Re: [nvo3] [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Fri, 13 April 2018 06:29 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49C59124D68; Thu, 12 Apr 2018 23:29:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JZg-RAso-3EP; Thu, 12 Apr 2018 23:29:02 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C06AD126C22; Thu, 12 Apr 2018 23:29:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10412; q=dns/txt; s=iport; t=1523600942; x=1524810542; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=0NuSxNHIb4Um+z1TUD5pOfP++HMw1iQYNJRF9Oek4fM=; b=M1Ipckm1zG+PIA7fHs00hhnyE86feIhnG5PQk08mKSrer6B06RNnM2Ez mu6J4aU+EtEgZUJifgVxa4iw/Vy0w6lZUsVL5/gPWHJ+Ywu/kp75KiGDV i5PIvz4NVn78MMigel42+PhJQoM/vCnO6MO42uaAvCbjsSMTiI2/Wt1Mf 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DlAAC6TdBa/5xdJa1cGQEBAQEBAQEBAQEBAQcBAQEBAYMTL2FvKAqDWogCjROBdIEPhmaLfoF7CxgLgTWDKwIaggkhNBgBAgEBAQEBAQJsHAyFIgEBAQECAQEBIREzBwsMBAIBCBEEAQEBAgIfBwICAh8GCxUICAEBBAENBQgXhFYDDQgPpxqCHIcQDYErgioFgQmGdIFUP4EPgl0ugk9CAQGBPTqCaYJUApcyLAgCiCaCWjuCdYE7g1qHOocsgjaGCwIREwGBJAEcOIFScBU6gkOCHRoRiEiFPm+NV4EXAQE
X-IronPort-AV: E=Sophos;i="5.48,444,1517875200"; d="scan'208";a="383686805"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Apr 2018 06:28:58 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id w3D6SvxL017326 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 Apr 2018 06:28:58 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Fri, 13 Apr 2018 01:28:57 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1320.000; Fri, 13 Apr 2018 01:28:57 -0500
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Tom Herbert <tom@herbertland.com>, Greg Mirsky <gregimirsky@gmail.com>
CC: NVO3 <nvo3@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, IETF IPPM WG <ippm@ietf.org>
Thread-Topic: [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
Thread-Index: AdPRe/DslDwu34XkSmq8g6ttV3Kt0QBLOKqAAAo10AAAACGHgAAAGEoAAAdNUeA=
Date: Fri, 13 Apr 2018 06:28:57 +0000
Message-ID: <f1110f381c6d4a4d89a33f1c8e82246f@XCH-RCD-008.cisco.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com> <CALx6S36ojk0z+iOhNhFqF2A+acXC1=xHPEN7G0Y_9+itC+WiGQ@mail.gmail.com> <CA+RyBmXGbia0q3p46ZR94pMy-WzPvJb-0QK7JsHLikhSWgRQcQ@mail.gmail.com> <CALx6S35boQabs9-8Jvn4eDeEdojCxGJJpg+1gXOP0NzBY5nBWw@mail.gmail.com>
In-Reply-To: <CALx6S35boQabs9-8Jvn4eDeEdojCxGJJpg+1gXOP0NzBY5nBWw@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.55.117.7]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/L2dqiOpTrOIU1dpzkTDHdwp0Ydw>
Subject: Re: [nvo3] [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Apr 2018 06:29:04 -0000

Tom,

the term "overhead" here refers to the number of extra bytes used in the parent protocol to carry IOAM data. IOAM data itself is of course not counted for the comparison, because it would need to be carried in both cases.

Using your Geneve reference as an example, in order to carry IOAM data, we need to add another Geneve Option class along with type fields etc. per the Geneve draft spec - which sums up to 4 bytes:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   |  Option Class  =  TBD_IOAM    |     Type      |R|R|R| Length  | 

The OOAM header requires 8 bytes to serve the very same purpose:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | V |           Msg Type        |           Length              |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             Flags             |    Reserved   |   Next Prot   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

HTH.

Frank



-----Original Message-----
From: Tom Herbert <tom@herbertland.com> 
Sent: Donnerstag, 12. April 2018 23:53
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: Frank Brockners (fbrockne) <fbrockne@cisco.com>; NVO3 <nvo3@ietf.org>; int-area@ietf.org; Service Function Chaining IETF list <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
Subject: Re: [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

On Thu, Apr 12, 2018 at 2:50 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> Hi Tom,
> could you please mention which drafts, iOAM or OOAM, you refer to. 
> Please note, that OOAM supports both active and hybrid OAM methods, 
> while iOAM only the latter.

Section 3 of draft-brockners-ippm-ioam-geneve-00 for instance.

>
> Regards,
> Greg
>
> On Thu, Apr 12, 2018 at 11:46 PM, Tom Herbert <tom@herbertland.com> wrote:
>>
>> On Thu, Apr 12, 2018 at 9:54 AM, Greg Mirsky <gregimirsky@gmail.com>
>> wrote:
>> > Hi Frank,
>> > thank you for sharing your points. Please find my notes in-line and 
>> > tagged
>> > GIM>>. I believe that this is very much relevant to work of other
>> > working
>> > groups that directly work on the overlay encapsulations in the 
>> > center of the discussion and hence I've added them to the list. 
>> > Hope we'll have more opinions to reach the conclusion that is 
>> > acceptable to all.
>> >
>> > Regards,
>> > Greg
>> >
>> > On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne) 
>> > <fbrockne@cisco.com> wrote:
>> >>
>> >> Back at the IPPM meeting in London, we discussed several drafts 
>> >> dealing with the encapsulation of IOAM data in various protocols 
>> >> (draft-brockners-ippm-ioam-vxlan-gpe-00,
>> >> draft-brockners-ippm-ioam-geneve-00, draft-weis-ippm-ioam-gre-00). 
>> >> One discussion topic that we decided to take to the list was the 
>> >> question on whether draft-ooamdt-rtgwg-ooam-header could be 
>> >> leveraged.  After carefully considering 
>> >> draft-ooamdt-rtgwg-ooam-header, I came to the conclusion that the 
>> >> “OOAM header” does not meet the needs of IOAM:
>> >>
>> >> * Efficiency: IOAM adds data to live user traffic. As such, an 
>> >> encapsulation needs to be as efficient as possible. The “OOAM header”
>> >> is 8
>> >> bytes long. The approach for IOAM data encapsulation in the above 
>> >> mentioned drafts only requires 4 bytes. Using the OOAM header 
>> >> approach would add an unnecessary overhead of 4 bytes – which is 
>> >> significant.
>> Greg,
>>
>> I'm missing something here. I looked at the drafts you referenced and 
>> each of them looks like the overhead for OAM is greater that four 
>> bytes. In each there is some overhead equivalent to type/length, for 
>> instance in Geneve four bytes are needed for option class, type, and 
>> length. Unless the the OAM data is zero length, I don't see how this 
>> adds up to only four bytes of overhead.
>>
>> Tom
>>
>> >
>> > GIM>> The difference in four octets is because OOAM Header:
>> >
>> > provides more flexibility, e.g. Flags field and Reserved fields; 
>> > supports larger OAM packets than iOAM header; is future proof by 
>> > supporting versioning (Version field).
>> >>
>> >> * Maturity: IOAM has several implementations, which were also 
>> >> shown at recent IETF hackathons – and we’re expecting additional 
>> >> implementations to be publicized soon. Interoperable 
>> >> implementations need timely specifications. Despite the question 
>> >> being asked, the recent thread on OOAM in the NVO3 list hasn’t 
>> >> revealed any implementation of the OOAM header.
>> >> In
>> >> addition, the thread revealed that several fundamental questions 
>> >> about the OOAM header are still open, such as whether or how 
>> >> active OAM mechanisms within protocols such as Geneve would apply 
>> >> to the OOAM header. This ultimately means that we won’t get to a 
>> >> timely specification.
>> >
>> > GIM>> May I ask which encapsulations supported by the 
>> > GIM>> implementations
>> > you
>> > refer to. Until very recently all iOAM proposals were to use 
>> > meta-data TLV in, e.g. Geneve and NSH. And if these or some of 
>> > these implementations already updated to the newly proposed iOAM 
>> > shim, I don't see problem in making them use OOAM Header. Would you 
>> > agree?
>> >
>> >>
>> >> * Scope: It isn’t entirely clear to which protocols the OOAM 
>> >> header would ultimately apply to. The way the OOAM header is 
>> >> defined, OOAM uses a 8-bit field for “Next Prot”, the next 
>> >> protocol. Some protocols that IOAM data needs to be encapsulated 
>> >> into use 16-bits for their next protocol code points. See e.g. the 
>> >> GRE encapsulation – as specified in draft-weis-ippm-ioam-gre-00.
>> >
>> > GIM>> The first paragraph of the Introduction section states:
>> >    New protocols that support overlay networks like VxLAN-GPE
>> >    [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve
>> >    [I-D.ietf-nvo3-geneve], BIER [I-D.ietf-bier-mpls-encapsulation], and
>> >    NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g.
>> >    Ethernet, IPv4/IPv6, and recognize Operations, Administration, and
>> >    Maintenance (OAM) as one of distinct types.  That ensures that
>> >    Overlay OAM (OOAM)packets are sharing fate with Overlay data packet
>> >    traversing the underlay.
>> > I'm updating the OOAM Header draft and along with cleaning nits 
>> > will update reference to GUE. I think that the list and the 
>> > statemnt are quite clear in identifying the scope of networks that 
>> > may benefit from using not only common OOAM Header but common OOAM 
>> > mechanisms, e.g. Echo Request/Reply.
>> >
>> >> With the above in mind, I’d suggest that the WG moves forward with 
>> >> specific definitions for encapsulating IOAM data into protocols – 
>> >> per the above mentioned drafts.
>> >>
>> >>
>> >>
>> >> Regards, Frank
>> >>
>> >>
>> >> _______________________________________________
>> >> ippm mailing list
>> >> ippm@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/ippm
>> >>
>> >
>> >
>> > _______________________________________________
>> > Int-area mailing list
>> > Int-area@ietf.org
>> > https://www.ietf.org/mailman/listinfo/int-area
>> >
>
>