Re: [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
Greg Mirsky <gregimirsky@gmail.com> Thu, 19 April 2018 16:31 UTC
Return-Path: <gregimirsky@gmail.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 233CB12DA28; Thu, 19 Apr 2018 09:31:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KJcJuJNxH0z4; Thu, 19 Apr 2018 09:31:02 -0700 (PDT)
Received: from mail-lf0-x234.google.com (mail-lf0-x234.google.com [IPv6:2a00:1450:4010:c07::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BDEF12DA4F; Thu, 19 Apr 2018 09:31:02 -0700 (PDT)
Received: by mail-lf0-x234.google.com with SMTP id x130-v6so1047960lff.9; Thu, 19 Apr 2018 09:31:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=PXxDqdkMEO81504Z0o2gv7fJaO1X6Dsm2ZmgojdsdgY=; b=UqMDMfzaAq3x4/uFAmXQoxSZu5jwlbQZrNZOANbXkuwdgiXIR37jPITU6SXDXTE/5B 5DkkHnbzaDU59OkcMHvc9+dh0NU4IsWPCrqpX8PFcqzNN/Ab3WYRs3l3IUv7GC7bWH9v qj1AmVcFRVVMzckZdukjZ2THGKIyuRqnr7+rWTPJZV9Imo2ffpbGHU1PbmZDmUVVr74B mKEduKvCjsBW0halpw22TTnNOKVMH1aU2qdSv8P/ld+P86c3mpBK6nv1HA7ZRiE4//CQ lcHXPg15wuFdFGXblvvWhAgNNN8hlu1+HfLfaQzbN4reegn9VXre+tIQC+V6ZG1xXb/B BF4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=PXxDqdkMEO81504Z0o2gv7fJaO1X6Dsm2ZmgojdsdgY=; b=Emlz+7+bUkdyMH5G597pfDFcbT3z5SOOhiiESxXB++IlM5qckZKgL+ZdD3eRi3oUsJ oHoX2N+7M8dNj0S58gt/mCcBqnKa6d9EOt0CcuKFq+k+6IBsFS04gIaOf5VnARCLwpgf RBJvEHNxi5WRB/mBsit4yyPz879CcQg0TVIoU0Q46vtQg7oKAruTkhqaYl1nJlo0piD/ bkyTLHJ2eO5m+/KvmZCK2o3kK8Vfx7mYNo/7ej1OvbdAttXw6U/iZE/YDQ8S7C8XE2md sed23TnzTqlwxdy3UsMxl+5M00qt6ofVV5g///3PITdMnPTXzXU04WylWhFF51AD3U8f 88Fw==
X-Gm-Message-State: ALQs6tAfPbkaZ7XE7+bCzSfvawZIsybGEP1cyDxolJa+eqJIpIpM8269 s2ag/ImveH99L5NRYrXyx6kEdeGVf/yINewYPHo=
X-Google-Smtp-Source: AIpwx49aasDDIQJqsm3jdNOhld8KDkeSrPWRwe8Xx9ciJvnzDUS1xeoaN2k7GUT86LSu0VvgMvibtIAMwERHRjJMFO8=
X-Received: by 10.46.156.81 with SMTP id t17mr4990143ljj.58.1524155460180; Thu, 19 Apr 2018 09:31:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.73.66 with HTTP; Thu, 19 Apr 2018 09:30:59 -0700 (PDT)
In-Reply-To: <CAPOJaHwZau-+jRRqK99dtTrw0t7E4gZRL_wM4ks9OWJ-YC1dpg@mail.gmail.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com> <f48b40357e644666bdd5c51c63118f80@XCH-RCD-008.cisco.com> <CAPOJaHwZau-+jRRqK99dtTrw0t7E4gZRL_wM4ks9OWJ-YC1dpg@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 19 Apr 2018 09:30:59 -0700
Message-ID: <CA+RyBmUFvgYhkFYv4J1G6ujiuB=Nt6+E35hp1m87f7Q=4tQkyQ@mail.gmail.com>
To: John Lemon <john.lemon@broadcom.com>
Cc: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, NVO3 <nvo3@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, IETF IPPM WG <ippm@ietf.org>
Content-Type: multipart/alternative; boundary="f4f5e80ee2f8c96174056a361897"
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/7KaRD7nTgTVYQKX0HN6-nL1vhWc>
Subject: Re: [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Apr 2018 16:31:10 -0000
Hi John, I don't argue with the importance of interoperable implementations (though early implementations accept the risk of non-compliance with the final specification, for example, SFC NSH). At the same time, I don't think that mere fact of existing implementation should cancel discussion of technical characteristics of the proposed approaches to hybrid OAM. Regards, Greg On Thu, Apr 19, 2018 at 9:09 AM, John Lemon <john.lemon@broadcom.com> wrote: > I never saw a response to the request for a pointer to an OOAM > implementation, so I assume none exist. > > I've seen several good arguments for why the existing IOAM implementation, > for which several implementations exist, meets the needs for IOAM. > > I think it is time to put to bed the request to examine merging OOAM and > IOAM. Let's move forward with IOAM and not hold it up. > > Respectfully, John > > > On Thu, Apr 12, 2018 at 11:06 AM, Frank Brockners (fbrockne) < > fbrockne@cisco.com> wrote: > >> Hi Greg, >> >> >> >> thanks – and it seems that we’re on the same page with regards to >> efficiency (4 bytes of non-required overhead) and maturity (or lack of) of >> OOAM. >> >> >> >> On the IOAM implementation: There are several implementations of IOAM. >> Some of which have recently been worked on and shown at an IETF hackathon, >> see https://datatracker.ietf.org/meeting/100/materials/slides-10 >> 0-hackathon-sessa-in-situ-oam-ioam - where we’ve shown IPv6 and >> VXLAN-GPE with IOAM – on FD.io/VPP as well as on Barefoot Tofino. You >> probably also remember the Netronome/Broadcom demo - >> https://www.youtube.com/watch?v=j9FbD4a3F4E . >> >> Below you seem to be specifically referring to the IOAM open source >> implementation in FD.io/VPP: There are protocol encapsulations for >> VXLAN-GPE, NSH, and IPv6 implemented in FD.io/VPP. The current code uses >> the “next header approach” for VXLAN-GPE and it leverages MD-Type 2 for >> NSH. As you’re well aware, there the discussion in SFC whether to use >> MD-Type 2 or next header encapsulating IOAM data in NSH isn’t yet settled, >> hence we’ll refrain from updating the code until SFC WG has come to a >> conclusion. >> >> >> >> Could you provide a pointer to an OOAM implementation? >> >> >> >> Thanks, >> >> Frank >> >> >> >> *From:* Greg Mirsky <gregimirsky@gmail.com> >> *Sent:* Donnerstag, 12. April 2018 18:54 >> *To:* Frank Brockners (fbrockne) <fbrockne@cisco.com> >> *Cc:* IETF IPPM WG <ippm@ietf.org>; NVO3 <nvo3@ietf.org>; Service >> Function Chaining IETF list <sfc@ietf.org>; int-area@ietf.org >> *Subject:* Re: [ippm] encapsulation of IOAM data in various protocols - >> follow up from WG discussion in London >> >> >> >> Hi Frank, >> >> thank you for sharing your points. Please find my notes in-line and >> tagged GIM>>. I believe that this is very much relevant to work of other >> working groups that directly work on the overlay encapsulations in the >> center of the discussion and hence I've added them to the list. Hope we'll >> have more opinions to reach the conclusion that is acceptable to all. >> >> >> >> Regards, >> >> Greg >> >> >> >> On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne) < >> fbrockne@cisco.com> wrote: >> >> Back at the IPPM meeting in London, we discussed several drafts dealing >> with the encapsulation of IOAM data in various protocols >> (draft-brockners-ippm-ioam-vxlan-gpe-00, draft-brockners-ippm-ioam-geneve-00, >> draft-weis-ippm-ioam-gre-00). One discussion topic that we decided to take >> to the list was the question on whether draft-ooamdt-rtgwg-ooam-header >> could be leveraged. After carefully considering >> draft-ooamdt-rtgwg-ooam-header, I came to the conclusion that the “OOAM >> header” does not meet the needs of IOAM: >> >> * Efficiency: IOAM adds data to live user traffic. As such, an >> encapsulation needs to be as efficient as possible. The “OOAM header” is 8 >> bytes long. The approach for IOAM data encapsulation in the above mentioned >> drafts only requires 4 bytes. Using the OOAM header approach would add an >> unnecessary overhead of 4 bytes – which is significant. >> >> GIM>> The difference in four octets is because OOAM Header: >> >> - provides more flexibility, e.g. Flags field and Reserved fields; >> - supports larger OAM packets than iOAM header; >> - is future proof by supporting versioning (Version field). >> >> * Maturity: IOAM has several implementations, which were also shown at >> recent IETF hackathons – and we’re expecting additional implementations to >> be publicized soon. Interoperable implementations need timely >> specifications. Despite the question being asked, the recent thread on OOAM >> in the NVO3 list hasn’t revealed any implementation of the OOAM header. In >> addition, the thread revealed that several fundamental questions about the >> OOAM header are still open, such as whether or how active OAM mechanisms >> within protocols such as Geneve would apply to the OOAM header. This >> ultimately means that we won’t get to a timely specification. >> >> GIM>> May I ask which encapsulations supported by the implementations you >> refer to. Until very recently all iOAM proposals were to use meta-data TLV >> in, e.g. Geneve and NSH. And if these or some of these implementations >> already updated to the newly proposed iOAM shim, I don't see problem in >> making them use OOAM Header. Would you agree? >> >> >> >> * Scope: It isn’t entirely clear to which protocols the OOAM header would >> ultimately apply to. The way the OOAM header is defined, OOAM uses a 8-bit >> field for “Next Prot”, the next protocol. Some protocols that IOAM data >> needs to be encapsulated into use 16-bits for their next protocol code >> points. See e.g. the GRE encapsulation – as specified in >> draft-weis-ippm-ioam-gre-00. >> >> GIM>> The first paragraph of the Introduction section states: >> >> New protocols that support overlay networks like VxLAN-GPE >> >> [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve >> >> [I-D.ietf-nvo3-geneve], BIER [I-D.ietf-bier-mpls-encapsulation], and >> >> NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g. >> >> Ethernet, IPv4/IPv6, and recognize Operations, Administration, and >> >> Maintenance (OAM) as one of distinct types. That ensures that >> >> Overlay OAM (OOAM)packets are sharing fate with Overlay data packet >> >> traversing the underlay. >> >> I'm updating the OOAM Header draft and along with cleaning nits will >> update reference to GUE. I think that the list and the statemnt are quite >> clear in identifying the scope of networks that may benefit from using not >> only common OOAM Header but common OOAM mechanisms, e.g. Echo >> Request/Reply >> <https://tools.ietf.org/html/draft-ooamdt-rtgwg-demand-cc-cv-03>. >> >> >> >> With the above in mind, I’d suggest that the WG moves forward with >> specific definitions for encapsulating IOAM data into protocols – per the >> above mentioned drafts. >> >> >> >> Regards, Frank >> >> >> _______________________________________________ >> ippm mailing list >> ippm@ietf.org >> https://www.ietf.org/mailman/listinfo/ippm >> >> >> >> _______________________________________________ >> ippm mailing list >> ippm@ietf.org >> https://www.ietf.org/mailman/listinfo/ippm >> >> >
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Frank Brockners (fbrockne)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Mickey Spiegel
- Re: [Int-area] [ippm] encapsulation of IOAM data … Carlos Pignataro (cpignata)
- Re: [Int-area] [nvo3] [ippm] encapsulation of IOA… Carlos Pignataro (cpignata)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … Frank Brockners (fbrockne)
- Re: [Int-area] [ippm] encapsulation of IOAM data … 徐小虎(义先)
- Re: [Int-area] [nvo3] [ippm] encapsulation of IOA… Frank Brockners (fbrockne)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Mickey Spiegel
- Re: [Int-area] [sfc] [ippm] encapsulation of IOAM… Uma Chunduri
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … Frank Brockners (fbrockne)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tianran Zhou
- Re: [Int-area] [ippm] encapsulation of IOAM data … Frank Brockners (fbrockne)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tianran Zhou
- Re: [Int-area] [ippm] encapsulation of IOAM data … Shwetha Bhandari (shwethab)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tianran Zhou
- Re: [Int-area] [ippm] encapsulation of IOAM data … Tom Herbert
- Re: [Int-area] [ippm] encapsulation of IOAM data … John Lemon
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … Frank Brockners (fbrockne)
- Re: [Int-area] [ippm] encapsulation of IOAM data … Greg Mirsky
- Re: [Int-area] [ippm] encapsulation of IOAM data … John Lemon
- Re: [Int-area] [ippm] encapsulation of IOAM data … Frank Brockners (fbrockne)