Re: [nvo3] [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

Greg Mirsky <gregimirsky@gmail.com> Thu, 12 April 2018 21:28 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 668AF1270AC; Thu, 12 Apr 2018 14:28:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zCG-v7ChYkwg; Thu, 12 Apr 2018 14:28:34 -0700 (PDT)
Received: from mail-lf0-x22c.google.com (mail-lf0-x22c.google.com [IPv6:2a00:1450:4010:c07::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 062B1124217; Thu, 12 Apr 2018 14:28:34 -0700 (PDT)
Received: by mail-lf0-x22c.google.com with SMTP id e5-v6so9755058lfb.7; Thu, 12 Apr 2018 14:28:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=PS3A6zEj5XY5k1H353peZiTJ64SsToibN0BwKazwbRc=; b=kcfiIkpWuFQQhHZ2PW5looGv4u3l00VWh9/TSfLDTazHypCR2Hj3A/SFEB/fjk0Isi WQvDrFlOXIiDtV4S1HK2Mcl0s4N9dqK3fdsU/npNBkTl8MoqhtA2fwFt7I9OPtDomIFq 8wEPdtBVZHF9EK933YVpvVjobVT7kmQ9qJHHmwp7M/li2urbxfAqTeUZ0ZGwQK26TQta 6DnV4Y2WOl0hSU8BgGraso9GnUo/T5ThysWvsO6G4YQAVs4S0dM50bF6/LvbVP51FIl0 AnagZ4qJldLZCvM1XkZHVmRbIDEUPUYRhjwONHRYY0q2qPiFg70eullunCkO9Z60rcYf c7AA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=PS3A6zEj5XY5k1H353peZiTJ64SsToibN0BwKazwbRc=; b=sAwuCTxd39ofk7MW/Ef8JgIkQJMv6me+boy/IgnLx48uDnoyxtFTuusFdQFe6xwCE+ x11i/6K/dyY06yCj67nJCvkFYFBDteHnCkNtlwTAapUcj8KznjnZF3t5Avby4A6WUgh9 Z5ubGhhTdTb/mDvb8T//68U35UQfC/dfJXo8DsilqvTAZtXCr02I0kfFsK/z7qWFO7VC roG3MLViRgFTMtW9fc5IqHrLH9eyIG0gES3ZC2lliN2f51WC8mLEkcsWBGNNuos12nrq NRRBwZb4zd7cwNeNXR6cmXj8Nb6yKzB5oKW4alsDBDVUMMORnwNwCNuCcfAy0Qfn8uNV FNJw==
X-Gm-Message-State: ALQs6tAEEQePsIhTgZazOEUMcFTHtZ0UtE/F6yCzHVGafHk2jEvMO5xZ eparuJQWxVc/maK6ARYGLlIvLqHjPeZZfnHanYc=
X-Google-Smtp-Source: AIpwx4/78vydyNkb+iEjItQU+dp8OFgz0ulpMppHd7XubqEscrSiwlbc3D4dgQHkqfhETah1yv/Vj9Z53PTdzI844VU=
X-Received: by 10.46.32.154 with SMTP id g26mr1628474lji.71.1523568511913; Thu, 12 Apr 2018 14:28:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.73.66 with HTTP; Thu, 12 Apr 2018 14:28:31 -0700 (PDT)
In-Reply-To: <CALx6S35hQKtFkw8rrs1CKsnPkEAGpULweK7uztAaenmy6Qw9Bw@mail.gmail.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com> <CALx6S35hQKtFkw8rrs1CKsnPkEAGpULweK7uztAaenmy6Qw9Bw@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 12 Apr 2018 23:28:31 +0200
Message-ID: <CA+RyBmXzCLV171CdR2wMA6J421FD66CkOpGGCbUsdyOrJKb2zg@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
Cc: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, NVO3 <nvo3@ietf.org>, int-area@ietf.org, Service Function Chaining IETF list <sfc@ietf.org>, IETF IPPM WG <ippm@ietf.org>
Content-Type: multipart/alternative; boundary="001a1143062af192f60569ad6f1d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/wa00OsAyEpSbSmF2TPSKwE4MQuM>
Subject: Re: [nvo3] [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Apr 2018 21:28:43 -0000

Hi Tom,
I think you refer to the proposal on how to apply RFC 8321
<https://tools.ietf.org/html/rfc8321> in IPv6 networks. Using two bits-long
field for Alternate Marking is just one option as you can find in the draft
on compact Alt.marking
<https://tools.ietf.org/html/draft-mizrahi-ippm-compact-alternate-marking-01>.
But to answer your question, there's no connection or dependency between
the Alternate Marking method and OOAM. Will note that we have documents on
the applicability of the Alternate Marking method in BIER, SFC NSH, and
Geneve.

Regards,
Greg

On Thu, Apr 12, 2018 at 8:37 PM, Tom Herbert <tom@herbertland.com> wrote:

> On Thu, Apr 12, 2018 at 9:54 AM, Greg Mirsky <gregimirsky@gmail.com>
> wrote:
> > Hi Frank,
> > thank you for sharing your points. Please find my notes in-line and
> tagged
> > GIM>>. I believe that this is very much relevant to work of other working
> > groups that directly work on the overlay encapsulations in the center of
> the
> > discussion and hence I've added them to the list. Hope we'll have more
> > opinions to reach the conclusion that is acceptable to all.
> >
> > Regards,
> > Greg
> >
> > On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne)
> > <fbrockne@cisco.com> wrote:
> >>
> >> Back at the IPPM meeting in London, we discussed several drafts dealing
> >> with the encapsulation of IOAM data in various protocols
> >> (draft-brockners-ippm-ioam-vxlan-gpe-00,
> >> draft-brockners-ippm-ioam-geneve-00, draft-weis-ippm-ioam-gre-00). One
> >> discussion topic that we decided to take to the list was the question on
> >> whether draft-ooamdt-rtgwg-ooam-header could be leveraged.  After
> carefully
> >> considering draft-ooamdt-rtgwg-ooam-header, I came to the conclusion
> that
> >> the “OOAM header” does not meet the needs of IOAM:
> >>
> >> * Efficiency: IOAM adds data to live user traffic. As such, an
> >> encapsulation needs to be as efficient as possible. The “OOAM header”
> is 8
> >> bytes long. The approach for IOAM data encapsulation in the above
> mentioned
> >> drafts only requires 4 bytes. Using the OOAM header approach would add
> an
> >> unnecessary overhead of 4 bytes – which is significant.
> >
>
> What is the relationship between this proposal and
> draft-fioccola-v6ops-ipv6-alt-mark which is currently searching for a
> way to squeeze out two bits in the IP header for performance
> measurement?
>
> Tom
>
> > GIM>> The difference in four octets is because OOAM Header:
> >
> > provides more flexibility, e.g. Flags field and Reserved fields;
> > supports larger OAM packets than iOAM header;
> > is future proof by supporting versioning (Version field).
> >>
> >> * Maturity: IOAM has several implementations, which were also shown at
> >> recent IETF hackathons – and we’re expecting additional implementations
> to
> >> be publicized soon. Interoperable implementations need timely
> >> specifications. Despite the question being asked, the recent thread on
> OOAM
> >> in the NVO3 list hasn’t revealed any implementation of the OOAM header.
> In
> >> addition, the thread revealed that several fundamental questions about
> the
> >> OOAM header are still open, such as whether or how active OAM mechanisms
> >> within protocols such as Geneve would apply to the OOAM header. This
> >> ultimately means that we won’t get to a timely specification.
> >
> > GIM>> May I ask which encapsulations supported by the implementations you
> > refer to. Until very recently all iOAM proposals were to use meta-data
> TLV
> > in, e.g. Geneve and NSH. And if these or some of these implementations
> > already updated to the newly proposed iOAM shim, I don't see problem in
> > making them use OOAM Header. Would you agree?
> >
> >>
> >> * Scope: It isn’t entirely clear to which protocols the OOAM header
> would
> >> ultimately apply to. The way the OOAM header is defined, OOAM uses a
> 8-bit
> >> field for “Next Prot”, the next protocol. Some protocols that IOAM data
> >> needs to be encapsulated into use 16-bits for their next protocol code
> >> points. See e.g. the GRE encapsulation – as specified in
> >> draft-weis-ippm-ioam-gre-00.
> >
> > GIM>> The first paragraph of the Introduction section states:
> >    New protocols that support overlay networks like VxLAN-GPE
> >    [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve
> >    [I-D.ietf-nvo3-geneve], BIER [I-D.ietf-bier-mpls-encapsulation], and
> >    NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g.
> >    Ethernet, IPv4/IPv6, and recognize Operations, Administration, and
> >    Maintenance (OAM) as one of distinct types.  That ensures that
> >    Overlay OAM (OOAM)packets are sharing fate with Overlay data packet
> >    traversing the underlay.
> > I'm updating the OOAM Header draft and along with cleaning nits will
> update
> > reference to GUE. I think that the list and the statemnt are quite clear
> in
> > identifying the scope of networks that may benefit from using not only
> > common OOAM Header but common OOAM mechanisms, e.g. Echo Request/Reply.
> >
> >> With the above in mind, I’d suggest that the WG moves forward with
> >> specific definitions for encapsulating IOAM data into protocols – per
> the
> >> above mentioned drafts.
> >>
> >>
> >>
> >> Regards, Frank
> >>
> >>
> >> _______________________________________________
> >> ippm mailing list
> >> ippm@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ippm
> >>
> >
> >
> > _______________________________________________
> > Int-area mailing list
> > Int-area@ietf.org
> > https://www.ietf.org/mailman/listinfo/int-area
> >
>