Re: [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

Greg Mirsky <gregimirsky@gmail.com> Thu, 12 April 2018 16:54 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C7EE1270AB; Thu, 12 Apr 2018 09:54:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oIfT11Yj2vOp; Thu, 12 Apr 2018 09:54:30 -0700 (PDT)
Received: from mail-lf0-x22c.google.com (mail-lf0-x22c.google.com [IPv6:2a00:1450:4010:c07::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1619E124E15; Thu, 12 Apr 2018 09:54:30 -0700 (PDT)
Received: by mail-lf0-x22c.google.com with SMTP id u3-v6so8720389lff.5; Thu, 12 Apr 2018 09:54:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=k24k4M4BHpZA/c74l7cDQMO/rTKBXFfqPRpNx1yzCUQ=; b=tWtJ1ZfukJCpoYskv9oNf5R3xN7/pSsX8q4M/HhWm3riePkkyOHrjQa0q/jyE5vzIY KhOSqNpHOeuLVNVy3PMp6cOYeE/SaLf5LTGUMDhVmPs/cQnHiBYXzgB84lY6tQTbiL4B k6T3RrUigp6rRf7ZiGojyKuimF9BaYgBsC8hHxO879tkHZOeWVNoQoDDCpUvDTHY6Wbm SLamHi4MaGEwuSZZHj/dTLdr8a6KCkAKClgastY89JebLXhPBrevUQFILMvddE9ZUuPf x9A+zS1VfbPlcpVeB/Ag8/Sc2diGPz/mPEvu9oRRfVAz6K+7UQTjFrsQZVuLZKg9A7Ek OS+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=k24k4M4BHpZA/c74l7cDQMO/rTKBXFfqPRpNx1yzCUQ=; b=cxWyx/gzIdXEKFyDXcBqZh+BbPzQ1OiDqewuIDHufFvdSZpfhOTiiH1KyDp7SWWd3v VAcpY4Ba6qsouk6SriHVPnN/xlVFZdd9p0c9waAHYeXv8TuvBbJxBUNCrIo9t9BkQlRV gZptJNln8CJPGhL51NPVzxbEMAIAmUZeFakyj/pveocM6xFVDaL/JFmXb3FiEoVop71c pB97Sl5Fr84WX10qXkKw9QGadt5Uxle3uP4K/PkYcxEJcMIqm6GwEJy3gJkiilOxxeB7 R6uVkDAtn6IciNZohKC/Ur6WzB+QxFX5Sv0NSkoKIYHqg+prqWtFVzuRVWbn87M6Zxw6 K4QQ==
X-Gm-Message-State: ALQs6tABQK1GRcKMkz621IEQKKHsfLdL4tA1tyHERTczr4BvVanXw0eh eZb78/uM7z8LZ8DUlg7/7Fub3gVjGua/g7J3HqM=
X-Google-Smtp-Source: AIpwx4/FCOSrYcu84vBL1IVCCWUKllA97NLUExVmMHQkoD1z7w8H6CWyF6MSmNJQwqMsVY38nA5Z8jwu3eRzSoow1E8=
X-Received: by 2002:a19:3bc6:: with SMTP id d67-v6mr6210500lfl.100.1523552068123; Thu, 12 Apr 2018 09:54:28 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.73.66 with HTTP; Thu, 12 Apr 2018 09:54:27 -0700 (PDT)
In-Reply-To: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 12 Apr 2018 18:54:27 +0200
Message-ID: <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com>
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
Cc: IETF IPPM WG <ippm@ietf.org>, NVO3 <nvo3@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, int-area@ietf.org
Content-Type: multipart/alternative; boundary="000000000000d13f4a0569a99bad"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/KG4e1zpBi5weoG9Smq3CwM-lHR0>
Subject: Re: [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Apr 2018 16:54:33 -0000

Hi Frank,
thank you for sharing your points. Please find my notes in-line and tagged
GIM>>. I believe that this is very much relevant to work of other working
groups that directly work on the overlay encapsulations in the center of
the discussion and hence I've added them to the list. Hope we'll have more
opinions to reach the conclusion that is acceptable to all.

Regards,
Greg

On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne) <
fbrockne@cisco.com> wrote:

> Back at the IPPM meeting in London, we discussed several drafts dealing
> with the encapsulation of IOAM data in various protocols
> (draft-brockners-ippm-ioam-vxlan-gpe-00, draft-brockners-ippm-ioam-geneve-00,
> draft-weis-ippm-ioam-gre-00). One discussion topic that we decided to take
> to the list was the question on whether draft-ooamdt-rtgwg-ooam-header
> could be leveraged.  After carefully considering draft-ooamdt-rtgwg-ooam-header,
> I came to the conclusion that the “OOAM header” does not meet the needs of
> IOAM:
>
> * Efficiency: IOAM adds data to live user traffic. As such, an
> encapsulation needs to be as efficient as possible. The “OOAM header” is 8
> bytes long. The approach for IOAM data encapsulation in the above mentioned
> drafts only requires 4 bytes. Using the OOAM header approach would add an
> unnecessary overhead of 4 bytes – which is significant.
>
GIM>> The difference in four octets is because OOAM Header:

   - provides more flexibility, e.g. Flags field and Reserved fields;
   - supports larger OAM packets than iOAM header;
   - is future proof by supporting versioning (Version field).

* Maturity: IOAM has several implementations, which were also shown at
> recent IETF hackathons – and we’re expecting additional implementations to
> be publicized soon. Interoperable implementations need timely
> specifications. Despite the question being asked, the recent thread on OOAM
> in the NVO3 list hasn’t revealed any implementation of the OOAM header. In
> addition, the thread revealed that several fundamental questions about the
> OOAM header are still open, such as whether or how active OAM mechanisms
> within protocols such as Geneve would apply to the OOAM header. This
> ultimately means that we won’t get to a timely specification.
>
GIM>> May I ask which encapsulations supported by the implementations you
refer to. Until very recently all iOAM proposals were to use meta-data TLV
in, e.g. Geneve and NSH. And if these or some of these implementations
already updated to the newly proposed iOAM shim, I don't see problem in
making them use OOAM Header. Would you agree?


> * Scope: It isn’t entirely clear to which protocols the OOAM header would
> ultimately apply to. The way the OOAM header is defined, OOAM uses a 8-bit
> field for “Next Prot”, the next protocol. Some protocols that IOAM data
> needs to be encapsulated into use 16-bits for their next protocol code
> points. See e.g. the GRE encapsulation – as specified in
> draft-weis-ippm-ioam-gre-00.
>
GIM>> The first paragraph of the Introduction section states:
   New protocols that support overlay networks like VxLAN-GPE
   [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve
   [I-D.ietf-nvo3-geneve], BIER [I-D.ietf-bier-mpls-encapsulation], and
   NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g.
   Ethernet, IPv4/IPv6, and recognize Operations, Administration, and
   Maintenance (OAM) as one of distinct types.  That ensures that
   Overlay OAM (OOAM)packets are sharing fate with Overlay data packet
   traversing the underlay.
I'm updating the OOAM Header draft and along with cleaning nits will update
reference to GUE. I think that the list and the statemnt are quite clear in
identifying the scope of networks that may benefit from using not only
common OOAM Header but common OOAM mechanisms, e.g. Echo Request/Reply
<https://tools.ietf.org/html/draft-ooamdt-rtgwg-demand-cc-cv-03>.

With the above in mind, I’d suggest that the WG moves forward with specific
> definitions for encapsulating IOAM data into protocols – per the above
> mentioned drafts.
>
>
>
> Regards, Frank
>
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm
>
>