1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
|
Internet Engineering Task Force (IETF) T. Senevirathne
Request for Comments: 6905 Cisco
Category: Informational D. Bond
ISSN: 2070-1721 IBM
S. Aldrin
Y. Li
Huawei
R. Watve
Cisco
March 2013
Requirements for Operations, Administration, and Maintenance (OAM)
in Transparent Interconnection of Lots of Links (TRILL)
Abstract
Operations, Administration, and Maintenance (OAM) is a general term
used to identify functions and toolsets to troubleshoot and monitor
networks. This document presents OAM requirements applicable to the
Transparent Interconnection of Lots of Links (TRILL).
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6905.
Senevirathne, et al. Informational [Page 1]
^L
RFC 6905 TRILL OAM Requirements March 2013
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction ....................................................3
1.1. Scope ......................................................3
2. Conventions Used in This Document ...............................3
3. Terminology .....................................................3
4. OAM Requirements ................................................4
4.1. Data Plane .................................................4
4.2. Connectivity Verification ..................................5
4.2.1. Unicast .............................................5
4.2.2. Distribution Trees ..................................5
4.3. Continuity Check ...........................................5
4.4. Path Tracing ...............................................6
4.5. General Requirements .......................................6
4.6. Performance Monitoring .....................................7
4.6.1. Packet Loss .........................................7
4.6.2. Packet Delay ........................................7
4.7. ECMP Utilization ...........................................8
4.8. Security and Operational Considerations ....................8
4.9. Fault Indications ..........................................8
4.10. Defect Indications ........................................9
4.11. Live Traffic Monitoring ...................................9
5. Security Considerations .........................................9
6. References ......................................................9
6.1. Normative References .......................................9
6.2. Informative References ....................................10
7. Acknowledgments ................................................11
8. Contributors ...................................................11
Senevirathne, et al. Informational [Page 2]
^L
RFC 6905 TRILL OAM Requirements March 2013
1. Introduction
The Operations, Administration, and Maintenance (OAM) generally
covers various production aspects of a network. In this document, we
use the term OAM as defined in [RFC6291].
The success of network operations depends on the ability to
proactively monitor it for faults, performance, etc., as well as the
ability to efficiently and quickly troubleshoot defects and failures.
A well-defined OAM toolset is a vital requirement for wider adoption
of Transparent Interconnection of Lots of Links (TRILL) as the next
generation data-forwarding technology in larger networks such as data
centers.
In this document, we define the requirements for TRILL OAM. It is
assumed that the readers are familiar with the OAM concepts and
terminologies defined in other OAM standards such as [8021ag],
[RFC5860], and [RFC4377]. This document does not attempt to redefine
the terms and concepts specified elsewhere.
1.1. Scope
The scope of this document is OAM between Routing Bridges (RBridges)
of a TRILL campus over links selected by TRILL routing.
2. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Although this document is not a protocol specification, the use of
this language clarifies the instructions to protocol designers
producing solutions that satisfy the requirements set out in this
document.
3. Terminology
Section: This term refers to a segment of a path between any two
given RBridges. As an example, consider the case where RB1 is
connected to RBx via RB2, RB3, and RB4. The segment between RB2 to
RB4 is referred to as a section of the path RB1 to RBx. More details
of this definition can be found in [RFC5960].
Flow: This term indicates a set of packets that share the same path
and per-hop behavior (such as priority). A flow is typically
identified by a portion of the inner payload that affects the hop-by-
hop forwarding decisions. This may contain Layer 2 through Layer 4
information.
Senevirathne, et al. Informational [Page 3]
^L
RFC 6905 TRILL OAM Requirements March 2013
All Selectable Least-Cost Paths: This term refers to a subset of all
potentially available least-cost paths to a specified destination
RBridge that are available (and usable) for forwarding of frames. It
is important to note that in practice, due to limitations in
implementations, not all available least-cost paths may be selectable
for forwarding.
Connectivity: This term indicates reachability between an arbitrary
RBridge RB1 and any other RBridge RB2. The specific path can be
either explicit (i.e., associated with a specific flow) or
unspecified. Unspecified means that messages used for connectivity
verification take whatever path the RBs happen to select. Please
refer to [OAMOVER] for details.
Continuity Verification: This term refers to proactive verification
of liveliness between two RBridges at periodic intervals and the
generation of explicit notification when connectivity failures occur.
Please refer to [OAMOVER] for details.
Fault: This term refers to an inability to perform a required action,
e.g., an unsuccessful attempt to deliver a packet. Please refer to
[TERMTP] for definition.
Defect: This term refers to an interruption in the normal operation,
such that over a period of time no packets are delivered
successfully. Please refer to [TERMTP] for definition.
Failure: This term refers to the termination of the required function
over a longer period of time. Persistence of a defect for a period
of time is interpreted as a failure. Please refer to [TERMTP] for
definition.
Simulated Flow: This term refers to a sequence of OAM-generated
packets designed to follow a specific path. The fields of the
packets in the simulated flow may or may not be identical to the
fields of data packets of an actual flow being simulated. However,
the purpose of the simulated flow is to have OAM packets of the
simulated flow follow a specific path.
4. OAM Requirements
4.1. Data Plane
OAM frames, utilized for connectivity verification, continuity
checks, performance measurements, etc., will by default take whatever
path TRILL chooses based on the current topology and per-hop equal-
cost path choices. In some cases, it may be required that the OAM
Senevirathne, et al. Informational [Page 4]
^L
RFC 6905 TRILL OAM Requirements March 2013
frames utilize specific paths. Thus, it MUST be possible to arrange
that OAM frames follow the path taken by a specific flow.
RBridges MUST have the ability to identify frames that require OAM
processing.
TRILL OAM frames MUST remain within a TRILL campus and MUST NOT be
egressed from a TRILL network as native frames.
OAM MUST have the ability to include all Ethernet traffic types
carried by TRILL.
4.2. Connectivity Verification
4.2.1. Unicast
From an arbitrary RBridge RB1, OAM MUST have the ability to verify
connectivity to any other RBridge RB2.
From an arbitrary RBridge RB1, OAM MUST have the ability to verify
connectivity to any other RBridge RB2 for a specific flow via the
path associated with the specified flow.
4.2.2. Distribution Trees
OAM MUST have the ability to verify connectivity from an arbitrary
RBridge RB1 to either a specific set of RBridges or all member
RBridges, for a specified distribution tree. This functionality is
referred to as verification of the unpruned distribution tree.
OAM MUST have the ability to verify connectivity from an arbitrary
RBridge RB1 to either a specific set of RBridges or all member
RBridges, for a specified distribution tree and for a specified flow.
This functionality is referred to as verification of the pruned tree.
4.3. Continuity Check
OAM MUST provide functions that allow any arbitrary RBridge RB1 to
perform a Continuity Check to any other RBridge.
OAM MUST provide functions that allow any arbitrary RBridge RB1 to
perform a Continuity Check to any other RBridge using a path
associated with a specified flow.
OAM SHOULD provide functions that allow any arbitrary RBridge to
perform a Continuity Check to any other RBridge over any section of
any selectable least-cost path.
Senevirathne, et al. Informational [Page 5]
^L
RFC 6905 TRILL OAM Requirements March 2013
OAM SHOULD provide the ability to perform a Continuity Check on
sections of any selectable path within the network.
OAM SHOULD provide the ability to perform a multicast Continuity
Check for specified distribution tree(s), as well as specified
combinations of distribution trees and flows. The former is referred
to as an unpruned multi-destination tree Continuity Check and the
latter is referred to as a pruned tree Continuity Check.
4.4. Path Tracing
OAM MUST provide the ability to trace a path between any two RBridges
corresponding to a specified unicast flow.
OAM SHOULD provide the ability to trace all selectable least-cost
paths between any two RBridges.
OAM SHOULD provide functionality to trace all branches of a specified
distribution tree (unpruned tree).
OAM SHOULD provide functionality to trace all branches of a specified
distribution tree for a specified flow (pruned tree).
4.5. General Requirements
OAM MUST provide the ability to initiate and maintain multiple
concurrent sessions for multiple OAM functions between any arbitrary
RBridge RB1 to any other RBridge. In general, multiple OAM
operations will run concurrently. For example, proactive continuity
checks may take place between RB1 and RB2 at the same time that an
operator decides to test connectivity between the same two RBs.
Multiple OAM functions and instances of those functions MUST be able
to run concurrently without interfering with each other.
OAM MUST provide a single OAM framework for all TRILL OAM functions
within the scope of this document.
OAM, as practical and as possible, SHOULD reuse functional,
operational, and semantic elements of existing OAM standards.
OAM MUST maintain related error and operational counters. Such
counters MUST be accessible via network management applications
(e.g., SNMP).
OAM functions related to continuity and connectivity checks MUST be
able to be invoked either proactively or on demand.
Senevirathne, et al. Informational [Page 6]
^L
RFC 6905 TRILL OAM Requirements March 2013
OAM MAY be required to provide the ability to specify a desired
response mode for a specific OAM message. The desired response mode
can be in-band, out-of-band, or none.
The OAM Framework MUST be extensible to include new functionality.
For example, the solution needs to include a version number to
differentiate older and newer implementations and TLV structures for
flexibility to include new information elements.
OAM MAY provide methods to verify control-plane and forwarding-plane
alignments.
OAM SHOULD leverage existing OAM technologies, where practical.
4.6. Performance Monitoring
4.6.1. Packet Loss
In this document, the term "packet loss" is used as defined in
Section 2.4 of [RFC2680].
OAM SHOULD provide the ability to measure packet loss statistics for
a flow from any arbitrary RBridge RB1 to any other RBridge.
OAM SHOULD provide the ability to measure packet loss statistics over
a section for a flow between any arbitrary RBridge RB1 to any other
RBridge.
OAM SHOULD provide the ability to measure packet loss statistics
between any two RBridges over all least-cost paths.
An RBridge SHOULD be able to perform the above packet loss
measurement functions either proactively or on demand.
4.6.2. Packet Delay
There are two types of packet delays -- one-way delay and two-way
delay (Round-Trip Delay).
One-way delay is defined in [RFC2679] as the time elapsed from the
start of transmission of the first bit of a packet by an RBridge
until the reception of the last bit of the packet by the destination
RBridge.
Senevirathne, et al. Informational [Page 7]
^L
RFC 6905 TRILL OAM Requirements March 2013
Two-way delay is also referred to as Round-Trip Delay and is defined
similar to [RFC2681]; i.e., the time elapsed from the start of
transmission of the first bit of a packet from RB1, receipt of the
packet at RB2, RB2 sending a response packet back to RB1, and RB1
receiving the last bit of that response packet.
OAM SHOULD provide functions to measure two-way delay between two
RBridges.
OAM MAY provide functions to measure one-way delay between two
RBridges for a specified flow.
OAM MAY provide functions to measure one-way delay between two
RBridges for a specified flow over a specific section.
4.7. ECMP Utilization
OAM MAY provide functionality to monitor the effectiveness of per-hop
Equal-Cost Multipath (ECMP) hashing. For example, individual
RBridges could maintain counters that show how packets are being
distributed across equal-cost next hops for a specified destination
RBridge or RBridges as a result of ECMP hashing.
4.8. Security and Operational Considerations
Methods MUST be provided to protect against exploitation of OAM
framework for security and denial-of-service attacks.
Methods MUST be provided to prevent OAM messages from causing
congestion in the networks. Periodically generated messages with
high frequencies may lead to congestion, hence methods such as
shaping or rate limiting SHOULD be utilized.
Certain OAM functions may be utilized to gather operational
information such as topology of the network. Methods MUST be
provided to prevent unauthorized users accessing OAM functions to
gather critical and sensitive information of the network.
OAM packets MUST be limited to within the TRILL campus, and the
implementation MUST provide methods to prevent leaking of OAM packets
out of the TRILL campus. Additionally, methods MUST be provided to
prevent accepting OAM packets from outside the TRILL campus.
4.9. Fault Indications
OAM MUST provide a Fault Indication framework to notify the packet's
ingress RBridge or other interested parties (such as syslog servers)
about faults.
Senevirathne, et al. Informational [Page 8]
^L
RFC 6905 TRILL OAM Requirements March 2013
OAM MUST provide functions to selectively enable or disable different
types of Fault Indications.
4.10. Defect Indications
OAM SHOULD provide a framework for Defect Detection and Indication.
OAM Defect Detection and Indication Framework SHOULD provide methods
to selectively enable or disable Defect Detection per defect type.
OAM Defect Detection and Indication Framework SHOULD provide methods
to configure Defect Detection thresholds per different types of
defects.
OAM Defect Detection and Indication Framework SHOULD provide methods
to log defect indications to a locally defined archive (such as log
buffer) or Simple Network Management Protocol (SNMP) traps.
OAM Defect Detection and Indication Framework SHOULD provide a Remote
Defect Indication framework that facilitates notifying the
originator/owner of the flow experiencing the defect, which is the
ingress RBridge.
Remote Defect Indication MAY be either in-band or out-of-band.
4.11. Live Traffic Monitoring
OAM implementations MAY provide methods to utilize live traffic for
troubleshooting and performance monitoring.
5. Security Considerations
Security requirements are specified in Section 4.8. For general TRILL
security considerations, please refer to [RFC6325].
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu,
D., and S. Mansfield, "Guidelines for the Use of the "OAM"
Acronym in the IETF", BCP 161, RFC 6291, June 2011.
Senevirathne, et al. Informational [Page 9]
^L
RFC 6905 TRILL OAM Requirements March 2013
6.2. Informative References
[8021ag] IEEE, "Virtual Bridged Local Area Networks Amendment 5:
Connectivity Fault Management", IEEE Std 802.1ag-2007,
2007.
[OAMOVER] Mizrahi, T., Sprecher, N., Bellagamba, E., Y. Weingarten,
"An Overview of Operations, Administration, and
Maintenance (OAM) Mechanisms", Work in Progress, January
2013.
[RFC2679] Almes, G., Kalidindi, S., and M. Zekauskas, "A One-way
Delay Metric for IPPM", RFC 2679, September 1999.
[RFC2680] Almes, G., Kalidindi, S., and M. Zekauskas, "A One-way
Packet Loss Metric for IPPM", RFC 2680, September 1999.
[RFC2681] Almes, G., Kalidindi, S., and M. Zekauskas, "A Round-trip
Delay Metric for IPPM", RFC 2681, September 1999.
[RFC4377] Nadeau, T., Morrow, M., Swallow, G., Allan, D., and S.
Matsushima, "Operations and Management (OAM) Requirements
for Multi-Protocol Label Switched (MPLS) Networks", RFC
4377, February 2006.
[RFC5860] Vigoureux, M., Ed., Ward, D., Ed., and M. Betts, Ed.,
"Requirements for Operations, Administration, and
Maintenance (OAM) in MPLS Transport Networks", RFC 5860,
May 2010.
[RFC5960] Frost, D., Ed., Bryant, S., Ed., and M. Bocci, Ed., "MPLS
Transport Profile Data Plane Architecture", RFC 5960,
August 2010.
[RFC6325] Perlman, R., Eastlake 3rd, D., Dutt, D., Gai, S., and A.
Ghanwani, "Routing Bridges (RBridges): Base Protocol
Specification", RFC 6325, July 2011.
[TERMTP] van Helvoort, H., Ed., Andersson, L., Ed., and N.
Sprecher, Ed., "A Thesaurus for the Terminology used in
Multiprotocol Label Switching Transport Profile (MPLS-TP)
drafts/RFCs and ITU-T' Transport Network Recommendations",
Work in Progress, February 2013.
Senevirathne, et al. Informational [Page 10]
^L
RFC 6905 TRILL OAM Requirements March 2013
7. Acknowledgments
Special acknowledgments to IEEE 802.1 chair, Tony Jeffree, for
allowing us to solicit comments from IEEE 802.1 group. Also
recognized are the comments received from the IEEE group, IESG,
Stewart Bryant, Ralph Droms, Adrian Farrel, Benoit Claise, Ayal Lior,
and others.
8. Contributors
Thomas Narten
IBM Corporation
3039 Cornwallis Avenue,
PO Box 12195
Research Triangle Park, NC 27709
USA
EMail:narten@us.ibm.com
Donald Eastlake
Huawei Technologies
155 Beaver Street,
Milford, MA 01757
USA
EMail: d3e3e3@gmail.com
Anoop Ghanwani
Dell
350 Holger Way
San Jose, CA 95134
USA
Phone: +1-408-571-3500
EMail: Anoop@alumni.duke.edu
Jon Hudson
Brocade
120 Holger Way
San Jose, CA 95134
USA
EMail: jon.hudson@gmail.com
Senevirathne, et al. Informational [Page 11]
^L
RFC 6905 TRILL OAM Requirements March 2013
Naveen Nimmu
Broadcom
9th Floor, Building no 9, Raheja Mind space
Hi-Tec City, Madhapur,
Hyderabad - 500 081
India
Phone: +1-408-218-8893
EMail: naveen@broadcom.com
Radia Perlman
Intel Labs
2700 156th Ave NE, Suite 300,
Bellevue, WA 98007
USA
Phone: +1-425-881-4824
EMail: radia.perlman@intel.com
Tal Mizrahi
Marvell
6 Hamada St.
Yokneam, 20692
Israel
EMail: talmi@marvell.com
Authors' Addresses
Tissa Senevirathne
Cisco Systems
375 East Tasman Drive
San Jose, CA 95134
USA
Phone: +1-408-853-2291
EMail: tsenevir@cisco.com
Senevirathne, et al. Informational [Page 12]
^L
RFC 6905 TRILL OAM Requirements March 2013
David Bond
IBM
4400 North 1st Street
San Jose, CA 95134
USA
Phone: +1-603-339-7575
EMail: mokon@mokon.net
Sam Aldrin
Huawei Technologies
2330 Central Express Way
Santa Clara, CA 95951
USA
EMail: aldrin.ietf@gmail.com
Yizhou Li
Huawei Technologies
101 Software Avenue,
Nanjing 210012
China
Phone: +86-25-56625375
EMail: liyizhou@huawei.com
Rohit Watve
Cisco Systems
375 East Tasman Drive
San Jose, CA 95134
USA
Phone: +1-408-424-2091
EMail: rwatve@cisco.com
Senevirathne, et al. Informational [Page 13]
^L
|