diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7680.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7680.txt')
-rw-r--r-- | doc/rfc/rfc7680.txt | 1235 |
1 files changed, 1235 insertions, 0 deletions
diff --git a/doc/rfc/rfc7680.txt b/doc/rfc/rfc7680.txt new file mode 100644 index 0000000..4cb351a --- /dev/null +++ b/doc/rfc/rfc7680.txt @@ -0,0 +1,1235 @@ + + + + + + +Internet Engineering Task Force (IETF) G. Almes +Request for Comments: 7680 Texas A&M +STD: 82 S. Kalidindi +Obsoletes: 2680 Ixia +Category: Standards Track M. Zekauskas +ISSN: 2070-1721 Internet2 + A. Morton, Ed. + AT&T Labs + January 2016 + + + A One-Way Loss Metric for IP Performance Metrics (IPPM) + +Abstract + + This memo defines a metric for one-way loss of packets across + Internet paths. It builds on notions introduced and discussed in the + IP Performance Metrics (IPPM) Framework document, RFC 2330; the + reader is assumed to be familiar with that document. This memo makes + RFC 2680 obsolete. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc7680. + + + + + + + + + + + + + + + + + +Almes, et al. Standards Track [Page 1] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +Copyright Notice + + Copyright (c) 2016 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Almes, et al. Standards Track [Page 2] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 + 1.1. Motivation . . . . . . . . . . . . . . . . . . . . . . . 5 + 1.2. General Issues regarding Time . . . . . . . . . . . . . . 6 + 2. A Singleton Definition for One-Way Packet Loss . . . . . . . 7 + 2.1. Metric Name . . . . . . . . . . . . . . . . . . . . . . . 7 + 2.2. Metric Parameters . . . . . . . . . . . . . . . . . . . . 7 + 2.3. Metric Units . . . . . . . . . . . . . . . . . . . . . . 7 + 2.4. Definition . . . . . . . . . . . . . . . . . . . . . . . 7 + 2.5. Discussion . . . . . . . . . . . . . . . . . . . . . . . 8 + 2.6. Methodologies . . . . . . . . . . . . . . . . . . . . . . 9 + 2.7. Errors and Uncertainties . . . . . . . . . . . . . . . . 10 + 2.8. Reporting the Metric . . . . . . . . . . . . . . . . . . 11 + 2.8.1. Type-P . . . . . . . . . . . . . . . . . . . . . . . 11 + 2.8.2. Loss Threshold . . . . . . . . . . . . . . . . . . . 11 + 2.8.3. Calibration Results . . . . . . . . . . . . . . . . . 11 + 2.8.4. Path . . . . . . . . . . . . . . . . . . . . . . . . 12 + 3. A Definition for Samples of One-Way Packet Loss . . . . . . . 12 + 3.1. Metric Name . . . . . . . . . . . . . . . . . . . . . . . 12 + 3.2. Metric Parameters . . . . . . . . . . . . . . . . . . . . 13 + 3.3. Metric Units . . . . . . . . . . . . . . . . . . . . . . 13 + 3.4. Definition . . . . . . . . . . . . . . . . . . . . . . . 13 + 3.5. Discussion . . . . . . . . . . . . . . . . . . . . . . . 13 + 3.6. Methodologies . . . . . . . . . . . . . . . . . . . . . . 14 + 3.7. Errors and Uncertainties . . . . . . . . . . . . . . . . 15 + 3.8. Reporting the Metric . . . . . . . . . . . . . . . . . . 15 + 4. Some Statistics Definitions for One-Way Packet Loss . . . . . 15 + 4.1. Type-P-One-way-Packet-Loss-Ratio . . . . . . . . . . . . 15 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 16 + 6. Changes from RFC 2680 . . . . . . . . . . . . . . . . . . . . 17 + 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 19 + 7.1. Normative References . . . . . . . . . . . . . . . . . . 19 + 7.2. Informative References . . . . . . . . . . . . . . . . . 20 + Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 21 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 + + + + + + + + + + + + + + + +Almes, et al. Standards Track [Page 3] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +1. Introduction + + This memo defines a metric for one-way packet loss across Internet + paths. It builds on notions introduced and discussed in the IPPM + Framework document, [RFC2330]; the reader is assumed to be familiar + with that document and its recent update [RFC7312]. + + This memo is intended to be parallel in structure to a companion + document for One-way Delay ("A One-Way Delay Metric for IP + Performance Metrics (IPPM)") [RFC7679]; the reader is assumed to be + familiar with that document. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. Although + [RFC2119] was written with protocols in mind, the key words are used + in this document for similar reasons. They are used to ensure the + results of measurements from two different implementations are + comparable and to note instances when an implementation could perturb + the network. + + Whenever a technical term from the IPPM Framework document is first + used in this memo, it will be tagged with a trailing asterisk. For + example, "term*" indicates that "term" is defined in the Framework + document. + + The structure of the memo is as follows: + + o A 'singleton*' analytic metric, called Type-P-One-way-Packet-Loss, + is introduced to measure a single observation of packet + transmission or loss. + + o Using this singleton metric, a 'sample*' called Type-P-One-way- + Packet-Loss-Poisson-Stream is introduced to measure a sequence of + singleton transmissions and/or losses measured at times taken from + a Poisson process, as defined in Section 11.1.1 of [RFC2330]. + + o Using this sample, several 'statistics*' of the sample will be + defined and discussed. + + This progression from singleton to sample to statistics, with clear + separation among them, is important. + + + + + + + + + +Almes, et al. Standards Track [Page 4] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +1.1. Motivation + + Understanding one-way packet loss of Type-P* packets from a source + host* to a destination host is useful for several reasons: + + o Some applications do not perform well (or at all) if end-to-end + loss between hosts is large relative to some threshold value. + + o Excessive packet loss may make it difficult to support certain + real-time applications (where the precise threshold of "excessive" + depends on the application). + + o The larger the value of packet loss, the more difficult it is for + transport-layer protocols to sustain high bandwidths. + + o The sensitivity of real-time applications and of transport-layer + protocols to loss become especially important when very large + delay-bandwidth products must be supported. + + The measurement of one-way loss instead of round-trip loss is + motivated by the following factors: + + o In today's Internet, the path from a source to a destination may + be different than the path from the destination back to the source + ("asymmetric paths"), such that different sequences of routers are + used for the forward and reverse paths. Therefore, round-trip + measurements actually measure the performance of two distinct + paths together. Measuring each path independently highlights the + performance difference between the two paths that may traverse + different Internet service providers and even radically different + types of networks (for example, research versus commodity + networks, or networks with asymmetric link capacities, or wireless + versus wireline access). + + o Even when the two paths are symmetric, they may have radically + different performance characteristics due to asymmetric queuing. + + o Performance of an application may depend mostly on the performance + in one direction. For example, a TCP-based communication will + experience reduced throughput if congestion occurs in one + direction of its communication. Troubleshooting may be simplified + if the congested direction of TCP transmission can be identified. + + o In networks in which quality of service (QoS) is enabled, + provisioning in one direction may be radically different than + provisioning in the reverse direction and thus the QoS guarantees + differ. Measuring the paths independently allows the verification + of both guarantees. + + + +Almes, et al. Standards Track [Page 5] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + It is outside the scope of this document to say precisely how loss + metrics would be applied to specific problems. + +1.2. General Issues regarding Time + + {Comment: The terminology below differs from that defined by ITU-T + documents (e.g., G.810, "Definitions and terminology for + synchronization networks" and I.356, "B-ISDN ATM layer cell transfer + performance") but is consistent with the IPPM Framework document. In + general, these differences derive from the different backgrounds; the + ITU-T documents historically have a telephony origin, while the + authors of this document (and the Framework document) have a computer + systems background. Although the terms defined below have no direct + equivalent in the ITU-T definitions, after our definitions we will + provide a rough mapping. However, note one potential confusion: our + definition of "clock" is the computer operating systems definition + denoting a time-of-day clock, while the ITU-T definition of clock + denotes a frequency reference.} + + Whenever a time (i.e., a moment in history) is mentioned here, it is + understood to be measured in seconds (and fractions) relative to UTC. + + As described more fully in the Framework document, there are four + distinct, but related notions of clock uncertainty: + + synchronization* + + measures the extent to which two clocks agree on what time it is. + For example, the clock on one host might be 5.4 msec ahead of the + clock on a second host. {Comment: A rough ITU-T equivalent is "time + error".} + + accuracy* + + measures the extent to which a given clock agrees with UTC. For + example, the clock on a host might be 27.1 msec behind UTC. {Comment: + A rough ITU-T equivalent is "time error from UTC".} + + resolution* + + is a specification of the smallest unit by which the clock's time is + updated. It gives a lower bound on the clock's uncertainty. For + example, the clock on an old Unix host might tick only once every 10 + msec and thus have a resolution of only 10 msec. {Comment: A very + rough ITU-T equivalent is "sampling period".} + + + + + + +Almes, et al. Standards Track [Page 6] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + skew* + + measures the change of accuracy, or of synchronization, with time. + For example, the clock on a given host might gain 1.3 msec per hour + and thus be 27.1 msec behind UTC at one time and only 25.8 msec an + hour later. In this case, we say that the clock of the given host + has a skew of 1.3 msec per hour relative to UTC, which threatens + accuracy. We might also speak of the skew of one clock relative to + another clock, which threatens synchronization. {Comment: A rough + ITU-T equivalent is "time drift".} + +2. A Singleton Definition for One-Way Packet Loss + +2.1. Metric Name + + Type-P-One-way-Packet-Loss + +2.2. Metric Parameters + + o Src, the IP address of a host + + o Dst, the IP address of a host + + o T, a time + + o Tmax, a loss threshold waiting time + +2.3. Metric Units + + The value of a Type-P-One-way-Packet-Loss is either a zero + (signifying successful transmission of the packet) or a one + (signifying loss). + +2.4. Definition + + >>The *Type-P-One-way-Packet-Loss* from Src to Dst at T is 0<< means + that Src sent the first bit of a Type-P packet to Dst at wire time* T + and that Dst received that packet. + + >>The *Type-P-One-way-Packet-Loss* from Src to Dst at T is 1<< means + that Src sent the first bit of a Type-P packet to Dst at wire time T + and that Dst did not receive that packet (within the loss threshold + waiting time, Tmax). + + + + + + + + +Almes, et al. Standards Track [Page 7] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +2.5. Discussion + + Thus, Type-P-One-way-Packet-Loss is 0 exactly when Type-P-One-way- + Delay is a finite value, and it is 1 exactly when Type-P-One-way- + Delay is undefined. + + The following issues are likely to come up in practice: + + o A given methodology will have to include a way to distinguish + between a packet loss and a very large (but finite) delay. As + noted by Mahdavi and Paxson [RFC2678], simple upper bounds (such + as the 255-second theoretical upper bound on the lifetimes of IP + packets [RFC791]) could be used, but good engineering, including + an understanding of packet lifetimes, will be needed in practice. + {Comment: Note that, for many applications of these metrics, there + may be no harm in treating a large delay as packet loss. An audio + playback packet, for example, that arrives only after the playback + point may as well have been lost. See Section 4.1.1 of [RFC6703] + for examination of unusual packet delays and application + performance estimation.} + + o If the packet arrives but is corrupted, then it is counted as + lost. {Comment: One is tempted to count the packet as received + since corruption and packet loss are related but distinct + phenomena. If the IP header is corrupted, however, one cannot be + sure about the source or destination IP addresses and is thus on + shaky grounds about knowing that the corrupted received packet + corresponds to a given sent test packet. Similarly, if other + parts of the packet needed by the methodology to know that the + corrupted received packet corresponds to a given sent test packet, + then such a packet would have to be counted as lost. It would be + inconsistent to count packets with corrupted methodology-specific + fields as lost, and not to count packets with other corrupted + aspects in the same category.} Section 15 of [RFC2330] defines the + "standard-formed" packet that is applicable to all metrics. Note + that at this time the definition of standard-formed packets only + applies to IPv4 (see also [IPPM-UPDATES]). + + o If the packet is duplicated along the path (or paths) so that + multiple non-corrupt copies arrive at the destination, then the + packet is counted as received. + + o If the packet is fragmented and if, for whatever reason, + reassembly does not occur, then the packet will be deemed lost. + + + + + + + +Almes, et al. Standards Track [Page 8] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +2.6. Methodologies + + As with other Type-P-* metrics, the detailed methodology will depend + on the Type-P (e.g., protocol number, UDP/TCP port number, size, + Differentiated Services (DS) Field [RFC2780]). + + Generally, for a given Type-P, one possible methodology would proceed + as follows: + + o Arrange that Src and Dst have clocks that are synchronized with + each other. The degree of synchronization is a parameter of the + methodology and depends on the threshold used to determine loss + (see below). + + o At the Src host, select Src and Dst IP addresses and form a test + packet of Type-P with these addresses. + + o At the Dst host, arrange to receive the packet. + + o At the Src host, place a timestamp in the prepared Type-P packet, + and send it towards Dst (ideally minimizing time before sending). + + o If the packet arrives within a reasonable period of time, the one- + way packet loss is taken to be zero (and take a timestamp as soon + as possible upon the receipt of the packet). + + o If the packet fails to arrive within a reasonable period of time, + Tmax, the one-way packet loss is taken to be one. Note that the + threshold of "reasonable" here is a parameter of the metric. + + {Comment: The definition of reasonable is intentionally vague and is + intended to indicate a value "Th" so large that any value in the + closed interval [Th-delta, Th+delta] is an equivalent threshold for + loss. Here, delta encompasses all error in clock synchronization and + timestamp acquisition and assignment along the measured path. If + there is a single value, Tmax, after which the packet must be counted + as lost, then we reintroduce the need for a degree of clock + synchronization similar to that needed for one-way delay, and + virtually all practical measurement systems combine methods for delay + and loss. Therefore, if a measure of packet loss parameterized by a + specific non-huge "reasonable" time-out value is needed, one can + always measure one-way delay and see what percentage of packets from + a given stream exceed a given time-out value. This point is examined + in detail in [RFC6703], including analysis preferences to assign + undefined delay to packets that fail to arrive with the difficulties + emerging from the informal "infinite delay" assignment, and an + estimation of an upper bound on waiting time for packets in transit. + Further, enforcing a specific constant waiting time on stored + + + +Almes, et al. Standards Track [Page 9] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + singletons of one-way delay is compliant with this specification and + may allow the results to serve more than one reporting audience.} + + Issues such as the packet format, the means by which Dst knows when + to expect the test packet, and the means by which Src and Dst are + synchronized are outside the scope of this document. {Comment: We + plan to document the implementation techniques of our work in much + more detail elsewhere; we encourage others to do so as well.} + +2.7. Errors and Uncertainties + + The description of any specific measurement method should include an + accounting and analysis of various sources of error or uncertainty. + The Framework document provides general guidance on this point. + + For loss, there are three sources of error: + + o synchronization between clocks on Src and Dst. + + o the packet-loss threshold (which is related to the synchronization + between clocks). + + o resource limits in the network interface or software on the + receiving instrument. + + The first two sources are interrelated and could result in a test + packet with finite delay being reported as lost. Type-P-One-way- + Packet-Loss is 1 if the test packet does not arrive, or if it does + arrive and the difference between the Src timestamp and the Dst + timestamp is greater than the "reasonable period of time" or loss + threshold. If the clocks are not sufficiently synchronized, the loss + threshold may not be "reasonable" - the packet may take much less + time to arrive than its Src timestamp indicates. Similarly, if the + loss threshold is set too low, then many packets may be counted as + lost. The loss threshold must be high enough and the clocks + synchronized well enough so that a packet that arrives is rarely + counted as lost. (See the discussions in the previous two sections.) + + Since the sensitivity of packet-loss measurement alone to lack of + clock synchronization is less than for delay, we refer the reader to + the treatment of synchronization errors in the "One-way Delay Metric + for IPPM" [RFC2330] for more details. + + The last source of error, resource limits, cause the packet to be + dropped by the measurement instrument and counted as lost when in + fact the network delivered the packet in reasonable time. + + + + + +Almes, et al. Standards Track [Page 10] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + The measurement instruments should be calibrated such that the loss + threshold is reasonable for application of the metrics and the clocks + are synchronized enough so the loss threshold remains reasonable. + + In addition, the instruments should be checked to ensure that the + possibility a packet arrives at the network interface but is lost due + to congestion on the interface or to other resource exhaustion (e.g., + buffers) on the instrument is low. + +2.8. Reporting the Metric + + The calibration and context in which the metric is measured MUST be + carefully considered and SHOULD always be reported along with metric + results. We now present four items to consider: Type-P of the test + packets, the loss threshold, instrument calibration, and the path + traversed by the test packets. This list is not exhaustive; any + additional information that could be useful in interpreting + applications of the metrics should also be reported (see [RFC6703] + for extensive discussion of reporting considerations for different + audiences). + +2.8.1. Type-P + + As noted in Section 13 of the Framework document [RFC2330], the value + of the metric may depend on the type of IP packets used to make the + measurement, or "Type-P". The value of Type-P-One-way-Delay could + change if the protocol (UDP or TCP), port number, size, or + arrangement for special treatment (e.g., IP DS Field [RFC2780], + Explicit Congestion Notification (ECN) [RFC3168], or RSVP) changes. + Additional packet distinctions identified in future extensions of the + Type-P definition will apply. The exact Type-P used to make the + measurements MUST be accurately reported. + +2.8.2. Loss Threshold + + The threshold, Tmax, between a large finite delay and loss (or other + methodology to distinguish between finite delay and loss) MUST be + reported. + +2.8.3. Calibration Results + + The degree of synchronization between the Src and Dst clocks MUST be + reported. If possible, a test packet that arrives at the Dst network + interface and is reported as lost due to resource exhaustion on Dst + SHOULD be reported. + + + + + + +Almes, et al. Standards Track [Page 11] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +2.8.4. Path + + Finally, the path traversed by the packet SHOULD be reported, if + possible. In general, it is impractical to know the precise path a + given packet takes through the network. The precise path may be + known for certain Type-P on short or stable paths. If Type-P + includes the record route (or loose-source route) option in the IP + header, and the path is short enough, and all routers* on the path + support record (or loose-source) route, then the path will be + precisely recorded. This is impractical because the route must be + short enough, many routers do not support (or are not configured for) + record route, and use of this feature would often artificially worsen + the performance observed by removing the packet from common-case + processing. However, partial information is still valuable context. + For example, if a host can choose between two links* (and hence, two + separate routes from Src to Dst), then the initial link used is + valuable context. {Comment: Backbone path selection services come and + go. A historical example was Merit's NetNow setup, where a Src on + one Network Access Point (NAP) can reach a Dst on another NAP by + either of several different backbone networks.} + +3. A Definition for Samples of One-Way Packet Loss + + Given the singleton metric Type-P-One-way-Packet-Loss, we now define + one particular sample of such singletons. The idea of the sample is + to select a particular binding of the parameters Src, Dst, and Type- + P, then define a sample of values of parameter T. The means for + defining the values of T is to select a beginning time T0, a final + time Tf, and an average rate lambda, then define a pseudorandom + Poisson process of rate lambda, whose values fall between T0 and Tf. + The time interval between successive values of T will then average 1/ + lambda. + + Note that Poisson sampling is only one way of defining a sample. + Poisson has the advantage of limiting bias, but other methods of + sampling will be appropriate for different situations. For example, + a truncated Poisson distribution may be needed to avoid reactive + network state changes during intervals of inactivity, see Section 4.6 + of [RFC7312]. Sometimes the goal is sampling with a known bias, and + [RFC3432] describes a method for periodic sampling with random start + times. + +3.1. Metric Name + + Type-P-One-way-Packet-Loss-Poisson-Stream + + + + + + +Almes, et al. Standards Track [Page 12] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +3.2. Metric Parameters + + o Src, the IP address of a host + + o Dst, the IP address of a host + + o T0, a time + + o Tf, a time + + o Tmax, a loss threshold waiting time + + o lambda, a rate in reciprocal seconds + +3.3. Metric Units + + A sequence of pairs; the elements of each pair are: + + o T, a time, and + + o L, either a zero or a one. + + The values of T in the sequence are monotonic increasing. Note that + T would be a valid parameter to Type-P-One-way-Packet-Loss and that L + would be a valid value of Type-P-One-way-Packet-Loss. + +3.4. Definition + + Given T0, Tf, and lambda, we compute a pseudorandom Poisson process + beginning at or before T0, with average arrival rate lambda, and + ending at or after Tf. Those time values greater than or equal to T0 + and less than or equal to Tf are then selected. At each of the + selected times in this process, we obtain one value of Type-P-One- + way-Delay. The value of the sample is the sequence made up of the + resulting <time, loss> pairs. If there are no such pairs, the + sequence is of length zero and the sample is said to be empty. + +3.5. Discussion + + The reader should be familiar with the in-depth discussion of Poisson + sampling in the Framework document [RFC2330], which includes methods + to compute and verify the pseudorandom Poisson process. + + We specifically do not constrain the value of lambda except to note + the extremes. If the rate is too large, then the measurement traffic + will perturb the network and itself cause congestion. If the rate is + too small, then you might not capture interesting network behavior. + {Comment: We expect to document our experiences with, and suggestions + + + +Almes, et al. Standards Track [Page 13] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + for, lambda elsewhere, culminating in a "Best Current Practice" + document.} + + Since a pseudorandom number sequence is employed, the sequence of + times, and hence the value of the sample, is not fully specified. + Pseudorandom number generators of good quality will be needed to + achieve the desired qualities. + + The sample is defined in terms of a Poisson process both to avoid the + effects of self-synchronization and also capture a sample that is + statistically as unbiased as possible. The Poisson process is used + to schedule the loss measurements. The test packets will generally + not arrive at Dst according to a Poisson distribution, since they are + influenced by the network. Time-slotted links described in + Section 3.4 [RFC7312] can greatly modify the sample characteristics. + The main concern is that unbiased packet streams with randomized + inter-packet time intervals will be converted to some new + distribution after encountering a time-slotted link, possibly with + strong periodic characteristics instead. + + {Comment: there is, of course, no claim that real Internet traffic + arrives according to a Poisson arrival process. + + It is important to note that, in contrast to this metric, loss ratios + observed by transport connections do not reflect unbiased samples. + For example, TCP transmissions both (1) occur in bursts, which can + induce loss due to the burst volume that would not otherwise have + been observed, and (2) adapt their transmission rate in an attempt to + minimize the loss ratio observed by the connection.} + + All the singleton Type-P-One-way-Packet-Loss metrics in the sequence + will have the same values of Src, Dst, and Type-P. + + Note also that, given one sample that runs from T0 to Tf, and given + new time values T0' and Tf' such that T0 <= T0' <= Tf' <= Tf, the + subsequence of the given sample whose time values fall between T0' + and Tf' are also a valid Type-P-One-way-Packet-Loss-Poisson-Stream + sample. + +3.6. Methodologies + + The methodologies follow directly from: + + o the selection of specific times using the specified Poisson + arrival process, and + + o the methodologies discussion already given for the singleton Type- + P-One-way-Packet-Loss metric. + + + +Almes, et al. Standards Track [Page 14] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + Care must be given to correctly handle out-of-order arrival of test + packets; it is possible that the Src could send one test packet at + TS[i], then send a second one (later) at TS[i+1] while the Dst could + receive the second test packet at TR[i+1], and then receive the first + one (later) at TR[i]. Metrics for reordering may be found in + [RFC4737]. + +3.7. Errors and Uncertainties + + In addition to sources of errors and uncertainties associated with + methods employed to measure the singleton values that make up the + sample, care must be given to analyze the accuracy of the Poisson + arrival process of the wire times of the sending of the test packets. + Problems with this process could be caused by several things, + including problems with the pseudorandom number techniques used to + generate the Poisson arrival process. The Framework document shows + how to use the Anderson-Darling test to verify the accuracy of the + Poisson process over small time frames. {Comment: The goal is to + ensure that the test packets are sent "close enough" to a Poisson + schedule and avoid periodic behavior.} + +3.8. Reporting the Metric + + The calibration and context for the underlying singletons MUST be + reported along with the stream (see "Reporting the Metric" + (Section 2.8) for Type-P-One-way-Packet-Loss). + +4. Some Statistics Definitions for One-Way Packet Loss + + Given the sample metric Type-P-One-way-Packet-Loss-Poisson-Stream, we + now offer several statistics of that sample. These statistics are + offered mostly to be illustrative of what could be done. See + [RFC6703] for additional discussion of statistics that are relevant + to different audiences. + +4.1. Type-P-One-way-Packet-Loss-Ratio + + Given a Type-P-One-way-Packet-Loss-Poisson-Stream, the average of all + the L values in the stream is the ratio of losses to total packets in + the stream. In addition, the Type-P-One-way-Packet-Loss-Ratio is + undefined if the sample is empty. + + + + + + + + + + +Almes, et al. Standards Track [Page 15] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + For example, suppose we take a sample and the results are as follows: + + Stream1 = < + + <T1, 0> + + <T2, 0> + + <T3, 1> + + <T4, 0> + + <T5, 0> + + > + + Then, the average of loss results would be 0.2, the loss ratio. + + Note that, since healthy Internet paths should be operating at loss + ratios below 1% (particularly if high delay-bandwidth products are to + be sustained), the sample sizes needed might be larger than one would + like. Thus, for example, if one wants to discriminate between + various fractions of 1% over one-minute periods, then several hundred + samples per minute might be needed. This would result in larger + values of lambda than one would ordinarily want. + + Note that although the loss threshold should be set such that any + errors in loss are not significant, if the possibility that a packet + that arrived is counted as lost due to resource exhaustion is + significant compared to the loss ratio of interest, Type-P-One-way- + Packet-Loss-Ratio will be meaningless. + +5. Security Considerations + + Conducting Internet measurements raises both security and privacy + concerns. This memo does not specify an implementation of the + metrics, so it does not directly affect the security of the Internet + nor of applications that run on the Internet. However, + implementations of these metrics must be mindful of security and + privacy concerns. + + There are two types of security concerns: potential harm caused by + the measurements and potential harm to the measurements. The + measurements could cause harm because they are active and inject + packets into the network. The measurement parameters MUST be + carefully selected so that the measurements inject trivial amounts of + additional traffic into the networks they measure. If they inject + + + + +Almes, et al. Standards Track [Page 16] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + "too much" traffic, they can skew the results of the measurement and + in extreme cases cause congestion and denial of service. + + The measurements themselves could be harmed by routers giving + measurement traffic a different priority than "normal" traffic or by + an attacker injecting artificial measurement traffic. If routers can + recognize measurement traffic and treat it separately, the + measurements will not reflect actual user traffic. If an attacker + injects artificial traffic that is accepted as legitimate, the loss + ratio will be artificially lowered. Therefore, the measurement + methodologies SHOULD include appropriate techniques to reduce the + probability that measurement traffic can be distinguished from + "normal" traffic. Authentication techniques, such as digital + signatures, may be used where appropriate to guard against injected + traffic attacks. + + When considering privacy of those involved in measurement or those + whose traffic is measured, the sensitive information available to + potential observers is greatly reduced when using active techniques + that are within this scope of work. Passive observations of user + traffic for measurement purposes raise many privacy issues. We refer + the reader to the privacy considerations described in the Large Scale + Measurement of Broadband Performance (LMAP) Framework [RFC7594], + which covers active and passive techniques. + + Collecting measurements or using measurement results for + reconnaissance to assist in subsequent system attacks is quite + common. Access to measurement results or control of the measurement + systems to perform reconnaissance should be guarded against. See + Section 7 of [RFC7594] (the Security Considerations section of the + LMAP Framework) for system requirements that help to avoid + measurement system compromise. + +6. Changes from RFC 2680 + + The text above constitutes a revision to RFC 2680, which is now an + Internet Standard. + + [RFC7290] provides the test plan and results supporting [RFC2680] + advancement along the Standards Track, according to the process in + [RFC6576]. The conclusions of [RFC7290] list four minor + modifications for inclusion: + + 1. Section 6.2.3 of [RFC7290] asserts that the assumption of post- + processing to enforce a constant waiting time threshold is + compliant and that the text of the RFC should be revised slightly + to include this point. The applicability of post-processing was + added in the last list item of Section 2.6, above. + + + +Almes, et al. Standards Track [Page 17] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + 2. Section 6.5 of [RFC7290] indicates that the Type-P-One-way- + Packet-Loss-Average statistic is more commonly called a Packet + Loss Ratio, so it is renamed in this document (this small + discrepancy does not affect candidacy for advancement). The + renaming was implemented in Section 4.1, above. + + 3. The IETF has reached consensus on guidance for reporting metrics + in [RFC6703], and the memo is referenced this document to + incorporate recent experience where appropriate. This reference + was added in the last list item of Section 2.6, in Section 2.8, + and in Section 4 above. + + 4. There are currently two errata with status "Verified" (EID 1528) + and "Held for Document Update" (EID 3186) for [RFC2680], and + these minor revisions were incorporated in Sections 1 and 2.7. + + A number of updates to the [RFC2680] text have been implemented in + the text to reference key IPPM RFCs that were approved after + [RFC2680] (see Sections 3 and 3.6, above) and to address comments on + the IPPM mailing list describing current conditions and experience. + + 1. Near the end of Section 1.1, there is an update of a network + example using ATM, a clarification of TCP's affect on queue + occupation, and discussion of the importance of one-way delay + measurement. + + 2. Clarification of the definition of "resolution" in Section 1.2. + + 3. Explicit inclusion of the maximum waiting time input parameter + in Sections 2.2, 2.4, and 3.2, reflecting recognition of this + parameter in more recent RFCs and ITU-T Recommendation Y.1540. + + 4. Addition of a reference to RFC 6703 in the discussion of packet + lifetime and application timeouts in Section 2.5. + + 5. Replaced "precedence" with updated terminology (DS Field) in + Sections 2.6 and 2.8.1 (with reference). + + 6. Added parenthetical guidance on minimizing the interval between + timestamp placement to send time or reception time in + Section 2.6. Also, the text now recognizes the timestamp + acquisition process and that practical systems measure both + delay and loss (thus requiring the max waiting time parameter). + + 7. Added a reference to RFC 3432 regarding periodic sampling + alongside Poisson sampling in Section 3 and also noted that a + truncated Poisson distribution may be needed with modern + networks as described in the IPPM Framework update [RFC7312]. + + + +Almes, et al. Standards Track [Page 18] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + 8. Recognition that time-slotted links described in [RFC7312] can + greatly modify the sample characteristics, in Section 3.5. + + 9. Added a reference to RFC 4737 regarding reordering metrics in + the related discussion of Section 3.6, "Methodologies". + + 10. Expanded and updated the material on privacy and added cautions + on use of measurements for reconnaissance in Section 5, + "Security Considerations". + + Section 5.4.4 of [RFC6390] suggests a common template for performance + metrics partially derived from previous IPPM and Benchmarking + Methodology Working Group (BMWG) RFCs, but it also contains some new + items. All of the normative parts of [RFC6390] are covered, but not + quite in the same section names or orientation. Several of the + informative parts are covered. Maintaining the familiar outline of + IPPM literature has value and minimizes unnecessary differences + between this revised RFC and current/future IPPM RFCs. + +7. References + +7.1. Normative References + + [RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791, + DOI 10.17487/RFC0791, September 1981, + <http://www.rfc-editor.org/info/rfc791>. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <http://www.rfc-editor.org/info/rfc2119>. + + [RFC2330] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis, + "Framework for IP Performance Metrics", RFC 2330, + DOI 10.17487/RFC2330, May 1998, + <http://www.rfc-editor.org/info/rfc2330>. + + [RFC2678] Mahdavi, J. and V. Paxson, "IPPM Metrics for Measuring + Connectivity", RFC 2678, DOI 10.17487/RFC2678, September + 1999, <http://www.rfc-editor.org/info/rfc2678>. + + [RFC2680] Almes, G., Kalidindi, S., and M. Zekauskas, "A One-way + Packet Loss Metric for IPPM", RFC 2680, + DOI 10.17487/RFC2680, September 1999, + <http://www.rfc-editor.org/info/rfc2680>. + + + + + + +Almes, et al. Standards Track [Page 19] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + [RFC2780] Bradner, S. and V. Paxson, "IANA Allocation Guidelines For + Values In the Internet Protocol and Related Headers", + BCP 37, RFC 2780, DOI 10.17487/RFC2780, March 2000, + <http://www.rfc-editor.org/info/rfc2780>. + + [RFC3432] Raisanen, V., Grotefeld, G., and A. Morton, "Network + performance measurement with periodic streams", RFC 3432, + DOI 10.17487/RFC3432, November 2002, + <http://www.rfc-editor.org/info/rfc3432>. + + [RFC6576] Geib, R., Ed., Morton, A., Fardid, R., and A. Steinmitz, + "IP Performance Metrics (IPPM) Standard Advancement + Testing", BCP 176, RFC 6576, DOI 10.17487/RFC6576, March + 2012, <http://www.rfc-editor.org/info/rfc6576>. + + [RFC7312] Fabini, J. and A. Morton, "Advanced Stream and Sampling + Framework for IP Performance Metrics (IPPM)", RFC 7312, + DOI 10.17487/RFC7312, August 2014, + <http://www.rfc-editor.org/info/rfc7312>. + + [RFC7679] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton, + Ed., "A One-Way Delay Metric for IP Performance Metrics + (IPPM)", STD 81, RFC 7679, DOI 10.17487/RFC7679, January + 2016, <http://www.rfc-editor.org/info/rfc7679>. + +7.2. Informative References + + [IPPM-UPDATES] + Morton, A., Fabini, J., Elkins, N., Ackermann, M., and V. + Hegde, "Updates for IPPM's Active Metric Framework: + Packets of Type-P and Standard-Formed Packets", Work in + Progress, draft-morton-ippm-2330-stdform-typep-02, + December 2015. + + [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition + of Explicit Congestion Notification (ECN) to IP", + RFC 3168, DOI 10.17487/RFC3168, September 2001, + <http://www.rfc-editor.org/info/rfc3168>. + + [RFC4737] Morton, A., Ciavattone, L., Ramachandran, G., Shalunov, + S., and J. Perser, "Packet Reordering Metrics", RFC 4737, + DOI 10.17487/RFC4737, November 2006, + <http://www.rfc-editor.org/info/rfc4737>. + + [RFC6390] Clark, A. and B. Claise, "Guidelines for Considering New + Performance Metric Development", BCP 170, RFC 6390, + DOI 10.17487/RFC6390, October 2011, + <http://www.rfc-editor.org/info/rfc6390>. + + + +Almes, et al. Standards Track [Page 20] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + + [RFC6703] Morton, A., Ramachandran, G., and G. Maguluri, "Reporting + IP Network Performance Metrics: Different Points of View", + RFC 6703, DOI 10.17487/RFC6703, August 2012, + <http://www.rfc-editor.org/info/rfc6703>. + + [RFC7290] Ciavattone, L., Geib, R., Morton, A., and M. Wieser, "Test + Plan and Results for Advancing RFC 2680 on the Standards + Track", RFC 7290, DOI 10.17487/RFC7290, July 2014, + <http://www.rfc-editor.org/info/rfc7290>. + + [RFC7594] Eardley, P., Morton, A., Bagnulo, M., Burbridge, T., + Aitken, P., and A. Akhter, "A Framework for Large-Scale + Measurement of Broadband Performance (LMAP)", RFC 7594, + DOI 10.17487/RFC7594, September 2015, + <http://www.rfc-editor.org/info/rfc7594>. + +Acknowledgements + + For [RFC2680], thanks are due to Matt Mathis for encouraging this + work and for calling attention on so many occasions to the + significance of packet loss. Thanks are due also to Vern Paxson for + his valuable comments on early drafts and to Garry Couch and Will + Leland for several useful suggestions. + + For this document, thanks to Joachim Fabini, Ruediger Geib, Nalini + Elkins, and Barry Constantine for sharing their measurement + experience as part of their careful reviews. Brian Carpenter and + Scott Bradner provided useful feedback at IETF Last Call. + + + + + + + + + + + + + + + + + + + + + + + +Almes, et al. Standards Track [Page 21] + +RFC 7680 A One-Way Loss Metric for IPPM January 2016 + + +Authors' Addresses + + Guy Almes + Texas A&M + + Email: almes@acm.org + + + Sunil Kalidindi + Ixia + + Email: skalidindi@ixiacom.com + + + Matt Zekauskas + Internet2 + + Email: matt@internet2.edu + + + Al Morton (editor) + AT&T Labs + 200 Laurel Avenue South + Middletown, NJ 07748 + United States + + Phone: +1 732 420 1571 + Fax: +1 732 368 1192 + Email: acmorton@att.com + URI: http://home.comcast.net/~acmacm/ + + + + + + + + + + + + + + + + + + + + + +Almes, et al. Standards Track [Page 22] + |