| < draft-mizrahi-ippm-ioam-profile-01.txt | draft-mizrahi-ippm-ioam-profile-02.txt > | |||
|---|---|---|---|---|
| Network Working Group T. Mizrahi | Network Working Group T. Mizrahi | |||
| Internet-Draft Huawei Network.IO Innovation Lab | Internet-Draft Huawei Smart Platforms iLab | |||
| Intended status: Informational F. Brockners | Intended status: Informational F. Brockners | |||
| Expires: March 14, 2020 S. Bhandari | Expires: August 9, 2020 S. Bhandari | |||
| R. Sivakolundu | R. Sivakolundu | |||
| C. Pignataro | C. Pignataro | |||
| Cisco | Cisco | |||
| A. Kfir | A. Kfir | |||
| B. Gafni | B. Gafni | |||
| Mellanox Technologies, Inc. | Mellanox Technologies, Inc. | |||
| M. Spiegel | M. Spiegel | |||
| Barefoot Networks | Barefoot Networks | |||
| T. Zhou | T. Zhou | |||
| Huawei | Huawei | |||
| J. Lemon | J. Lemon | |||
| Broadcom | Broadcom | |||
| September 11, 2019 | February 6, 2020 | |||
| In Situ OAM Profiles | In Situ OAM Profiles | |||
| draft-mizrahi-ippm-ioam-profile-01 | draft-mizrahi-ippm-ioam-profile-02 | |||
| Abstract | Abstract | |||
| In Situ Operations, Administration and Maintenance (IOAM) is used for | In Situ Operations, Administration and Maintenance (IOAM) is used for | |||
| monitoring network performance and for detecting traffic bottlenecks | monitoring network performance and for detecting traffic bottlenecks | |||
| and anomalies. This is achieved by incorporating IOAM data into in- | and anomalies. This is achieved by incorporating IOAM data into in- | |||
| flight data packets. This document introduces the concept of use | flight data packets. This document introduces the concept of use | |||
| case-driven IOAM profiles. An IOAM profile defines a use case or a | case-driven IOAM profiles. An IOAM profile defines a use case or a | |||
| set of use cases for IOAM, and an associated set of rules that | set of use cases for IOAM, and an associated set of rules that | |||
| restrict the scope and features of the IOAM specification, thereby | restrict the scope and features of the IOAM specification, thereby | |||
| skipping to change at page 2, line 10 ¶ | skipping to change at page 2, line 10 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 14, 2020. | This Internet-Draft will expire on August 9, 2020. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 2, line 36 ¶ | skipping to change at page 2, line 36 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Specifying an IOAM Profile . . . . . . . . . . . . . . . . . 3 | 2. Specifying an IOAM Profile . . . . . . . . . . . . . . . . . 3 | |||
| 2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 4 | 2.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2.4. IOAM Option Header Field Values . . . . . . . . . . . . . 4 | 2.4. IOAM Option Header Field Values . . . . . . . . . . . . . 4 | |||
| 2.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 4 | 2.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 4 | |||
| 2.6. Timestamp Format . . . . . . . . . . . . . . . . . . . . 4 | 2.6. Timestamp Format . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 | |||
| 5. Normative References . . . . . . . . . . . . . . . . . . . . 5 | 5. Normative References . . . . . . . . . . . . . . . . . . . . 5 | |||
| Appendix A. An IOAM Profile Example . . . . . . . . . . . . . . 5 | Appendix A. An IOAM Profile Example . . . . . . . . . . . . . . 6 | |||
| A.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 5 | A.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| A.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 6 | A.2. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| A.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 6 | A.3. IOAM Options . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| A.4. IOAM Option Header Field Values . . . . . . . . . . . . . 6 | A.4. IOAM Option Header Field Values . . . . . . . . . . . . . 6 | |||
| A.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 6 | A.5. Opaque State Snapshot . . . . . . . . . . . . . . . . . . 6 | |||
| A.6. Profile Coexistence . . . . . . . . . . . . . . . . . . . 6 | A.6. Profile Coexistence . . . . . . . . . . . . . . . . . . . 6 | |||
| A.7. Validity . . . . . . . . . . . . . . . . . . . . . . . . 6 | A.7. Validity . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 1. Introduction | 1. Introduction | |||
| IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the | IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the | |||
| network by incorporating IOAM data fields into in-flight data | network by incorporating IOAM data fields into in-flight data | |||
| packets. | packets. | |||
| This document introduces the concept of use case driven IOAM | This document introduces the concept of use case driven IOAM | |||
| profiles. The motivation for defining profiles is to limit the scope | profiles. The motivation for defining profiles is to limit the scope | |||
| skipping to change at page 3, line 43 ¶ | skipping to change at page 3, line 43 ¶ | |||
| A profile defines a set of rules that limit the scope or | A profile defines a set of rules that limit the scope or | |||
| functionality of IOAM. By default, any detail in IOAM that is not | functionality of IOAM. By default, any detail in IOAM that is not | |||
| specifically addressed or limited by the profile is as defined in | specifically addressed or limited by the profile is as defined in | |||
| IOAM [I-D.ietf-ippm-ioam-data]. The rest of this section presents a | IOAM [I-D.ietf-ippm-ioam-data]. The rest of this section presents a | |||
| set of topics that may be addressed in a profile specification. A | set of topics that may be addressed in a profile specification. A | |||
| profile may include some or all of these topics, and optionally other | profile may include some or all of these topics, and optionally other | |||
| topics. | topics. | |||
| A profile may in part be defined using a specific assignment to the | A profile may in part be defined using a specific assignment to the | |||
| IOAM YANG model [I-D.zhou-ippm-ioam-yang]. It should be noted that | IOAM YANG model. The IOAM YANG model [I-D.zhou-ippm-ioam-yang] | |||
| while the YANG model assists in the definition of a profile, it does | defines a set of IOAM-related attributes, such as which IOAM option | |||
| not replace the profile definition. Specifically, a profile | types are enabled, and which data fields are used. For example, an | |||
| definition includes the use case(s) for using the profile, and | IOAM profile that only uses the icremental trace option may be | |||
| possibly some properties that cannot be defined by an assignment to | defined as such by an assignment to the respective attributes that | |||
| the YANG model, such as the semantics of the Opaque State Snapshot | are defined in the YANG model. It should be noted that while the | |||
| field. | YANG model assists in the definition of a profile, it does not | |||
| replace the profile definition. Specifically, a profile definition | ||||
| includes the use case(s) for using the profile, and possibly some | ||||
| properties that cannot be defined by an assignment to the YANG model, | ||||
| such as the semantics of the Opaque State Snapshot field. | ||||
| 2.2. Use Cases | 2.2. Use Cases | |||
| An IOAM profile should define the use case(s) for using the profile. | An IOAM profile should define the use case(s) for using the profile. | |||
| The use case may describe deployment scenarios or specific | The use case may describe deployment scenarios or specific | |||
| applications that make use of IOAM data. The use case should | applications that make use of IOAM data. The use case should | |||
| typically define the required functionality from IOAM. For example, | typically define the required functionality from IOAM. For example, | |||
| an IOAM profile may be defined such that it requires transit delay | an IOAM profile may be defined such that it requires transit delay | |||
| monitoring, but does not require path tracing. These requirements | monitoring, but does not require path tracing. These requirements | |||
| then affect which IOAM data fields are used in the profile. | then affect which IOAM data fields are used in the profile. | |||
| skipping to change at page 5, line 31 ¶ | skipping to change at page 5, line 36 ¶ | |||
| Moreover, in some cases a profile may limit the set of features of | Moreover, in some cases a profile may limit the set of features of | |||
| IOAM in a way that reduces the set of potential threats compared to a | IOAM in a way that reduces the set of potential threats compared to a | |||
| full implementation of IOAM. In fact, a particular IOAM profile can | full implementation of IOAM. In fact, a particular IOAM profile can | |||
| optimize a particular security posture or requirement. | optimize a particular security posture or requirement. | |||
| 5. Normative References | 5. Normative References | |||
| [I-D.ietf-ippm-ioam-data] | [I-D.ietf-ippm-ioam-data] | |||
| Brockners, F., Bhandari, S., Pignataro, C., Gredler, H., | Brockners, F., Bhandari, S., Pignataro, C., Gredler, H., | |||
| Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, | Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, | |||
| P., Chang, R., daniel.bernier@bell.ca, d., and J. Lemon, | P., remy@barefootnetworks.com, r., daniel.bernier@bell.ca, | |||
| "Data Fields for In-situ OAM", draft-ietf-ippm-ioam- | d., and J. Lemon, "Data Fields for In-situ OAM", draft- | |||
| data-07 (work in progress), September 2019. | ietf-ippm-ioam-data-08 (work in progress), October 2019. | |||
| [I-D.zhou-ippm-ioam-yang] | [I-D.zhou-ippm-ioam-yang] | |||
| Zhou, T., Guichard, J., Brockners, F., and S. Raghavan, "A | Zhou, T., Guichard, J., Brockners, F., and S. Raghavan, "A | |||
| YANG Data Model for In-Situ OAM", draft-zhou-ippm-ioam- | YANG Data Model for In-Situ OAM", draft-zhou-ippm-ioam- | |||
| yang-04 (work in progress), June 2019. | yang-05 (work in progress), January 2020. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| Appendix A. An IOAM Profile Example | Appendix A. An IOAM Profile Example | |||
| A.1. Overview | A.1. Overview | |||
| skipping to change at page 7, line 8 ¶ | skipping to change at page 7, line 17 ¶ | |||
| An IOAM transit/decapsulating node that receives a packet with IOAM | An IOAM transit/decapsulating node that receives a packet with IOAM | |||
| options that do not comply to the current profile should forward/ | options that do not comply to the current profile should forward/ | |||
| decapsulate the packet without IOAM processing, if it is able to do | decapsulate the packet without IOAM processing, if it is able to do | |||
| so. If a decapsulating node is not able to decapsulate an IOAM | so. If a decapsulating node is not able to decapsulate an IOAM | |||
| option that is not compliant to the current profile, the packet is | option that is not compliant to the current profile, the packet is | |||
| discarded. | discarded. | |||
| Authors' Addresses | Authors' Addresses | |||
| Tal Mizrahi | Tal Mizrahi | |||
| Huawei Network.IO Innovation Lab | Huawei Smart Platforms iLab | |||
| 8-2 Matam | ||||
| Haifa 3190501 | ||||
| Israel | Israel | |||
| Email: tal.mizrahi.phd@gmail.com | Email: tal.mizrahi.phd@gmail.com | |||
| Frank Brockners | Frank Brockners | |||
| Cisco Systems, Inc. | Cisco Systems, Inc. | |||
| Hansaallee 249, 3rd Floor | Hansaallee 249, 3rd Floor | |||
| DUESSELDORF, NORDRHEIN-WESTFALEN 40549 | DUESSELDORF, NORDRHEIN-WESTFALEN 40549 | |||
| Germany | Germany | |||
| skipping to change at page 8, line 35 ¶ | skipping to change at page 9, line 4 ¶ | |||
| Email: mspiegel@barefootnetworks.com | Email: mspiegel@barefootnetworks.com | |||
| Tianran Zhou | Tianran Zhou | |||
| Huawei | Huawei | |||
| 156 Beiqing Rd. | 156 Beiqing Rd. | |||
| Beijing 100095 | Beijing 100095 | |||
| China | China | |||
| Email: zhoutianran@huawei.com | Email: zhoutianran@huawei.com | |||
| Jennifer Lemon | ||||
| John Lemon | ||||
| Broadcom | Broadcom | |||
| 270 Innovation Drive | 270 Innovation Drive | |||
| San Jose, CA 95134 | San Jose, CA 95134 | |||
| US | US | |||
| Email: john.lemon@broadcom.com | Email: jennifer.lemon@broadcom.com | |||
| End of changes. 15 change blocks. | ||||
| 24 lines changed or deleted | 29 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||