| < draft-mizrahi-ippm-ioam-profile-00.txt | draft-mizrahi-ippm-ioam-profile-01.txt > | |||
|---|---|---|---|---|
| Network Working Group T. Mizrahi | Network Working Group T. Mizrahi | |||
| Internet-Draft Huawei Network.IO Innovation Lab | Internet-Draft Huawei Network.IO Innovation Lab | |||
| Intended status: Informational F. Brockners | Intended status: Informational F. Brockners | |||
| Expires: September 12, 2019 S. Bhandari | Expires: March 14, 2020 S. Bhandari | |||
| R. Sivakolundu | R. Sivakolundu | |||
| C. Pignataro | C. Pignataro | |||
| Cisco | Cisco | |||
| A. Kfir | A. Kfir | |||
| B. Gafni | B. Gafni | |||
| Mellanox Technologies, Inc. | Mellanox Technologies, Inc. | |||
| M. Spiegel | M. Spiegel | |||
| Barefoot Networks | Barefoot Networks | |||
| T. Zhou | T. Zhou | |||
| Huawei | Huawei | |||
| J. Lemon | J. Lemon | |||
| Broadcom | Broadcom | |||
| March 11, 2019 | September 11, 2019 | |||
| In Situ OAM Profiles | In Situ OAM Profiles | |||
| draft-mizrahi-ippm-ioam-profile-00 | draft-mizrahi-ippm-ioam-profile-01 | |||
| Abstract | Abstract | |||
| In Situ Operations, Administration and Maintenance (IOAM) is used for | In Situ Operations, Administration and Maintenance (IOAM) is used for | |||
| monitoring network performance and for detecting traffic bottlenecks | monitoring network performance and for detecting traffic bottlenecks | |||
| and anomalies. This is achieved by incorporating IOAM data into in- | and anomalies. This is achieved by incorporating IOAM data into in- | |||
| flight data packets. This document introduces the concept of use | flight data packets. This document introduces the concept of use | |||
| case-driven IOAM profiles. An IOAM profile defines a use case or a | case-driven IOAM profiles. An IOAM profile defines a use case or a | |||
| set of use cases for IOAM, and an associated set of rules that | set of use cases for IOAM, and an associated set of rules that | |||
| restrict the scope and features of the IOAM specification, thereby | restrict the scope and features of the IOAM specification, thereby | |||
| skipping to change at page 2, line 10 ¶ | skipping to change at page 2, line 10 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 12, 2019. | This Internet-Draft will expire on March 14, 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2019 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 32 ¶ | skipping to change at page 2, line 32 ¶ | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Specifying an IOAM Profile . . . . . . . . . . . . . . . . . 3 | 2. Specifying an IOAM Profile . . . . . . . . . . . . . . . . . 3 | |||
| 2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 4 | 2.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.4. IOAM Option Header Field Values . . . . . . . . . . . . . 4 | 2.4. IOAM Option Header Field Values . . . . . . . . . . . . . 4 | |||
| 2.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 4 | 2.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 4 | |||
| 2.6. Timestamp Format . . . . . . . . . . . . . . . . . . . . 4 | 2.6. Timestamp Format . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4 | 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | |||
| 5. Normative References . . . . . . . . . . . . . . . . . . . . 5 | 5. Normative References . . . . . . . . . . . . . . . . . . . . 5 | |||
| Appendix A. An IOAM Profile Example . . . . . . . . . . . . . . 5 | Appendix A. An IOAM Profile Example . . . . . . . . . . . . . . 5 | |||
| A.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 5 | A.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| A.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 5 | A.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| A.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 6 | A.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| A.4. IOAM Option Header Field Values . . . . . . . . . . . . . 6 | A.4. IOAM Option Header Field Values . . . . . . . . . . . . . 6 | |||
| A.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 6 | A.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 6 | |||
| A.6. Profile Coexistence . . . . . . . . . . . . . . . . . . . 6 | A.6. Profile Coexistence . . . . . . . . . . . . . . . . . . . 6 | |||
| A.7. Validity . . . . . . . . . . . . . . . . . . . . . . . . 6 | A.7. Validity . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 1. Introduction | 1. Introduction | |||
| IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the | IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the | |||
| network by incorporating IOAM data fields into in-flight data | network by incorporating IOAM data fields into in-flight data | |||
| packets. | packets. | |||
| This document introduces the concept of use case driven IOAM | This document introduces the concept of use case driven IOAM | |||
| profiles. The motivation for defining profiles is to limit the scope | profiles. The motivation for defining profiles is to limit the scope | |||
| of IOAM features, allowing simpler implementation, verification, and | of IOAM features, allowing simpler implementation, verification, and | |||
| skipping to change at page 3, line 42 ¶ | skipping to change at page 3, line 42 ¶ | |||
| 2.1. Overview | 2.1. Overview | |||
| A profile defines a set of rules that limit the scope or | A profile defines a set of rules that limit the scope or | |||
| functionality of IOAM. By default, any detail in IOAM that is not | functionality of IOAM. By default, any detail in IOAM that is not | |||
| specifically addressed or limited by the profile is as defined in | specifically addressed or limited by the profile is as defined in | |||
| IOAM [I-D.ietf-ippm-ioam-data]. The rest of this section presents a | IOAM [I-D.ietf-ippm-ioam-data]. The rest of this section presents a | |||
| set of topics that may be addressed in a profile specification. A | set of topics that may be addressed in a profile specification. A | |||
| profile may include some or all of these topics, and optionally other | profile may include some or all of these topics, and optionally other | |||
| topics. | topics. | |||
| A profile may in part be defined using a specific assignment to the | ||||
| IOAM YANG model [I-D.zhou-ippm-ioam-yang]. It should be noted that | ||||
| while the YANG model assists in the definition of a profile, it does | ||||
| not replace the profile definition. Specifically, a profile | ||||
| definition includes the use case(s) for using the profile, and | ||||
| possibly some properties that cannot be defined by an assignment to | ||||
| the YANG model, such as the semantics of the Opaque State Snapshot | ||||
| field. | ||||
| 2.2. Use Cases | 2.2. Use Cases | |||
| An IOAM profile should define the use case(s) for using the profile. | An IOAM profile should define the use case(s) for using the profile. | |||
| The use case may describe deployment scenarios or specific | The use case may describe deployment scenarios or specific | |||
| applications that make use of IOAM data. The use case should | applications that make use of IOAM data. The use case should | |||
| typically define the required functionality from IOAM. For example, | typically define the required functionality from IOAM. For example, | |||
| an IOAM profile may be defined such that it requires transit delay | an IOAM profile may be defined such that it requires transit delay | |||
| monitoring, but does not require path tracing. These requirements | monitoring, but does not require path tracing. These requirements | |||
| then affect which IOAM data fields are used in the profile. | then affect which IOAM data fields are used in the profile. | |||
| skipping to change at page 5, line 27 ¶ | skipping to change at page 5, line 33 ¶ | |||
| full implementation of IOAM. In fact, a particular IOAM profile can | full implementation of IOAM. In fact, a particular IOAM profile can | |||
| optimize a particular security posture or requirement. | optimize a particular security posture or requirement. | |||
| 5. Normative References | 5. Normative References | |||
| [I-D.ietf-ippm-ioam-data] | [I-D.ietf-ippm-ioam-data] | |||
| Brockners, F., Bhandari, S., Pignataro, C., Gredler, H., | Brockners, F., Bhandari, S., Pignataro, C., Gredler, H., | |||
| Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, | Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, | |||
| P., Chang, R., daniel.bernier@bell.ca, d., and J. Lemon, | P., Chang, R., daniel.bernier@bell.ca, d., and J. Lemon, | |||
| "Data Fields for In-situ OAM", draft-ietf-ippm-ioam- | "Data Fields for In-situ OAM", draft-ietf-ippm-ioam- | |||
| data-05 (work in progress), March 2019. | data-07 (work in progress), September 2019. | |||
| [I-D.zhou-ippm-ioam-yang] | ||||
| Zhou, T., Guichard, J., Brockners, F., and S. Raghavan, "A | ||||
| YANG Data Model for In-Situ OAM", draft-zhou-ippm-ioam- | ||||
| yang-04 (work in progress), June 2019. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| Appendix A. An IOAM Profile Example | Appendix A. An IOAM Profile Example | |||
| A.1. Overview | A.1. Overview | |||
| End of changes. 10 change blocks. | ||||
| 9 lines changed or deleted | 23 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||