Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06

"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Tue, 23 July 2019 17:58 UTC

Return-Path: <naikumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 961DB120743; Tue, 23 Jul 2019 10:58:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.399
X-Spam-Level:
X-Spam-Status: No, score=-14.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=boLNY9uB; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=HQkv4yMT
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m9-4uclhZxku; Tue, 23 Jul 2019 10:58:21 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EED47120745; Tue, 23 Jul 2019 10:58:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=51001; q=dns/txt; s=iport; t=1563904698; x=1565114298; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=FE+XKZvxpj6HYBRNLc6y4jp7ouZhdTU8aPvZ7Q7hIys=; b=boLNY9uBfZOBuBzmX8q1dIQplYDVmQga2r1UQ/gOq2tL6NfYysbmgmfS CiNnxWus8yrOP5L5PI1+gQ0OKQqwOppcTb479hg6jLo8cIzhro2TVjqeS IofJv7RybGyd49CecqM6lX8zRmv14WANURXlBG49Y7xk6uHZGE4wr8Lzs E=;
IronPort-PHdr: 9a23:1KOJSxabxJTTHw/fDLfK/NP/LSx94ef9IxIV55w7irlHbqWk+dH4MVfC4el20gabRp3VvvRDjeee87vtX2AN+96giDgDa9QNMn1NksAKh0olCc+BB1f8KavsZi05AcFLTndu/mqwNg5eH8OtL1A=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJAACHSTdd/5xdJa1mGQEBAQEBAQEBAQEBAQcBAQEBAQGBVQIBAQEBAQsBgRQvJCwDbVUgBAsqCoQTg0cDjX+CNiWJVI18gS4UgRADUAQJAQEBDAEBGAEJCwIBAYEFXYJeAheCNyM2Bw4BAwEBBAEBAgEGbYUeDIVKAQEBAQMBARAICQoTAQEsBgUBDwIBCBEDAQIhAQYDAgICHwYLFAkIAgQBDQUUBweCewQBAYEdTQMdAQ6fbAKBOIhgcYEygnkBAQWBRkGCfgMKC4ITAwaBNAGLXheBf4EQAScME4JMPoIaRwEBAgEBFoEPPwcJCQYHCQKCUzKCJowCEgYTB4JEhH6CLYY+jRktQAkCghmGWIRuhFKDdBuCLYclhAyKLI01h0iBdY4TAgQCBAUCDgEBBYFXCCkNgUtwFTsqAYJBE4IvDBeDToUUhT9yAQEBAYEljRwBMW8BAQ
X-IronPort-AV: E=Sophos;i="5.64,299,1559520000"; d="scan'208,217";a="590457209"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Jul 2019 17:58:16 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x6NHwFiS005752 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 23 Jul 2019 17:58:16 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 23 Jul 2019 12:58:15 -0500
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 23 Jul 2019 12:58:13 -0500
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 23 Jul 2019 12:58:13 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EJLjRbF91qhYGO7tCuZqCA6nCTH3OYeRWm+18ITxTs4lhe10ozDnlVSQabkQjrUapkw7llaPUBWjClrqRaWfZGujYzlWH6N88CdhmG4Y5MgqRSGdTUFAv8rQDhPCP/o4BgVl4kOJ8kX3xZJiNlg1WZI8cLl7FqaRyVZE78oN93Mi9YStGB/Z15QeGgAba7mfvL/duYu2GzlADDTpqK5dtZpjnR8E+Xx75+Z89MIbWJGS25VYuAFjbjb1P5r0HHtVjM53dWrYP8Bk/+IYFhDGaKcRLYbF+7hLXbOqoVYH3XiAYLc090ynoBwg66DeaN/4lAty2tiqDD9U5HE3gl6P4g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FE+XKZvxpj6HYBRNLc6y4jp7ouZhdTU8aPvZ7Q7hIys=; b=FDHhlVU/VZ9YLm/OZ+a18+a5KXnrUprcmtSlp/hDE0pbTcBeT2J0itAuZYMQA63Fpr05ZnFEdQ1ub46p7WaPbwyt9ZDjuxPUP8nQ49IN3+416oZFX1M7P4iW96YZwZgqrFdxHZ4EXeGcdz8kTpfURElVmBP9sFxO1iehZ3ytK/t9r0atv331tnwuoC3lmUBw1qURrRmmWbRSqT3CqbaPEv/0ffnxMDg8yHlMMQ/vixT8hbv1ptFyLmQUpP2P3LdPyL/5NoIaFv6dli9bxX9LgtsT3W2PUWk9HUbdK4EciWe0wrvcXZWZvJR9DlvV9LkhXPWDU3V8xiiwvFFR09BctA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FE+XKZvxpj6HYBRNLc6y4jp7ouZhdTU8aPvZ7Q7hIys=; b=HQkv4yMTM1QuZyS8pPiXoQ/kL6bw9/HyRmnsNOAy4KBaAmq2x+sZujM1aE8yu4Kg+cjeCo6nghlSaKrmbUDQFdRpWkCm2ZA2FUlo0BXgd2SJLxKOAvvmUVGXzNjbx+P3ArZTh5VvZUg0P4wiz7befHPz9pIifsNKoHsYwcVLyvo=
Received: from BN6PR11MB4145.namprd11.prod.outlook.com (10.255.129.84) by BN6PR11MB2002.namprd11.prod.outlook.com (10.173.33.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.16; Tue, 23 Jul 2019 17:58:11 +0000
Received: from BN6PR11MB4145.namprd11.prod.outlook.com ([fe80::f9e2:59ff:1976:9690]) by BN6PR11MB4145.namprd11.prod.outlook.com ([fe80::f9e2:59ff:1976:9690%7]) with mapi id 15.20.2094.017; Tue, 23 Jul 2019 17:58:11 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, James Guichard <james.n.guichard@futurewei.com>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>
CC: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
Thread-Index: AQHVFWHG6SZyvEyD3EGGLNC6v36bBKbXDJKAgAGF/oA=
Date: Tue, 23 Jul 2019 17:58:11 +0000
Message-ID: <1A1EA07A-94DB-4100-8149-119B7915E64B@cisco.com>
References: <BYAPR13MB25978FD458B59EB22067685FD21E0@BYAPR13MB2597.namprd13.prod.outlook.com> <CA+RyBmWUeNd5u1NPb9cy5-DxsPdCYcB5q5nQ904P8-n-CX3KOQ@mail.gmail.com>
In-Reply-To: <CA+RyBmWUeNd5u1NPb9cy5-DxsPdCYcB5q5nQ904P8-n-CX3KOQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.10.b.190609
authentication-results: spf=none (sender IP is ) smtp.mailfrom=naikumar@cisco.com;
x-originating-ip: [173.38.117.75]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7b97739f-4817-445b-2a4a-08d70f9753d3
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BN6PR11MB2002;
x-ms-traffictypediagnostic: BN6PR11MB2002:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <BN6PR11MB2002663B21372F85E0DD8B4FC6C70@BN6PR11MB2002.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0107098B6C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(376002)(396003)(346002)(366004)(136003)(199004)(189003)(3846002)(8676002)(14444005)(316002)(6246003)(86362001)(54896002)(110136005)(6512007)(53936002)(5660300002)(4326008)(5070765005)(66556008)(64756008)(36756003)(256004)(966005)(66446008)(58126008)(66476007)(76116006)(6116002)(91956017)(236005)(790700001)(6306002)(68736007)(66946007)(7736002)(6486002)(33656002)(81166006)(81156014)(2906002)(99286004)(517774005)(486006)(229853002)(8936002)(76176011)(25786009)(11346002)(478600001)(2501003)(476003)(2616005)(9326002)(71190400001)(71200400001)(66066001)(186003)(14454004)(53546011)(26005)(6436002)(446003)(606006)(6506007)(30864003)(102836004); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR11MB2002; H:BN6PR11MB4145.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: zBMJdgbre6jvIwqkX5fjpaYExxMNK11Ms5ER8wx6c7bEZ9WsOfwFX/EE8e0i5UJt0mN8f29MAyE2smEQj16Ktw4a6cuXvhHZ4u6PP2TfD2pMiu8EVoP9vdXrzWi8xgOMg5q+4IRBda5Cmy74GQ2bCtPl7U6kpVKOh221AwhiJUG2K/FRPNeiiZ6uy7dfEHllnsUEUjlvD9YABmHWiev2DuMtX8QKjnl3+7GCvmlbo+WHL1AbiEICkMZ8MDytWosoW5lwggZKdgTG9XuPTqX3PwQ1ORzwRaLBmVfd6oPnk1IVrOX6m61+Hl3636a5L6HYnNOUFhBkYGjPdBDiElI8LvIR/vERaFAel6qNDgnAK/F79j2on+/jH/4k6ifd1l9vxYtuQVIKbYvlF+NInwnzaheJbHCvHZqx7Tj1t1N+1qg=
Content-Type: multipart/alternative; boundary="_000_1A1EA07A94DB41008149119B7915E64Bciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b97739f-4817-445b-2a4a-08d70f9753d3
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jul 2019 17:58:11.5781 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: naikumar@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB2002
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/T-lXjoqJQ8TP8QJ6oL6pFyTGq_U>
Subject: Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 17:58:26 -0000

Hi Greg,

Thank you for the comments. Please see our responses below.

in regard to the applicability of ICMP the statement in Section 4.1.1 is "ICMP could be leveraged for connectivity function (defined in Section 4.1) to verify the availability of SF or SFC." When I looked through Section 4.1 I find some discussion of a Fault Management function but no clear definition of what is connectivity verification in SFC.

<Authors> Section 4.1 already list some of the OAM functions that can be performed as part of connectivity function.

More so, it appears that connectivity verification is being mixed with re-ordering detection, Path MTU Discovery, data integrity monitoring,

<Authors> Please refer Section 2.2.7 of RFC7276 that explains MTU verification as part of Connectivity verification. Section 3.1.1 already explains the rationale behind including policy verification.

and some sort of policy verification. Real kitchen sink.

<Authors> The intention is to capture/highlight various OAM functions based on the unique characteristics of SFC. Please read section 3.1.1 about SF availability. It is already explained about what is (or why) policy verification for SF availability. Accordingly, we humbly deny on this comment.

At the same time, in other documents on network OAM, connectivity verification has been firmly defined as a function that verifies that data have been received only form the expected source over the expected path. In conjunction with this, a misconnection error is defined to indicate that packets from another connection have been received. In other words, the connectivity verification function verifies not only that packets from A reach node B but that they arrive only on the red wire, not on blue or yellow. Said all that, the interpretation of connectivity function in SFC may be different but, in my opinion, Section 4.1 does not provide anything.

<Authors> We dont understand your concern here. SFC OAM components explains what is availability and PM for SF/SFC (Refer section 3.1.x and 3.2.x) and tied it up with the function in section 4. The relevant sections also highlight the difference in SFC (For example, what is availability in terms of SF).

Also, it is not clear how the last bullet "Proactively test alternate or protected paths to ensure reliability of network configurations" is specific to and requires the use of a connectivity function and why it cannot be addressed by, for example, continuity check function.

<Authors> Thanks for highlighting this. We will add the same point under Section 4.2. Hope that satisfies your concern.

Also, the very last sentence of Section 4.1 concludes that ICMP in SFC "can be used for basic OAM functions". But I cannot find anywhere in the document where the term, notion of "basic OAM functions" has been discussed or defined. Which functions considered as basic? ICMP can be used as the fault management tool, to some extent because it is relatively processing extensive, but its value in performance monitoring is very low. Is PM OAM not part of the basic OAM functions?

<Authors> Thanks. To avoid any confusion, we modified it as below. Does the below modification help?

"It could be observed that ICMP at its current stage may not be able
   to perform all required SFC OAM functions, but as explained above, it
   can be used for some of the connectivity functions."


Section 6.4.2, in my opinion, may provide some context to how to interpret the use of "availability". From "BFD or S-BFD could be leveraged to perform SF or SFC availability" it appears that the availability is viewed as part of Fault Management OAM. (I'm still awaiting a response to my earlier questions specifically on the interpretation of "availability" in the OAM Framework for SFC.

<Authors> Thanks, this looks like a valid point. We can change the same as below:

"BFD or S-BFD could be leveraged to perform continuity function for SF or SFC."

Further, in Section 6.4.2 the possible use is described as "Upon receiving the control packet, the last SFF in the SFC will reply back with relevant DIAG code." But this is not how BFD in the Asynchronous mode operates, that is how only S-BFD works. The first sentence of the second paragraph refers to both BFD and S-BFD. But the rest of the paragraph describes the operation of S-BFD only, not of BFD in Asynchronous mode. I believe that either the positioning statement must be modified or explanation of the operation of BFD in Asynchronous mode over SFP provided.

<Authors> The intention is not to explain how it works for each BFD mode. But to explain the common behavior. AFAIK/R, setting relevant DIAG code in the response packet is common for both BFD and S-BFD. So we dont see any confusion here.


Section 6.4.3 includes the statement about the applicability of iOAM to availability: "In-Situ OAM could be used with O bit set to perform SF availability and SFC availability or performance measurement." I interpret this conclusion as the indication that availability is considered as part of the Fault Management OAM toolset. If that is the case, I question the value of using one-way OAM for fault management because only the egress node may have the state and even that is not demonstrated in existing iOAM documents. In order to detect path failure, a node must have information that can be used to detect the packet loss. That can be either monotonically increasing sequence numbers or the notion that packets must be arriving at pre-determined intervals. Which mechanism can be used by iOAM? Also, since iOAM, in regard to availability, appears as single-way FM OAM mechanism, that uses the actual data flow, what is its advantage comparing to, for example, collecting and comparing counters from ingress and egress? In other words, even if the egress can detect the loss of its availability for the particular SFP, how such a notion can be used?

<Authors> Section 6.4 is all about the applicability of different tools. It neither concludes nor prefers one over the other. How the data is collected, interpreted, used for failure detection or signaled back to the Initiator are expected to be explained in the solution document that proposes iOAM as the tool for SFC OAM. As mentioned in the document scope, any solution specific info is outside the scope of this document and accordingly we dont see a reason to include those details in this document.

I, again, have to point out that Section 6.4.4 references the individual draft that had expired 3+ years ago. Usually, that is the indication that neither authors nor the community are interested in the idea.

<Authors> This was already clarified by Carlos in different thread. The concept in the draft is already implemented and available in ODL.

Hope the above clarifies your queries. We are addressing the agreed comments and editorial comments that you raised in the other thread. We will submit a new version with the fixes.

Thanks,
Nagendra


From: sfc <sfc-bounces@ietf.org> on behalf of Greg Mirsky <gregimirsky@gmail.com>
Date: Monday, July 22, 2019 at 10:44 AM
To: James Guichard <james.n.guichard@futurewei.com>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06

Dear Jim, Joe, et al.,
I'd like to share my comments on Section of 6.4 of the draft. Much appreciate your consideration and response to my questions.

  *   in regard to the applicability of ICMP the statement in Section 4.1.1 is "ICMP could be leveraged for connectivity function (defined in Section 4.1) to verify the availability of SF or SFC." When I looked through Section 4.1 I find some discussion of a Fault Management function but no clear definition of what is connectivity verification in SFC. More so, it appears that connectivity verification is being mixed with re-ordering detection, Path MTU Discovery, data integrity monitoring, and some sort of policy verification. Real kitchen sink. At the same time, in other documents on network OAM, connectivity verification has been firmly defined as a function that verifies that data have been received only form the expected source over the expected path. In conjunction with this, a misconnection error is defined to indicate that packets from another connection have been received. In other words, the connectivity verification function verifies not only that packets from A reach node B but that they arrive only on the red wire, not on blue or yellow. Said all that, the interpretation of connectivity function in SFC may be different but, in my opinion, Section 4.1 does not provide anything. Also, it is not clear how the last bullet "Proactively test alternate or protected paths to ensure reliability of network configurations" is specific to and requires the use of a connectivity function and why it cannot be addressed by, for example, continuity check function.
  *   Also, the very last sentence of Section 4.1 concludes that ICMP in SFC "can be used for basic OAM functions". But I cannot find anywhere in the document where the term, notion of "basic OAM functions" has been discussed or defined. Which functions considered as basic? ICMP can be used as the fault management tool, to some extent because it is relatively processing extensive, but its value in performance monitoring is very low. Is PM OAM not part of the basic OAM functions?
  *   Section 6.4.2, in my opinion, may provide some context to how to interpret the use of "availability". From "BFD or S-BFD could be leveraged to perform SF or SFC availability" it appears that the availability is viewed as part of Fault Management OAM. (I'm still awaiting a response to my earlier questions specifically on the interpretation of "availability" in the OAM Framework for SFC.
  *   Further, in Section 6.4.2 the possible use is described as "Upon receiving the control packet, the last SFF in the SFC will reply back with relevant DIAG code." But this is not how BFD in the Asynchronous mode operates, that is how only S-BFD works. The first sentence of the second paragraph refers to both BFD and S-BFD. But the rest of the paragraph describes the operation of S-BFD only, not of BFD in Asynchronous mode. I believe that either the positioning statement must be modified or explanation of the operation of BFD in Asynchronous mode over SFP provided.
  *   Section 6.4.3 includes the statement about the applicability of iOAM to availability: "In-Situ OAM could be used with O bit set to perform SF availability and SFC availability or performance measurement." I interpret this conclusion as the indication that availability is considered as part of the Fault Management OAM toolset. If that is the case, I question the value of using one-way OAM for fault management because only the egress node may have the state and even that is not demonstrated in existing iOAM documents. In order to detect path failure, a node must have information that can be used to detect the packet loss. That can be either monotonically increasing sequence numbers or the notion that packets must be arriving at pre-determined intervals. Which mechanism can be used by iOAM? Also, since iOAM, in regard to availability, appears as single-way FM OAM mechanism, that uses the actual data flow, what is its advantage comparing to, for example, collecting and comparing counters from ingress and egress? In other words, even if the egress can detect the loss of its availability for the particular SFP, how such a notion can be used?
  *   I, again, have to point out that Section 6.4.4 references the individual draft that had expired 3+ years ago. Usually, that is the indication that neither authors nor the community are interested in the idea.
Regards,
Greg

On Tue, May 28, 2019 at 10:37 AM James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>> wrote:

Dear WG:



This message starts a new two week WG Last Call on advancing https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/<https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-sfc-oam-framework%2F&data=02%7C01%7Cjames.n.guichard%40futurewei.com%7Ce47e5eb13f224f18c46408d6e378b2f7%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636946504868870205&sdata=lkKvAgmKik7lkqGANQpnIvBRdbjKAqYtzTUdTfB9f3Y%3D&reserved=0> for publication as an Informational RFC.



Substantive comments and statements of support for publishing this document should be directed to the mailing list. Editorial suggestions can be sent to the authors.  This last call will end on 11th June 2019.



Thanks!



Jim & Joel





_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc