1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
|
Network Working Group K. Hedayat
Request for Comments: 5357 Brix Networks
Category: Standards Track R. Krzanowski
Verizon
A. Morton
AT&T Labs
K. Yum
Juniper Networks
J. Babiarz
Nortel Networks
October 2008
A Two-Way Active Measurement Protocol (TWAMP)
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Abstract
The One-way Active Measurement Protocol (OWAMP), specified in RFC
4656, provides a common protocol for measuring one-way metrics
between network devices. OWAMP can be used bi-directionally to
measure one-way metrics in both directions between two network
elements. However, it does not accommodate round-trip or two-way
measurements. This memo specifies a Two-Way Active Measurement
Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip
measurement capabilities. The TWAMP measurement architecture is
usually comprised of two hosts with specific roles, and this allows
for some protocol simplifications, making it an attractive
alternative in some circumstances.
Hedayat, et al. Standards Track [Page 1]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Table of Contents
1. Introduction ....................................................2
1.1. Relationship of Test and Control Protocols .................3
1.2. Logical Model ..............................................3
1.3. Pronunciation Guide ........................................4
2. Protocol Overview ...............................................5
3. TWAMP-Control ...................................................6
3.1. Connection Setup ...........................................6
3.2. Integrity Protection .......................................7
3.3. Values of the Accept Field .................................7
3.4. TWAMP-Control Commands .....................................7
3.5. Creating Test Sessions .....................................8
3.6. Send Schedules ............................................10
3.7. Starting Test Sessions ....................................10
3.8. Stop-Sessions .............................................10
3.9. Fetch-Session .............................................12
4. TWAMP-Test .....................................................12
4.1. Sender Behavior ...........................................12
4.1.1. Packet Timings .....................................12
4.1.2. Packet Format and Content ..........................12
4.2. Reflector Behavior ........................................13
4.2.1. TWAMP-Test Packet Format and Content ...............14
5. Implementers' Guide ............................................20
6. Security Considerations ........................................20
7. Acknowledgements ...............................................21
8. IANA Considerations ............................................21
8.1. Registry Specification ....................................22
8.2. Registry Management .......................................22
8.3. Experimental Numbers ......................................22
8.4. Initial Registry Contents .................................22
9. Internationalization Considerations ............................22
Appendix I - TWAMP Light (Informative) ............................23
Normative References ..............................................24
Informative References ............................................24
1. Introduction
The Internet Engineering Task Force (IETF) has completed a Proposed
Standard for the round-trip delay [RFC2681] metric. The IETF has
also completed a protocol for the control and collection of one-way
measurements, the One-way Active Measurement Protocol (OWAMP)
[RFC4656]. However, OWAMP does not accommodate round-trip or two-way
measurements.
Two-way measurements are common in IP networks, primarily because
synchronization between local and remote clocks is unnecessary for
round-trip delay, and measurement support at the remote end may be
Hedayat, et al. Standards Track [Page 2]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
limited to a simple echo function. However, the most common facility
for round-trip measurements is the ICMP Echo Request/Reply (used by
the ping tool), and issues with this method are documented in Section
2.6 of [RFC2681]. This memo specifies the Two-Way Active Measurement
Protocol, or TWAMP. TWAMP uses the methodology and architecture of
OWAMP [RFC4656] to define an open protocol for measurement of two-way
or round-trip metrics (henceforth in this document the term two-way
also signifies round-trip), in addition to the one-way metrics of
OWAMP. TWAMP employs time stamps applied at the echo destination
(reflector) to enable greater accuracy (processing delays can be
accounted for). The TWAMP measurement architecture is usually
comprised of only two hosts with specific roles, and this allows for
some protocol simplifications, making it an attractive alternative to
OWAMP in some circumstances.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
1.1. Relationship of Test and Control Protocols
Similar to OWAMP [RFC4656], TWAMP consists of two inter-related
protocols: TWAMP-Control and TWAMP-Test. The relationship of these
protocols is as defined in Section 1.1 of OWAMP [RFC4656]. TWAMP-
Control is used to initiate, start, and stop test sessions, whereas
TWAMP-Test is used to exchange test packets between two TWAMP
entities.
1.2. Logical Model
The role and definition of the logical entities are as defined in
Section 1.2 of OWAMP [RFC4656] with the following exceptions:
- The Session-Receiver is called the Session-Reflector in the TWAMP
architecture. The Session-Reflector has the capability to create
and send a measurement packet when it receives a measurement
packet. Unlike the Session-Receiver, the Session-Reflector does
not collect any packet information.
- The Server is an end system that manages one or more TWAMP
sessions, and is capable of configuring per-session state in the
endpoints. However, a Server associated with a Session-Reflector
would not have the capability to return the results of a test
session, and this is a difference from OWAMP.
Hedayat, et al. Standards Track [Page 3]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
- The Fetch-Client entity does not exist in the TWAMP architecture,
as the Session-Reflector does not collect any packet information
to be fetched. Consequently, there is no need for the Fetch-
Client.
An example of possible relationship scenarios between these roles is
presented below. In this example, different logical roles are played
on different hosts. Unlabeled links in the figure are unspecified by
this document and may be proprietary protocols.
+----------------+ +-------------------+
| Session-Sender |<-TWAMP-Test-->| Session-Reflector |
+----------------+ +-------------------+
^ ^
| |
| |
| |
| +----------------+<----------------+
| | Server |
| +----------------+
| ^
| |
| TWAMP-Control
| |
v v
+----------------+
| Control-Client |
+----------------+
As in OWAMP [RFC4656], different logical roles can be played by the
same host. For example, in the figure above, there could actually be
two hosts: one playing the roles of Control-Client and Session-
Sender, and the other playing the roles of Server and Session-
Reflector. This example is shown below.
+-----------------+ +-------------------+
| Control-Client |<--TWAMP-Control-->| Server |
| | | |
| Session-Sender |<--TWAMP-Test----->| Session-Reflector |
+-----------------+ +-------------------+
1.3. Pronunciation Guide
The acronym OWAMP is usually pronounced in two syllables, Oh-wamp.
The acronym TWAMP is also pronounced in two syllables, Tee-wamp.
Hedayat, et al. Standards Track [Page 4]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
2. Protocol Overview
The Two-Way Active Measurement Protocol is an open protocol for
measurement of two-way metrics. It is based on OWAMP [RFC4656] and
adheres to OWAMP's overall architecture and design. The TWAMP-
Control and TWAMP-Test protocols accomplish their testing tasks as
outlined below:
- The Control-Client initiates a TCP connection on TWAMP's well-
known port, and the Server (its role now established) responds
with its Greeting message, indicating the security/integrity
mode(s) it is willing to support.
- The Control-Client responds with the chosen mode of communication
and information supporting integrity protection and encryption, if
the mode requires them. The Server responds to accept the mode
and give its start time. This completes the control-connection
setup.
- The Control-Client requests (and describes) a test session with a
unique TWAMP-Control message. The Server responds with its
acceptance and supporting information. More than one test session
may be requested with additional messages.
- The Control-Client initiates all requested testing with a Start-
Sessions message, and the Server acknowledges.
- The Session-Sender and the Session-Reflector exchange test packets
according to the TWAMP-Test protocol for each active session.
- When appropriate, the Control-Client sends a message to stop all
test sessions.
There are two recognized extension mechanisms in the TWAMP Protocol.
1) The Modes field is used to establish the communication options
during TWAMP-Control Connection Setup.
2) The TWAMP-Control Command Number is another intended extension
mechanism, allowing additional commands to be defined in the
future.
The TWAMP-Control protocol resolves different capability levels
between the Control-Client and Server.
All multi-octet quantities defined in this document are represented
as unsigned integers in network byte order, unless specified
otherwise.
Hedayat, et al. Standards Track [Page 5]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Throughout this memo, the bits marked MBZ (Must Be Zero) MUST be set
to zero by senders and MUST be ignored by receivers.
3. TWAMP-Control
TWAMP-Control is a derivative of the OWAMP-Control for two-way
measurements. All TWAMP-Control messages are similar in format and
follow similar guidelines to those defined in Section 3 of OWAMP
[RFC4656] with the exceptions outlined in the following sections.
One such exception is the Fetch-Session command, which is not used in
TWAMP.
3.1. Connection Setup
Connection establishment of TWAMP follows the same procedure defined
in Section 3.1 of OWAMP [RFC4656]. The Modes field is a recognized
extension mechanism in TWAMP, and the current mode values are
identical to those used in OWAMP. The only exception is the well-
known port number for TWAMP-Control. A Client opens a TCP connection
to the Server on well-known port 862. The host that initiates the
TCP connection takes the roles of Control-Client and (in the two-host
implementation) the Session-Sender. The host that acknowledges the
TCP connection accepts the roles of Server and (in the two-host
implementation) the Session-Reflector.
The Control-Client MAY set a desired code point in the Diffserv Code
Point (DSCP) field in the IP header for ALL packets of a specific
control connection. The Server SHOULD use the DSCP of the Control-
Client's TCP SYN in ALL subsequent packets on that connection
(avoiding any ambiguity in case of re-marking).
The possibility exists for Control-Client failure after TWAMP-
Control connection establishment, or the path between the Control-
Client and Server may fail while a connection is in progress. The
Server MAY discontinue any established control connection when no
packet associated with that connection has been received within
SERVWAIT seconds. The Server SHALL suspend monitoring control
connection activity after receiving a Start-Sessions command, and
SHALL resume after receiving a Stop-Sessions command (IF the SERVWAIT
option is supported). Note that the REFWAIT timeout (described
below) covers failures during test sessions, and if REFWAIT expires
on ALL test sessions initiated by a TWAMP-Control connection, then
the SERVWAIT monitoring SHALL resume (as though a Stop-Sessions
command had been received). An implementation that supports the
SERVWAIT timeout SHOULD also implement the REFWAIT timeout. The
default value of SERVWAIT SHALL be 900 seconds, and this waiting time
MAY be configurable. This timeout allows the Server to free up
resources in case of failure.
Hedayat, et al. Standards Track [Page 6]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Both the Server and the Client use the same mappings from KeyIDs to
shared secrets. The Server, being prepared to conduct sessions with
more than one Client, uses KeyIDs to choose the appropriate secret
key; a Client would typically have different secret keys for
different Servers. The shared secret is a passphrase. To maximize
passphrase interoperability, the passphrase character set MUST be
encoded using Appendix B of [RFC5198] (the ASCII Network Virtual
Terminal Definition). It MUST not contain newlines (any combination
of Carriage-Return (CR) and/or Line-Feed (LF) characters), and
control characters SHOULD be avoided.
3.2. Integrity Protection
Integrity protection of TWAMP follows the same procedure defined in
Section 3.2 of OWAMP [RFC4656]. As in OWAMP, each HMAC (Hashed
Message Authentication Code) sent covers everything sent in a given
direction between the previous HMAC (but not including it) and the
start of the new HMAC. This way, once encryption is set up, each bit
of the TWAMP-Control connection is authenticated by an HMAC exactly
once.
Note that the Server-Start message (sent by a Server during the
initial control-connection exchanges) does not terminate with an HMAC
field. Therefore, the HMAC in the first Accept-Session message also
covers the Server-Start message and includes the Start-Time field in
the HMAC calculation.
Also, in authenticated and encrypted modes, the HMAC in TWAMP-Control
packets is encrypted.
3.3. Values of the Accept Field
Accept values used in TWAMP are the same as the values defined in
Section 3.3 of OWAMP [RFC4656].
3.4. TWAMP-Control Commands
TWAMP-Control commands conform to the rules defined in Section 3.4 of
OWAMP [RFC4656].
The following commands are available for the Control-Client:
Request-TW-Session, Start-Sessions, and Stop-Sessions. The Server
can send specific messages in response to the commands it receives
(as described in the sections that follow).
Note that the OWAMP Request-Session command is replaced by the TWAMP
Request-TW-Session command, and the Fetch-Session command does not
appear in TWAMP.
Hedayat, et al. Standards Track [Page 7]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
3.5. Creating Test Sessions
Test session creation follows the same procedure as defined in
Section 3.5 of OWAMP [RFC4656]. The Request-TW-Session command is
based on the OWAMP Request-Session command, and uses the message
format as described in Section 3.5 of OWAMP, but without the Schedule
Slot Descriptions field(s) and uses only one HMAC. The description
of the Request-TW-Session format follows.
In TWAMP, the first octet is referred to as the Command Number, and
the Command Number is a recognized extension mechanism. Readers are
encouraged to consult the TWAMP-Control Command Number registry to
determine if there have been additional values assigned.
The Command Number value of 5 indicates a Request-TW-Session command,
and the Server MUST interpret this command as a request for a two-way
test session using the TWAMP-Test protocol.
If a TWAMP Server receives an unexpected Command Number, it MUST
respond with the Accept field set to 3 (meaning "Some aspect of
request is not supported") in the Accept-Session message. Command
Numbers that are Forbidden (and possibly numbers that are Reserved)
are unexpected.
In OWAMP, the Conf-Sender field is set to 1 when the Request-Session
message describes a task where the Server will configure a one-way
test packet sender. Likewise, the Conf-Receiver field is set to 1
when the message describes the configuration for a Session-Receiver.
In TWAMP, both endpoints send and receive test packets, with the
Session-Sender first sending and then receiving test packets,
complimented by the Session-Reflector first receiving and then
sending.
Both the Conf-Sender field and Conf-Receiver field MUST be set to 0
since the Session-Reflector will both receive and send packets, and
the roles are established according to which host initiates the TCP
connection for control. The Server MUST interpret any non-zero value
as an improperly formatted command, and MUST respond with the Accept
field set to 3 (meaning "Some aspect of request is not supported") in
the Accept-Session message.
The Session-Reflector in TWAMP does not process incoming test packets
for performance metrics and consequently does not need to know the
number of incoming packets and their timing schedule. Consequently
the Number of Scheduled Slots and Number of Packets MUST be set to 0.
The Sender Port is the UDP port from which TWAMP-Test packets will be
sent and the port to which TWAMP-Test packets will be sent by the
Hedayat, et al. Standards Track [Page 8]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Session-Reflector (the Session-Sender will use the same UDP port to
send and receive packets). The Receiver Port is the desired UDP port
to which TWAMP-Test packets will be sent by the Session-Sender (the
port where the Session-Reflector is asked to receive test packets).
The Receiver Port is also the UDP port from which TWAMP-Test packets
will be sent by the Session-Reflector (the Session-Reflector will use
the same UDP port to send and receive packets).
The Sender Address and Receiver Address fields contain, respectively,
the sender and receiver addresses of the endpoints of the Internet
path over which a TWAMP-Test session is requested. They MAY be set
to 0, in which case the IP addresses used for the Control-Client to
Server TWAMP-Control message exchange MUST be used in the test
packets.
The Session Identifier (SID) is as defined in OWAMP [RFC4656]. Since
the SID is always generated by the receiving side, the Server
determines the SID, and the SID in the Request-TW-Session message
MUST be set to 0.
The Start Time is as defined in OWAMP [RFC4656].
The Timeout is interpreted differently from the definition in OWAMP
[RFC4656]. In TWAMP, Timeout is the interval that the Session-
Reflector MUST wait after receiving a Stop-Sessions message. In case
there are test packets still in transit, the Session-Reflector MUST
reflect them if they arrive within the Timeout interval following the
reception of the Stop-Sessions message. The Session-Reflector MUST
NOT reflect packets that are received beyond the timeout.
Type-P descriptor is as defined in OWAMP [RFC4656]. The only
capability of this field is to set the Differentiated Services Code
Point (DSCP) as defined in [RFC2474]. The same value of DSCP MUST be
used in test packets reflected by the Session-Reflector.
Since there are no Schedule Slot Descriptions, the Request-TW-Session
message is completed by MBZ (Must Be Zero) and HMAC fields. This
completes one logical message, referred to as the Request-TW-Session
command.
The Session-Reflector MUST respond to each Request-TW-Session command
with an Accept-Session message as defined in OWAMP [RFC4656]. When
the Accept field = 0, the Port field confirms (repeats) the port to
which TWAMP-Test packets are sent by the Session-Sender toward the
Session-Reflector. In other words, the Port field indicates the port
number where the Session-Reflector expects to receive packets from
the Session-Sender.
Hedayat, et al. Standards Track [Page 9]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
When the requested Receiver Port is not available (e.g., port in
use), the Server at the Session-Reflector MAY suggest an alternate
and available port for this session in the Port field. The Session-
Sender either accepts the alternate port, or composes a new Session-
Request message with suitable parameters. Otherwise, the Server at
the Control-Client uses the Accept field to convey other forms of
session rejection or failure and MUST NOT suggest an alternate port;
in this case, the Port field MUST be set to zero.
3.6. Send Schedules
The send schedule for test packets defined in Section 3.6 of OWAMP
[RFC4656] is not used in TWAMP. The Control-Client and Session-
Sender MAY autonomously decide the send schedule. The Session-
Reflector SHOULD return each test packet to the Session-Sender as
quickly as possible.
3.7. Starting Test Sessions
The procedure and guidelines for starting test sessions is the same
as defined in Section 3.7 of OWAMP [RFC4656].
3.8. Stop-Sessions
The procedure and guidelines for stopping test sessions is similar to
that defined in Section 3.8 of OWAMP [RFC4656]. The Stop-Sessions
command can only be issued by the Control-Client. The message MUST
NOT contain any session description records or skip ranges. The
message is terminated with a single block HMAC to complete the Stop-
Sessions command. Since the TWAMP Stop-Sessions command does not
convey SIDs, it applies to all sessions previously requested and
started with a Start-Sessions command.
Hedayat, et al. Standards Track [Page 10]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Thus, the TWAMP Stop-Sessions command is constructed as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 3 | Accept | MBZ |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Sessions |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (8 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Above, the Command Number in the first octet (3) indicates that this
is the Stop-Sessions command.
Non-zero Accept values indicate a failure of some sort. Zero values
indicate normal (but possibly premature) completion. The full list
of available Accept values is described in Section 3.3 of [RFC4656],
"Values of the Accept Field".
If Accept has a non-zero value, results of all TWAMP-Test sessions
spawned by this TWAMP-Control session SHOULD be considered invalid.
If the Accept-Session message was not transmitted at all (for
whatever reason, including failure of the TCP connection used for
TWAMP-Control), the results of all TWAMP-Test sessions spawned by
this TWAMP-Control session MAY be considered invalid.
Number of Sessions indicates the number of sessions that the
Control-Client intends to stop.
Number of Sessions MUST contain the number of send sessions started
by the Control-Client that have not been previously terminated by a
Stop-Sessions command (i.e., the Control-Client MUST account for each
accepted Request-Session). If the Stop-Sessions message does not
account for exactly the number of sessions in progress, then it is to
be considered invalid, the TWAMP-Control connection SHOULD be closed,
and any results obtained considered invalid.
Upon receipt of a TWAMP-Control Stop-Sessions command, the Session-
Reflector MUST discard any TWAMP-Test packets that arrive at the
current time plus the Timeout (in the Request-TW-Session command).
Hedayat, et al. Standards Track [Page 11]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
3.9. Fetch-Session
One purpose of TWAMP is measurement of two-way metrics. Two-way
measurement methods do not require packet-level data to be collected
by the Session-Reflector (such as sequence number, timestamp, and
Time to Live (TTL)) because this data is communicated in the
"reflected" test packets. As such, the protocol does not require the
retrieval of packet-level data from the Server and the OWAMP Fetch-
Session command is not used in TWAMP.
4. TWAMP-Test
The TWAMP-Test protocol is similar to the OWAMP-test protocol
[RFC4656] with the exception that the Session-Reflector transmits
test packets to the Session-Sender in response to each test packet it
receives. TWAMP defines two different test packet formats, one for
packets transmitted by the Session-Sender and one for packets
transmitted by the Session-Reflector. As with OWAMP-test protocol
[RFC4656], there are three modes: unauthenticated, authenticated, and
encrypted.
4.1. Sender Behavior
The sender behavior is determined by the configuration of the
Session-Sender and is not defined in this standard. Further, the
Session-Reflector does not need to know the Session-Sender behavior
to the degree of detail as needed in OWAMP [RFC4656]. Additionally,
the Session-Sender collects and records the necessary information
provided from the packets transmitted by the Session-Reflector for
measuring two-way metrics. The information recording based on the
packet(s) received by the Session-Sender is implementation dependent.
4.1.1. Packet Timings
Since the send schedule is not communicated to the Session-Reflector,
there is no need for a standardized computation of packet timing.
Regardless of any scheduling delays, each packet that is actually
sent MUST have the best possible approximation of its real time of
departure as its timestamp (in the packet).
4.1.2. Packet Format and Content
The Session-Sender packet format and content follow the same
procedure and guidelines as defined in Section 4.1.2 of OWAMP
[RFC4656] (with the exception of the reference to the send schedule).
Hedayat, et al. Standards Track [Page 12]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Note that the Reflector test packet formats are larger than the
Sender's formats. The Session-Sender MAY append sufficient Packet
Padding to allow the same IP packet payload lengths to be used in
each direction of transmission (this is usually desirable). To
compensate for the Reflector's larger test packet format, the Sender
appends at least 27 octets of padding in unauthenticated mode, and at
least 56 octets in authenticated and encrypted modes.
4.2. Reflector Behavior
TWAMP requires the Session-Reflector to transmit a packet to the
Session-Sender in response to each packet it receives.
As packets are received, the Session-Reflector will do the following:
- Timestamp the received packet. Each packet that is actually
received MUST have the best possible approximation of its real
time of arrival entered as its Received Timestamp (in the packet).
- In authenticated or encrypted mode, decrypt the appropriate
sections of the packet body (first block (16 octets) for
authenticated, 96 octets for encrypted), and then check integrity
of sections covered by the HMAC.
- Copy the packet sequence number into the corresponding reflected
packet to the Session-Sender.
- Extract the Sender TTL value from the TTL/Hop Limit value of
received packets. Session-Reflector implementations SHOULD fetch
the TTL/Hop Limit value from the IP header of the packet,
replacing the value of 255 set by the Session-Sender. If an
implementation does not fetch the actual TTL value (the only good
reason not to do so is an inability to access the TTL field of
arriving packets), it MUST set the Sender TTL value as 255.
- In authenticated and encrypted modes, the HMAC MUST be calculated
first, then the appropriate portion of the packet body is
encrypted.
- Transmit a test packet to the Session-Sender in response to every
received packet. The response MUST be generated as immediately as
possible. The format and content of the test packet is defined in
Section 4.2.1. Prior to the transmission of the test packet, the
Session-Reflector MUST enter the best possible approximation of
its actual sending time as its Timestamp (in the packet). This
permits the determination of the elapsed time between the
reception of the packet and its transmission.
Hedayat, et al. Standards Track [Page 13]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
- Packets not received within the Timeout (following the Stop-
Sessions command) MUST be ignored by the Reflector. The Session-
Reflector MUST NOT generate a test packet to the Session-Sender
for packets that are ignored.
The possibility exists for Session-Sender failure during a session,
or the path between the Session-Sender and Session-Reflector may fail
while a test session is in progress. The Session-Reflector MAY
discontinue any session that has been started when no packet
associated with that session has been received for REFWAIT seconds.
The default value of REFWAIT SHALL be 900 seconds, and this waiting
time MAY be configurable. This timeout allows a Session-Reflector to
free up resources in case of failure.
4.2.1. TWAMP-Test Packet Format and Content
The Session-Reflector MUST transmit a packet to the Session-Sender in
response to each packet received. The Session-Reflector SHOULD
transmit the packets as immediately as possible. The Session-
Reflector SHOULD set the TTL in IPv4 (or Hop Limit in IPv6) in the
UDP packet to 255.
The test packet will have the necessary information for calculating
two-way metrics by the Session-Sender. The format of the test packet
depends on the mode being used. The two formats are presented below.
Hedayat, et al. Standards Track [Page 14]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
For unauthenticated mode:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Error Estimate | MBZ |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Receive Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Error Estimate | MBZ |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender TTL | |
+-+-+-+-+-+-+-+-+ +
| |
. .
. Packet Padding .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Hedayat, et al. Standards Track [Page 15]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
For authenticated and encrypted modes:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (12 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Error Estimate | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| MBZ (6 octets) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Receive Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (8 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (12 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Error Estimate | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| MBZ (6 octets) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender TTL | |
+-+-+-+-+-+-+-+-+ +
| |
| |
| MBZ (15 octets) |
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
| HMAC (16 octets) |
| |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
Hedayat, et al. Standards Track [Page 16]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
| |
. .
. Packet Padding .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Note that all timestamps have the same format as OWAMP [RFC4656] as
follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Integer part of seconds |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Fractional part of seconds |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Sequence Number is the sequence number of the test packet according
to its transmit order. It starts with zero and is incremented by one
for each subsequent packet. The Sequence Number generated by the
Session-Reflector is independent from the sequence number of the
arriving packets.
Timestamp and Error Estimate are the Session-Reflector's transmit
timestamp and error estimate for the reflected test packet,
respectively. The format of all timestamp and error estimate fields
follow the definition and formats defined by OWAMP, Section 4.1.2 in
[RFC4656].
Sender Timestamp and Sender Error Estimate are exact copies of the
timestamp and error estimate from the Session-Sender test packet that
corresponds to this test packet.
Sender TTL is 255 when transmitted by the Session-Sender. Sender TTL
is set to the Time To Live (or Hop Count) value of the received
packet from the IP packet header when transmitted by the Session-
Reflector.
Receive Timestamp is the time the test packet was received by the
reflector. The difference between Timestamp and Receive Timestamp is
the amount of time the packet was in transition in the Session-
Reflector. The Error Estimate associated with the Timestamp field
also applies to the Receive Timestamp.
Sender Sequence Number is a copy of the Sequence Number of the packet
transmitted by the Session-Sender that caused the Session-Reflector
to generate and send this test packet.
Hedayat, et al. Standards Track [Page 17]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
The HMAC field in TWAMP-Test packets covers the same fields as the
Advanced Encryption Standard (AES) encryption. Thus, in
authenticated mode, HMAC covers the first block (16 octets); in
encrypted mode, HMAC covers the first six blocks (96 octets). In
TWAMP-Test, the HMAC field MUST NOT be encrypted.
Packet Padding in TWAMP-Test SHOULD be pseudo-random (it MUST be
generated independently of any other pseudo-random numbers mentioned
in this document). However, implementations MUST provide a
configuration parameter, an option, or a different means of making
Packet Padding consist of all zeros. Packet Padding MUST NOT be
covered by the HMAC and MUST NOT be encrypted.
The minimum data segment length of TWAMP-Test packets in
unauthenticated mode is 41 octets, and 104 octets in both
authenticated mode and encrypted modes.
Note that the Session-Reflector Test packet formats are larger than
the Sender's formats. The Session-Reflector SHOULD reduce the length
of the Sender's Packet Padding to achieve equal IP packet payload
lengths in each direction of transmission, when sufficient padding is
present. The Session-Reflector MAY re-use the Sender's Packet
Padding (since the requirements for padding generation are the same
for each), and in this case the Session-Reflector SHOULD truncate the
padding such that the highest-number octets are discarded.
In unauthenticated mode, encryption or authentication MUST NOT be
applied.
The TWAMP-Test packet layout is identical in authenticated and
encrypted modes. The encryption operation for a Session-Sender
packet follows the same rules of Session-Sender packets as defined in
OWAMP section 4.1.2 of [RFC4656].
The main difference between authenticated mode and encrypted mode is
the portion of the test packets that are covered by HMAC and
encrypted. Authenticated mode permits the timestamp to be fetched
after a portion of the packet is encrypted, but in encrypted mode all
the sequence numbers and timestamps are fetched before encryption to
provide maximum data-integrity protection.
In authenticated mode, only the sequence number in the first block is
encrypted, and the subsequent timestamps and sequence numbers are
sent in clear text. Sending the timestamp in clear text allows one
to reduce the time between when a timestamp is obtained by a
Session-Reflector and when that packet is sent out. This potentially
improves the timestamp accuracy, because the sequence number can be
encrypted before the timestamp is fetched.
Hedayat, et al. Standards Track [Page 18]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
In encrypted mode, the reflector MUST fetch the timestamps, generate
the HMAC, and encrypt the packet, then send it.
Obtaining the keys and encryption methods follows the same procedure
as OWAMP as described below. Each TWAMP-Test session has two keys,
an AES Session-key and an HMAC Session-key, and the keys are derived
from the TWAMP-Control keys and the SID.
The TWAMP-Test AES Session-key is obtained as follows: the TWAMP-
Control AES Session-key (the same AES Session-key as used for the
corresponding TWAMP-Control session) is encrypted with the 16-octet
session identifier (SID) as the key, using a single-block AES-ECB
encryption. The result is the TWAMP-Test AES Session-key to be used
in encrypting (and decrypting) the packets of the particular TWAMP-
Test session. Note that the TWAMP-Test AES Session-key, TWAMP-
Control AES Session-key, and the SID are all comprised of 16 octets.
The TWAMP-Test HMAC Session-key is obtained as follows: the TWAMP-
Control HMAC Session-key (the same HMAC Session-key as used for the
corresponding TWAMP-Control session) is encrypted using AES-CBC
(Cipher Block Chaining) with the 16-octet session identifier (SID) as
the key. This is a two-block CBC encryption that is always performed
with IV=0. Note that the TWAMP-Test HMAC Session-key and TWAMP-
Control HMAC Session-key are comprised of 32 octets, while the SID is
16 octets.
In authenticated mode, the first block (16 octets) of each TWAMP-Test
packet is encrypted using the AES Electronic Codebook (ECB) mode.
This mode does not involve any chaining, and lost, duplicated, or
reordered packets do not cause problems with deciphering any packet
in a TWAMP-Test session.
In encrypted mode, the first six blocks (96 octets) are encrypted
using AES-CBC mode. The AES Session-key to use is obtained in the
same way as the key for authenticated mode. Each TWAMP-Test packet
is encrypted as a separate stream, with just one chaining operation;
chaining does not span multiple packets so that lost, duplicated, or
reordered packets do not cause problems. The initialization vector
for the CBC encryption is a value with all bits equal to zero.
Implementation Note: Naturally, the key schedule for each TWAMP-Test
session MUST be set up at most once per session, not once per packet.
Hedayat, et al. Standards Track [Page 19]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
5. Implementers' Guide
This section serves as guidance to implementers of TWAMP. The
example architecture presented here is not a requirement. Similar to
OWAMP [RFC4656], TWAMP is designed with enough flexibility to allow
different architectures that suit multiple system requirements.
In this example, the roles of Control-Client and Session-Sender are
implemented in one host referred to as the controller, and the roles
of Server and Session-Reflector are implemented in another host
referred to as the responder.
controller responder
+-----------------+ +-------------------+
| Control-Client |<--TWAMP-Control-->| Server |
| | | |
| Session-Sender |<--TWAMP-Test----->| Session-Reflector |
+-----------------+ +-------------------+
This example provides an architecture that supports the full TWAMP
standard. The controller establishes the test session with the
responder through the TWAMP-Control protocol. After the session is
established, the controller transmits test packets to the responder.
The responder follows the Session-Reflector behavior of TWAMP as
described in Section 4.2.
Appendix I provides an example for purely informational purposes. It
suggests an incremental path to adopting TWAMP, by implementing the
TWAMP-Test protocol first.
6. Security Considerations
Fundamentally, TWAMP and OWAMP use the same protocol for
establishment of Control and Test procedures. The main difference
between TWAMP and OWAMP is the Session-Reflector behavior in TWAMP
vs. the Session-Receiver behavior in OWAMP. This difference in
behavior does not introduce any known security vulnerabilities that
are not already addressed by the security features of OWAMP. The
entire security considerations of OWAMP [RFC4656] applies to TWAMP.
The Server-Greeting message (defined in OWAMP, Section 3.1 of
[RFC4656]) includes a Count field to specify the iteration counter
used in PKCS #5 to generate keys from shared secrets. OWAMP
recommends a lower limit of 1024 iterations, but no upper limit. The
Count field provides an opportunity for a denial-of-service (DOS)
attack because it is 32 bits long. If an attacking system set the
maximum value in Count (2**32), then the system under attack would
stall for a significant period of time while it attempts to generate
Hedayat, et al. Standards Track [Page 20]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
keys. Therefore, TWAMP-compliant systems SHOULD have a configuration
control to limit the maximum Count value. The default maximum Count
value SHOULD be 32768. As suggested in OWAMP, this value MAY be
increased when greater computing power becomes common. If a
Control-Client receives a Server-Greeting message with Count greater
that its maximum configured value, it SHOULD close the control
connection.
7. Acknowledgements
We would like to thank Nagarjuna Venna, Sharee McNab, Nick Kinraid,
Stanislav Shalunov, Matt Zekauskas, Walt Steverson, Jeff Boote,
Murtaza Chiba, and Kevin Earnst for their comments, suggestions,
reviews, helpful discussion, and proof-reading. Lars Eggert, Sam
Hartman, and Tim Polk contributed very useful AD-level reviews, and
the authors thank them for their contributions to the memo.
8. IANA Considerations
IANA has allocated a well-known TCP port number (861) for the OWAMP-
Control part of the OWAMP [RFC4656] protocol.
...
owamp-control 861/tcp OWAMP-Control
owamp-control 861/udp OWAMP-Control
# [RFC4656]
IANA has also allocated a well-known TCP/UDP port number for the
TWAMP-Control protocol.
...
twamp-control 862/tcp Two-way Active Measurement Protocol
(TWAMP) Control
twamp-control 862/udp Two-way Active Measurement Protocol
(TWAMP) Control
# [RFC5357]
# 863-872 Unassigned
Since TWAMP adds an additional Control command beyond the OWAMP-
Control specification and describes behavior when this control
command is used, IANA has created a registry for the TWAMP Command
Number field. The field is not explicitly named in [RFC4656] but is
called out for each command. This field is a recognized extension
mechanism for TWAMP.
Hedayat, et al. Standards Track [Page 21]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
8.1. Registry Specification
IANA has created a TWAMP-Control Command Number registry. TWAMP-
Control commands are specified by the first octet in OWAMP-Control
messages as shown in Section 3.5 of [RFC4656], and modified by this
document. Thus, this registry may contain sixteen possible values.
8.2. Registry Management
Because the registry may only contain sixteen values, and because
OWAMP and TWAMP are IETF protocols, this registry must only be
updated by "IETF Consensus" as specified in [RFC5226] -- an RFC
documenting the use that is approved by the IESG. We expect that new
values will be assigned as monotonically increasing integers in the
range [0-15], unless there is a good reason to do otherwise.
8.3. Experimental Numbers
[RFC3692] recommends allocating an appropriate number of values for
experimentation and testing. It is not clear to the authors exactly
how many numbers might be useful in this space, or if it would be
useful that they were easily distinguishable or at the "high end" of
the number range. Two might be useful, say one for session control,
and one for session fetch. On the other hand, a single number would
allow for unlimited extension, because the format of the rest of the
message could be tailored, with allocation of other numbers done once
usefulness has been proven. Thus, this document allocates one number
(6) as designated for experimentation and testing.
8.4. Initial Registry Contents
TWAMP-Control Command Number Registry
Value Description Semantics Definition
0 Reserved
1 Forbidden
2 Start-Sessions RFC 4656, Section 3.7
3 Stop-Sessions RFC 4656, Section 3.8
4 Reserved
5 Request-TW-Session this document, Section 3.5
6 Experimentation undefined, see Section 8.3.
9. Internationalization Considerations
The protocol does not carry any information in a natural language,
with the possible exception of the KeyID in TWAMP-Control, which is
encoded in UTF-8 [RFC3629, RFC5198].
Hedayat, et al. Standards Track [Page 22]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Appendix I - TWAMP Light (Informative)
In this example, the roles of Control-Client, Server, and Session-
Sender are implemented in one host referred to as the controller, and
the role of Session-Reflector is implemented in another host referred
to as the responder.
controller responder
+-----------------+ +-------------------+
| Server |<----------------->| |
| Control-Client | | Session-Reflector |
| Session-Sender |<--TWAMP-Test----->| |
+-----------------+ +-------------------+
This example provides a simple architecture for responders where
their role will be to simply act as light test points in the network.
The controller establishes the test session with the Server through
non-standard means. After the session is established, the controller
transmits test packets to the responder. The responder follows the
Session-Reflector behavior of TWAMP as described in section 4.2 with
the following exceptions.
In the case of TWAMP Light, the Session-Reflector does not
necessarily have knowledge of the session state. IF the Session-
Reflector does not have knowledge of the session state, THEN the
Session-Reflector MUST copy the Sequence Number of the received
packet to the Sequence Number field of the reflected packet. The
controller receives the reflected test packets and collects two-way
metrics. This architecture allows for collection of two-way metrics.
This example eliminates the need for the TWAMP-Control protocol, and
assumes that the Session-Reflector is configured and communicates its
configuration with the Server through non-standard means. The
Session-Reflector simply reflects the incoming packets back to the
controller while copying the necessary information and generating
sequence number and timestamp values per Section 4.2.1. TWAMP Light
introduces some additional security considerations. The non-standard
means to control the responder and establish test sessions SHOULD
offer the features listed below.
The non-standard responder control protocol SHOULD have an
authenticated mode of operation. The responder SHOULD be
configurable to accept only authenticated control sessions.
The non-standard responder control protocol SHOULD have a means to
activate the authenticated and encrypted modes of the TWAMP-Test
protocol.
Hedayat, et al. Standards Track [Page 23]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
When the TWAMP Light test sessions operate in authenticated or
encrypted mode, the Session-Reflector MUST have some mechanism for
generating keys (because the TWAMP-Control protocol normally plays a
role in this process, but is not present here). The specification of
the key generation mechanism is beyond the scope of this memo.
Normative References
[RFC4656] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M.
Zekauskas, "A One-way Active Measurement Protocol (OWAMP)",
RFC 4656, September 2006.
[RFC2681] Almes, G., Kalidindi, S., and M. Zekauskas, "A Round-trip
Delay Metric for IPPM", RFC 2681, September 1999.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field (DS Field)
in the IPv4 and IPv6 Headers", RFC 2474, December 1998.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226, May
2008.
[RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO 10646",
STD 63, RFC 3629, November 2003.
[RFC5198] Klensin, J. and M. Padlipsky, "Unicode Format for Network
Interchange", RFC 5198, March 2008.
Informative References
[RFC3692] Narten, T., "Assigning Experimental and Testing Numbers
Considered Useful", BCP 82, RFC 3692, January 2004.
Hedayat, et al. Standards Track [Page 24]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Authors' Addresses
Kaynam Hedayat
Brix Networks
285 Mill Road
Chelmsford, MA 01824
USA
EMail: khedayat@brixnet.com
URI: http://www.brixnet.com/
Roman M. Krzanowski, Ph.D.
Verizon
500 Westchester Ave.
White Plains, NY
USA
EMail: roman.krzanowski@verizon.com
URI: http://www.verizon.com/
Al Morton
AT&T Labs
Room D3 - 3C06
200 Laurel Ave. South
Middletown, NJ 07748
USA
Phone +1 732 420 1571
EMail: acmorton@att.com
URI: http://home.comcast.net/~acmacm/
Kiho Yum
Juniper Networks
1194 Mathilda Ave.
Sunnyvale, CA
USA
EMail: kyum@juniper.net
URI: http://www.juniper.com/
Jozef Z. Babiarz
Nortel Networks
3500 Carling Avenue
Ottawa, Ont K2H 8E9
Canada
Email: babiarz@nortel.com
URI: http://www.nortel.com/
Hedayat, et al. Standards Track [Page 25]
^L
RFC 5357 Two-Way Active Measurement Protocol October 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Hedayat, et al. Standards Track [Page 26]
^L
|