summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7750.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc7750.txt')
-rw-r--r--doc/rfc/rfc7750.txt619
1 files changed, 619 insertions, 0 deletions
diff --git a/doc/rfc/rfc7750.txt b/doc/rfc/rfc7750.txt
new file mode 100644
index 0000000..9f3a396
--- /dev/null
+++ b/doc/rfc/rfc7750.txt
@@ -0,0 +1,619 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) J. Hedin
+Request for Comments: 7750 G. Mirsky
+Updates: 5357 S. Baillargeon
+Category: Standards Track Ericsson
+ISSN: 2070-1721 February 2016
+
+
+ Differentiated Service Code Point and Explicit Congestion Notification
+ Monitoring in the Two-Way Active Measurement Protocol (TWAMP)
+
+Abstract
+
+ This document describes an optional extension for Two-Way Active
+ Measurement Protocol (TWAMP) allowing the monitoring of the
+ Differentiated Service Code Point and Explicit Congestion
+ Notification fields with the TWAMP-Test protocol.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7750.
+
+Copyright Notice
+
+ Copyright (c) 2016 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 1]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 1.1. Conventions Used in This Document . . . . . . . . . . . . 3
+ 1.1.1. Terminology . . . . . . . . . . . . . . . . . . . . . 3
+ 1.1.2. Requirements Language . . . . . . . . . . . . . . . . 3
+ 2. TWAMP Extensions . . . . . . . . . . . . . . . . . . . . . . 3
+ 2.1. Setting Up Connection to Monitor DSCP and ECN . . . . . . 3
+ 2.2. TWAMP-Test Extension . . . . . . . . . . . . . . . . . . 4
+ 2.2.1. Session-Reflector Packet Format for DSCP and ECN
+ Monitoring . . . . . . . . . . . . . . . . . . . . . 4
+ 2.2.2. DSCP and ECN Monitoring with Extensions from RFC 6038 8
+ 2.2.3. Consideration for TWAMP Light Mode . . . . . . . . . 8
+ 3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
+ 4. Security Considerations . . . . . . . . . . . . . . . . . . . 9
+ 5. References . . . . . . . . . . . . . . . . . . . . . . . . . 9
+ 5.1. Normative References . . . . . . . . . . . . . . . . . . 9
+ 5.2. Informative References . . . . . . . . . . . . . . . . . 10
+ Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 10
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11
+
+1. Introduction
+
+ The One-Way Active Measurement Protocol (OWAMP) [RFC4656] defines the
+ Type-P Descriptor field and negotiation of its value in the OWAMP-
+ Control protocol. The Two-Way Active Measurement Protocol (TWAMP)
+ [RFC5357] states that only a Differentiated Services Code Point
+ (DSCP) value (see [RFC2474], [RFC3168], and [RFC3260]) can be defined
+ by Type-P Descriptor, and the negotiated value must be used by both
+ the Session-Sender and Session-Reflector. The TWAMP specification
+ also states that the same DSCP value (found in the Session-Sender
+ packet) MUST be used in the test packet reflected by the Session-
+ Reflector. However, the TWAMP-Test protocol does not specify any
+ methods to determine or report when the DSCP value has changed or is
+ different than expected in the forward or reverse direction. Re-
+ marking the DSCP (changing its original value) in IP networks is
+ possible and often accomplished by a Differentiated Services policy
+ configured on a single node along the IP path. In many cases, a
+ change of the DSCP value indicates an unintentional or erroneous
+ behavior. At best, the Session-Sender can detect a change of the
+ DSCP reverse direction, assuming such a change is actually
+ detectable.
+
+ This document describes an OPTIONAL feature for TWAMP. It is called
+ DSCP and ECN Monitoring. It allows the Session-Sender to know the
+ actual DSCP value received at the Session-Reflector. Furthermore,
+ this feature tracks the Explicit Congestion Notification (ECN) value
+ (see [RFC2474], [RFC3168], and [RFC3260]) received at the Session-
+
+
+
+Hedin, et al. Standards Track [Page 2]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+ Reflector. This is helpful to determine if the ECN is actually
+ operating or if an ECN-capable node has detected congestion in the
+ forward direction.
+
+1.1. Conventions Used in This Document
+
+1.1.1. Terminology
+
+ DSCP: Differentiated Services Code Point
+
+ ECN: Explicit Congestion Notification
+
+ IPPM: IP Performance Metrics
+
+ TWAMP: Two-Way Active Measurement Protocol
+
+ OWAMP: One-Way Active Measurement Protocol
+
+1.1.2. Requirements Language
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
+ "OPTIONAL" in this document are to be interpreted as described in
+ [RFC2119].
+
+2. TWAMP Extensions
+
+ TWAMP connection establishment follows the procedure defined in
+ Section 3.1 of [RFC4656] and Section 3.1 of [RFC5357] where the Modes
+ field is used to identify and select specific communication
+ capabilities. At the same time, the Modes field is recognized and
+ used as an extension mechanism [RFC6038]. The new feature requires a
+ new flag to identify the ability of a Session-Reflector to return the
+ values of received DSCP and ECN values back to a Session-Sender, and
+ to support the new Session-Reflector packet format in the TWAMP-Test
+ protocol. See Section 3 for details on the assigned bit position.
+
+2.1. Setting Up Connection to Monitor DSCP and ECN
+
+ The Server sets the DSCP and ECN Monitoring flag in the Modes field
+ of the Server Greeting message to indicate its capabilities and
+ willingness to monitor them. If the Control-Client agrees to monitor
+ DSCP and ECN on some or all test sessions invoked with this control
+ connection, it MUST set the DSCP and ECN Monitoring flag in the Modes
+ field in the Setup Response message.
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 3]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+2.2. TWAMP-Test Extension
+
+ Monitoring of DSCP and ECN requires support by the Session-Reflector
+ and changes the test packet format in all the original modes
+ (unauthenticated, authenticated, and encrypted). Monitoring of DSCP
+ and ECN does not alter the Session-Sender test packet format, but
+ certain considerations must be taken when and if this mode is
+ accepted in combination with Symmetrical Size mode [RFC6038].
+
+2.2.1. Session-Reflector Packet Format for DSCP and ECN Monitoring
+
+ When the Session-Reflector supports DSCP and ECN Monitoring, it
+ constructs the Sender DSCP and ECN (S-DSCP-ECN) field, presented in
+ Figure 1, for each test packet it sends to the Session-Sender
+ according to the following procedure:
+
+ o the six (least-significant) bits of the Differentiated Service
+ field MUST be copied from the received Session-Sender test packet
+ into the Sender DSCP (S-DSCP) field;
+
+ o the two bits of the ECN field MUST be copied from the received
+ Session-Sender test packet into the Sender ECN (S-ECN) field.
+
+ 0 1 2 3 4 5 6 7
+ +---+---+---+---+---+---+---+---+
+ | S-DSCP | S-ECN |
+ +---+---+---+---+---+---+---+---+
+
+ Figure 1: Sender DSCP and ECN Field Format
+
+ Formats of the test packet transmitted by the Session-Reflector in
+ unauthenticated, authenticated, and encrypted modes have been defined
+ in Section 4.2.1 of [RFC5357]. For the Session-Reflector that
+ supports DSCP and ECN Monitoring, these formats are displayed in
+ Figures 2 and 3.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 4]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+ For unauthenticated mode:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sequence Number |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Error Estimate | MBZ |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Receive Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender Sequence Number |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender Error Estimate | MBZ |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender TTL | S-DSCP-ECN | MBZ |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ ~ Packet Padding ~
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 2: Session-Reflector Test Packet Format with DSCP and ECN
+ Monitoring in Unauthenticated Mode
+
+ The DSCP and ECN values (part of the Type-P Descriptor [RFC4656]) can
+ be provisioned through TWAMP-Control or by other means (command-line
+ interface (CLI) or Central Controller). The DSCP and ECN values are
+ often copied into reflected test packets with current TWAMP
+ implementations without TWAMP-Control protocol. With the DSCP and
+ ECN Monitoring extension, the Session-Reflector handles the DSCP as
+ follows:
+
+ o the Session-Reflector MUST extract the DSCP and ECN values from
+ the received packet and MUST use them to populate the S-DSCP-ECN
+ field of the corresponding reflected packet;
+
+ o the Session-Reflector MUST transmit each reflected test packet
+ with the DSCP set to the provisioned value;
+
+
+
+
+
+Hedin, et al. Standards Track [Page 5]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+ o if the provisioned DSCP value is not known (e.g., TWAMP Light),
+ the choice of the DSCP is implementation specific. For instance,
+ the Session-Reflector MAY copy the DSCP value from the received
+ test packet and set it as the DSCP in a reflected packet.
+ Alternatively, the Session-Reflector MAY set the DSCP value to CS0
+ (zero) [RFC2474];
+
+ o if the provisioned ECN value is not known, ECN SHOULD be set to
+ Not-ECT codepoint value [RFC3168]. Otherwise, the provisioned ECN
+ value for the session SHALL be used.
+
+ A Session-Reflector in the DSCP and ECN Monitoring mode does not
+ analyze nor act on the ECN value of the received TWAMP test packet;
+ therefore, it ignores congestion indications from the network. It is
+ expected that sending rates are low enough, as TWAMP deployment
+ experience had demonstrated since TWAMP base (RFC 5357) was published
+ in 2008, that ignoring these congestion indications will not
+ significantly contribute to network congestion.
+
+ For authenticated and encrypted modes:
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sequence Number |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ | MBZ (12 octets) |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Error Estimate | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | MBZ (6 octets) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Receive Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MBZ (8 octets) |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender Sequence Number |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ | MBZ (12 octets) |
+ | |
+
+
+
+Hedin, et al. Standards Track [Page 6]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender Error Estimate | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | MBZ (6 octets) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sender TTL | S-DSCP-ECN | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ | MBZ (14 octets) |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ | HMAC (16 octets) |
+ | |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | |
+ ~ Packet Padding ~
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 3: Session-Reflector Test Packet Format with DSCP and ECN
+ Monitoring in Authenticated or Encrypted Modes
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 7]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+2.2.2. DSCP and ECN Monitoring with Extensions from RFC 6038
+
+ [RFC6038] defined two extensions to TWAMP -- first, to ensure that
+ the Session-Sender and Session-Reflector exchange TWAMP-Test packets
+ of equal size; second, to specify the number of octets to be
+ reflected by Session-Reflector. If DSCP and ECN Monitoring and
+ Symmetrical Size and/or Reflects Octets modes are being negotiated
+ between Server and Control-Client in Unauthenticated mode, then,
+ because Sender DSCP and Sender ECN increase the size of the
+ unauthenticated Session-Reflector packet by 4 octets, the Padding
+ Length value SHOULD be greater than or equal to 28 octets to allow
+ for the truncation process that TWAMP recommends in Section 4.2.1 of
+ [RFC5357].
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Sequence Number |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Timestamp |
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Error Estimate | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ | MBZ (28 octets) |
+ | |
+ + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
+ | |
+ . .
+ . Packet Padding .
+ | |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Figure 4: Session-Sender Test Packet Format with DSCP and ECN
+ Monitoring and Symmetrical Test Packet in Unauthenticated Mode
+
+2.2.3. Consideration for TWAMP Light Mode
+
+ Appendix I of [RFC5357] does not explicitly state how the value of
+ the Type-P Descriptor is synchronized between the Session-Sender and
+ Session-Reflector and whether different values are considered as
+ error conditions and should be reported. We assume that by some
+ means the Session-Sender and the Session-Reflector of the given
+ TWAMP-Test session have been informed to use the same DSCP value.
+ The same means, i.e., configuration, could be used to inform the
+
+
+
+Hedin, et al. Standards Track [Page 8]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+ Session-Reflector to support DSCP and ECN Monitoring mode by copying
+ data from received TWAMP test packets. Then Session-Sender may be
+ informed to use the Sender DSCP and ECN field in the reflected TWAMP
+ test packet.
+
+3. IANA Considerations
+
+ In the TWAMP-Modes registry defined in [RFC5618], IANA has reserved a
+ new DSCP and ECN Monitoring Capability as follows:
+
+ +-----+---------------------------+---------------------+-----------+
+ | Bit | Description | Semantics | Reference |
+ | Pos | | Definition | |
+ +-----+---------------------------+---------------------+-----------+
+ | 8 | DSCP and ECN Monitoring | Section 2 | RFC 7750 |
+ | | Capability | | |
+ +-----+---------------------------+---------------------+-----------+
+
+ Table 1: New Type-P Descriptor Monitoring Capability
+
+4. Security Considerations
+
+ Monitoring of DSCP and ECN does not appear to introduce any
+ additional security threat to hosts that communicate with TWAMP as
+ defined in [RFC5357] and existing extensions [RFC6038]. Sections
+ such as 3.2, 4, 4.1.2, 4.2, and 4.2.1 of [RFC5357] discuss
+ unauthenticated, authenticated, and encrypted modes in varying
+ degrees of detail. The security considerations that apply to any
+ active measurement of live networks are relevant here as well. See
+ the Security Considerations sections in [RFC4656] and [RFC5357].
+
+5. References
+
+5.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <http://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
+ "Definition of the Differentiated Services Field (DS
+ Field) in the IPv4 and IPv6 Headers", RFC 2474,
+ DOI 10.17487/RFC2474, December 1998,
+ <http://www.rfc-editor.org/info/rfc2474>.
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 9]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+ [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
+ of Explicit Congestion Notification (ECN) to IP",
+ RFC 3168, DOI 10.17487/RFC3168, September 2001,
+ <http://www.rfc-editor.org/info/rfc3168>.
+
+ [RFC4656] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M.
+ Zekauskas, "A One-way Active Measurement Protocol
+ (OWAMP)", RFC 4656, DOI 10.17487/RFC4656, September 2006,
+ <http://www.rfc-editor.org/info/rfc4656>.
+
+ [RFC5357] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., and J.
+ Babiarz, "A Two-Way Active Measurement Protocol (TWAMP)",
+ RFC 5357, DOI 10.17487/RFC5357, October 2008,
+ <http://www.rfc-editor.org/info/rfc5357>.
+
+ [RFC5618] Morton, A. and K. Hedayat, "Mixed Security Mode for the
+ Two-Way Active Measurement Protocol (TWAMP)", RFC 5618,
+ DOI 10.17487/RFC5618, August 2009,
+ <http://www.rfc-editor.org/info/rfc5618>.
+
+ [RFC6038] Morton, A. and L. Ciavattone, "Two-Way Active Measurement
+ Protocol (TWAMP) Reflect Octets and Symmetrical Size
+ Features", RFC 6038, DOI 10.17487/RFC6038, October 2010,
+ <http://www.rfc-editor.org/info/rfc6038>.
+
+5.2. Informative References
+
+ [RFC3260] Grossman, D., "New Terminology and Clarifications for
+ Diffserv", RFC 3260, DOI 10.17487/RFC3260, April 2002,
+ <http://www.rfc-editor.org/info/rfc3260>.
+
+Acknowledgements
+
+ The authors greatly appreciate thorough review and thoughtful
+ comments by Bill Cerveny, Christofer Flinta, and Samita Chakrabarti.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 10]
+
+RFC 7750 DSCP and ECN Monitoring in TWAMP February 2016
+
+
+Authors' Addresses
+
+ Jonas Hedin
+ Ericsson
+
+ Email: jonas.hedin@ericsson.com
+
+
+ Greg Mirsky
+ Ericsson
+
+ Email: gregory.mirsky@ericsson.com
+
+
+ Steve Baillargeon
+ Ericsson
+
+ Email: steve.baillargeon@ericsson.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hedin, et al. Standards Track [Page 11]
+