTLP and QoS-NSLP act after the 
   handover in order to re-establish the proper QoS on the New path.

   Resource reservation on the New path must be done as quickly as 
   possible in order to reduce the degradation of QoS for the MN which is
   especially important when real-time applications are used.
   A basic idea for reducing such delay could be to re-establish QoS 
   before the handover on all the possible future paths, that is to act in 
   a proactive way. 
   Of course this means that there will be a waste of resources since 
   they are assigned on all Candidate paths and we have no guarantee that 
   the handover will occur.

   We therefore, propose to take the pros of both mechanism by
   creating the Messaging Associations in a proactive way and by assigning
   resources in the reactive way. We may say that we are acting in a
   Semi-Proactive way.
   Adopting this solution we anticipate the creation of the GIST state 
   before the handover. The resource reservation is as usual performed 
   after the handover but the total time will be minimal.
   Moreover, resources are assigned only to the effective path to  
   avoid their waste.

   In our solution the re-establishment is faster also because we 
   introduce the possibility of buffering the packets directed to MN, in
   an intermediate node of the end-to-end path. This node is known as the
   Candidate CRossover Node (CCRN).    


   This type of solution is a case of: 
     -  Predictive routing (section 3.3 of [4]) defined as a predictive
        installation of the state on the path that will be used after a 
        MN handover; 
     -  Path-decoupled signaling as defined in [3].

   Consequently, implementing this solution does not need to introduce new 
   messages in the QoS-NSLP and NTLP protocols but only a new Message 
   Routing Method (MRM) will be added. This describes the algorithm for
   discovering both the CCRN and the route which signaling messages should 
   take (see section 4). 
   The procedures described in the following paragraphs are applicable 
   in networks served by Mobile IPv4 with Route Optimization [6] or 
   by Mobile IPv6 (in which the Route Optimization is already integrated).




F.Tommasi, et al.            Expires February 2007                [Page 3]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006


2 Terminology 

   NSIS-aware: a node is NSIS-aware when it supports NTLP and QoS-NSLP;

   Mobile Node (MN): a host that can change its point of connection to 
   the network;

   Correspondent Node (CN): the network node with which the MN is
   communicating at that time;

   Access Router (AR): the access node to the network for an MN;

   Previous AR (PAR): the AR for the MN before the handover;

   Candidate AR (CAR): possible AR for a handover of the MN;

   New AR (NAR): the AR for the MN after the handover;

   New path: the path between CN and NAR;

   Old path: the path between CN and PAR;

   Candidate path: the path between CN and CAR;

   Crossover node (CRN): one of the NSIS-aware nodes of the 
   intersection between the Old and New path;

   Candidate CRN (CCRN): one of the NSIS-aware nodes of the 
   intersection between the Old and Candidate path;


3 Semi-Proactive Procedure from the NSLP point of view

   In following paragraphs we will present a detailed description of 
   the main phases of the Semi-Proactive procedure.


3.1 Introduction to the procedure

   Let us first recall that QoS-NSLP supports both the sender-initiated
   and the receiver-initiated reservation. 
   The entity that sends the RESERVE message takes the name of QoS NSIS 
   Initiator (QNI) and the entity that receives that message is called 
   QoS NSIS Responder (QNR). The intermediary NSIS-aware takes the name 
   of QoS NSIS Entity (QNE). 
   In the case of sender-initiated reservation (figure 1), the RESERVE 
   message travels in the same direction of the data flow. Therefore, 
   the QNI is the NSIS-aware node that is closer to the sender of that
   flow.
   Moreover, going through the nodes, the same RESERVE message allows the 
   GIST to create its state.
   In the case of a receiver-initiated reservation (figure 2), the 
   RESERVE message travels in the opposite direction to the data flow. 



F.Tommasi, et al.            Expires February 2007                [Page 4]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006

   Therefore, the QNI is the NSIS-aware node that is closer to the afore
   mentioned flow receiver. In this case, due to asymmetric routing, 
   the QNR must send a QUERY message to allow the GIST to create its
   state.


                 QNI        QNE        QNE        QNR
                sender                          receiver
                  |          |          |          |
                  | RESERVE  |          |          |
                  +--------->|          |          |
                  |          | RESERVE  |          |
                  |          +--------->|          |
                  |          |          | RESERVE  |
                  |          |          +--------->|
                  |          |          |          |
                  |          |          | RESPONSE |
                  |          |          |<---------+
                  |          | RESPONSE |          |
                  |          |<---------+          |
                  | RESPONSE |          |          |
                  |<---------+          |          |
                  |          |          |          |
                  |          |          |          |

              Figure 1 : Basic Sender-initiated Reservation



                   QNR        QNE        QNE        QNI
                  sender                          receiver
                    |          |          |          |
                    | QUERY    |          |          |
                    +--------->|          |          |
                    |          | QUERY    |          |
                    |          +--------->|          |
                    |          |          | QUERY    |
                    |          |          +--------->|
                    |          |          |          |
                    |          |          | RESERVE  |
                    |          |          |<---------+
                    |          | RESERVE  |          |
                    |          |<---------+          |
                    | RESERVE  |          |          |
                    |<---------+          |          |
                    |          |          |          |
                    | RESPONSE |          |          |
                    +--------->|          |          |
                    |          | RESPONSE |          |
                    |          +--------->|          |
                    |          |          | RESPONSE |
                    |          |          +--------->|
                    |          |          |          |

              Figure 2 : Basic Receiver-initiated Reservation



F.Tommasi, et al.            Expires February 2007                [Page 5]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



   The Semi-Proactive procedure, presented in this draft, proposes to 
   re-establish the QoS as fast as possible. 

   The best way is to initiate, in a proactive way, as many operations as 
   possible but without the waste of the available resources.
   In order to do this we propose to create the GIST state before the
   handover and to reserve the resources on the New path after the moving 
   of the MN. The RESERVE message therefore, can only be sent after the 
   handover.

   In case of receiver-initiated reservation (figure 3) it is easy to 
   define a separation between the creation of the state and the 
   reservation of the resources. In fact, it is only necessary that the 
   QNR (close to the sender of data flow) sends the QUERY message 
   before the handover and the QNI responds with the RESERVE message after 
   the movement of the MN.

   The problem is the separation of the two phases when the reservation 
   is sender-initiated. 
   Therefore, also in this case, we could send a QUERY message in order
   to obtain the separation between the GIST state creation and the 
   resource reservation (figure 4). 





                   QNR        QNE        QNE        QNI
                  sender                          receiver
                    |          |          |          |
                    | QUERY    |          |          |
         Proactive  +--------->|          |          |
                    |          | QUERY    |          |
                    |          +--------->|          |
                    |          |          | QUERY    |
                    |          |          +--------->|  Proactive
                    |          |          |          |
                    |          |          | RESERVE  |
                    |          |          |<---------+  Reactive
                    |          | RESERVE  |          |
                    |          |<---------+          |
                    | RESERVE  |          |          |
          Reactive  |<---------+          |          |
                    |          |          |          |
                    | RESPONSE |          |          |
          Reactive  +--------->|          |          |
                    |          | RESPONSE |          |
                    |          +--------->|          |
                    |          |          | RESPONSE |
                    |          |          +--------->|  Reactive 
                    |          |          |          |

   Figure 3 : Receiver-initiated Semi-Proactive QoS Re-establishment




F.Tommasi, et al.            Expires February 2007                [Page 6]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006





                 QNI        QNE        QNE        QNR
                sender                          receiver
                  |          |          |          |
                  | QUERY    |          |          |
       Proactive  +--------->|          |          |
                  |          | QUERY    |          |
                  |          +--------->|          |
                  |          |          | QUERY    |
                  |          |          +--------->|  Proactive
                  |          |          |          |
                  |          |          |          |
                  | RESERVE  |          |          |
        Reactive  +--------->|          |          |
                  |          | RESERVE  |          |
                  |          +--------->|          |
                  |          |          | RESERVE  |
                  |          |          +--------->|  Reactive
                  |          |          |          |
                  |          |          | RESPONSE |
                  |          |          |<---------+  Reactive
                  |          | RESPONSE |          |
                  |          |<---------+          |
                  | RESPONSE |          |          |
        Reactive  |<---------+          |          |
                  |          |          |          |
                  |          |          |          |

     Figure 4 : Sender-initiated Semi-Proactive QoS Re-establishment




   In addition, we would like to consider that in the proactive phase 
   the PAR has already available a list of CARs. Each one of these could 
   act like or as a QNI or as a QNR depending on the type of reservation; 
   so it would send or receive the QUERY message for the GIST state 
   creation.


   The procedure consists of three main sections:
     1. Triggering, in which the PAR communicates to the correct end-
       point so that it sends the QUERY message.
     2. Proactive, in which the QUERY message allows the creation of
       the GIST state and the discovery of the CCRN.
     3. Reactive, in which the resources are reserved. 





F.Tommasi, et al.            Expires February 2007                [Page 7]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



3.2 Triggering section


   Triggering section is the first phase of the procedure proposed in 
   this draft and it is composed by two main steps.
   In the first step the MN asks the PAR for the list of the CARs and
   notifies the   PAR to send the trigger message.
   In the second step if the MN is the sender of the data flow, the PAR 
   triggers each CAR for creating a GIST state towards the CN. Instead, 
   if the MN is the receiver of the data flow, the PAR triggers the CN 
   for creating a GIST state on each Candidate path towards the CARs.


3.3 Proactive section 
 
   The aim of this section is to describe the creation of the GIST state 
   in a proactive way.


3.3.1 Classification of the end-points

   In NSIS a resource reservation can be sender or receiver-initiated.
   In the first case, the sender of the data flow is the starter of the 
   reservation while for the receiver-initiated reservation the receiver
   would be the starter.

   From the MN point of view two other cases exist: the MN can be the 
   sender or the receiver of the data stream.

   This means that we have the following possible combinations as shown in
   figure 5.




        +---------------------+----------------------------------+
        |           \  MN     |     Sender      |   Receiver     |
        |Reservation \        |                 |                |
        +---------------------+-----------------+----------------+
        | Sender-initiated    | CAR=QNI,CN=QNR  | CAR=QNR,CN=QNI |
        +---------------------+-----------------+----------------+
        | Receiver-initiated  | CAR =QNR,CN=QNI | CAR =QNI,CN=QNR|
        +---------------------+-----------------+----------------+

              Figure 5 : Nodes in the Proactive phase



   According to the current definition of NSIS a QoS-NSLP RESERVE 
   message travels from QNI to QNR and the QoS-NSLP QUERY  follows the 
   data flow direction.




F.Tommasi, et al.            Expires February 2007                [Page 8]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



3.3.2 Receiver-initiated reservation

   The QUERY message is sent by QNR node in downstream direction 
   towards the QNI. 

   A Mobility flag (M flag) is added in the Generic flags that are in the
   QoS-NSLP Common Header. This allows a QNE to distinguish the Semi-
   Proactive procedure from the regular NSIS procedure.
   When QNI receives this message it waits the end of the handover to 
   respond with a RESERVE message that contains Mobility flag.

   No other messages, TLV objects or fields are needed.  


3.3.3 Sender-initiated reservation    

   The QUERY message is sent in a downstream direction in the same way
   as the receiver-initiated reservation, but in this case the message 
   travels from the QNI to the QNR.
   After the handover, the QNR that has received a QUERY message will 
   wait for the RESERVE message with the Mobility flag, without taking 
   any other action.


3.3.4 Proactive selection of the CAR

   In order to optimize this procedure it is possible to define a 
   selective algorithm to choose a given CAR from the set of CARs using 
   information such as the characteristic of the service offered by the 
   CAR.   
   The definition of such algorithm is out of the scope to this version 
   of the document. 


3.4 Reactive section

   In this paragraph we will define the procedures carried out after 
   the MN handover.
   The GIST state has been installed, as previously mentioned, in the
   paths between the CN and each CAR.
   The resource reservation is performed only on the path from the QNI 
   to the QNR in a reactive way.

   The possible scenarios are described in the following figure.





F.Tommasi, et al.            Expires February 2007                [Page 9]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



     +---------------------+----------------------------------+
     |           \  MN     |     Sender      |   Receiver     |
     |Reservation \        |                 |                |
     +---------------------+-----------------+----------------+
     | Sender-initiated    | NAR=QNI,CN=QNR  | NAR=QNR,CN=QNI |
     +---------------------+-----------------+----------------+
     | Receiver-initiated  | NAR =QNR,CN=QNI | NAR =QNI,CN=QNR|
     +---------------------+-----------------+----------------+

           Figure 6 : Nodes in the Reactive phase


   After the handover the QNI will send a RESERVE message. The QNR will 
   answer with a RESPONSE message. Both messages contain the Mobility 
   flag.
   In order to benefit from this procedure the NAR must be one of the 
   CARs otherwise there wouldn't be a GIST state with the CN and the
   procedure from Semi-Proactive would become totally Reactive.

   In this phase we perform the Local Path Repair procedure instead of the
   Path Repair, using the CRN discovered during the creation of the GIST 
   state. 
   The Path Repair consists of reserving resources for a session in the 
   New path and to tear down the old reservation on the Old path for the 
   same session.

   To understand the Local Path Repair, the following definitions are 
   given:
      - Local Old path is the path between PAR and CRN;
      - Local New path is the path between NAR and CRN;
      - Local Update path is the path between CN and CRN;

   What happens is that, in the Local New path, the resources must be 
   reserved (RESERVE massage) and torn down in the Local Old path (RESERVE
   massage with TEAR flag set) while updated in the Local Update path 
   (RESERVE massage with REPLACE flag set).


4 Semi-Proactive Procedure by the GIST point of view

   The fundamental aim of the GIST protocol is to discover the path 
   in which signaled data will follow and to create a GIST state between 
   the end-points of the data flow.

   On the basis of what has already been said previously, in networks 
   where there are MNs it is better to create a proactive GIST state 
   on all of the Candidate paths.

   The GIST protocol during the creation of the GIST state discovers the 
   CCRN.
   The algorithm for the discovery is quite simple thanks to the 
   information contained in the GIST-Query, GIST-Response and GIST-Confirm 
   messages. At the end of the proactive phase there will be therefore, as 
   many GIST state as the nodes contained in the CAR list.



F.Tommasi, et al.            Expires February 2007               [Page 10]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



   In order to implement the Semi-Proactive mechanism a new Message 
   routing method (MRM) is used. This MRM is called Semi-Proactive MRM.  
   The document in [4] describes the path-coupled MRM which is applied 
   when signaling messages follow the route defined by an existing flow in 
   the network. 
   Semi-Proactive MRM describes the algorithm for realizing Predictive 
   routing and path-decoupled signaling. It also contains information 
   for discovering the CCRN and the route that signaling messages 
   should take.
   It transports information of the newly discovered CCRN to the other 
   QNE on the path.
   Details of the Semi-Proactive MRM will be provided in future version 
   of this document.


4.1 CCRN and CRN

   Both CCRN and CRN have an important role in the procedures described 
   in this draft.
   It is potentially possible to discover as many CCNRs as CARs. In the 
   proactive phase, if the MN is the receiver of the data flow, the 
   CCRNs buffers the packets sent to the MN during the handover (as 
   described in paragraph 5).

   In the reactive phase the CRN will be the principle node of the Local 
   path Repair (see paragraph 3.4).


4.2 CCRN Discovery

   If the MN is the data flow sender the CCRN could be 
   the first NSIS-aware node in which the Old and the Candidate 
   path converge.
   If the MN and the receiver of the data flow the CCRN could be the 
   last NSIS-aware entity before the Old and the Candidate path 
   diverge.

   As a consequence, the CCRN will be a node on the common trunk between 
   the Old path and the Candidate one.

   The discovery of the CCRN is realized by the GIST protocol during the 
   creation of the GIST state. In fact the protocol, during that phase 
   possesses all the information necessary for the mentioned discovery.

   If in a subnet there are many mobile terminals that are
   communicating with the same CN or with neighbouring CN, the CCNRs of
   different handovers could coincide in the same node. Therefore the
   node in managing different buffering would have more work load to
   handle with. It is possible to introduce more complex algorithm for
   choosing other CCRNs. This algorithm must take in account the node
   position and the presence of bufferization already in act.

   Future versions will consider detailed description of the two 
   algorithms.



F.Tommasi, et al.            Expires February 2007               [Page 11]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



5 The new buffering

   If the MN is the data flow receiver, it is necessary to have 
   buffering mechanisms in order to avoid the loss of packets sent to 
   MN during its handover.

   The buffered packets are sent to the MN across the NAR at the end of 
   the handover.

   This type of solutions has already been defined. For example,
   Perkins[7] propose to buffer at the PAR (in the document this node is 
   called Foreign Agent) but it guarantees only a minimal loss of packets 
   and not the right QoS during the sending of the buffered packets to the 
   MN.
   We have proposed the inclusion of buffering in the CCRN for various 
   reasons. 
   Above all because the CCRN is the closest node to the MN on the New 
   path in which buffering is possible. This means to reduce the total 
   time that the buffered packets use to reach the MN.

   The second motivation for making this choice regards the QoS. The 
   buffered packets, sent on the Local New path after the reservation 
   of resources are treated by the same QoS as the other packets from the 
   same flow.

   A CCRN starts to buffer packets as soon as it has been discovered.
 
   The CRN ends the bufferization of packets when it receives from the QNI 
   the RESERVE message.

   The other CCRNs stop the bufferization of packets and discard the 
   already buffered packets at the end of a timeout.
   If the MN is the data flow sender it is not necessary to effect any 
   bufferization.


6 Security Considerations

   For the moment we haven?t taken into account the security problem.


7 References

   [1]  Perkins, C., "IP Mobility Support for IPv4", RFC 3220, January
        2002.

   [2]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in 
        IPv6", RFC 3775, June 2004.

   [3]  Hancock, R., Karagiannis, G., Loughney, J. and S. Van den Bosch, 
        "Next Steps in Signaling (NSIS): Framework", RFC 4080, June 2005.



F.Tommasi, et al.            Expires February 2007               [Page 12]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



   [4]  Schulzrinne, H., and R. Hancock, "GIST: General Internet 
        Messaging Protocol for Signaling", draft-ietf-nsis-ntlp-10 (work
        in progress), July 2006.

   [5]  Bosch, S., "NSLP for Quality-of-Service signalling", draft-ietf-
        nsis-qos-nslp-11 (work in progress), June 2006.

   [6]  Johnson, D., and C. Perkins, "Route Optimization in Mobile IP" 
        Internet Draft draft-ietf-mobileip-optim-11, September 2001.

   [7]  Perkins, C. and K-Y. Wang, "Optimized smooth handoffs in Mobile 
        IP", Proceedings of IEEE Symposium on Computers and
        Communications, Egypt, July 1999.



Authors' Addresses


   Franco Tommasi
   University of Lecce, Fac. Ingegneria
   Via Monteroni 73100 Lecce, ITALY
   franco.tommasi@unile.it


   Simone Molendini
   University of Lecce, Fac. Ingegneria
   Via Monteroni 73100 Lecce, ITALY
   simone.molendini@unile.it


   Andrea Tricco
   University of Lecce, Fac. Ingegneria
   Via Monteroni 73100 Lecce, ITALY
   andrea.tricco@unile.it


   Elena Scialpi
   University of Lecce, Fac. Ingegneria
   Via Monteroni 73100 Lecce, ITALY
   elena.scialpi@unile.it



Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information



F.Tommasi, et al.            Expires February 2007               [Page 13]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006



   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.
   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.



Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.























F.Tommasi, et al.            Expires February 2007               [Page 14]



Internet-Draft     Semi-Proactive QoS Re-establishment         August 2006