Re: [sfc] Tsvart telechat review of draft-ietf-sfc-oam-framework-13

"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Sat, 16 May 2020 14:16 UTC

Return-Path: <naikumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28DA33A02C1; Sat, 16 May 2020 07:16:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.698
X-Spam-Level:
X-Spam-Status: No, score=-7.698 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=WJEFcjqP; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=XxlRkoIP
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tUQQlg0i07jQ; Sat, 16 May 2020 07:16:21 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E3B03A02BE; Sat, 16 May 2020 07:16:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28700; q=dns/txt; s=iport; t=1589638581; x=1590848181; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=5E+YZlkZAP3d/y/sv+V41M7qOVFb4ZJa/EupqQU1oKY=; b=WJEFcjqPbYMIONHEyGafYQnj6Ib0BirB6ZV3RsWEmBXrhFz96zFhZZHj 02K4GiSDy2b9UwsO1wcySWOmYjCbQllbFmocPvJsm1khQc57QeTDctkmr mpsSD8M1WHWRzevzD9B7YW3Tb/obFzHG1dCZsqKpzA7J94uXyBPoAMaoj Y=;
IronPort-PHdr: 9a23:6E77CxGPco2/ilVLPLT1k51GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e401QObVoTA4PUCgO3T4OjsWm0FtJCGtn1KMJlBTAQMhshemQs8SNWEBkv2IL+PDWQ6Ec1OWUUj8yS9Nk5YS83/fFbV5Ha16G1aFhD2LwEgIOPzF8bbhNi20Obn/ZrVbk1IiTOxbKk0Ig+xqFDat9Idhs1pLaNixw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CkCQCO9L9e/5RdJa1mHgEBCxIMQIMbUQdvWC8sCoQag0YDjkSXOoFCgRADVAsBAQEMAQEjCgIEAQGERAIXggEkOBMCAwEBCwEBBQEBAQIBBQRthSoBBiUMhXICAQMSEQQNDAEBNwEPAgEIEggCJgICAjAVAg4CBAENBRsHgwQBgksDLgEOpCICgTmIYXZ/M4MBAQEFgTYChDAYgg4DBoEOKoJjiV8aggCBEAEnHIFPSTU+gmcBAQOBOQ8aOAKCWjOCLY4vAREGCQkogl6JH5gWCoJQiCaGCYoYHYJdhHKDfpAIggGQQ4lrk2gCBAIEBQIOAQEFgWkigVZwFTsqAYI+UBgNiX2ELoIVg3KFFIVCdAIBNAIGAQcBAQMJfIwbAiYHgQYBMF8BAQ
X-IronPort-AV: E=Sophos;i="5.73,398,1583193600"; d="scan'208";a="771557927"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 May 2020 14:16:19 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 04GEGJCk009215 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 16 May 2020 14:16:19 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sat, 16 May 2020 09:16:19 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sat, 16 May 2020 09:16:18 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Sat, 16 May 2020 10:16:18 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HPS+K6OEWwDYhApVNYJAiAkL9xolCEs3tGDaA7YzVQ963a0BocrYVbxKkyvH+BXa+KJl11gIJ3bRuM4O4dwGCi6aJHvRhTIqUz+BFaNUrQYsoY9+VmpyLgj4YYOTaf35pXnAN+7GAHmz16CC2Yawy36dYE238H//zOw95Dm6ANtwfKeNGxVIouG3eU3tKtSat2YRARcFDu13Bnvd+IMoTBre/iKvNes3EfrynNPnD553KwTWMuIbteUEQU0mxoo73E7S3FnrTuVGoPCWOW/T5Qg6MKmGR4qUnsqydKBZed5K5pPbNzFtyZntB2ENIiMb+Rn8bPI6xJGe/hhrg0h/UQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5E+YZlkZAP3d/y/sv+V41M7qOVFb4ZJa/EupqQU1oKY=; b=QETPF8Vj7zDc3NRutxG36xRds7NIkQT/6FYoH5HO3E5knnBEbc1T99CbfsXNrIwwaaI0aaEKyHL6kbvUgPZNFnBragceH93B5spQ1PiujhHVq7F+Ph0H4/mtkZRV1cG7DSHIjA5HOb7EoYOtjshZfVVhr66UPtaRedyIYj6EKoqDl6eunj4bJchKMeUCreBhoj+HOWykCXr9Vz17grJJs9fUugAGAS5U+r3wTGR/mYLiZHunk40noZc9xlwWJ5N9nXr2oLHeFLRY45a0gOLoX/zYJ4x1XeFO0AUXRcHL68ky2RbUS1Va7y/FFMT/ac3fd+kg/XobDBlwpfK9Q1QIag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5E+YZlkZAP3d/y/sv+V41M7qOVFb4ZJa/EupqQU1oKY=; b=XxlRkoIPtZHB/D1tFXMqIVdF18lLk3Y7JuwKkRvcGUUIOs5jxhbYHW3IbvS5WrYyA5z3KpBwprKv2st2c4PUWYN6VnSJzWcrTm7frDhCdY94miOASpwupzjeB2E9FOXkpSmVTUDTKHONkJCzF6ti5vbc68PwF/EY/5Zn3VKpek0=
Received: from BN6PR11MB4068.namprd11.prod.outlook.com (2603:10b6:405:7c::31) by BN6PR11MB0035.namprd11.prod.outlook.com (2603:10b6:405:62::36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.25; Sat, 16 May 2020 14:16:16 +0000
Received: from BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34]) by BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34%3]) with mapi id 15.20.3000.022; Sat, 16 May 2020 14:16:16 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>
CC: "sfc@ietf.org" <sfc@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-sfc-oam-framework.all@ietf.org" <draft-ietf-sfc-oam-framework.all@ietf.org>
Thread-Topic: Tsvart telechat review of draft-ietf-sfc-oam-framework-13
Thread-Index: AQHWIkc0q4UpHqu67ESlbizdVIKf+6ipMYIA
Date: Sat, 16 May 2020 14:16:15 +0000
Message-ID: <B12ACAA0-BFBC-40D6-85D2-A7E056027C68@cisco.com>
References: <158861910132.5213.12389985411421411727@ietfa.amsl.com>
In-Reply-To: <158861910132.5213.12389985411421411727@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.55.90]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 97925b75-7e22-4ab1-f101-08d7f9a3b22f
x-ms-traffictypediagnostic: BN6PR11MB0035:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR11MB003567C51008319716E1C61FC6BA0@BN6PR11MB0035.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 040513D301
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR11MB4068.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(346002)(39860400002)(376002)(366004)(396003)(33656002)(8936002)(2906002)(30864003)(91956017)(2616005)(966005)(478600001)(26005)(186003)(71200400001)(4326008)(316002)(5660300002)(64756008)(6512007)(66556008)(66446008)(6506007)(8676002)(86362001)(66476007)(54906003)(36756003)(450100002)(66946007)(6486002)(110136005)(76116006)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: N4PtntNOrVmHf7BLQgM1y6H4Y4jm0FUrHUrZsQGzpz77W1xO61VVH+2ySZlQsPHXyCKJyG823OAWGMvFE+yOTsBeEoXtAIOc53SfIq2I/E1TVIx5Gh+MxU/nDpNoXR8N55/qlIiUXl9jr5RLoKDR7upwpJsjihBWJxsXZYP4fpazwykBxL315EsG7wel36kLGMYoguIOHtThDIN0uXz2vJe1Me5y/v5va9vhAOAdX8QnqxVWyNLVfsoGVkdlp56TNO5twAMTIPjfsWH4dCBbdwyL5vyXnoiEsJNxkcA5qjKmMkj0rTEeDzbEHhNKNiu18UXAlNHVaqc6d6lK8WZ5loFUEzhZLQ86+xWkLSF3mVjDPGkN76+ndYmiNjewqboyzj98fEUMtnISZpo5rIxwYjB/uj+LMnEegGj1U/1bQz7gZacQWPOXydbnsXTny1H7OfOgxVxu+tBy2jwKN+HWb65bf9CC9wkmj5dD8rgCbbc=
Content-Type: text/plain; charset="utf-8"
Content-ID: <50B84A1E5FA89C4194216BB0017CF3A4@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 97925b75-7e22-4ab1-f101-08d7f9a3b22f
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 May 2020 14:16:15.6029 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 44q4jWx/HoL/zcPaLIDce+N/VYlMvcJQhafCEnhlCOomSiDhfB1qZByCbopGircCKYY71jSZjVnbojEzQ4eH0A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB0035
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/Kx2h5_UUAt3UA90JfNX3tE5UgNA>
Subject: Re: [sfc] Tsvart telechat review of draft-ietf-sfc-oam-framework-13
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 May 2020 14:16:24 -0000

Hi Frank,

Thank you for the review. Please see inline for the response..


    Reviewer: Frank Brockners
    Review result: Ready with Nits
    
    This document has been reviewed as part of the transport area review team's
    ongoing effort to review key IETF documents. These comments were written
    primarily for the transport area directors, but are copied to the document's
    authors and WG to allow them to address any issues raised and also to the IETF
    discussion list for information.
    
    When done at the time of IETF Last Call, the authors should consider this
    review as part of the last-call comments they receive. Please always CC
    tsv-art@ietf.org if you reply to or forward this review.
    
    This document provides a reference framework for OAM for SFC.
    
    Comments:
    
    Section 3.1.1 SF availability: The text makes explicit reference to multiple
    instances of a SF. Consequently, it should be defined how availability of a SF
    is computed/determined in case multiple instances are deployed. 

<Nagendra> This is already clarified in the section as below:

"For cases where
   multiple instances of an SF are used to realize a given SF for the
   purpose of load sharing, SF availability can be performed by checking
   the availability of any one of those instances, or the availability
   check may be targeted at a specific instance."

This further
    leads to the question, whether availability is always a "binary" state
    (available / not-available), or could a SF be e.g. 99% available? 

<Nagendra>The availability is measured as binary state. I am not sure what is 99% available. If it means getting 99 responses for 100 probes sent, I think it falls under packet loss category which in turn is performance measurement.

Section 3.1.2
    SF performance: What is the impact of a "multiple instance SF deployment" on SF
    performance measurement? 

<Nagendra>I think we covered this in SF availability but not here. Does the below updated text look better?

OLD:
On the one hand, the performance of any specific SF can be quantified
   by measuring the loss and delay metrics of the traffic from SFF to
   the respective SF, while on the other hand, the performance can be
   measured by leveraging the loss and delay metrics from the respective
   SFs.  The latter requires SF involvement to perform the measurement
   while the former does not.

NEW:
On the one hand, the performance of any specific SF can be quantified
   by measuring the loss and delay metrics of the traffic from SFF to
   the respective SF, while on the other hand, the performance can be
   measured by leveraging the loss and delay metrics from the respective
   SFs.  The latter requires SF involvement to perform the measurement
   while the former does not. For cases where
   multiple instances of an SF are used to realize a given SF for the
   purpose of load sharing, SF performance can be quantified by measuring 
   the metrics for any one instance of SF or by measuring the metrics for 
   a specific instance.

The section only talks about loss and delay as
    performance criteria. It would be good to state that other performance criteria
    (e.g. specific to the SF, throughput, etc.) exist. 

<Nagendra> We can add the below to Section 3.1.2:

NEW:
"The metrics measured to quantify the performance of the SF component is 
not just limited to loss and delay. Other metrics such as throughout also exist 
and the choice of metrics for performance measurement is outside the scope 
of this document."

Section 3.2.1 SFC
    availability: The current definition is very focused on connectivity
    verification, i.e. it tries to answer the question: "Does my SFC transport
    packets?". IMHO we should also ask the question "Does my SFC process the
    packets correctly?" - because if packets are not processed per the SFC
    definition, we might not call the SFC available. 

<Nagendra> I think this is already handled by SF availability. The end-to-end SFC availability is verified by steering the OAM packet over the ordered set of SFs within the SFC. This is more like daisy chaining the availability of SFs within the SFC to determine end-to-end SFC availability. If the derived solution verifies the SF availability not just based on the uptime but based on the service treatment, it also answers the question "Does my SFC process the packets correctly". Let us know if there is any further clarity required. 

While 3.2.2 states that "any
    SFC-aware network device should have the ability to make performance
    measurements" a similar statement isn't found in 3.2.1. IMHO the ability for
    availability checks is probably a prerequisite for performance measurement.

<Nagendra> The ability to perform end-to-end or partial SFC availability verification is already mentioned in section 3.2.1 as below:

" In order to perform service connectivity verification of an SFC/SFP,
   the OAM functions could be initiated from any SFC-aware network
   devices of an SFC-enabled domain for end-to-end paths, or partial
   paths terminating on a specific SF, within the SFC/SFP"

Please let us know if you have any suggestion to improve if there is a lack of clarity.

    Section 3.2.2 SFC performance measurement: The section only mentions the need
    for performance measurement. It misses the definition of what SFC performance
    measurement is. 

<Nagendra>

Section 3.3. Classifier component: The section mentions the
    need for the ability to perform performance measurement of the classifier
    component. What is performance measurement of the classifier? What does
    performance measurement of the classifier component comprise? 

<Nagendra>We can add the below text:

OLD:
Any SFC-aware network device should have the ability to perform
   performance measurement of the classifier component for each SFC.

NEW:
Any SFC-aware network device should have the ability to perform
   performance measurement of the classifier component for each SFC.
    The performance can be quantified by measuring the performance metrics of the 
     traffic from the classifier for each SFC/SFP.

Section 3.4. /
    3.5. Availability/PM of the underlay and overlay network: It would be good to
    add a sentence that states that the mechanisms for availability/PM which are
    offered by the technologies used by the overlay/underlay are used, rather than
    new methods specifically for SFC would be defined. 

<Nagendra>Yes, that makes sense. Please check the below text:

OLD:
Any SFC-aware network device may have the ability to perform
   availability check or performance measurement of the overlay network.

NEW:
Any SFC-aware network device may have the ability to perform
   availability check or performance measurement of the overlay network. Any
   existing OAM tools and techniques can be leveraged for this purpose.

Section 4. SFC OAM
    Functions: It would be good, if examples in section 4 could also include more
    "recent" methods such as OWAMP/TWAMP (RFC4656, RFC 5357). 

<Nagendra> 

OLD:
Delay within an SFC could be measured based on the time it takes for
   a packet to traverse the SFC from the ingress SFC node to the egress
   SFF.  As SFCs are unidirectional in nature, measurement of one-way
   delay [RFC7679] is important.  In order to measure one-way delay,
   time synchronization MUST be supported by means such as NTP, PTP,
   GPS, etc.

NEW:
Delay within an SFC could be measured based on the time it takes for
   a packet to traverse the SFC from the ingress SFC node to the egress
   SFF.  Measurement protocols such as One-way Active Measurement 
    Protocol (OWAMP) [RFC4656], Two-way Active Measurement Protocol
   (TWAMP) [RFC5357] can be used to measure the characteristics. As 
   SFCs are unidirectional in nature, measurement of one-way
   delay [RFC7679] is important.  In order to measure one-way delay,
   time synchronization MUST be supported by means such as NTP, Precision Time Protocol (PTP),
   GPS, etc.

Section 4.4.
    Performance Measurement: Focus is entirely on the PM of the connectivity,
    rather than on the SF. How about covering PM for the SF as well? 

<Nagendra> I am not sure I understand what is missing. Do you have any suggestion for the text improvement?.

Section 5.1
    OAM Tool Gap Analysis:
     - Not sure what "NVo3 OAM" refers to. Could that be explained below the table
     and in section 1.2.1? 

<Nagendra> Combining this with other below queries as they appears to be related.

- E-OAM needs to be detailed. Is seems that CFM
     (802.1ag) and not 802.3ah is refered to here. 

<Nagendra> Per my understanding, 802.ah is 1-hop while 802.3ag can be more than 1 hop and both uses Ethernet frames. So I think both are applicable here. My response regarding E-OAM details in this section is combined below.

- "Trace" in the "Trace" column
     need to be extended on. Is this traceroute? Paris-Traceroute? IOAM-Loopback? 

     IPPM needs to be detailed, because IPPM is not a tool as such but an IETF WG.
     Does this refer to OWAMP/TWAMP/etc. as defined by IPPM?
    
<Nagendra> Combining the above queries. 

OLD:
There are various OAM tool sets available to perform OAM functions
   within various layers.  These OAM functions may be used to validate
   some of the underlay and overlay networks.  Tools like ping and trace
   are in existence to perform connectivity check and tracing of
   intermediate hops in a network.  These tools support different
   network types like IP, MPLS, TRILL, etc.  There is also an effort to
   extend the tool set to provide connectivity and continuity checks
   within overlay networks.  BFD is another tool which helps in
   detecting data forwarding failures.  Table 3 below is not exhaustive

NEW:
There are various OAM tool sets available to perform OAM functions
   within various layers.  These OAM functions may be used to validate
   some of the underlay and overlay networks.  Tools like ping and trace
   are used to perform connectivity check and tracing of
   intermediate hops in a network.  These tools are already available for
   different types of networks such as IP, MPLS, TRILL, etc. 
 
E-OAM offers OAM mechanisms such as an Ethernet continuity check for 
Ethernet links. There is an effort around NVO3 OAM
to provide connectivity and continuity checks for networks that use NVO3.  BFD is used
for the detection of data plane forwarding failures.
 
The IPPM framework [RFC 2330] offers tools such as OWAMP [RFC4656] and TWAMP
[RFC5357] (collectively referred as IPPM in this section) to measure various performance
metrics. MPLS Packet Loss Measurement (LM) and Packet Delay Measurement (DM) (collectively
referred as MPLS_PM in this section) [RFC6374] offers the ability to measure
performance metrics in MPLS network.

Table 3 below is not exhaustive.

Section 6.4.3 IOAM:
    - The section states that IOAM "may be used to perform various SFC OAM
    functions as well". It would be good to expand on this statement: E.g. IOAM
    Trace-Option Type could be leveraged for SFC tracing. IOAM Direct-Export Option
    Type could be leveraged. - How would we deal with the IOAM Active Flag
    (draft-ietf-ippm-ioam-flags-01) when used with SFC OAM? 

<Nagendra> The intention of the section is to highlight the applicability of different OAM toolsets for OAM functions at service layer. I am not sure if we really should try explaining all the possible options within each tool. But I agree that it is worth clarifying the availability of IOAM options for tracing. think we can clarify that different IOAM Option-Types are available for OAM functions such as SFC tracing. Can you check if the below looks ok?

OLD:
[I-D.ietf-sfc-ioam-nsh] defines how In-Situ OAM data fields are
   transported using NSH header.  [I-D.ietf-sfc-proof-of-transit]
   defines a mechanism to perform proof of transit to securely verify if
   a packet traversed the relevant SFP or SFC.  While the mechanism is
   defined inband (i.e., it will be included in data packets), it may be
   used to perform various SFC OAM functions as well.

NEW:
[I-D.ietf-sfc-ioam-nsh] defines how In-Situ OAM data fields are
   transported using NSH header.  [I-D.ietf-sfc-proof-of-transit]
   defines a mechanism to perform proof of transit to securely verify if
   a packet traversed the relevant SFP or SFC.  While the mechanism is
   defined inband (i.e., it will be included in data packets), IOAM Option-Types
  such as IOAM Trace Option-Types can also be used to perform other SFC OAM function 
  such as SFC tracing.

- The text states
    "In-Situ OAM could be used with O bit set": Why would IOAM be used with the
    overflow bit set for SFC OAM? For details on IOAM's O-bit, see section 4.4.1 in
    https://tools.ietf.org/html/draft-ietf-ippm-ioam-data-09. 

<Nagendra> The O bit referred here is not the O bit in IOAM but the one in NSH/Overlay header. To avoid any confusion, this can be updated as below:

OLD:
In-Situ OAM could be used with O bit set to perform SF availability
   and SFC availability or performance measurement.

NEW:
In-Situ OAM could be used with O bit in the overlay header set, to perform SF availability
   and SFC availability or performance measurement.

Section 6.4.4 SFC
    Traceroute: - This section refers to an expired draft (even calling out the
    fact that the draft has exipred), but also mentions that functionality is
    available and implemented in OpenDaylight. Consider removing the references to
    the expired draft and rather add references to OpenDaylight documents. - IOAM
    Loopback (see draft-ietf-ippm-ioam-flags-01) could apply SFC Traceroute as well.
    
<Nagendra>Ok. Let me check if I can find some reference for ODL. 

    Detailed set of nits that I encountered while reading through the document ([x]
    references line number x) – hope that they are helpful in further improving the
    doc:

<Nagendra> Yes of course (.
    
    [global] s/an SF/a SF/ -- and similarly SFC/SFF

<Nagendra>Other RFCs uses "an SF/SFF". So the draft is updated accordingly. If your suggestion is to substitute "a SF" to "an SF",  it is done (.

    [176] "OAM Controller" not defined

<Nagendra>We can change it as below:

OLD:
OAM controllers are assumed to be within the same administrative
   domain as the target SFC enabled domain.

NEW:
OAM controllers are SFC-aware network devices that are capable of 
generating OAM packets. They are assumed to be within the same 
administrative domain as the target SFC enabled domain.

    [202] Why just Virtual Machines and no containers? Suggest to make things
    generic and talk about virtual and physical entities.

<Nagendra> We changed this as virtual entities.

          This comment applies throughout the document.
    [216] Ethernet OAM: Add reference. Do you refer to physical layer Ethernet OAM
    (802.3ah) or CFM (802.1ag)? 

<Nagendra> The response was provided in the above comment section.

[243] s/uses the overlay network/uses the overlay
    network layer/ 

<Nagendra> Done.

[246] Could we add a few examples of "various overlay network
    technologies"? For the underlay network layer several examples are listed.

<Nagendra> Ok.

    [248] What does "mostly transparent" mean? 

<Nagendra> The data plane elements connecting the overlay layer nodes may not always process the overlay header. 

[254] What does "tight coupling"
    between the link layer and the physical technology mean? 

<Nagendra>I am not sure I understand the nit here. Do you see any difficulty in parsing the sentence?.

[255] Suggest to avoid
    terms like "popular" - popularity can change, standards stay 

<Nagendra> Ok. This is changed as "Ethernet is one such choice..."

[256] Acronyms
    "POS" and "DWDM" are not defined 

<Nagendra> Added.

[274] Link start/end-points don't seem to
    always align with the underlay network in the diagram 

<Nagendra> Fixed it.

[287] s/may comprise
    of/may consist of/ 

<Nagendra>We fixed it as "may comprise"..

[288] s/but not shown/but is not shown/ 

<Nagendra> We fixed this as "intermediate nodes not shown...:

[307]
    s/devices/device/ 

<Nagendra> Done.

[308] What is a "controller"? 

<Nagendra> We discussed this in the above comment section.

[314] s/includes/include/ 

<Nagendra>Done.

[319]
    Add hSFC to list of acronyms in section 1.2.1 

<Nagendra> This is expanded in the respective section. We added it in the acronym section as well.

[320] Add IBN to list of acronyms
    in section 1.2.1 

<Nagendra> Ok, Done.

[325] s/includes/include/ 

<Nagendra> Done.
[359] The function/term "controller"
    requires definition. 

<Nagendra> Done, as mentioned in the above comment section.

[383] s/?./?/ 

[398] s/get the got/got/

<Nagendra> Done.

 [461]
    s/devices/device/

<Nagendra> Done.

 [469] Does it have to be equal cost multipath at the service
    layer, or could unequal cost multipath also be an option for load-balancing?
   
<Nagendra>I didn’t see any discussion specific to ECMP/UCMP in the architecture RFC.

 [521] Not sure whether the overlay network establishes the service plane. Isn't
    it that the overlay network establishes connectivity for the SFC-related
    functions in the service plane? 

<Nagendra> The service layer is established over the overlay network layer. I am not sure if it is right to say overlay network provides connectivity for service layer (.

[531] s/components/component/ [545] remove
    "underlay" 

<Nagendra> Done.

[595] s/devices/device/ 

<Nagendra> Done.

[600] s/action/an action/ 

<Nagendra> Done.

[601] Expand on
    "TTL or other means" (TTL also needs to be added to acronyms in 1.2.1). Is this
    specific to NSH? Or specific to IPv4?

<Nagendra> TTL is listed as well-known abbrev in https://www.rfc-editor.org/materials/abbrev.expansion.txt and so we left it as it is. TTL in this document refers to NSH TTL field.

 [630] Mention that for "approximation of
    packet loss for a given SFC can be derived" to be applicable, SFC OAM packets
    would need to be forwarded the same as live user traffic.

<Nagendra> As it is intending to derive the approximate loss value, I am not sure if we need this additional consideration that the OAM packet would need to follow the live user traffic. Let me know if you think otherwise.

 [636] Is uppercase
    "MUST" applicable to an informational document? Especially given that
    RFC2119/RFC8174 is explicitly referenced by the draft. 

<Nagendra> Based on various reviewer comments, we removed the use of any normative statement.

[666] Add MPLS, TRILL to
    acronyms in 1.2.1 

<Nagendra> Ok. Done.

[678] s/exhaustive/exhaustive./ 

<Nagendra> Done.

[720] Is uppercase "SHOULD" applicable to an informational document?
    Especially given that RFC2119/RFC8174 is explicitly referenced by the draft.
    
<Nagendra> Based on various reviewer comments, we removed the use of any normative statement.

[722] Is uppercase "MAY" applicable to an informational document? Especially
    given that RFC2119/RFC8174 is explicitly referenced by the draft. 

<Nagendra> Based on various reviewer comments, we removed the use of any normative statement.

[754]
    s/packet/packets/ 

[755] s/to next node/to the next node/

 [771] How does this
    requirement align with the earlier paragraph, e.g. in case a node sends an ICMP
    reply? It would probably make sense to scope the statement to e.g. NSH. 

<Nagendra> As mentioned in the statement, the node that initiates the OAM packet must set the marker and so this statement is applicable for the initiating node.

[806]
    s/function/functions/ 

<Nagendra> Done

[809] s/from relevant node/from the relevant node/ 

<Nagendra> Done

[810]
    s/generate ICMP/generate an ICMP/ 

<Nagendra> Done

[812] s/from last/from the last/ 

<Nagendra> Done

[830]
    s/perform continuity/perform the continuity/

<Nagendra> Done

 [834] s/with relevant/with the
    relevant 

<Nagendra> Done

[835] s/perform partial SFC availability./perform a partial SFC
    availability check./ 

<Nagendra> Done

[851] For "In-Situ OAM data fields" add a normative
    reference to draft-ietf-ippm-ioam-data 

[905] Add "CLI" to section 1.2.1
    acronyms 

<Nagendra> Done

[920] Add a reference for NETCONF ->RFC6241
    
<Nagendra> Done

Once again, thanks a lot for the great comments.

Regards,
Nagendra