All,

For tomorrow we'll start the work on Policy.

Concepts.

Policy structure (Policy, Rule, Descriptor and Action) definitions are 
templates.   They may be complete or require further complementary information, 
referred to as Settings, to complete them.  Indexed (given a key) structures 
are referenceable and reusable.

Settings may be provided when one template re-uses another, e.g. when a Policy 
(template) references a Rule (template), but the model currently limits adding 
complementary settings to a few key structures in order to reduce system 
complexity.  Otherwise, the model would look like Policy references Rule with 
some Settings which references a Descriptor with some Settings and also an 
Action with some Settings.

Policies may be referenced when creating a Context which indicates that the 
Client would use a pre-configured policy.  However, it is not unusual for the 
Client to acquire from a Policy Decision Point a dynamically constructed policy 
(dynamic policy) and request its installation at the time of Context creation.  
What is most likely, however, it is that a Context is modified or is created 
because of a policy based service request, i.e. usually one that requires 
Quality of Service such as Voice.   Dynamic policies are *highly customized* as 
they are often negotiated between endpoints using a protocol such as SDP within 
a SIP control plane.  As such, these policies are not reusable and effectively 
disappear when the associated Context is removed.

It is hoped but not guaranteed that the application of Settings will reduce the 
probability of needing a dynamic policy.   Hence, dynamic policies cannot be 
dismissed in the architecture.

Complementary settings are provided for DPNs, Installed DPN policies, 
Interfaces and their protocols as well as Contexts.  Note, we will not discuss 
in detail these elements but focus on the Policy Information model first.  
Other locations may be specified depending upon the outcome of the final draft.

The goal of the system is to ensure that the DPN has sufficient information at 
the time of packet processing to carry out policy enforcement.

We'll discuss these concepts and details tomorrow.

Lyle





________________________________

This e-mail may contain Sprint proprietary information intended for the sole 
use of the recipient(s). Any use by others is prohibited. If you are not the 
intended recipient, please contact the sender and delete all copies of the 
message.
_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm

Reply via email to