summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9634.txt
blob: 5f742485ab9b8f01e3d4219f44d2aa744ad76f78 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
Internet Engineering Task Force (IETF)                         G. Mirsky
Request for Comments: 9634                                      Ericsson
Category: Informational                                          M. Chen
ISSN: 2070-1721                                                   Huawei
                                                                D. Black
                                                                Dell EMC
                                                            October 2024


  Operations, Administration, and Maintenance (OAM) for Deterministic
               Networking (DetNet) with the IP Data Plane

Abstract

   This document discusses the use of existing IP Operations,
   Administration, and Maintenance protocols and mechanisms in
   Deterministic Networking networks that use the IP data plane.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Not all documents
   approved by the IESG are candidates for any level of Internet
   Standard; see Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9634.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction
   2.  Conventions Used in This Document
     2.1.  Terminology
   3.  Active OAM for DetNet Networks with the IP Data Plane
     3.1.  Mapping Active OAM and IP DetNet Flows
     3.2.  Active OAM Using IP-in-UDP Encapsulation
     3.3.  Active OAM Using DetNet-in-UDP Encapsulation
     3.4.  The Application of Y.1731/G.8013 Using GRE-in-UDP
           Encapsulation
   4.  Active OAM for DetNet IP Interworking with OAM for Non-IP
           DetNet Domains
   5.  IANA Considerations
   6.  Security Considerations
   7.  References
     7.1.  Normative References
     7.2.  Informative References
   Authors' Addresses

1.  Introduction

   [RFC8655] introduces and explains the Deterministic Networking
   (DetNet) architecture.

   Operations, Administration, and Maintenance (OAM) protocols are used
   to detect and localize defects in the network as well as to monitor
   network performance.  Some OAM functions (e.g., failure detection)
   work in the network proactively, while others (e.g., defect
   localization) are usually performed on demand.  These tasks are
   achieved by a combination of active and hybrid OAM methods, as
   defined in [RFC7799].

   [RFC9551] lists the OAM functional requirements for DetNet and
   defines the principles for OAM use within DetNet networks utilizing
   the IP data plane.  The functional requirements can be compared
   against current OAM tools to identify gaps and potential enhancements
   required to enable proactive and on-demand path monitoring and
   service validation.

   This document discusses the use of existing IP OAM protocols and
   mechanisms in DetNet networks that use the IP data plane.

2.  Conventions Used in This Document

2.1.  Terminology

   The term "DetNet OAM" as used in this document means "a set of OAM
   protocols, methods, and tools for Deterministic Networking".

   DetNet:  Deterministic Networking

   OAM:  Operations, Administration, and Maintenance

   ICMP:  Internet Control Message Protocol

   Underlay Network or Underlay Layer:  The network that provides
      connectivity between DetNet nodes.  MPLS networks providing Label
      Switched Path (LSP) connectivity between DetNet nodes are an
      example of the DetNet IP network underlay layer.

   DetNet Node:  A node that is an actor in the DetNet domain.  DetNet
      domain edge nodes and nodes that perform the Packet Replication,
      Elimination, and Ordering Functions within the domain are examples
      of a DetNet node.

3.  Active OAM for DetNet Networks with the IP Data Plane

   OAM protocols and mechanisms act within the data plane of the
   particular networking layer.  Thus, it is critical that the data
   plane encapsulation support OAM mechanisms and enable them to be
   configured so that DetNet OAM packets follow the same path
   (unidirectional or bidirectional) through the network and receive the
   same forwarding treatment in the DetNet forwarding sub-layer as the
   DetNet flow being monitored.

   The DetNet data plane encapsulation in a transport network with IP
   encapsulations is specified in Section 6 of [RFC8939].  For the IP
   underlay network, DetNet flows are identified by the ordered match to
   the provisioned information set that, among other elements, includes
   the IP protocol type, source port number, and destination port
   number.  Active IP OAM protocols like Bidirectional Forwarding
   Detection (BFD) [RFC5880] or the Simple Two-way Active Measurement
   Protocol (STAMP) [RFC8762] use UDP transport and the well-known UDP
   port numbers as the respective destination ports.  For BFD, the UDP
   destination port is specific to the BFD variant, e.g., multihop BFD
   uses port 4784 [RFC5883].

   Thus, a DetNet node must be able to associate an IP DetNet flow with
   the particular test session to ensure that test packets experience
   the same treatment as the DetNet flow packets.  For example, in a
   network where path selection and DetNet functionality are based on
   3-tuples (destination and source IP addresses in combination with the
   Differentiated Services Code Point value), that association can be
   achieved by having the OAM traffic use the same 3-tuple as the
   monitored IP DetNet flow.  In such a scenario, an IP OAM session
   between the same pair of IP nodes would share the network treatment
   with the monitored IP DetNet flow regardless of whether ICMP, BFD, or
   STAMP is used.

   In IP networks, the majority of on-demand failure detection and
   localization is achieved through the use of ICMP, utilizing Echo
   Request and Echo Reply messages, along with a set of defined error
   messages such as Destination Unreachable, which provide detailed
   information through assigned code points.  [RFC0792] and [RFC4443]
   define ICMP for IPv4 and IPv6 networks, respectively.  To utilize
   ICMP effectively for these purposes within DetNet, DetNet nodes must
   establish the association of ICMP traffic between DetNet nodes with
   IP DetNet traffic.  This entails ensuring that such ICMP traffic
   traverses the same interfaces and receives QoS treatment that is
   identical to the monitored DetNet IP flow.  Failure to do so may
   result in ICMP being unable to detect and localize failures specific
   to the DetNet IP data plane.

3.1.  Mapping Active OAM and IP DetNet Flows

   IP OAM protocols are used to detect failures (e.g., BFD [RFC5880])
   and performance degradation (e.g., STAMP [RFC8762]) that affect an IP
   DetNet flow.  For active OAM to be useful, it is essential to ensure
   that specially constructed OAM packets traverse the same set of nodes
   and links and receive the same network QoS treatment as the monitored
   data flow, e.g., a DetNet flow.  When the UDP destination port number
   used by the OAM protocol is assigned by IANA, judicious selection of
   the UDP source port may help achieve co-routedness of OAM with the
   monitored IP DetNet flow in multipath environments, e.g., Link
   Aggregation Group or Equal Cost Multipath, via the use of a UDP
   source port value that results in the OAM traffic and the monitored
   IP DetNet flow hashing to the same path based on the packet header
   hashes used for path selection.  This does assume that forwarding
   equipment along the multipath makes consistent hashing decisions,
   which might not always be true in a heterogeneous environment.  (That
   also applies to the encapsulation techniques described in
   Sections 3.2 and 3.3.)  To ensure the accuracy of OAM results in
   detecting failures and monitoring the performance of IP DetNet, it is
   essential that test packets not only traverse the same path as the
   monitored IP DetNet flow but also receive the same treatment by the
   nodes, e.g., shaping, filtering, policing, and availability of the
   pre-allocated resources, as experienced by the IP DetNet packet.
   That correlation between the particular IP OAM session and the
   monitored IP DetNet flow can be achieved by using DetNet provisioning
   information (e.g., [RFC9633]).  Each IP OAM protocol session is
   presented as a DetNet application with related service and forwarding
   sub-layers.  The forwarding sub-layer of the IP OAM session is
   identical to the forwarding sub-layer of the monitored IP DetNet
   flow, except for information in the "ip-header" grouping item as
   defined in [RFC9633].

3.2.  Active OAM Using IP-in-UDP Encapsulation

   As described above, active IP OAM is realized through several
   protocols.  Some protocols use UDP transport, while ICMP is a
   network-layer protocol.  The amount of operational work mapping IP
   OAM protocols to the monitored DetNet flow can be reduced by using an
   IP/UDP tunnel [RFC2003] to carry IP test packets.  Then, to ensure
   that OAM packets traverse the same set of nodes and links, the IP/UDP
   tunnel must be mapped to the monitored DetNet flow.  Note that in
   such a case, the DetNet domain for the test packet is seen as a
   single IP link.  As a result, transit DetNet IP nodes cannot be
   traced using the usual traceroute procedure, and a modification of
   the traceroute may be required.

3.3.  Active OAM Using DetNet-in-UDP Encapsulation

   Active OAM in IP DetNet can be realized using DetNet-in-UDP
   encapsulation.  Using a DetNet-in-UDP tunnel between IP DetNet nodes
   ensures that active OAM test packets follow the same path through the
   network as the monitored IP DetNet flow packets and receive the same
   forwarding treatment in the DetNet forwarding sub-layer (see
   Section 4.1.2 of [RFC8655]) as the IP DetNet flow being monitored.

   [RFC9566] describes how DetNet with the MPLS-over-UDP/IP data plane
   [RFC9025] can be used to support Packet Replication, Elimination, and
   Ordering Functions (PREOF) to potentially lower packet loss, improve
   the probability of on-time packet delivery, and ensure in-order
   packet delivery in IP DetNet's service sub-layer.  To ensure that an
   active OAM test packet follows the path of the monitored DetNet flow
   in the DetNet service sub-layer, the encapsulation shown in Figure 1
   is used.

         +---------------------------------+
         |                                 |
         |         DetNet App-Flow         |
         |       (original IP) Packet      |
         |                                 |
         +---------------------------------+ <--\
         |            DetNet ACH           |    |
         +---------------------------------+    +--> PREOF-capable
         |       Service-ID (S-Label)      |    |    DetNet IP data
         +---------------------------------+    |    plane encapsulation
         |            UDP Header           |    |
         +---------------------------------+    |
         |            IP Header            |    |
         +---------------------------------+ <--/
         |            Data-Link            |
         +---------------------------------+
         |             Physical            |
         +---------------------------------+

             Figure 1: DetNet Associated Channel Header Format

   *  DetNet ACH - the DetNet Associated Channel Header as defined in
      [RFC9546].

   *  PREOF - Packet Replication, Elimination, and Ordering Functions
      used in the DetNet service sub-layer as defined in [RFC8655].

3.4.  The Application of Y.1731/G.8013 Using GRE-in-UDP Encapsulation

   [RFC8086] has defined the method of encapsulating GRE (Generic
   Routing Encapsulation) headers in UDP.  GRE-in-UDP encapsulation can
   be used for IP DetNet OAM, as it eases the task of mapping an OAM
   test session to a particular IP DetNet flow that is identified by an
   N-tuple.  Matching a GRE-in-UDP tunnel to the monitored IP DetNet
   flow enables the use of Y.1731/G.8013 [ITU.Y1731] as a comprehensive
   toolset of OAM.  The Protocol Type field in the GRE header must be
   set to 0x8902, assigned by IANA to the IEEE 802.1ag Connectivity
   Fault Management (CFM) protocol / ITU-T Recommendation Y.1731.
   Y.1731/G.8013 supports the necessary functions required for IP DetNet
   OAM, i.e., continuity checks, one-way packet loss, and packet delay
   measurements.

4.  Active OAM for DetNet IP Interworking with OAM for Non-IP DetNet
    Domains

   A domain in which the IP data plane provides DetNet service could be
   used in conjunction with a Time-Sensitive Networking (TSN) network
   and a DetNet domain with the MPLS data plane to deliver end-to-end
   service.  In such scenarios, the ability to detect defects and
   monitor performance using OAM is essential.  [RFC9546] identifies two
   OAM interworking models -- peering and tunneling.  Interworking
   between DetNet domains with IP and MPLS data planes is analyzed in
   Section 4.2 of [RFC9546].  In addition, OAM interworking requirements
   and recommendations that apply between a DetNet domain with the MPLS
   data plane and an adjacent TSN network also apply between a DetNet
   domain with the IP data plane and an adjacent TSN network.

5.  IANA Considerations

   This document has no IANA actions.

6.  Security Considerations

   This document describes the applicability of the existing Fault
   Management and Performance Monitoring IP OAM protocols.  It does not
   raise any security concerns or issues in addition to those common to
   networking or already documented in [RFC0792], [RFC4443], [RFC5880],
   and [RFC8762] for the referenced DetNet and OAM protocols.

7.  References

7.1.  Normative References

   [RFC0792]  Postel, J., "Internet Control Message Protocol", STD 5,
              RFC 792, DOI 10.17487/RFC0792, September 1981,
              <https://www.rfc-editor.org/info/rfc792>.

   [RFC2003]  Perkins, C., "IP Encapsulation within IP", RFC 2003,
              DOI 10.17487/RFC2003, October 1996,
              <https://www.rfc-editor.org/info/rfc2003>.

   [RFC4443]  Conta, A., Deering, S., and M. Gupta, Ed., "Internet
              Control Message Protocol (ICMPv6) for the Internet
              Protocol Version 6 (IPv6) Specification", STD 89,
              RFC 4443, DOI 10.17487/RFC4443, March 2006,
              <https://www.rfc-editor.org/info/rfc4443>.

   [RFC8086]  Yong, L., Ed., Crabbe, E., Xu, X., and T. Herbert, "GRE-
              in-UDP Encapsulation", RFC 8086, DOI 10.17487/RFC8086,
              March 2017, <https://www.rfc-editor.org/info/rfc8086>.

   [RFC8655]  Finn, N., Thubert, P., Varga, B., and J. Farkas,
              "Deterministic Networking Architecture", RFC 8655,
              DOI 10.17487/RFC8655, October 2019,
              <https://www.rfc-editor.org/info/rfc8655>.

   [RFC8939]  Varga, B., Ed., Farkas, J., Berger, L., Fedyk, D., and S.
              Bryant, "Deterministic Networking (DetNet) Data Plane:
              IP", RFC 8939, DOI 10.17487/RFC8939, November 2020,
              <https://www.rfc-editor.org/info/rfc8939>.

   [RFC9025]  Varga, B., Ed., Farkas, J., Berger, L., Malis, A., and S.
              Bryant, "Deterministic Networking (DetNet) Data Plane:
              MPLS over UDP/IP", RFC 9025, DOI 10.17487/RFC9025, April
              2021, <https://www.rfc-editor.org/info/rfc9025>.

   [RFC9546]  Mirsky, G., Chen, M., and B. Varga, "Operations,
              Administration, and Maintenance (OAM) for Deterministic
              Networking (DetNet) with the MPLS Data Plane", RFC 9546,
              DOI 10.17487/RFC9546, February 2024,
              <https://www.rfc-editor.org/info/rfc9546>.

   [RFC9633]  Geng, X., Ryoo, Y., Fedyk, D., Rahman, R., and Z. Li,
              "Deterministic Networking (DetNet) YANG Data Model",
              RFC 9633, DOI 10.17487/RFC9633, October 2024,
              <https://www.rfc-editor.org/info/rfc9633>.

7.2.  Informative References

   [ITU.Y1731]
              ITU-T, "Operation, administration and maintenance (OAM)
              functions and mechanisms for Ethernet-based networks",
              ITU-T Recommendation G.8013/Y.1731, June 2023.

   [RFC5880]  Katz, D. and D. Ward, "Bidirectional Forwarding Detection
              (BFD)", RFC 5880, DOI 10.17487/RFC5880, June 2010,
              <https://www.rfc-editor.org/info/rfc5880>.

   [RFC5883]  Katz, D. and D. Ward, "Bidirectional Forwarding Detection
              (BFD) for Multihop Paths", RFC 5883, DOI 10.17487/RFC5883,
              June 2010, <https://www.rfc-editor.org/info/rfc5883>.

   [RFC7799]  Morton, A., "Active and Passive Metrics and Methods (with
              Hybrid Types In-Between)", RFC 7799, DOI 10.17487/RFC7799,
              May 2016, <https://www.rfc-editor.org/info/rfc7799>.

   [RFC8762]  Mirsky, G., Jun, G., Nydell, H., and R. Foote, "Simple
              Two-Way Active Measurement Protocol", RFC 8762,
              DOI 10.17487/RFC8762, March 2020,
              <https://www.rfc-editor.org/info/rfc8762>.

   [RFC9551]  Mirsky, G., Theoleyre, F., Papadopoulos, G., Bernardos,
              CJ., Varga, B., and J. Farkas, "Framework of Operations,
              Administration, and Maintenance (OAM) for Deterministic
              Networking (DetNet)", RFC 9551, DOI 10.17487/RFC9551,
              March 2024, <https://www.rfc-editor.org/info/rfc9551>.

   [RFC9566]  Varga, B., Farkas, J., and A. Malis, "Deterministic
              Networking (DetNet) Packet Replication, Elimination, and
              Ordering Functions (PREOF) via MPLS over UDP/IP",
              RFC 9566, DOI 10.17487/RFC9566, April 2024,
              <https://www.rfc-editor.org/info/rfc9566>.

Authors' Addresses

   Greg Mirsky
   Ericsson
   Email: gregimirsky@gmail.com


   Mach(Guoyi) Chen
   Huawei
   Email: mach.chen@huawei.com


   David Black
   Dell EMC
   176 South Street
   Hopkinton, MA 01748
   United States of America
   Email: david.black@dell.com