Re: [ippm] 答复: WGLC for STAMP Extensions

Greg Mirsky <gregimirsky@gmail.com> Sat, 06 June 2020 17:33 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3F943A08D8 for <ippm@ietfa.amsl.com>; Sat, 6 Jun 2020 10:33:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4tLiIR6z_GA5 for <ippm@ietfa.amsl.com>; Sat, 6 Jun 2020 10:33:17 -0700 (PDT)
Received: from mail-lj1-x233.google.com (mail-lj1-x233.google.com [IPv6:2a00:1450:4864:20::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCEC13A08D5 for <ippm@ietf.org>; Sat, 6 Jun 2020 10:33:16 -0700 (PDT)
Received: by mail-lj1-x233.google.com with SMTP id j18so2524872lji.2 for <ippm@ietf.org>; Sat, 06 Jun 2020 10:33:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=MD+xRjq4XE4Ol22ZpznpQqkPS6i6yukV9TPm4RSBv/4=; b=HGxxWli/00eSYyMn+rDLciv1c92v20JkbPL576PP/VBZzti4xzIVU6rQ1IkKM281/y AaSRXILce8hAeirejSgabiuMRaRbv54H4cNYAiQfxPI9epqeSP7wD8tL41gcAU/TQQjh VpdHtn6d7y306GijGD9YsLB6ORV1y6Sbd926mHCcllXMqxlQ3Fe4VWYFeXOmTjrFkoY9 ppcGF5UDW60xyiVH8aJMbrGa2FJCUX0RXhLuH+lnWG0ipSplulD9k3u51843g8S6f3st id/2NtZfGHPXFzBfSP8DXtAm5oxsxcbCSNdPxowBYcHZN6C+4vADjXYp4fw6dbt7ijrK KdhQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=MD+xRjq4XE4Ol22ZpznpQqkPS6i6yukV9TPm4RSBv/4=; b=Oz/i70b5/o6aqNrBtBa9eb2+xJZdaLrRpgZLyjnflUsMu88Oqd5y20LMospqVvgnX4 TxtMiyM2zCw+Q9kJT7i5+AEEaPiSXDh5df2Nu/dA88NmGubgUAJqMmmeP0B5UcEu8Y1/ G1einDbiFkYJe44nJCFBqMIvVmhVNfJhIsSvr2DTazBvYigejeqqyvbdxLFEUl5fy0zm LtDUJG/H547RpoTqo5weJ6Z0g2RkI7XT7V+6svHiHaSWZorJmtkOGK6+miCzIXGuIJ5G sZxngjyJ1fpt8/KPB7GRHXRkHX3qqfPKvZmgWXO2r+t13T+rhKS8pbiSnE4bU8EH42zX rJQw==
X-Gm-Message-State: AOAM530GHIiHFq8l/59FyXnoJrFtImN0G8ytCu964GIRSEE0dQmjzrsQ KBMLhZFtnyElMRlCZ497XLkP++TBBWgiNYQ0MUw=
X-Google-Smtp-Source: ABdhPJyfA60Ce/cgHHDt5LxGmiFdqULYp9vQqtyhLR9Euokrd4SChOIMogt4TSgrYS6QjnzBFhf0WBgn59ymOnOGTTA=
X-Received: by 2002:a2e:b17b:: with SMTP id a27mr7919005ljm.288.1591464793114; Sat, 06 Jun 2020 10:33:13 -0700 (PDT)
MIME-Version: 1.0
References: <CAKcm_gMVc88xpkOMmV7L-ybVCBzw+LhNS6Jw3=iB2gutR0ZhxA@mail.gmail.com> <48ED4E513E517844B7A0FAA7C5B661164919EEB6@dggemm513-mbx.china.huawei.com> <CA+RyBmUaQEeQXiW5PabcrGoUXeMk2Nr_Yo8V8hxVd37DUA=Xtw@mail.gmail.com> <48ED4E513E517844B7A0FAA7C5B66116491A23E0@dggemm513-mbx.china.huawei.com> <CA+RyBmUDBzikdK1AXGM5zQWYCsJ==ozupODqr96Z6bsXk38q5w@mail.gmail.com> <48ED4E513E517844B7A0FAA7C5B66116491A2ADE@dggemm513-mbx.china.huawei.com>
In-Reply-To: <48ED4E513E517844B7A0FAA7C5B66116491A2ADE@dggemm513-mbx.china.huawei.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Sat, 06 Jun 2020 10:33:02 -0700
Message-ID: <CA+RyBmWQwVbvtJEuQ8fmHcw4XDbjRiV5LkwoPqj-4UJ3JE3yCA@mail.gmail.com>
To: "Songyuezhong (songyuezhong, IP technology Research Dept)" <songyuezhong@huawei.com>
Cc: Ian Swett <ianswett=40google.com@dmarc.ietf.org>, "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>, Tianran Zhou <zhoutianran@huawei.com>
Content-Type: multipart/alternative; boundary="000000000000aa8a9005a76dc5ad"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/SyEClDvkoKBUWiwzsWT1pCLaxEY>
Subject: Re: [ippm] 答复: WGLC for STAMP Extensions
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Jun 2020 17:33:20 -0000

Hi Yuezhong,
great questions, thank you! Please find my answers below in-line tagged
GIM3>>.

Regards,
Greg

On Wed, Jun 3, 2020 at 8:51 PM Songyuezhong (songyuezhong, IP technology
Research Dept) <songyuezhong@huawei.com> wrote:

> Hi Greg,
>
>
>
> ok, for the new STAMP application document we can discuss off-list.
>
> And for this draft, I still have some problem. such as the Follow-up
> Telemetry TLV, Follow-up Timestamp is record by egress when the packet
> Return to sender, And this timestamp will be carried next time?
>
GIM3>> You are absolutely correct. Obtaining a timestamp on the
transmission of a packet is challenging and various techniques have been
used to improve the consistency of this process, i.e., minimize the
variable delay between when the timestamp value is obtained and the
transmission of the packet actually begins. Separating the part of reading
the time value from the transporting it is what the Follow-up extension
provides to STAMP-based systems. As you've noted, the time value is read
and saved at the Session-Reflector very close to the physical transmission
of the reflected packet. And then that value may be included in the next
reflected STAMP packet in the Follow-up TLV.

> And the last problem is why HMAC TLV is needed in authenticated mode, I
> think this mode has this function inherently.
>
GIM3>> I'll note that only the base STAMP packet is protected by HMAC per
RFC 8762. The HMAC TLV is to protect STAMP extensions. I hope that makes it
clearer.

>
>
> Regards,
>
> Yuezhong
>
> *发件人:* Greg Mirsky [mailto:gregimirsky@gmail.com]
> *发送时间:* 2020年6月3日 3:49
> *收件人:* Songyuezhong (songyuezhong, IP technology Research Dept) <
> songyuezhong@huawei.com>
> *抄送:* Ian Swett <ianswett=40google.com@dmarc.ietf.org>; IETF IPPM WG (
> ippm@ietf.org) <ippm@ietf.org>; Tianran Zhou <zhoutianran@huawei.com>
> *主题:* Re: [ippm] 答复: WGLC for STAMP Extensions
>
>
>
> Hi Yuezhong,
>
> great, let us connect off-list to share ideas about a new STAMP
> application document.
>
> On your other questions (I brought it to the front) I've added my notes
> under GIM2>> tag below:
>
>
>
> And another question is how to use Class of Service TLV to find the
> misconfigure problem, is it enough?
> GIM>> One of the possible scenarios could be as follows:
>
> STAMP Sender sets DSCP1 to value A
> STAMP packet is transmitted with DSCP set to A
> STAMP Reflector copies DSCP value into DSCP2 field
> reflected STAMP packet is transmitted with DSCP set to A (as requested by
> the STAMP Sender)
> STAMP Sender receives the STAMP packet with DSCP A but DSCP2 value is B
> not as expected.
> I hope this little example helps. Obviously, there are many ways to use
> the CoS TLV to test CoS mappings.
>
> song>> the CoS mappings happened in Sender or other places, if DSCP value
> is not same with DSCP2 value, it means a error in which place?
>
> GIM2>> Let us assume that no CoS re-mapping expected along a path between
> the Sender and the Reflector. If the value in the DSCP2 field is different
> from the value set in the DSCP field by the Sender at the transmission,
> then the error is on the downstream leg of the path. If the value in the
> DSCP1 field is different from the value in the DSCP field of the reflected
> packet received by the Sender, then the error is on the upstream leg of the
> path. I'll note that CoS re-mapping may be used and then the determination
> of the error condition should be based on the expected behavior. I hope
> that helps.
>
> song>> and for Access Report TLV, can you explain more, for example the
> location of sender and reflector both in user side, and how to find the
> reflector status changed, very thanks!
>
> GIM2>> As noted in the last paragraph in Section 4.6:
>
>    The Access Report TLV is used by the Performance Measurement Function
>    (PMF) components of the Access Steering, Switching and Splitting
>    feature for 5G networks [TS23501].  The PMF component in the User
>    Equipment acts as the STAMP Session-Sender, and the PMF component in
>    the User Plane Function acts as the STAMP Session-Reflector.
>
> UE acts as Session-Sender and UPF - Session-Reflector.
>
>
>
> Regards,
>
> Greg
>
>
>
> On Mon, Jun 1, 2020 at 8:59 PM Songyuezhong (songyuezhong, IP technology
> Research Dept) <songyuezhong@huawei.com> wrote:
>
> Hi Greg,
>
> thanks for the reply from you and Ian, some of my questions have been
> answered, and there are still a few problems I don't understand,
>
> I will use the way you use with song>> tag for my reply
>
>
>
> Regards,
>
> Yuezhong
>
>
>
> *发件人:* Greg Mirsky [mailto:gregimirsky@gmail.com]
> *发送时间:* 2020年6月2日 0:03
> *收件人:* Songyuezhong (songyuezhong, IP technology Research Dept) <
> songyuezhong@huawei.com>
> *抄送:* Ian Swett <ianswett=40google.com@dmarc.ietf.org>; IETF IPPM WG (
> ippm@ietf.org) <ippm@ietf.org>
> *主题:* Re: [ippm] 答复: WGLC for STAMP Extensions
>
>
>
> Hi Yuezhong,
>
> thank you for your comments and suggestions. Please find my notes and
> answers in-line under the GIM>> tag.
>
>
>
> Regards,
>
> Greg
>
>
>
> On Sat, May 30, 2020 at 4:56 AM Songyuezhong (songyuezhong, IP technology
> Research Dept) <songyuezhong@huawei.com> wrote:
>
> Hi Ian,
>
>
>
> I have read the latest version of this draft,and have some small
> suggestions, hope it is helpful for you.
>
>
>
> For part 4,there list 8 new TLVs, but it seems not detailed enough for
> each TLV about the application scenario and some terms in it, we need guess
> to understand the whole plan.
>
> GIM>> We have tried to provide a clear technical description of extensions
> to help implementers produce interoperable implementations. Describing
> various scenarios an extension may be used in was not our main objective.
> There are other SDOs that reference STAMP and STAMP TLVs in their
> documents. I can mention BBF's WT-390.2 IP Performance Measurement from IP
> Edge to Customer Equipment using STAMP, and MEF's MEF-w66 Service OAM for
> IP Services. Both documents are in advanced phase and will be published
> later this year.
>
>
>
> Especially for the people who have no background knowledge of each
> application scenario, maybe it is more hard for them to understand.
>
> GIM>> Yes, you are correct. Standard documents require a certain level of
> knowledge in the particular area of the technology.
>
>
>
> So I suggest for each TLV, there should have some pictures and background
> content to help people understand the TLV’s meaning and using method,it
> will be better.
>
> GIM>> That is very helpful suggestion and I think that it can be a basis
> for the Applicability of STAMP document. Would you be interested in working
> on the new document together?
>
>
>
> song>>We would like to work on the new document you mentioned,if there
> have some plan,we can discuss together.
>
>
>
> By the way, I have some doubt about the Location TLV, which is the last-hop router, the reflector or the router before it? And how to indicate if the STAMP packets are send to the wrong Session-Reflector from this TLV?
>
> GIM>> I hope that Henrik's response clarified one of the use case
> scenarios.
>
>
>
> And another question is how to use Class of Service TLV to find the misconfigure problem, is it enough?
>
> GIM>> One of the possible scenarios could be as follows:
>
>    - STAMP Sender sets DSCP1 to value A
>    - STAMP packet is transmitted with DSCP set to A
>    - STAMP Reflector copies DSCP value into DSCP2 field
>    - reflected STAMP packet is transmitted with DSCP set to A (as
>    requested by the STAMP Sender)
>    - STAMP Sender receives the STAMP packet with DSCP A but DSCP2 value
>    is B not as expected.
>
> I hope this little example helps. Obviously, there are many ways to use
> the CoS TLV to test CoS mappings.
>
> song>> the CoS mappings happened in Sender or other places, if DSCP value
> is not same with DSCP2 value, it means a error in which place?
>
> song>> and for Access Report TLV, can you explain more, for example the
> location of sender and reflector both in user side, and how to find the
> reflector status changed, very thanks!
>
>
>
> Thanks,
> Yuezhong
>
>
>
> *发件人:* ippm [mailto:ippm-bounces@ietf.org] *代表 *Ian Swett
> *发送时间:* 2020年5月23日 5:26
> *收件人:* IETF IPPM WG (ippm@ietf.org) <ippm@ietf.org>
> *主题:* [ippm] WGLC for STAMP Extensions
>
>
>
> Hi IPPM,
>
> At our virtual interim meeting, we decided
> draft-ietf-ippm-stamp-option-tlv was ready for last call. This email starts
> a two-week WGLC for this draft.
>
> The latest version can be found here:
> https://tools.ietf.org/html/draft-ietf-ippm-stamp-option-tlv-04
>
> This last call will end on *Monday, June 8th*. Please reply to
> ippm@ietf.org with your reviews and comments.
>
> Thanks,
> Ian & Tommy
>
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm
>
>