| < draft-ietf-6man-ipv6-alt-mark-12.txt | draft-ietf-6man-ipv6-alt-mark-13.txt > | |||
|---|---|---|---|---|
| 6MAN Working Group G. Fioccola | 6MAN Working Group G. Fioccola | |||
| Internet-Draft T. Zhou | Internet-Draft T. Zhou | |||
| Intended status: Standards Track Huawei | Intended status: Standards Track Huawei | |||
| Expires: April 25, 2022 M. Cociglio | Expires: October 2, 2022 M. Cociglio | |||
| Telecom Italia | Telecom Italia | |||
| F. Qin | F. Qin | |||
| China Mobile | China Mobile | |||
| R. Pang | R. Pang | |||
| China Unicom | China Unicom | |||
| October 22, 2021 | March 31, 2022 | |||
| IPv6 Application of the Alternate Marking Method | IPv6 Application of the Alternate Marking Method | |||
| draft-ietf-6man-ipv6-alt-mark-12 | draft-ietf-6man-ipv6-alt-mark-13 | |||
| Abstract | Abstract | |||
| This document describes how the Alternate Marking Method can be used | This document describes how the Alternate Marking Method can be used | |||
| as a passive performance measurement tool in an IPv6 domain. It | as a passive performance measurement tool in an IPv6 domain. It | |||
| defines a new Extension Header Option to encode Alternate Marking | defines a new Extension Header Option to encode Alternate Marking | |||
| information in both the Hop-by-Hop Options Header and Destination | information in both the Hop-by-Hop Options Header and Destination | |||
| Options Header. | Options Header. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 1, line 40 ¶ | skipping to change at page 1, line 40 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on April 25, 2022. | This Internet-Draft will expire on October 2, 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 2, line 24 ¶ | skipping to change at page 2, line 24 ¶ | |||
| 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.2. Requirements Language . . . . . . . . . . . . . . . . . . 3 | 1.2. Requirements Language . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Alternate Marking application to IPv6 . . . . . . . . . . . . 3 | 2. Alternate Marking application to IPv6 . . . . . . . . . . . . 3 | |||
| 2.1. Controlled Domain . . . . . . . . . . . . . . . . . . . . 5 | 2.1. Controlled Domain . . . . . . . . . . . . . . . . . . . . 5 | |||
| 2.1.1. Alternate Marking Measurement Domain . . . . . . . . 6 | 2.1.1. Alternate Marking Measurement Domain . . . . . . . . 6 | |||
| 3. Definition of the AltMark Option . . . . . . . . . . . . . . 7 | 3. Definition of the AltMark Option . . . . . . . . . . . . . . 7 | |||
| 3.1. Data Fields Format . . . . . . . . . . . . . . . . . . . 7 | 3.1. Data Fields Format . . . . . . . . . . . . . . . . . . . 7 | |||
| 4. Use of the AltMark Option . . . . . . . . . . . . . . . . . . 8 | 4. Use of the AltMark Option . . . . . . . . . . . . . . . . . . 8 | |||
| 5. Alternate Marking Method Operation . . . . . . . . . . . . . 10 | 5. Alternate Marking Method Operation . . . . . . . . . . . . . 10 | |||
| 5.1. Packet Loss Measurement . . . . . . . . . . . . . . . . . 10 | 5.1. Packet Loss Measurement . . . . . . . . . . . . . . . . . 10 | |||
| 5.2. Packet Delay Measurement . . . . . . . . . . . . . . . . 11 | 5.2. Packet Delay Measurement . . . . . . . . . . . . . . . . 12 | |||
| 5.3. Flow Monitoring Identification . . . . . . . . . . . . . 13 | 5.3. Flow Monitoring Identification . . . . . . . . . . . . . 13 | |||
| 5.4. Multipoint and Clustered Alternate Marking . . . . . . . 15 | 5.4. Multipoint and Clustered Alternate Marking . . . . . . . 15 | |||
| 5.5. Data Collection and Calculation . . . . . . . . . . . . . 16 | 5.5. Data Collection and Calculation . . . . . . . . . . . . . 16 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 16 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 16 | |||
| 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19 | |||
| 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 20 | 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 20 | 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 20 | 9.1. Normative References . . . . . . . . . . . . . . . . . . 20 | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 20 | 9.2. Informative References . . . . . . . . . . . . . . . . . 20 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 1. Introduction | 1. Introduction | |||
| [RFC8321] and [RFC8889] describe a passive performance measurement | [I-D.fioccola-rfc8321bis] and [I-D.fioccola-rfc8889bis] describe a | |||
| method, which can be used to measure packet loss, latency and jitter | passive performance measurement method, which can be used to measure | |||
| on live traffic. Since this method is based on marking consecutive | packet loss, latency and jitter on live traffic. Since this method | |||
| batches of packets, the method is often referred to as the Alternate | is based on marking consecutive batches of packets, the method is | |||
| Marking Method. | often referred to as the Alternate Marking Method. | |||
| This document defines how the Alternate Marking Method can be used to | This document defines how the Alternate Marking Method can be used to | |||
| measure performance metrics in IPv6. The rationale is to apply the | measure performance metrics in IPv6. The rationale is to apply the | |||
| Alternate Marking methodology to IPv6 and therefore allow detailed | Alternate Marking methodology to IPv6 and therefore allow detailed | |||
| packet loss, delay and delay variation measurements both hop-by-hop | packet loss, delay and delay variation measurements both hop-by-hop | |||
| and end-to-end to exactly locate the issues in an IPv6 network. | and end-to-end to exactly locate the issues in an IPv6 network. | |||
| The Alternate Marking is an on-path telemetry technique and consists | The Alternate Marking is an on-path telemetry technique and consists | |||
| of synchronizing the measurements in different points of a network by | of synchronizing the measurements in different points of a network by | |||
| switching the value of a marking bit and therefore dividing the | switching the value of a marking bit and therefore dividing the | |||
| skipping to change at page 3, line 30 ¶ | skipping to change at page 3, line 30 ¶ | |||
| domain. | domain. | |||
| The threat model for the application of the Alternate Marking Method | The threat model for the application of the Alternate Marking Method | |||
| in an IPv6 domain is reported in Section 6. As with all on-path | in an IPv6 domain is reported in Section 6. As with all on-path | |||
| telemetry techniques, the only definitive solution is that this | telemetry techniques, the only definitive solution is that this | |||
| methodology MUST be applied in a controlled domain. | methodology MUST be applied in a controlled domain. | |||
| 1.1. Terminology | 1.1. Terminology | |||
| This document uses the terms related to the Alternate Marking Method | This document uses the terms related to the Alternate Marking Method | |||
| as defined in [RFC8321] and [RFC8889]. | as defined in [I-D.fioccola-rfc8321bis] and | |||
| [I-D.fioccola-rfc8889bis]. | ||||
| 1.2. Requirements Language | 1.2. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 2. Alternate Marking application to IPv6 | 2. Alternate Marking application to IPv6 | |||
| skipping to change at page 10, line 12 ¶ | skipping to change at page 10, line 16 ¶ | |||
| Hop Option should not affect the throughput. However, in practice, | Hop Option should not affect the throughput. However, in practice, | |||
| it is important to be aware that the things may be different in the | it is important to be aware that the things may be different in the | |||
| implementation and it can happen that packets with Hop-by-Hop are | implementation and it can happen that packets with Hop-by-Hop are | |||
| forced onto the slow path, but this is a general issue, as also | forced onto the slow path, but this is a general issue, as also | |||
| explained in [I-D.hinden-6man-hbh-processing]. It is also worth | explained in [I-D.hinden-6man-hbh-processing]. It is also worth | |||
| mentioning that the application to a controlled domain should avoid | mentioning that the application to a controlled domain should avoid | |||
| the risk of arbitrary nodes dropping packets with Hop-by-Hop Options. | the risk of arbitrary nodes dropping packets with Hop-by-Hop Options. | |||
| 5. Alternate Marking Method Operation | 5. Alternate Marking Method Operation | |||
| This section describes how the method operates. [RFC8321] introduces | This section describes how the method operates. | |||
| several applicable methods which are reported below, and a new field | [I-D.fioccola-rfc8321bis] introduces several applicable methods which | |||
| is introduced to facilitate the deployment and improve the | are reported below, and a new field is introduced to facilitate the | |||
| scalability. | deployment and improve the scalability. | |||
| 5.1. Packet Loss Measurement | 5.1. Packet Loss Measurement | |||
| The measurement of the packet loss is really straightforward in | The measurement of the packet loss is really straightforward in | |||
| comparison to the existing mechanisms, as detailed in [RFC8321]. The | comparison to the existing mechanisms, as detailed in | |||
| packets of the flow are grouped into batches, and all the packets | [I-D.fioccola-rfc8321bis]. The packets of the flow are grouped into | |||
| within a batch are marked by setting the L bit (Loss flag) to a same | batches, and all the packets within a batch are marked by setting the | |||
| value. The source node can switch the value of the L bit between 0 | L bit (Loss flag) to a same value. The source node can switch the | |||
| and 1 after a fixed number of packets or according to a fixed timer, | value of the L bit between 0 and 1 after a fixed number of packets or | |||
| and this depends on the implementation. The source node is the only | according to a fixed timer, and this depends on the implementation. | |||
| one that marks the packets to create the batches, while the | The source node is the only one that marks the packets to create the | |||
| intermediate nodes only read the marking values and identify the | batches, while the intermediate nodes only read the marking values | |||
| packet batches. By counting the number of packets in each batch and | and identify the packet batches. By counting the number of packets | |||
| comparing the values measured by different network nodes along the | in each batch and comparing the values measured by different network | |||
| path, it is possible to measure the packet loss occurred in any | nodes along the path, it is possible to measure the packet loss | |||
| single batch between any two nodes. Each batch represents a | occurred in any single batch between any two nodes. Each batch | |||
| measurable entity recognizable by all network nodes along the path. | represents a measurable entity recognizable by all network nodes | |||
| along the path. | ||||
| Both fixed number of packets and fixed timer can be used by the | Both fixed number of packets and fixed timer can be used by the | |||
| source node to create packet batches. But, as also explained in | source node to create packet batches. But, as also explained in | |||
| [RFC8321], the timer-based batches are preferable because they are | [I-D.fioccola-rfc8321bis], the timer-based batches are preferable | |||
| more deterministic than the counter-based batches. There is no | because they are more deterministic than the counter-based batches. | |||
| definitive rule for counter-based batches, differently from timer- | There is no definitive rule for counter-based batches, differently | |||
| based batches. Using a fixed timer for the switching offers better | from timer-based batches. Using a fixed timer for the switching | |||
| control over the method, indeed the length of the batches can be | offers better control over the method, indeed the length of the | |||
| chosen large enough to simplify the collection and the comparison of | batches can be chosen large enough to simplify the collection and the | |||
| the measures taken by different network nodes. In the implementation | comparison of the measures taken by different network nodes. In the | |||
| the counters can be sent out by each node to the controller that is | implementation the counters can be sent out by each node to the | |||
| responsible for the calculation. It is also possible to exchange | controller that is responsible for the calculation. It is also | |||
| this information by using other on-path techniques. But this is out | possible to exchange this information by using other on-path | |||
| of scope for this document. | techniques. But this is out of scope for this document. | |||
| Packets with different L values may get swapped at batch boundaries, | Packets with different L values may get swapped at batch boundaries, | |||
| and in this case, it is required that each marked packet can be | and in this case, it is required that each marked packet can be | |||
| assigned to the right batch by each router. It is important to | assigned to the right batch by each router. It is important to | |||
| mention that for the application of this method there are two | mention that for the application of this method there are two | |||
| elements to consider: the clock error between network nodes and the | elements to consider: the clock error between network nodes and the | |||
| network delay. These can create offsets between the batches and out- | network delay. These can create offsets between the batches and out- | |||
| of-order of the packets. The mathematical formula on timing aspects, | of-order of the packets. The mathematical formula on timing aspects, | |||
| explained in section 3.2 of [RFC8321], must be satisfied and it takes | explained in section 5 of [I-D.fioccola-rfc8321bis], must be | |||
| into considerations the different causes of reordering such as clock | satisfied and it takes into considerations the different causes of | |||
| error and network delay. The assumption is to define the available | reordering such as clock error and network delay. The assumption is | |||
| counting interval where to get stable counters and to avoid these | to define the available counting interval where to get stable | |||
| issues. Specifically, if the effects of network delay are ignored, | counters and to avoid these issues. Specifically, if the effects of | |||
| the condition to implement the methodology is that the clocks in | network delay are ignored, the condition to implement the methodology | |||
| different nodes MUST be synchronized to the same clock reference with | is that the clocks in different nodes MUST be synchronized to the | |||
| an accuracy of +/- B/2 time units, where B is the fixed time duration | same clock reference with an accuracy of +/- B/2 time units, where B | |||
| of the batch, which refers to the original marking interval at the | is the fixed time duration of the batch, which refers to the original | |||
| source node considering that this interval could fluctuate along the | marking interval at the source node considering that this interval | |||
| path. In this way each marked packet can be assigned to the right | could fluctuate along the path. In this way each marked packet can | |||
| batch by each node. Usually the counters can be taken in the middle | be assigned to the right batch by each node. Usually the counters | |||
| of the batch period to be sure to take still counters. In a few | can be taken in the middle of the batch period to be sure to take | |||
| words this implies that the length of the batches MUST be chosen | still counters. In a few words this implies that the length of the | |||
| large enough so that the method is not affected by those factors. | batches MUST be chosen large enough so that the method is not | |||
| The length of the batches can be determined based on the specific | affected by those factors. The length of the batches can be | |||
| deployment scenario. | determined based on the specific deployment scenario. | |||
| L bit=1 ----------+ +-----------+ +---------- | L bit=1 ----------+ +-----------+ +---------- | |||
| | | | | | | | | | | |||
| L bit=0 +-----------+ +-----------+ | L bit=0 +-----------+ +-----------+ | |||
| Batch n ... Batch 3 Batch 2 Batch 1 | Batch n ... Batch 3 Batch 2 Batch 1 | |||
| <---------> <---------> <---------> <---------> <---------> | <---------> <---------> <---------> <---------> <---------> | |||
| Traffic Flow | Traffic Flow | |||
| ===========================================================> | ===========================================================> | |||
| L bit ...1111111111 0000000000 11111111111 00000000000 111111111... | L bit ...1111111111 0000000000 11111111111 00000000000 111111111... | |||
| skipping to change at page 15, line 39 ¶ | skipping to change at page 15, line 46 ¶ | |||
| When all values in the FlowMonID space are consumed, the centralized | When all values in the FlowMonID space are consumed, the centralized | |||
| controller can keep track and reassign the values that are not used | controller can keep track and reassign the values that are not used | |||
| any more by old flows, while if the FlowMonID is pseudo randomly | any more by old flows, while if the FlowMonID is pseudo randomly | |||
| generated by the source, conflicts and collisions are possible. | generated by the source, conflicts and collisions are possible. | |||
| 5.4. Multipoint and Clustered Alternate Marking | 5.4. Multipoint and Clustered Alternate Marking | |||
| The Alternate Marking method can also be extended to any kind of | The Alternate Marking method can also be extended to any kind of | |||
| multipoint to multipoint paths, and the network clustering approach | multipoint to multipoint paths, and the network clustering approach | |||
| allows a flexible and optimized performance measurement, as described | allows a flexible and optimized performance measurement, as described | |||
| in [RFC8889]. | in [I-D.fioccola-rfc8889bis]. | |||
| The Cluster is the smallest identifiable subnetwork of the entire | The Cluster is the smallest identifiable subnetwork of the entire | |||
| Network graph that still satisfies the condition that the number of | Network graph that still satisfies the condition that the number of | |||
| packets that goes in is the same that goes out. With network | packets that goes in is the same that goes out. With network | |||
| clustering, it is possible to use the partition of the network into | clustering, it is possible to use the partition of the network into | |||
| clusters at different levels in order to perform the needed degree of | clusters at different levels in order to perform the needed degree of | |||
| detail. So, for Multipoint Alternate Marking, FlowMonID can identify | detail. So, for Multipoint Alternate Marking, FlowMonID can identify | |||
| in general a multipoint-to-multipoint flow and not only a point-to- | in general a multipoint-to-multipoint flow and not only a point-to- | |||
| point flow. | point flow. | |||
| skipping to change at page 20, line 17 ¶ | skipping to change at page 20, line 22 ¶ | |||
| The authors would like to thank Bob Hinden, Ole Troan, Martin Duke, | The authors would like to thank Bob Hinden, Ole Troan, Martin Duke, | |||
| Lars Eggert, Roman Danyliw, Alvaro Retana, Eric Vyncke, Warren | Lars Eggert, Roman Danyliw, Alvaro Retana, Eric Vyncke, Warren | |||
| Kumari, Benjamin Kaduk, Stewart Bryant, Christopher Wood, Yoshifumi | Kumari, Benjamin Kaduk, Stewart Bryant, Christopher Wood, Yoshifumi | |||
| Nishida, Tom Herbert, Stefano Previdi, Brian Carpenter, Greg Mirsky, | Nishida, Tom Herbert, Stefano Previdi, Brian Carpenter, Greg Mirsky, | |||
| Ron Bonica for the precious comments and suggestions. | Ron Bonica for the precious comments and suggestions. | |||
| 9. References | 9. References | |||
| 9.1. Normative References | 9.1. Normative References | |||
| [I-D.fioccola-rfc8321bis] | ||||
| Fioccola, G., Cociglio, M., Mirsky, G., Mizrahi, T., Zhou, | ||||
| T., and X. Min, "Alternate-Marking Method", draft- | ||||
| fioccola-rfc8321bis-03 (work in progress), February 2022. | ||||
| [I-D.fioccola-rfc8889bis] | ||||
| Fioccola, G., Cociglio, M., Sapio, A., Sisto, R., and T. | ||||
| Zhou, "Multipoint Alternate-Marking Method", draft- | ||||
| fioccola-rfc8889bis-03 (work in progress), February 2022. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [RFC8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
| DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
| 9.2. Informative References | 9.2. Informative References | |||
| [I-D.chen-pce-pcep-ifit] | [I-D.chen-pce-pcep-ifit] | |||
| Yuan, H., Zhou, T., Li, W., Fioccola, G., and Y. Wang, | Yuan, H., Zhou, T., Li, W., Fioccola, G., and Y. Wang, | |||
| "Path Computation Element Communication Protocol (PCEP) | "Path Computation Element Communication Protocol (PCEP) | |||
| Extensions to Enable IFIT", draft-chen-pce-pcep-ifit-04 | Extensions to Enable IFIT", draft-chen-pce-pcep-ifit-06 | |||
| (work in progress), July 2021. | (work in progress), February 2022. | |||
| [I-D.fz-spring-srv6-alt-mark] | [I-D.fz-spring-srv6-alt-mark] | |||
| Fioccola, G., Zhou, T., and M. Cociglio, "Segment Routing | Fioccola, G., Zhou, T., and M. Cociglio, "Segment Routing | |||
| Header encapsulation for Alternate Marking Method", draft- | Header encapsulation for Alternate Marking Method", draft- | |||
| fz-spring-srv6-alt-mark-01 (work in progress), July 2021. | fz-spring-srv6-alt-mark-02 (work in progress), February | |||
| 2022. | ||||
| [I-D.hinden-6man-hbh-processing] | [I-D.hinden-6man-hbh-processing] | |||
| Hinden, R. M. and G. Fairhurst, "IPv6 Hop-by-Hop Options | Hinden, R. M. and G. Fairhurst, "IPv6 Hop-by-Hop Options | |||
| Processing Procedures", draft-hinden-6man-hbh- | Processing Procedures", draft-hinden-6man-hbh- | |||
| processing-01 (work in progress), June 2021. | processing-01 (work in progress), June 2021. | |||
| [I-D.ietf-idr-sr-policy-ifit] | [I-D.ietf-idr-sr-policy-ifit] | |||
| Qin, F., Yuan, H., Zhou, T., Fioccola, G., and Y. Wang, | Qin, F., Yuan, H., Zhou, T., Fioccola, G., and Y. Wang, | |||
| "BGP SR Policy Extensions to Enable IFIT", draft-ietf-idr- | "BGP SR Policy Extensions to Enable IFIT", draft-ietf-idr- | |||
| sr-policy-ifit-02 (work in progress), July 2021. | sr-policy-ifit-03 (work in progress), January 2022. | |||
| [I-D.peng-v6ops-hbh] | [I-D.peng-v6ops-hbh] | |||
| Peng, S., Li, Z., Xie, C., Qin, Z., and G. Mishra, | Peng, S., Li, Z., Xie, C., Qin, Z., and G. Mishra, | |||
| "Processing of the Hop-by-Hop Options Header", draft-peng- | "Processing of the Hop-by-Hop Options Header", draft-peng- | |||
| v6ops-hbh-06 (work in progress), August 2021. | v6ops-hbh-06 (work in progress), August 2021. | |||
| [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing | |||
| Architecture", RFC 4291, DOI 10.17487/RFC4291, February | Architecture", RFC 4291, DOI 10.17487/RFC4291, February | |||
| 2006, <https://www.rfc-editor.org/info/rfc4291>. | 2006, <https://www.rfc-editor.org/info/rfc4291>. | |||
| skipping to change at page 21, line 37 ¶ | skipping to change at page 22, line 14 ¶ | |||
| [RFC7045] Carpenter, B. and S. Jiang, "Transmission and Processing | [RFC7045] Carpenter, B. and S. Jiang, "Transmission and Processing | |||
| of IPv6 Extension Headers", RFC 7045, | of IPv6 Extension Headers", RFC 7045, | |||
| DOI 10.17487/RFC7045, December 2013, | DOI 10.17487/RFC7045, December 2013, | |||
| <https://www.rfc-editor.org/info/rfc7045>. | <https://www.rfc-editor.org/info/rfc7045>. | |||
| [RFC7384] Mizrahi, T., "Security Requirements of Time Protocols in | [RFC7384] Mizrahi, T., "Security Requirements of Time Protocols in | |||
| Packet Switched Networks", RFC 7384, DOI 10.17487/RFC7384, | Packet Switched Networks", RFC 7384, DOI 10.17487/RFC7384, | |||
| October 2014, <https://www.rfc-editor.org/info/rfc7384>. | October 2014, <https://www.rfc-editor.org/info/rfc7384>. | |||
| [RFC8321] Fioccola, G., Ed., Capello, A., Cociglio, M., Castaldelli, | ||||
| L., Chen, M., Zheng, L., Mirsky, G., and T. Mizrahi, | ||||
| "Alternate-Marking Method for Passive and Hybrid | ||||
| Performance Monitoring", RFC 8321, DOI 10.17487/RFC8321, | ||||
| January 2018, <https://www.rfc-editor.org/info/rfc8321>. | ||||
| [RFC8754] Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J., | [RFC8754] Filsfils, C., Ed., Dukes, D., Ed., Previdi, S., Leddy, J., | |||
| Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header | Matsushima, S., and D. Voyer, "IPv6 Segment Routing Header | |||
| (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020, | (SRH)", RFC 8754, DOI 10.17487/RFC8754, March 2020, | |||
| <https://www.rfc-editor.org/info/rfc8754>. | <https://www.rfc-editor.org/info/rfc8754>. | |||
| [RFC8799] Carpenter, B. and B. Liu, "Limited Domains and Internet | [RFC8799] Carpenter, B. and B. Liu, "Limited Domains and Internet | |||
| Protocols", RFC 8799, DOI 10.17487/RFC8799, July 2020, | Protocols", RFC 8799, DOI 10.17487/RFC8799, July 2020, | |||
| <https://www.rfc-editor.org/info/rfc8799>. | <https://www.rfc-editor.org/info/rfc8799>. | |||
| [RFC8889] Fioccola, G., Ed., Cociglio, M., Sapio, A., and R. Sisto, | ||||
| "Multipoint Alternate-Marking Method for Passive and | ||||
| Hybrid Performance Monitoring", RFC 8889, | ||||
| DOI 10.17487/RFC8889, August 2020, | ||||
| <https://www.rfc-editor.org/info/rfc8889>. | ||||
| [RFC8915] Franke, D., Sibold, D., Teichel, K., Dansarie, M., and R. | [RFC8915] Franke, D., Sibold, D., Teichel, K., Dansarie, M., and R. | |||
| Sundblad, "Network Time Security for the Network Time | Sundblad, "Network Time Security for the Network Time | |||
| Protocol", RFC 8915, DOI 10.17487/RFC8915, September 2020, | Protocol", RFC 8915, DOI 10.17487/RFC8915, September 2020, | |||
| <https://www.rfc-editor.org/info/rfc8915>. | <https://www.rfc-editor.org/info/rfc8915>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Giuseppe Fioccola | Giuseppe Fioccola | |||
| Huawei | Huawei | |||
| Riesstrasse, 25 | Riesstrasse, 25 | |||
| End of changes. 19 change blocks. | ||||
| 74 lines changed or deleted | 75 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||