Re: [ippm] Lars Eggert's Discuss on draft-ietf-ippm-ioam-data-12: (with DISCUSS and COMMENT)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Mon, 12 April 2021 16:58 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8D7A3A0B1D; Mon, 12 Apr 2021 09:58:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.918
X-Spam-Level:
X-Spam-Status: No, score=-11.918 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=iQFNkQ/b; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=wgajH7C0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yKhcCLOwxZ9E; Mon, 12 Apr 2021 09:58:24 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A73F3A0AB7; Mon, 12 Apr 2021 09:58:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=179830; q=dns/txt; s=iport; t=1618246704; x=1619456304; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=COOYYWLhSgdTgloTwb/rVy6r2XC+gjIoT8iEEJ8TiI8=; b=iQFNkQ/bHC+xWhMgqtl7tFlFZX6mk5+rKDHGx3amVYM/Jo9a78umw7jm w+bc7WRxlF62fLaKUQjTtOMeaQevf45UnWInCAGuOqgPcMjLYIOaEhJrv N6sS5m7GF/gbbDgbgfLxV1pxRZWhs5nnDgBrftbR6zHbKoHkc81w6pLsa w=;
X-Files: ioam-trace-example.png : 118663
X-IPAS-Result: A0CiAAAQe3RgmJxdJa1aGwEBAQEBAQEBBQEBARIBAQEDAwEBAYISgVNRgVg2MQqEOINIA4U5iFcDjyeKFIJTA1QEBwEBAQoBAgEBMgIEAQGBW4J1AheBYgIlOBMCAwEBAQMCAwEBAQEBBQEBAQIBBgQUAQEBAQEBAQFohVANhkQBAQEBAgEFAR0dAQE3AQsEAgEIEQEDAQEBBQEBIwICAhUBGhcGCAIEDgUIBhGCUoJWAw4hAaFTAoofd4EygQGCBAEBBoUQGIIMBwmBOYJ2NYNUgUiFBiccgUlCgRNDgl8+hBkrgxU1giuBWBEdDQQtBgI8JgQNIgkLFBwvDhYlPAITARIBBQECYBKQLCEBAyyCR0KHaYFkj3uBHotcCoMLhQOCcAKIN4xzg02KeI9dhk8dlwicCCwEhGECBAIEBQIOAQEGgWshgVtwFTuCaVAXAg6OHwkDDQkVgzmKWXM4AgYBCQEBAwl8iVCBNgGBDgEB
IronPort-PHdr: A9a23:7fkSvhVGPyLLHFtm+F+tc0PqZMHV8K0IAWYlgqEPgq9Scqml45XpN VDe4vMollLSQIHH8JpshuXZvrr8H2sa7sXJvHMDdclKUBkIwYUTkhc7CcGIQUv8MLbxbiM8E cgDMT0t/3yyPUVPXsqrYVrUry6/4jEfAAm5MhB6daz5H4fIhJGx0Oa/s5TYfwRPgm+7ZrV/Z BW7pAncrI8Ym4xnf60w0RDO5HBPfrc++A==
IronPort-HdrOrdr: A9a23:YtdKiK7IyTGgunDw+QPXwZqFI+orLtY04lQ7vn1ZYSd+NuSFis Gjm+ka3xfoiDAXHEotg8yEJbPoexLh3LZPy800Ma25VAfr/FGpIoZr8Jf4z1TbdRHW3tV2kZ 1te60WMrLNJHBxh8ri/U2cG9Ev3NGI/MmT9Jjj5l1GJDsaDJ1IxQF/FwqdDwlSTA5JGZI2GP Onl7R6jhCnfmkaadn+O2kdU4H41pP2vb/FQTpDPR4o7wGSkSilgYSbLzG01goTOgk/uosK3n PCl2XCl8CemtG9jiTRzmrCq6lR8eGRtudrIOyppowrJi73igCuDb4RGoGqmDwuuumg5BILvb D30m0dFv9+4X/QYW25yCGFs2KLvVpeiA6B9XaijXTuusD/Tj4hYvAx+L5xSAfT6EYrobhHoc R29l+ZrJZeAFfhmynw9rHzJmlXv3e0unYrnKoviWVeW+IlGcZshLEYlXkldKsoLWbf0sQKAe NuBMbT6LJ9alWBdU3UuWFp3ZiFQmkzNg3ueDlDhuWllxxt2FxpxUoRw8IS2l0a8ogmdpVC7+ PYdox1ibB1SNMMZ64VPpZDfeKHTkj2BT7cOmObJlrqUIsdPWjWlpLx6LIpoManZYIP15l3vJ jaSltXuSoTdivVeI+z9awO1iqIbHS2XDzrxM0bzYN+oKfASL3iNjDGR0spl8emvvUDEszWU/ u+I/ttcrveBFqrPbwM8xz1WpFUJ3VbetYSoMwHV1WHpd+OKoCCjJ2dTN/jYJ7WVRo0UGL2BX UOGBLpIt9b00ytUnjkxBzYW3bnfF3j7Yt9eZKqudQ7+cwoDMlhowIVgVO26oWgMjtZqJE7e0 N4PffgiaO0pW6/+G7S9GV3Mh9BDkJYiY+QFk9ilEsvCQfZYLwDs9KQdSR5x32cPCJySMvQDU pCvVht4Lm2KJaR3CgmDNqiPguh/iIujUPPa61ZtryI5M/jdJ99M40vX7ZpEx7XUzZvnxxxlW tFYAgYZ0PWGz/0k5+5hJgMCOy3TaglvC6bZepv7VPWrwG1uNwmTHpzZU/ebeenxSIVAwdyqn I02akFm7aEkSuoMgIE8ZQFGWwJTn+WDrJABBmCf6NOlNnQCVpNZFbPoyCGgBcufWev0EMeig XaXHCpUMCOJEZBsXZF1auvyndITyG2ekJ9bW0Si/wmKU3Ppmtz3eiXZqC6zmuWbR8YzvsANS zeCAFiUT9G1pS50gWYly2FEmhjzpIyPvbFBLBmaL3L3GixQbf42J0uDrtR/Jx/MsrpvfJOWe WDexWNJDeQMZJj5yWF4nIkMjJzsn8qjLfh3wDk9nGx2Do6DeDJKFprA7EdLNf01Rmve9+YlJ F4h8kyp+2+LyH4bcOH07jea3pbMQzIyFTGOd0AuNRRp+Y/pbFzF57UXX/B02xGxgw3KIPxmF kFSKp27bjdMuZUDoAvUjMc+kBsmMWELUMtvACzGOM4cF03h3LQPt+C4dPz2PISK1zEoBG1NU iU8iVb8fuAQjCK0qQCDbksZWtRc0ox5R1Zjay/XpyVDB/vce5N/FC3aCDgNLBcTbWIArUWoF Jx5cqSk+qeair/30TRsFJAU9Zz2nfiRdn3BgSGXfNM+Zi9P1+Hh6Ox+s69jDvtU1KAGg0lrJ wAcVZVd9hJjzkpkZY+3SezQLHmu05NqSoq3Rh30lr2npW86GjVHUtaIRTUj5VfUz5UKGWJh6 3+gJ+l/WW45iNE15nFHFpRed8LG8F4dPmEExtT
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,216,1613433600"; d="png'150?scan'150,208,150";a="668564655"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 12 Apr 2021 16:58:22 +0000
Received: from mail.cisco.com (xbe-rcd-006.cisco.com [173.37.102.21]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 13CGwLK1004924 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 12 Apr 2021 16:58:21 GMT
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-rcd-006.cisco.com (173.37.102.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Mon, 12 Apr 2021 11:58:21 -0500
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Mon, 12 Apr 2021 11:58:21 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Mon, 12 Apr 2021 11:58:21 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g0cZScY2wLyr4pUvr8zFFTA/29nJn0h1SDcuFpATkluL/WT/EdcHRDSLofwQIOYO+HXoIQW9zS/27yJzuD/1bn10szNnscSHVl2nyK84aG0PoLQyRFByXl9qP/2Rj3HwE5Xo+lp6EsZyFiXMZL8VymMpTxvJKoEO8mgVdrMmLbACQyOO7Ei5DAh5d2HM2U5/jHrk1N9yqEMS4Vvi+OFqjTEj+08bJxQQc1q6mYc0sqSn6rcdXpaFMAFSPIwZ3c4N7SzxpaFGph0Hj3NPTL3Y+zT0mhejwry//nkKJs69aM8SYm2eHlc8AhD6CD+0wuEko9lKw5QZCeYbcMi1iczF2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xlN8E96WIjHx6autfummFohKaDUYCe/KlkhttXnfea8=; b=WC1ZVmDM066z65dpSvTxyAMre+4Jd7Pw65g0sU9yfb7Z2fxnGv+HyYSCNNMes+n6wYzc5JJtYialhox82XnNAxLFA81l6ox8CwXPH217ODcSFtZ90IzsG3E1gF47QhVZvVaQ57XeIzSPbw2OOSdFMyy6plKsEUTCpBWjuT1PLpj9Ixd27xC+LHhMHaSslqs1GuNnbgESQK/B0ygRPbFtHVpCdry9a8PnzgHoJCvUUIkGOAB0odx/ppavx0QdUjo3azOPFO5DYStZf/m/jr4yF40f62nMBL7v+m1BhAHJXBxVpJ6QS+MQSbljOJnOHphvEI0yHJW5K+uhZ1oTlithAw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xlN8E96WIjHx6autfummFohKaDUYCe/KlkhttXnfea8=; b=wgajH7C0+7z+/WSd2ovuMWcHmfukJu61Chw4kIJLvbWG0MjnwptpDiQx7MY+gZK/nY7KggOTXcovIFXgI4SITLa5FprSt0jtTwxUvU4vu7O8ec32aXu/2w5LiNp/uZV/qEkIwXUzmxVT9kC8C9xugdwouaDJkhb4Sdl6OHssVSo=
Received: from BYAPR11MB2584.namprd11.prod.outlook.com (2603:10b6:a02:c8::31) by SJ0PR11MB4781.namprd11.prod.outlook.com (2603:10b6:a03:2d8::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.18; Mon, 12 Apr 2021 16:58:20 +0000
Received: from BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::f43e:a30f:8e8f:1e93]) by BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::f43e:a30f:8e8f:1e93%6]) with mapi id 15.20.3999.033; Mon, 12 Apr 2021 16:58:19 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Lars Eggert <lars@eggert.org>
CC: The IESG <iesg@ietf.org>, "draft-ietf-ippm-ioam-data@ietf.org" <draft-ietf-ippm-ioam-data@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, Al Morton <acm@research.att.com>
Thread-Topic: Lars Eggert's Discuss on draft-ietf-ippm-ioam-data-12: (with DISCUSS and COMMENT)
Thread-Index: AQHXIXKPxK7/c1+mik++OpFqpHZ06qqvlvyQgAD4vQCAAJ6LkA==
Date: Mon, 12 Apr 2021 16:58:19 +0000
Message-ID: <BYAPR11MB2584B4F0CF9DF43370D103D0DA709@BYAPR11MB2584.namprd11.prod.outlook.com>
References: <161667538893.15241.7322339760692550091@ietfa.amsl.com> <BYAPR11MB258481FC2FB8EC909D59969EDA719@BYAPR11MB2584.namprd11.prod.outlook.com> <3D4CC7F2-66F5-4EE3-AFC0-315BD2C7E0D2@eggert.org>
In-Reply-To: <3D4CC7F2-66F5-4EE3-AFC0-315BD2C7E0D2@eggert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: eggert.org; dkim=none (message not signed) header.d=none;eggert.org; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.220.42]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cc17309a-b077-4428-e5c2-08d8fdd42cce
x-ms-traffictypediagnostic: SJ0PR11MB4781:
x-microsoft-antispam-prvs: <SJ0PR11MB4781480DFB294D7F7C5FF7F1DA709@SJ0PR11MB4781.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2584.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(136003)(366004)(396003)(346002)(39860400002)(376002)(86362001)(186003)(8936002)(4001150100001)(8676002)(26005)(76116006)(478600001)(4326008)(38100700002)(6506007)(33656002)(71200400001)(53546011)(7696005)(54906003)(5660300002)(99936003)(2906002)(6916009)(9686003)(66556008)(66476007)(66446008)(52536014)(66946007)(83380400001)(55016002)(30864003)(64756008)(66616009)(316002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/mixed; boundary="_002_BYAPR11MB2584B4F0CF9DF43370D103D0DA709BYAPR11MB2584namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2584.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cc17309a-b077-4428-e5c2-08d8fdd42cce
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Apr 2021 16:58:19.7777 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: szK1J0pB5gvhKf5zoF9RDOrPkY0Zc7yPbuAENLlpaofY70bRjc0+9GuOLBfzNiDzAlMDS3ODvCoa090C/NtlvQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB4781
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.21, xbe-rcd-006.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/Et6ooJnMSUYmQZMw257Fo3ggr6k>
Subject: Re: [ippm] Lars Eggert's Discuss on draft-ietf-ippm-ioam-data-12: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Apr 2021 16:58:30 -0000

Hi Lars,

> -----Original Message-----
> From: Lars Eggert <lars@eggert.org>
> Sent: Montag, 12. April 2021 08:59
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> Cc: The IESG <iesg@ietf.org>; draft-ietf-ippm-ioam-data@ietf.org; ippm-
> chairs@ietf.org; ippm@ietf.org; Al Morton <acm@research.att.com>
> Subject: Re: Lars Eggert's Discuss on draft-ietf-ippm-ioam-data-12: (with
> DISCUSS and COMMENT)
> 
> Hi,
> 
> On 2021-4-11, at 19:46, Frank Brockners (fbrockne) <fbrockne@cisco.com>
> wrote:
> >> Not requiring at least one mandatory-to-implement trace option type
> >> is highly problematic, since it creates two incompatible flavors of this
> standard.
> >> Preventing bifurcation seems to trump the desire for allowing
> >> (minor?) optimizations.
> >
> > ...FB: There seems to be some confusion and potential misunderstanding here:
> The two different Trace Option-Types would not lead to two incompatible
> flavors of the standard:
> > Each Trace Option-Type fills in the exact same IOAM data-fields - i.e. " node
> data list [i]" looks the exact same whether pre-allocated or incremental trace
> option types are used.
> 
> I was with you until here, thinking I had misunderstood the draft.
> 
> > Each Trace Option-Type just handles a different “bucket” in the packet.
> 
> But then this sentence confused me again.
> 
> This is what I am trying to understand: Let's assume IOM data gets added to a
> packet by an implementation using the pre-allocated format. It now gets
> forwarded to another node with an implementation using the incremental
> format. Can that second implementation, access, parse and update the IOAM
> information in the packet? Is the reverse also possible (first stack is using
> incremental format, second stack is using preallocated format?)
> 
> If the answer is yes to both of these, I have misunderstood the spec, and my
> discuss is moot.
> 
> If not, then I don't see how a deployment can mix hardware- and software-
> based forwarders?

... FB: Perhaps a picture can help - see attached. The example shows a 5 node setup:
* Node A is the encap node; node E is the decap node; nodes B,C,D are transit nodes. The node data list [i] array is abbreviated with ndl[i].
* We have a setup with a mix of software (SW - using preallocated trace Option-Type) and hardware (HW - using incremental trace Option-Type) forwarders.
* The encap node inserts trace option types for both flavors (pre-allocated and incremental). For pre-allocated, we make room for an array of three hops. 
* The picture gives a view of the packet at 3 tap points:
1) After nodes A and B: You see the two buckets, one for incremental-tracing, one for pre-allocated tracing. In both buckets, there one field of the node data list filled.
2) After node C, which is a software forwarder, an additional field in the node data list of the pre-allocated tracing bucket got filled.
3) After node D, which is a hardware forwarder, an additional field in the node data list of the incremental tracing bucket got allocated and filled.
* Node E would simply strip the IOAM information from the packet and forward it to some controller/collector. draft-spiegel-ippm-ioam-rawexport is one example of how to handle export using IPFIX. Note that node E would not do any interpretation of the data. It just strips it from the packet and ships it.

> 
> > And each Trace Option-Type caters for a different type of transit node:
> Software-based forwarders and Hardware-based forwarders. The differences
> between the two are not negligible. Memcopy is expensive for a software
> forwarder, as is a pointer-lookup in the packet for a hardware forwarder. The
> fact that there are two Option-Types that cater for different types of transit
> nodes is the result of long discussions. The two different ways to carry the data-
> fields is to ensure that IOAM can be deployed on a wide variety of devices. I'm
> afraid, that if we'd drop one variant, or make one variant mandatory, all we'd
> get is a slowed down adoption of the standard, because we would restrict IOAM
> tracing to either software forwarders or hardware forwarders.
> 
> I fully understand that at the moment, there is a performance difference. If this
> technology actually takes off, I believe that both hardware and software
> techniques will be developed that will mitigate those performance differences.
> This has played out time and time again for different standars.

...FB: I would really wish you were right. The issue is that we all have the IPv6 extension header example in mind, which started to put pointers into packets, requiring pointer lookup to properly parse extension headers... You know how long it took the industry to come up with basic support for HbyH or routing extension headers in hardware. We're still in the middle of this journey.
This is pretty much what drove the design for two different types of "buckets" - so that forwarders can insert the information into the bucket that suits them.

> 
> > That said, one thing that we should underline in the document is the fact that
> encap and decap nodes SHOULD be capable of inserting and removing both
> Trace-Option types. That way, there won’t be any compatibility challenge at all.
> Transit nodes of different type (HW or SW) would write the information into
> "their" type of bucket. Extracting the information at the decap node would be
> common in any case.
> 
> You'd need to mandate that both must be inserted into the packets, and on
> decap, you'd need to specify how an implementation is supposed to merge the
> information contained in the two different option types to construct
> information about what happened on the path.

...FB: Agree that we'd need to add a statement that encap/decap nodes SHOULD be able to insert/remove both trace Option-Types, because on encap/decap the effort between forwarders is comparable.
Per my note above, there is no need for the decap node to do any type of consolidation. It would just strip the different option types, and there could be additional ones, like POT or E2E Option-Types and ship the information to some controller/management station for further processing. 

> 
> >
> >>
> >> ---------------------------------------------------------------------
> >> -
> >> COMMENT:
> >> ---------------------------------------------------------------------
> >> -
> >>
> >> Section 1, paragraph 4, comment:
> >>>   IOAM use cases and mechanisms have expanded as this document
> matured,
> >>>   resulting in additional flags and options that could trigger creation
> >>>   of additional packets dedicated to OAM.  The term IOAM continues to
> >>>   be used for such mechanisms, in addition to the "in-situ" mechanisms
> >>>   that motivated this terminology.
> >>
> >> Suggest to rephrase this expanded view on IAM in a way that does not
> >> tie the description to the time period during which this
> >> soon-to-be-archival document was edited.
> >
> > ...FB: Thanks. Good suggestion - which we'll reflect in the next revision.
> >
> >>
> >> Section 5.2, paragraph 6, comment:
> >>>   A transit node MUST ignore IOAM-Option-Types that it does not
> >>>   understand.  A transit node MUST NOT add new IOAM-Option-Types to a
> >>>   packet, MUST NOT remove IOAM-Option-Types from a packet, and MUST
> >> NOT
> >>>   change the IOAM-Data-Fields of an IOAM Edge-to-Edge Option-Type.
> >>
> >> I'm surprised that IOAM data isn't authenticated or even
> >> integrity-protected at all. Relying on RFC2119 language alone seems a pretty
> weak protection.
> >
> > ...FB: Integrity protection of IOAM data fields is handled in a sister document:
> draft-brockners-ippm-ioam-data-integrity.
> 
> Thanks, I missed that. But that is an informational reference to an individual I-D.
> I'm still surprised that integrity protection of IOAM data is not more of a concern
> for the architecture that is being proposed here?

...FB: The integrity discussion only started recently - likely because the current deployments of early IOAM / or similar implementations are within "limited domains". We also need to ack the cost of signing the IOAM data, which is not negligible. 

> 
> >>
> >> I'll note that cryptographically authenticating IOM data would
> >> probably result in a system that wouldn't need the concept of
> >> namespaces, because keys would automatically serve that purpose. (A
> >> device can't update an IOAM data item if it doesn't have the key to
> >> authenticate the update with.)
> >
> > ...FB: Looking at the way you interpreted the meaning of namespaces, we'll
> probably need to add some additional explanation of  the role of namespaces.
> 
> I think that would be very helpful. I think Ben's ballot position goes into more
> detail here, so please check with him on this.

... FB: We'll do. I'm still in catch-up mode after the break.
> 
> > Section 5.4, paragraph 11, comment:
> >>>   o  Time of day when the packet was processed by the node as well as
> >>>      the transit delay.  Different definitions of processing time are
> >>>      feasible and expected, though it is important that all devices of
> >>>      an in-situ OAM domain follow the same definition.
> >>
> >> I think "important" is an understatement, this seems required? Also,
> >> capturing time-of-day seems to require synchronized clocks.
> >
> > ...FB: As usual, the answer is "in depends". If one is just interested in capturing
> jitter, then one might also do with non-synchronized clocks.
> 
> I'd suggest that clock sync should then be recommended, with the caveat that
> unsync'ed clocks may be allowed when jitter is all that will be evaluated for.

...FB: We can add this context/explanation to the document. 
> 
> > Section 5.4.2.12, paragraph 2, comment:
> >>> 5.4.2.12.  buffer occupancy
> >>>
> >>>   The "buffer occupancy" field is a 4-octet unsigned integer field.
> >>>   This field indicates the current status of the occupancy of the
> >>>   common buffer pool used by a set of queues.  The units of this field
> >>>   are implementation specific.  Hence, the units are interpreted within
> >>>   the context of an IOAM-Namespace and/or node-id if used.  The authors
> >>>   acknowledge that in some operational cases there is a need for the
> >>>   units to be consistent across a packet path through the network,
> >>>   hence it is RECOMMENDED for implementations to use standard units
> >>>   such as Bytes.
> >>
> >> There are other "standard units" here, such as packets. You'd need to
> >> recommend a specific standard unit and not just give an example.
> >
> > ...FB: The topic of "units" for IOAM data fields has been discussed quite a bit
> and not prescribing units is the result of this discussion. The approach that the
> draft takes is to "avoid specifying a unit unless you have to", because it is quite
> easy to translate units in backend analytics systems. As long as one properly
> understands which unit is used for a particular field, backend systems can easily
> interpret the data and there is no need to prescribe a particular unit.
> 
> Yes, but that "as long as" qualification is a pretty big one. It would mean that the
> backend systems need to have detailed knowledge of what each device along
> the path is configured to use as units. That seems a pretty dangerous
> assumoption?

...FB: You can group devices which use a particular unit for buffers into the same namespace. This is what namespaces are for. 
The backend system would maintain a mapping of what unit is used for buffers for a particular namespace. 

> 
> >> Given that the max. value for microseconds is 999999, using a 32-bit
> >> field leaves the top eight bits unused.
> >
> > ...FB: True. Are you suggesting that we'd rather make the top 8-bits "reserved"
> because they will never be used anyway?
> 
> I'm just pointing it out, in case you'd want to use those eight bits for second-
> level info.

...FB: Good point. Let's see what other folks think - whether we should keep things as they are, or leverage the fields to grow the seconds range.

Thanks again, Frank
> 
> Thanks,
> Lars