Re: [nvo3] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

Greg Mirsky <gregimirsky@gmail.com> Thu, 19 April 2018 16:15 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BEF4126B6E; Thu, 19 Apr 2018 09:15:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LLfoZ8sCZBbv; Thu, 19 Apr 2018 09:15:12 -0700 (PDT)
Received: from mail-lf0-x234.google.com (mail-lf0-x234.google.com [IPv6:2a00:1450:4010:c07::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8696E1200E5; Thu, 19 Apr 2018 09:15:12 -0700 (PDT)
Received: by mail-lf0-x234.google.com with SMTP id d79-v6so1011246lfd.0; Thu, 19 Apr 2018 09:15:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Lqxlpp/4ACQzhoIYqRDPC9K9AD+biepnXMzFOnR8Pik=; b=T+pTzXFXE4bMpH2jVmtqd47zrkPIoq44XPyq3Aqc8OrCOWTiVfcMaQMKkngl1vLgLY /s70za2uXtGiNQhczANGbvbEqUmYGAQTtxdwhjZbYuHMj04VSm47H5O0dHHw74l1J3h4 vsbafRI6kuwdSVcXx+Ul7S4EOtijFrMIXmErLxJF/K6NbnxIXRa5NsEBVrGjVpnupZV2 4op6TS8t+76lK2kN8YtOV0ResFpKfpCnGE0eibLUt6IBNfsCBUGJCqINf0a+macJjs16 nG2dSFn8cjp1uGbLpi/qqeDMlC/NH10PJXSunUziAqNLPeC4Z3zm0sF6Ys1UBHQe5XBy RdVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Lqxlpp/4ACQzhoIYqRDPC9K9AD+biepnXMzFOnR8Pik=; b=e6zdzoCT5dTURwTvXKyI/l+aTjnQ+0LhMsiTEI1x7dXMaz9bTE3OTQOpRv4+onJbBm ltgyvijp9HJdwFNuyOQOST6ahJM8wwIEDs0wsLdW3Q/Ln21x0jhMdD7hCzgAplASVOAp t/9ONGQAuEzc0ZqqXfJw2OG9acdx6wxIoaOTz4T9O5oVu9Vk/mleCAwD+LYiw2NR+beG EF1k1QFJ5hOXMKIeJSAFB8BLjfpvncXAI5LKXMPrfa48JptBcoT7MutVyqOBEp7vv2EO FK3NdrZ3LEnF8dNYOnrlLY84gR/CKgrmf5qgppN/y8C3/kC2smmlclXXcPGnXlEEf3VA hmkA==
X-Gm-Message-State: ALQs6tAwCfhB78LNENk9t41JQEGHJQB7EBW+VjGhj78xFBMtV9wj6C4X 3etQJVOwAcLdM35kckZXMLhphJ9CkK1OAKfS4Jo=
X-Google-Smtp-Source: AB8JxZqAdHOFquJSb8yN7U9rHLkmgPNAGTeh2kahgO31UwXIEgDuonE4ncaAffiN9aN7Wp49ZMGuw3gBGLMRMt+1LAA=
X-Received: by 2002:a19:aacd:: with SMTP id t196-v6mr466870lfe.60.1524154510592; Thu, 19 Apr 2018 09:15:10 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.73.66 with HTTP; Thu, 19 Apr 2018 09:15:09 -0700 (PDT)
In-Reply-To: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 19 Apr 2018 09:15:09 -0700
Message-ID: <CA+RyBmWKyv+iDsQdAum0xP5FbEb5hvc7AQm+SOvt5b7myjBtHg@mail.gmail.com>
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
Cc: IETF IPPM WG <ippm@ietf.org>, NVO3 <nvo3@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, int-area@ietf.org
Content-Type: multipart/alternative; boundary="0000000000002fcfa7056a35e02f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/0_VRbA0uod3uufiqbDfHGh0iR-g>
Subject: Re: [nvo3] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Apr 2018 16:15:19 -0000

Hi Frank, et. al,
we have a very good discussion, thank you. I have a question and appreciate
your consideration:

   - encapsulation documents refer to IOAM HDR, its length is reflected in
   the field labeled either Length or IOAM HDR len. But I cannot find the
   definition of IOAM HDR. What is the IOAM HDR?


Regards,
Greg


On Wed, Apr 11, 2018 at 3:02 AM, Frank Brockners (fbrockne) <
fbrockne@cisco.com> wrote:

> Back at the IPPM meeting in London, we discussed several drafts dealing
> with the encapsulation of IOAM data in various protocols
> (draft-brockners-ippm-ioam-vxlan-gpe-00, draft-brockners-ippm-ioam-geneve-00,
> draft-weis-ippm-ioam-gre-00). One discussion topic that we decided to take
> to the list was the question on whether draft-ooamdt-rtgwg-ooam-header
> could be leveraged.  After carefully considering draft-ooamdt-rtgwg-ooam-header,
> I came to the conclusion that the “OOAM header” does not meet the needs of
> IOAM:
>
> * Efficiency: IOAM adds data to live user traffic. As such, an
> encapsulation needs to be as efficient as possible. The “OOAM header” is 8
> bytes long. The approach for IOAM data encapsulation in the above mentioned
> drafts only requires 4 bytes. Using the OOAM header approach would add an
> unnecessary overhead of 4 bytes – which is significant.
>
> * Maturity: IOAM has several implementations, which were also shown at
> recent IETF hackathons – and we’re expecting additional implementations to
> be publicized soon. Interoperable implementations need timely
> specifications. Despite the question being asked, the recent thread on OOAM
> in the NVO3 list hasn’t revealed any implementation of the OOAM header. In
> addition, the thread revealed that several fundamental questions about the
> OOAM header are still open, such as whether or how active OAM mechanisms
> within protocols such as Geneve would apply to the OOAM header. This
> ultimately means that we won’t get to a timely specification.
>
> * Scope: It isn’t entirely clear to which protocols the OOAM header would
> ultimately apply to. The way the OOAM header is defined, OOAM uses a 8-bit
> field for “Next Prot”, the next protocol. Some protocols that IOAM data
> needs to be encapsulated into use 16-bits for their next protocol code
> points. See e.g. the GRE encapsulation – as specified in
> draft-weis-ippm-ioam-gre-00.
>
> With the above in mind, I’d suggest that the WG moves forward with
> specific definitions for encapsulating IOAM data into protocols – per the
> above mentioned drafts.
>
>
>
> Regards, Frank
>
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm
>
>