Operations and Management Area Working Group T. Mizrahi Internet Draft Marvell Intended status: Informational N. Sprecher Expires:July 2013January 2014 Nokia Siemens Networks E. Bellagamba Ericsson Y. WeingartenJanuaryJuly 9, 2013 An Overview of Operations, Administration, and Maintenance (OAM) Mechanismsdraft-ietf-opsawg-oam-overview-08.txtdraft-ietf-opsawg-oam-overview-09.txt Abstract Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolsetthat can be usedfor fault detection and isolation, and for performance measurement. OAM mechanisms have been defined for various layers in the protocol stack, and are used with a variety of transport protocols. This document presents an overview of the data plane OAMmechanismstools that have been definedand are currently being definedby the IETF. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onJulyJanuary 9,2013.2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction ................................................. 3 1.1.The Building Blocks of OAM .............................. 3Background .............................................. 4 1.2.Forwarding Plane vs. Management Plane ...................Target Audience.......................................... 4 1.3.The OAM toolsets ........................................ 4 1.4.OAM-related Work in the IETF ............................ 5 1.4. Focusing on Data Plane OAMDocuments ......................................Tools ........................ 61.5. Non-IETF OAM Documents ................................. 102.BasicTerminology........................................... 12.................................................. 6 2.1. Abbreviations.......................................... 12........................................... 6 2.2. Terminology used in OAM Standards...................... 13....................... 8 2.2.1. General Terms..................................... 13...................................... 8 2.2.2.OAM Maintenance Entities .......................... 13Functions, Mechanisms, Tools and Protocols ......... 8 2.2.3.OAM Maintenance Points ............................ 14Data Plane, Control Plane and Management Plane ..... 9 2.2.4. The Players ....................................... 10 2.2.5. Proactive and On-demandactivationActivation ................15 2.2.5.11 2.2.6. Connectivity Verification and Continuity Checks ...15 2.2.6.11 2.2.7. Failures ..........................................1512 3. OAMTools ................................................... 16 3.1.Functions ............................................... 12 4. OAM Mechanisms in the IETF - a Detailed Description.......... 13 4.1. IP Pingand................................................ 13 4.2. IP Traceroute................................. 16 3.1.1. Ping .............................................. 16 3.1.2. Traceroute......................................... 16 3.2........................................... 14 4.3. Bidirectional Forwarding Detection (BFD) ...............17 3.2.1.15 4.3.1. Overview ..........................................17 3.2.2.15 4.3.2. Terminology ....................................... 15 4.3.3. BFD Control .......................................17 3.2.3.15 4.3.4. BFD Echo ..........................................18 3.3.16 4.4. MPLS OAM ...............................................18 3.4.16 4.5. MPLS-TP OAM ............................................19 3.4.1.17 4.5.1. Overview ..........................................19 3.4.2.17 4.5.2. Terminology ....................................... 17 4.5.3. Generic Associated Channel ........................ 193.4.3.4.5.4. MPLS-TP OAM Toolset ...............................20 3.4.3.1.19 4.5.4.1. Continuity Check and Connectivity Verification 203.4.3.2.4.5.4.2. Route Tracing ................................21 3.4.3.3.20 4.5.4.3. Lock Instruct ................................21 3.4.3.4.20 4.5.4.4. Lock Reporting ............................... 213.4.3.5.4.5.4.5. Alarm Reporting .............................. 213.4.3.6.4.5.4.6. Remote Defect Indication .....................22 3.4.3.7.21 4.5.4.7. Client Failure Indication ....................22 3.4.3.8.21 4.5.4.8. Performance Monitoring ....................... 21 4.5.4.8.1. Packet Loss Measurement (LM)............................. 223.4.3.9.4.5.4.8.2. Packet Delay Measurement (DM)........................... 223.5. PWE34.6. Pseudowire OAM........................................................................................ 233.5.1. PWE34.6.1. Pseudowire OAM using Virtual Circuit Connectivity Verification (VCCV)......................................................................................... 233.5.2. PWE34.6.2. Pseudowire OAM using G-ACh...................................................... 24 4.6.3. Attachment Circuit - Pseudowire Mapping ........... 243.6.4.7. OWAMP and TWAMP......................................... 243.6.1.4.7.1. Overview .......................................... 243.6.2.4.7.2. Control and Test Protocols ........................24 3.6.3.25 4.7.3. OWAMP ............................................. 253.6.4.4.7.4. TWAMP ............................................. 263.7.4.8. TRILL .................................................. 26 4.9. Summary of OAM Mechanisms .............................. 27 4.10. Summary of OAM Functions............................... 26 4............................... 29 5. Security Considerations .....................................27 5.30 6. IANA Considerations .........................................27 6.31 7. Acknowledgments .............................................27 7.31 8. References ..................................................28 7.1. Normative References ................................... 28 7.2.31 8.1. Informative References ................................. 31 Appendix A. List of OAM Documents .............................. 36 A.1. List of IETF OAM Documents ............................. 36 A.2. List of Selected Non-IETF OAM Documents ................ 41 1. Introduction OAM is a general term that refers to a toolset for detecting, isolating and reportingconnectionfailures andperformance degradation.for monitoring the network performance. There are several different interpretations to the "OAM" acronym. This document refers to Operations, Administration and Maintenance, as recommended in [OAM-Def]. This document summarizes the OAM tools and mechanisms defined in the IETF.The term OAM in thisThis documentrefers to Operations, Administration and Maintenance [OAM-Def], focusingfocuses onthe forwardingdata planeof OAM.OAM tools. Hence, control and management aspects of OAM are outside the scope of this document. 1.1.The Building Blocks ofBackground OAMAn OAM protocol is runwas originally used in traditional transport technologies such as E1 and T1, evolving into PDH and then later in SONET/SDH. ATM was probably thecontext of a Maintenance Domain, consisting of two or more nodes that run the OAM protocol, referredfirst technology to include inherent OAM mechanisms from day one, while in other transport technologies OAM was typically defined in an ad hoc manner after the technology was already defined and deployed. Packet-based networks were traditionally considered unreliable and best-effort, but asMaintenance Points (MP). This subsection provides a brief summary ofpacket-based networks evolved, they have become the commontools used by OAMtransport for both data and telephony, replacing traditional transport protocols.AnConsequently, packet-based networks were expected to provide a similar "carrier grade" experience, and specifically to support OAM. OAMprotocoltypicallysupports one or morehas a multi-layer architecture; each transport technology has its own OAM mechanisms. Moreover, OAM can be used at different levels of hierarchy in thetools described below. o Continuity Checking (CC): Used for verifyingnetwork to form a multi-layer OAM solution, as shown in theliveness ofexample in Figure 1. Figure 1 illustrates aconnectionnetwork in which IP traffic between twoMPs. o Connectivity Verification (CV): Allowscustomer edges is transported over anMP to check whether itMPLS provider network. MPLS OAM isconnected to a peer MP, and to verify that messages from the peer MP are received through the expected path. o Path Discovery / Fault Localization: An MP uses this mechanism to trace the route to a peer MP, i.e., to identify the nodes alongused at thepath toprovider-level for monitoring thepeer MP. When aconnectionfails, this mechanism also allows the MP to detectbetween thelocation oftwo provider edges, while IP OAM is used at thefailure. o Performance Monitoring: Consists of 3 main functions o Loss Measurement (LM) - monitorscustomer-level for monitoring thepacket loss rate of a connection. o Delay Measurement (DM) - monitorsend-to-end connection between thedelay and delay variation between MPs.two customer edges. |<-------------- Customer-level OAM -------------->| IP OAM (Ping, Traceroute, OWAMP, TWAMP) |<- Provider-level OAM ->| MPLS OAM (LSP Ping) +-----+ +----+ +----+ +-----+ | | | |========================| | | | | |-------| | MPLS | |-------| | | | IP | | | | IP | | +-----+ +----+ +----+ +-----+ Customer Provider Provider Customer Edge Edge Edge Edge Figure 1 Example: Multi-layer OAM 1.2. Target Audience The target audience of this document includes: oThroughput measurementStandard development organizations -monitors the throughput of a connection. 1.2. Forwarding Plane vs. Management Plane While the OAM tools may,both IETF working groups andquite often do, work in conjunction with a control-planenon-IETF organizations can benefit from this document when designing new OAM protocols, ormanagement plane, they are usually definedwhen looking tobe independent of the control-plane. Thereuse existing OAMtools communicate with the management plane to raise alarms,mechanisms for new transport technologies. o Network equipment vendors andoften the on-demand tools may be activated by the management, e.g.network operators - can use this document as an index tolocateexisting IETF OAM mechanisms, andlocalize problems. The considerations of the control-plane maintenance tools or the functionality of the management-plane are out of scope for this document, which will concentrate on presenting the forwarding-plane toolstheir connection to various transport technologies. It should be noted thatare usedthis document is not necessarily suitable for beginners without any background in OAM. 1.3.The OAM toolsetsOAM-related Work in the IETF This memo provides an overview of the different sets of OAM mechanisms defined by the IETF.It is intended for those with little or no familiarity with the described mechanisms.The set of OAM mechanisms described in this memo are applicable to IP unicast, MPLS, pseudowires,andMPLS for the transportenvironment (MPLS-TP).profile (MPLS-TP), and TRILL. While OAM mechanisms that are applicable to other technologies exist, they are beyond the scope of this memo. This document focuses on IETF documents that have been published as RFCs, while other ongoingOAM- relatedOAM-related work is outside the scope. The IETF has defined OAM protocols and mechanisms in several differentfronts: o IP Ping and Traceroute: Ping iscontexts. We roughly categorize these efforts into avery simple and common application for failure diagnosis that uses ICMP Echo requests, as definedfew sets of OAM-related RFCs, listed in Table 1. Each category defines a logically-coupled set of RFCs, although the sets are in[ICMPv4],some cases intertwined by common tools and[ICMPv6]. Traceroute ([TCPIP-Tools], [NetTools])protocols. The discussion in this document isan application that allows usersordered according totrace the path between an IP source and an IP destination, i.e., to identify the nodes along the path. o BFD: Bidirectional Forwarding Detection (BFD) is defined in [BFD] as a framework for a lightweightthese categories. +--------------+------------+ | Category | Transport | | | Technology | +--------------+------------+ |IP Ping | IPv4/IPv6 | +--------------+------------+ |IP Traceroute | IPv4/IPv6 | +--------------+------------+ |BFD | generic | +--------------+------------+ |MPLS OAMmechanism. The intention is to define a base mechanism that can be used with various encapsulation types, network environments, and in various medium types. o MPLS OAM:| MPLSLSP Ping, as defined in [MPLS-OAM], [MPLS-OAM-FW] and [LSP- Ping], is an| +--------------+------------+ |MPLS-TP OAMmechanism for point to point MPLS LSPs. It includes two main functions: Ping and Traceroute. o MPLS-TP OAM:| MPLS-TP | +--------------+------------+ |Pseudowire OAM| Pseudowires| +--------------+------------+ |OWAMP and | IPv4/IPv6 | |TWAMP | | +--------------+------------+ |TRILL OAMis defined| TRILL | +--------------+------------+ Table 1 Categories of OAM-related IETF Documents 1.4. Focusing on Data Plane OAM Tools OAM tools may, and quite often do, work in conjunction with aset of RFCs.control plane and/or management plane. The OAMrequirements for MPLS Transport Profile (MPLS-TP) are defined in [MPLS-TP-OAM]. Each of thetoolsincommunicate with the management plane to raise alarms, and often OAMtoolset is defined in its own RFC,tools may be activated by the management (as well asspecified in Section 1.4. o PWE3 OAM:by the control plane), e.g. to locate and localize problems. ThePWE3 OAM architecture definesconsiderations of the controlchannels that supportplane maintenance tools and theusefunctionality ofexisting IETF OAMthe management plane are out of scope for this document, which concentrates on presenting the data plane toolsto bethat are used fora pseudowire (PW). The control channels thatOAM. Since OAM protocols aredefined in [VCCV] and [PW-G- ACH] may beusedin conjunction with ICMP Ping, LSP Ping, and BFD to perform CC and CV functionality. In addition the channels support use of any offor monitoring theMPLS-TP baseddata plane, it is imperative for OAM toolsfor completing their respectiveto be capable of testing the actual data plane in as much accuracy as possible. Thus, it is important to enforce fate-sharing between OAMfunctionality for a PW. o OWAMPtraffic andTWAMP: The One Way Activethe user-traffic it monitors. 2. Terminology 2.1. Abbreviations ACH Associated Channel Header AIS Alarm Indication Signal ATM Asynchronous Transfer Mode BFD Bidirectional Forwarding Detection CC Continuity Check CV Connectivity Verification DM Delay Measurement FEC Forwarding Equivalence Class G-ACh Generic Associated Channel GAL Generic Associated Label ICMP Internet Control Message Protocol(OWAMP) and theL2TP Layer TwoWay ActiveTunneling Protocol LCCE L2TP Control Connection Endpoint LDP Label Distribution Protocol LER Label Edge Router LM Loss MeasurementProtocols (TWAMP) are two protocols defined in the IP Performance Metrics (IPPM) working group in the IETF. These protocols allow delayLSP Label Switched Path LSR Label Switched Router ME Maintenance Entity MEG Maintenance Entity Group MEP MEG End Point MIP MEG Intermediate Point MP Maintenance Point MPLS Multiprotocol Label Switching MPLS-TP MPLS Transport Profile MTU Maximum Transmission Unit OAM Operations, Administration, andpacket loss measurementMaintenance PDH Plesiochronous Digital Hierarchy PE Provider Edge PW Pseudowire PWE3 Pseudowire Emulation Edge-to-Edge RBridge Routing Bridge RDI Remote Defect Indication SDH Synchronous Digital Hierarchy SONET Synchronous Optical Networking TRILL Transparent Interconnection of Lots of Links TTL Time To Live VCCV Virtual Circuit Connectivity Verification 2.2. Terminology used inIP networks. This document summarizes theOAMmechanisms defined by the IETF. We first presentStandards 2.2.1. General Terms A wide variety of terms is used in various OAM standards. This section presents a comparison of theterminologyterms used in various OAM standards,and then summarizewithout fully quoting theOAM functions thatdefinition of each term. An interesting overview of the term OAMstandard provides. 1.4. IETF OAM Documents Table 1 summarizesand its derivatives is presented in [OAM-Def]. A thesaurus of terminology for MPLS-TP terms is presented in [TP-Term], and provides a good summary of some of theIETFOAM relatedRFCs discussed in this document. The table includesterminology. 2.2.2. Functions, Mechanisms, Tools and Protocols OAM Function OAM is a"Type" column, specifying the naturegroup ofeachfunctions that provide network fault indication, performance information, and data and diagnosis functions (based on the definition of OAM in thelisted documents: o Tool: documentsATM Forum Glossary). This definition implies thatdefineOAM functions are the atomic building blocks of OAM, where each function defines an OAMtool or mechanism. o Prof.: documents that define a profile or a variantcapability. Typical examples of OAM functions are presented in Section 3. OAM Protocol A protocol used for implementing one or more OAM functions. The OWAMP-Test [OWAMP] is an example of an OAMtool thatprotocol. OAM Mechanism An OAM Mechanism, sometimes referred to as an OAM tool, isdefined in other documents. o Inf.: documentsa mechanism thatdefineimplements one or more OAM functions. In some cases aninfrastructure that is used byOAMtools. o Misc.: otherprotocol *is* an OAMrelated documents,mechanism, e.g., OWAMP- Test. In other cases an OAMrequirementmechanism uses a set of protocols that are not strictly OAM-related; for example, Traceroute (Section 4.2.) can be implemented using UDP andframework documents. +-----------+--------------------------------------+-----+----------+ | | Title |Type | RFC | +-----------+--------------------------------------+-----+----------+ |IP Ping and| Internet Control Message Protocol |Tool | RFC 792 | |Traceroute | [ICMPv4] | | | | +--------------------------------------+-----+----------+ | | InternetICMP messages, without using an OAM protocol per se. The terms tool and mechanism are used interchangeably in this document. 2.2.3. Data Plane, ControlMessage Protocol |Tool | RFC 4443 | | | (ICMPv6)Plane and Management Plane Data Plane The Data Plane is typically described as the hardware and software components responsible for receiving a packet, performing lookups to identify theInternet Protocol | |packet's destination and possible actions that need to be performed on the packet, and forwarding the packet out through the appropriate outgoing interface (based on [Cont]). The Data Plane is also known as the Forwarding Plane or the User Plane. Control Plane The Control Plane, as described in [Cont], is generally described as the hardware and software components for handling packets destined to the device itself as well as building and sending packets originated locally on the device. Management Plane This term Management Plane, as described in [Mgmt], is used to describe the exchange of management messages through management protocols (often transported by IP and by IP transport protocols) between management applications and the managed entities such as network nodes. Data Plane vs. Control Plane vs. Management Plane The distinction between the planes is at times a bit vague. For example, the definition of "Control Plane" above may imply that OAM tools such as ping, BFD and others are in fact in the control plane. This document focuses on data plane OAM tools, i.e., tools used for monitoring the data plane. While these tools could arguably be considered to be in the control plane, these tools monitor the data plane, and hence it is imperative to have fate-sharing between OAM traffic and the data plane traffic it monitors. Another potentially vague distinction is between the management plane and control plane. The management plane should be seen as separate from, but possibly overlapping with, the control plane (based on [Mgmt]). 2.2.4. The Players An OAM mechanism is used between two (or more) "players". Various terms are used in IETF documents to refer to the players that take part in OAM. Table 2 summarizes the terms used in each of the categories discussed in this document. +--------------------------+--------------------------+ | Category | Terms |Version 6 (IPv6) Specification+--------------------------+--------------------------+ | Ping / Traceroute |-Host | | ([ICMPv4], [ICMPv6], |-Node | |[ICMPv6][TCPIP-Tools]) |-Interface | | |-Gateway | + ------------------------ + ------------------------ + |+--------------------------------------+-----+----------+BFD [BFD] | System |A Primer On Internet and TCP/IP |Tool | RFC 2151 |+ ------------------------ + ------------------------ + | MPLS OAM [MPLS-OAM-FW] |Tools and Utilities [TCPIP-Tools]LSR | + ------------------------ + ------------------------ + | MPLS-TP OAM [TP-OAM-FW] |-End Point - MEP | |+--------------------------------------+-----+----------+|-Intermediate Point - MIP | + ------------------------ + ------------------------ + |FYI on a Network Management Tool |ToolPseudowire OAM [VCCV] |-PE |RFC 1147| |-LCCE | + ------------------------ + ------------------------ + |Catalog: Tools for MonitoringOWAMP and TWAMP |-Host | | ([OWAMP], [TWAMP]) |-End system | + ------------------------ + ------------------------ + | TRILL OAM [TRILL-OAM] |-RBridge |Debugging TCP/IP Internets+--------------------------+--------------------------+ Table 2 Maintenance Point Terminology 2.2.5. Proactive and| | | | | Interconnected Devices [NetTools] | | | | +--------------------------------------+-----+----------+ | | Extended ICMP to Support Multi-Part |Tool | RFC 4884 | | | Messages [ICMP-MP] | | | | +--------------------------------------+-----+----------+ | | ICMP Extensions for Multiprotocol |Tool | RFC 4950 | | | Label Switching [ICMP-Ext] | | | | +--------------------------------------+-----+----------+ | | Extending ICMP for InterfaceOn-demand Activation The different OAM tools may be used in one of two basic types of activation: Proactive Proactive activation - indicates that the tool is activated on a continual basis, where messages are sent periodically, and|Tool | RFC 5837 | | | Next-Hop Identification [ICMP-Int] | | | +-----------+--------------------------------------+-----+----------+ |BFD | Bidirectional Forwarding Detection |Tool | RFC 5880 | | | [BFD] | | | | +--------------------------------------+-----+----------+ | | Bidirectional Forwarding Detection |Prof.| RFC 5881 | | | (BFD) for IPv4errors are detected when a certain number of expected messages are not received. On-demand On-demand activation - indicates that the tool is activated "manually" to detect a specific anomaly. 2.2.6. Connectivity Verification andIPv6 (Single Hop) | | | | | [BFD-IP] | | | | +--------------------------------------+-----+----------+ | | Generic ApplicationContinuity Checks Two distinct classes ofBidirectional |Misc.| RFC 5882 | | | Forwarding Detection [BFD-Gen] | | | | +--------------------------------------+-----+----------+ | | Bidirectional Forwarding Detection |Prof.| RFC 5883 | | | (BFD) for Multihop Paths [BFD-Multi] | | | | +--------------------------------------+-----+----------+ | | Bidirectional Forwarding Detection |Prof.| RFC 5884 | | | for MPLS Label Switched Paths (LSPs) | | | | | [BFD-LSP] | | | | +--------------------------------------+-----+----------+ | | Bidirectional Forwarding Detection |Prof.| RFC 5885 | | | for the Pseudowire Virtual Circuit | | | | | Connectivity Verification (VCCV) | | | | | [BFD-VCCV] | | | +-----------+--------------------------------------+-----+----------+ |MPLSfailure management functions are used in OAM| Operations and Management (OAM) |Misc.| RFC 4377 | | | Requirements for Multi-Protocol Label| | | | | Switched (MPLS) Networks [MPLS-OAM] | | | | +--------------------------------------+-----+----------+ | | A Framework for Multi-Protocol |Misc.| RFC 4378 | | | Label Switching (MPLS) Operations | | | | |protocols, connectivity verification andManagement (OAM) [MPLS-OAM-FW] | | | | +--------------------------------------+-----+----------+ | | Detecting Multi-Protocol Label |Tool | RFC 4379 | | | Switched (MPLS) Data Plane Failures | | | | | [LSP-Ping] | | | | +--------------------------------------+-----+----------+ | | Operationscontinuity checks. The distinction between these terms is defined in [MPLS-TP-OAM], andManagement (OAM) |Misc.| RFC 4687 | | | Requirements for Point-to-Multipoint | | | | | MPLS Networks [MPLS-P2MP] | | | +-----------+--------------------------------------+-----+----------+ |MPLS-TP | Requirements for OAMis used similarly inMPLS-TP |Misc.| RFC 5860 | |OAM | [MPLS-TP-OAM] | | | | +--------------------------------------+-----+----------+ | | MPLS Generic Associated Channel |Inf. | RFC 5586 | | | [G-ACh] | | | | +--------------------------------------+-----+----------+ | | MPLS-TP OAM Framework |Misc.| RFC 6371 | | | [TP-OAM-FW] | | | | +--------------------------------------+-----+----------+ | | Proactive Connectivity Verification, |Tool | RFC 6428 | | |this document. ContinuityCheck, and Remote Defect | | | | | Indication for the MPLS Transport | | | | | Profile [TP-CC-CV] | | | | +--------------------------------------+-----+----------+ | | MPLS On-Demand Connectivity |Tool | RFC 6426 | | | Verification and Route Tracing | | | | | [OnDemand-CV] | | | | +--------------------------------------+-----+----------+ | | MPLS Fault Management Operations, |Tool | RFC 6427 | | | Administration, and Maintenance (OAM)| | | | | [TP-Fault] | | | | +--------------------------------------+-----+----------+ | | MPLS Transport Profile Lock Instruct |Tool | RFC 6435 | | | and Loopback Functions [Lock-Loop] | | | | +--------------------------------------+-----+----------+ | | Packet Loss and Delay Measurement for|Tool | RFC 6374 | | | MPLS Networks [MPLS-LM-DM] | | | | +--------------------------------------+-----+----------+ | | A Packet LossCheck Continuity checks are used to verify that a destination is reachable, andDelay Measurement |Prof.| RFC 6375 | | | Profile for MPLS-Based Transport | | | | | Networks [TP-LM-DM] | | | +-----------+--------------------------------------+-----+----------+ |PWE3 OAM | Pseudowire Virtual Circuit |Inf. | RFC 5085 | | |are typically sent proactively, though they can be invoked on- demand as well. Connectivity Verification(VCCV): | | | | |AControl Channel for Pseudowires | | | | | [VCCV] | | | | +--------------------------------------+-----+----------+ | | Bidirectional Forwarding Detection |Prof.| RFC 5885 | | | forconnectivity verification function allows Alice to check whether she is connected to Bob or not. This function also allows Alice to verify that messages from Bob are received through thePseudowire Virtual Circuit | | | | | Connectivity Verification (VCCV) | | | | | [BFD-VCCV] | | | | +--------------------------------------+-----+----------+ | | Usingcorrect path, thereby verifying not only that theGeneric Associated Channel |Inf. | RFC 6423 | | | Label for Pseudowire intwo MPs are connected, but also that they are connected through theMPLS | | | | | Transport Profile (MPLS-TP) | | | | | [PW-G-ACh] | | | | +--------------------------------------+-----+----------+ | | Pseudowire (PW) Operations, |Misc.| RFC 6310 | | | Administration, and Maintenance (OAM)| | | | | Message Mapping [PW-Map] | | | +-----------+--------------------------------------+-----+----------+ |OWAMP and | A One-way Active Measurement Protocol|Tool | RFC 4656 | |TWAMP | [OWAMP] | | | | +--------------------------------------+-----+----------+ | | A Two-Way Active Measurement Protocol|Tool | RFC 5357 | | | [TWAMP] | | | | +--------------------------------------+-----+----------+ | | Framework for IP Performance Metrics |Misc.| RFC 2330 | | | [IPPM-FW] | | | | +--------------------------------------+-----+----------+ | | IPPM Metrics for Measuring |Misc.| RFC 2678 | | | Connectivity [IPPM-Con] | | | | +--------------------------------------+-----+----------+ | | A One-way Delay Metric for IPPM |Misc.| RFC 2679 | | | [IPPM-1DM] | | | | +--------------------------------------+-----+----------+ | | A One-way Packet Loss Metric for IPPM|Misc.| RFC 2680 | | | [IPPM-1LM] | | | | +--------------------------------------+-----+----------+ | | A Round-trip Delay Metric for IPPM |Misc.| RFC 2681 | | | [IPPM-2DM] | | | +-----------+--------------------------------------+-----+----------+ Table 1 Summaryexpected path, allowing detection ofIETF OAM Related RFCs 1.5. Non-IETF OAM Documents In addition tounexpected topology changes. It is noted that while theOAM mechanisms defined byCV function is performed in theIETF,data plane, theIEEE and ITU-T have also defined various OAM mechanisms"expected path" is predetermined either in the control plane or in the management plane. A connectivity verification (CV) protocol typically uses a CV message, followed by a CV reply thatfocus on Ethernet,is sent back to the originator. A CV function can be applied proactively or on-demand. Connectivity verification andvarious other transport network environments. These variouscontinuity checks are considered complementary mechanisms,defined by the three standard organizations,and are oftentightly coupled, and have had a mutual effect onused in conjunction with each other. 2.2.7. Failures TheITU-T and IETF have both defined OAM mechanisms for MPLS LSPs, [ITU-T-Y1711] and [LSP-Ping]. The following OAM standards by the IEEEterms Failure, Fault, andITU-TDefect are used interchangeably in the standards, referring to a malfunction that can be detected by a connectivity or a continuity check. In someextent linkedstandards, such as 802.1ag [IEEE802.1Q] , there is no distinction between these terms, while in other standards each of these terms refers to a different type of malfunction. The terminology used in IETF MPLS-TP OAMmechanisms listed above and are mentioned here only as reference material: o OAM mechanisms for Ethernet based networks have been defined by both the ITU-T in [ITU-T-Y1731], and bytakes after theIEEEITU-T, which distinguishes between these terms in[IEEE802.1ag].[ITU-T-G.806]; Fault TheIEEE 802.3 standard defines OAM for one-hop Ethernet links [IEEE802.3ah]. oterm Fault refers to an inability to perform a required action, e.g., an unsuccessful attempt to deliver a packet. Defect TheITU-T has defined OAM for MPLS LSPs in [ITU-T-Y1711], and MPLS-TP OAMterm Defect refers to an interruption in the normal operation, such as a consecutive period of time where no packets are delivered successfully. Failure The term Failure refers to the termination of the required function. While a Defect typically refers to a limited period of time, a failure refers to a long period of time. 3. OAM Functions This subsection provides a brief summary of the common OAM functions used in OAM-related standards. These functions are used as building blocks in[ITU-G8113.1] and [ITU-G8113.2]. Table 2 summarizesthe OAM standardsmentioneddescribed in this document. o Connectivity Verification (CV) and/or Continuity Checks (CC): As defined in Section 2.2.6. o Path Discovery / Fault Localization: Thisdocument focuses on IETF OAM standards, but these non-IETF standards are referenced where relevant. +-----------+--------------------------------------+---------------+ | | Title |Standard/Draft | +-----------+--------------------------------------+---------------+ |ITU-T | Operation & Maintenancemechanism| ITU-T Y.1711 | |MPLS OAM | for MPLS networks [ITU-T-Y1711] | | | +--------------------------------------+---------------+ | | Assignmentcan be used to trace the route to a destination, i.e., to identify the nodes along the route to the destination. When more than one route is available to a specific destination, this mechanism traces one of the'OAM Alert Label' | RFC 3429 | | | for Multiprotocol Label Switching | | | | Architecture (MPLS) Operation and | | | | Maintenance (OAM) Functions | | | | [OAM-Label] | | | | | | | | Note: althoughavailable routes. When a failure occurs, this mechanism also allows to detect the location of the failure. Note that the term route tracing (or Traceroute) that isan IETF | | | | document, itused in the context of IP and MPLS, islistedsometimes referred to asone of the| | | | non-IETF OAM standards, since it | | | | was definedpath tracing in other transport technologies, such asa complementary part | | | | of ITU-T Y.1711. | | +-----------+--------------------------------------+---------------+ |ITU-T | Operations, administration and |ITU-T G.8113.2 | |MPLS-TP OAM| Maintenance mechanisms for MPLS-TP | | | | networks usingTRILL. o Performance Monitoring: Typically refers to: o Loss Measurement (LM) - monitors thetools defined for | | | | MPLS [ITU-G8113.2] | | | | | | | | Note: this document describespacket loss rate. o Delay Measurement (DM) - monitors the| | | |delay and delay variation. 4. OAMtoolset defined byMechanisms in the IETFfor | | | | MPLS-TP, whereas ITU-T G.8113.1 | | | | describes the OAM toolset defined | | | | by- a Detailed Description This section presents a detailed description of theITU-T. | | | +--------------------------------------+---------------+ | | Operations, Administration and |ITU-T G.8113.1 | | | Maintenance mechanism for MPLS-TPsets of OAM- related mechanisms in| | | | Packet Transport Network (PTN) | | | +--------------------------------------+---------------+ | | Allocationeach of the categories in Table 1. 4.1. IP Ping Ping is aGeneric Associated | RFC 6671 | | | Channel Typecommon network diagnosis application forITU-T MPLS Transport| | | | Profile Operation, Maintenance, and | | | | Administration (MPLS-TP OAM) | | | | [ITU-T-CT] | | | | | | | | Note: although thisIP networks that uses ICMP. 'Ping' is anIETF | | | | document,abbreviation for Packet internet groper [NetTerms]. As defined in [NetTerms], it islisted as onea program used to test reachability ofthe| | | | non-IETF OAM standards, since it | | | | was defined as a complementary part | | | | of ITU-T G.8113.1. | | +-----------+--------------------------------------+---------------+ |ITU-T | OAM Functionsdestinations by sending them an ICMP echo request andMechanismswaiting for|[ITU-T-Y1731] | |Ethernet | Ethernet-based Networks | | |OAM | | | +-----------+--------------------------------------+---------------+ |IEEE | Connectivity Fault Management | IEEE 802.1ag | |CFM | [IEEE802.1ag] | | | | | | | | Note: CFM was originally published | | | |a reply. The ICMP Echo request/reply exchange in Ping is used asIEEE 802.1ag, buta continuity check function for the Internet Protocol. The originator transmits an ICMP Echo request packet, and the receiver replies with an Echo reply. ICMP ping isnow | | | | incorporateddefined inthe 802.1Q standard.| | +-----------+--------------------------------------+---------------+ |IEEE | Media Access Control Parameters, | IEEE 802.3ah | |802.3 | Physical Layers,two variants, [ICMPv4] is used for IPv4, andManagement | | |link level | Parameters[ICMPv6] is used forSubscriber Access | | |OAM | Networks [IEEE802.3ah] | | | | | | | | Note: link level OAM was originally | | | | definedIPv6. Ping implementations typically use ICMP messages. UDP Ping is a variant that uses UDP messages instead of ICMP echo messages. Ping is a single-ended continuity check, i.e., it allows the *initiator* of the Echo request to test the reachability. If it is desirable for both ends to test the reachability, both ends have to invoke Ping independently. Note that since ICMP filtering is deployed inIEEE 802.3ah,some routers and firewalls, the usefulness of Ping isnow | | | | incorporatedsometimes limited in the802.3 standard. | | +-----------+--------------------------------------+---------------+ Table 2 Non-IETF OAM Standards Mentioned in this Document 2. Basic Terminology 2.1. Abbreviations ACH Associated Channel Header AIS Alarm Indication Signal BFD Bidirectional Forwarding Detection CC Continuity Check CV Connectivity Verification DM Delay Measurement FEC Forwarding Equivalence Class GAL Generic Associated Label ICMP Internet Control Message Protocol LDP Label Distribution Protocol LM Loss Measurement LSP Label Switched Path ME Maintenance Entity MEG Maintenance Entity Group MEP MEG End Point MIP MEG Intermediate Point MP Maintenance Point MPLS Multiprotocol Label Switching MPLS-TP MPLS Transport Profile MTU Maximum Transmission Unit OAM Operations, Administration, and Maintenance PW Pseudowire PWE3 Pseudowire Emulation Edge-to-Edge RDI Remote Defect Indication TTL Time To Live VCCV Virtual Circuit Connectivity Verification 2.2. Terminology used in OAM Standards 2.2.1. General Terms A wide variety of termswider internet. This limitation isused in various OAM standards. Each of the OAM standards listed in the reference section includes a section that defines termsequally relevant tothat tool. A thesaurus of terminology for MPLS-TP termsTraceroute. 4.2. IP Traceroute Traceroute ([TCPIP-Tools], [NetTools]) ispresented in [TP-Term], and provides a good summary of some of the OAM related terminology. This section presentsan application that allows users to discover acomparison of the terms used in various OAM standards, without fully quoting the definition of each term. Forpath between an IP source and an IP destination. The most common way to implement Traceroute [TCPIP-Tools] is described as follows. Traceroute sends aformal definitionsequence ofeach term, referUDP packets tothe referencesUDP port 33434 at theenddestination. By default, Traceroute begins by sending three packets (the number ofthis document. 2.2.2. OAM Maintenance Entities OAM tools are designed to monitor and manage a Maintenance Entity (ME). An ME, as definedpackets is configurable in[TP-OAM-FW], defines a relationship between two points of a transport path to which maintenance and monitoring operations apply. The following related terms are also quoted from [TP-OAM-FW]: o MEP: The two points that define a maintenance entity. o MEG: The collectionmost Traceroute implementations), each with an IP Time-To-Live (or Hop Limit in IPv6) value of oneor more MEs that belongsto thesame transport path and that are maintained and monitored as a group are known as a Maintenance Entity Group (MEG). o MIP: In between MEPs, there are zero or more intermediate points, called Maintenance Entity Group Intermediate Points (MIPs). A pair of MEPs engaged in an ME are connected by a communication link, which may be one of several types of connection, e.g. a single physical connection, a set of physical connections, or a virtual link such as an MPLS LSP. The term Maintenance Entity (ME) is used in ITU-T Recommendations (e.g. [ITU-T-Y1731]),destination. These packets expire aswellsoon as they reach the first router in theMPLS-TP terminology ([TP-OAM- FW]). Various terms are used to refer to an ME. For example, BFD does not explicitly use a termpath. Consequently, thatis equivalent to ME, but rather uses the term "session", referringrouter sends three ICMP Time Exceeded Messages back to therelationship between two nodes using a BFD protocol. The MPLS LSP Ping ([LSP-Ping]) terminology simply usesTraceroute application. Traceroute now sends another three UDP packets, each with theterm "LSP" in this context. MPLS-TP has definedTTL value of 2. These messages cause theterms ME and Maintenance Entity Group (MEG) in [TP-OAM-FW], similarsecond router tothe terms defined by ITU-T. A MEG allows the monitoring of a compound set of MEs,return ICMP messages. This process continues, with ever increasing values forexample when monitoring a p2mp MEG that is consideredthe TTL field, until the packets actually reach the destination. Because no application listens tobeport 33434 at theset of MEs betweendestination, theroot and each individualdestinationMEP. 2.2.3. OAM Maintenance Points A Maintenance Point (MP) is a functional entityreturns ICMP Destination Unreachable Messages indicating an unreachable port. This event indicates to the Traceroute application that it isdefined at a node infinished. The Traceroute program displays thenetwork, and either initiates or reacts to OAM messages. A Maintenance End Point (MEP) is oneround-trip delay associated with each of theend points of an ME, and can initiate OAM messages and respond to them. A Maintenance Intermediate Point (MIP)attempts. It isan intermediate point between two MEPs,noted thatdoes not generally initiate OAM frames (one exception to thisTraceroute is an application, and not a protocol. As such, it has various different implementations. One of the most common ones uses UDP probe packets, as described above. Other implementations exist that use other types ofAIS notifications), but is able to respond to OAM framesprobe messages, such as ICMP or TCP. Note thatare destined to it.IP routing may be asymmetric. While Traceroute discovers a path between a source and destination, it does not reveal the reverse path. AMIPfew ICMP extensions ([ICMP-MP], [ICMP-Int]) have been defined inMPLS-TP identifies OAM packets destined to it bythevaluecontext of Traceroute. These documents define several extensions, including extensions to theTTL field in the OAM packet. The term Maintenance Point is a general term for MEPs and MIPs. The 802.1ag defines a finer distinction between Up MPs and Down MPs. An MP is a bridge interface,ICMP Destination Unreachable message, thatis monitoredcan be used byanTraceroute applications. 4.3. Bidirectional Forwarding Detection (BFD) 4.3.1. Overview While multiple OAMprotocol either in the direction facing the network, ormechanisms have been defined for various protocols in thedirection facingprotocol stack, Bidirectional Forwarding Detection [BFD], defined by thebridge. A Down MPIETF BFD working group, isan MP that receivesa generic OAMpackets from,mechanism that can be deployed over various encapsulating protocols, andtransmits them to the directionin various medium types. The IETF has defined variants of thenetwork. An Up MP receives OAM packets from,protocol for IP ([BFD-IP], [BFD-Multi]), for MPLS LSPs [BFD-LSP], andtransmits them to the directionfor pseudowires [BFD-VCCV]. The usage ofthe bridging entity.BFD in MPLS-TP([TP-OAM-FW]) uses a similar distinction on the placement of the MP - either at the ingress, egress, or forwarding function of the node (Down / Up MPs). This placementisimportant for localization of a connection failure. 2.2.4. Proactive and On-demand activation The different OAM tools may be useddefined inone of[TP-CC-CV]. BFD includes two main OAM functions, using twobasictypes ofactivation: o Proactive activation - indicates that the toolBFD packets: BFD Control packets, and BFD Echo packets. 4.3.2. Terminology BFD operates between two *systems*. The BFD protocol isactivated on a continual basis periodically, where messages are sentrun betweenthetwoMEPs, and errors are detected whensystems after establishing acertain number of expected messages*session*. 4.3.3. BFD Control BFD supports a bidirectional continuity check, using BFD control packets, that arenot received. o On-demand activation - indicates that the tool is activated "manually" to detect a specific anomaly. In this activationexchanged within asmall numberBFD session. BFD sessions operate in one ofOAM messagestwo modes: o Asynchronous mode (i.e. proactive): in this mode BFD control packets are sentby a MEP andperiodically. When thereply message is received. 2.2.5. Connectivity Verification and Continuity Checks Two distinct classesreceiver detects that no BFD control packets have been received during a predetermined period of time, a failuremanagement functions are used in OAM protocols, connectivity verification and continuity checks. The distinction between these terms is defined in [MPLS-TP-OAM], andisused similarlydetected. o Demand mode: in thisdocument. Continuity checksmode, BFD control packets areused to verify the liveness ofsent on-demand. Upon need, aconnection orsystem initiates apath between two MPs, and are typically sent proactively, though they can be invoked on-demand as well. A connectivity verification function allows an MPseries of BFD control packets to checkwhether it is connected to a peer MP or not. This function also allowstheMP to verify that messages fromcontinuity of thepeer MPsession. BFD control packets arereceived throughsent independently in each direction. Each of thecorrect path, thereby verifying not only thatend-points (referred to as systems) of thetwo MPsmonitored path maintains its own session identification, called a Discriminator, both of which areconnected, but alsoincluded in the BFD Control Packets thattheyareconnected throughexchanged between theexpected path. This allows detectionend-points. At the time ofunexpected topology changes. A connectivity verification (CV) protocol typically uses a CV message, followed by a CV reply that is sent back tosession establishment, theoriginator. A CV function can be applied proactively or on-demand. Connectivity verification and continuity checks are considered complementary mechanisms, and are often used in conjunction with each other. 2.2.6. Failures The terms Failure, Fault, and DefectDiscriminators areused interchangeably inexchanged between thestandards, referring to a malfunction that can be detected by a connectivity or a continuity check.two-end points. Insome standards, such as [IEEE802.1ag], thereaddition, the transmission (and reception) rate isno distinctionnegotiated betweenthese terms, while in other standards each of these terms refers to a different type of malfunction. The terminology used in IETF MPLS-TP OAM takes aftertheITU-T, which distinguishes between these terms in [ITU-T-G.806]; The term Fault refers to an inability to perform a required action, e.g., an unsuccessful attempt to deliver a packet. The term Defect refers to an interruptiontwo end-points, based on information included in the control packets. These transmission rates may be renegotiated during the session. During normaloperation, such as a consecutive periodoperation oftime wherethe session, i.e. nopacketsfailures aredelivered successfully. The term Failure refers todetected, thetermination ofBFD session is in therequired function. While a Defect typically refers toUp state. If no BFD Control packets are received during alimitedperiod oftime, a failure referstime called the Detection Time, the session is declared to be Down. The detection time is along periodfunction oftime. 3. OAM Tools 3.1. IP Pingthe pre-configured or negotiated transmission time, andTraceroute 3.1.1. Ping Ping isacommon network diagnosis application for IP networks that uses ICMP. The ICMPparameter called Detect Mult. Detect Mult determines the number of missing BFD Control packets that cause the session to be declared as Down. This parameter is included in the BFD Control packet. 4.3.4. BFD Echorequest/reply exchangeA BFD echo packet is sent to aconnectivity verification function forpeer system, and is looped back to theInternet Protocol.originator. Theoriginator transmits an ICMP Echo request packet,echo function can be used proactively, or on-demand. The BFD echo function has been defined in BFD for IPv4 andthe receiver replies with an Echo reply. ICMP pingIPv6 ([BFD-IP]), but is not used in BFD for MPLS LSPs, PWs, or in BFD for MPLS-TP. 4.4. MPLS OAM The IETF MPLS working group has defined OAM for MPLS LSPs. The requirements and framework of this effort are defined in [MPLS-OAM-FW] and [MPLS-OAM], respectively. The corresponding OAM mechanism defined, in this context, is LSP Ping [LSP-Ping]. LSP Ping is modeled after the Ping/Traceroute paradigm and thus it may be used in one of twovariants, [ICMPv4]modes: o "Ping" mode: In this mode LSP Ping is used forIPv4, and [ICMPv6]end-to-end connectivity verification between two LERs. o "Traceroute" mode: This mode is used forIPv6. 3.1.2. Traceroute Traceroute ([TCPIP-Tools], [NetTools]) is an application that allows users to discoverhop-by-hop fault isolation. LSP Ping extends thepath between an IP sourcebasic ICMP Ping operation (of data-plane connectivity verification) with functionality to verify data-plane vs. control-plane consistency for a Forwarding Equivalence Class (FEC) andan IP destination.also Maximum Transmission Unit (MTU) problems. The Traceroutesends a sequence of UDP packetsfunctionality may be used toUDP port 33434 atisolate and localize thedestination. By default, Traceroute begins by sending three packets (the numberMPLS faults, using the Time-to-live (TTL) indicator to incrementally identify the sub-path ofpacketsthe LSP that isconfigurable in most Traceroute implementations), each withsuccessfully traversed before the faulty link or node. It should be noted that LSP Ping supports unique identification of the LSP within anIP Time-To-Live (TTL) valueaddressing domain. The identification is checked using the full FEC identification. LSP Ping is easily extensible to include additional information needed to support new functionality, by use ofoneType-Length-Value (TLV) constructs. The usage of TLVs is typically not easy to perform in hardware, and is thus typically handled by thedestination. These packets expire as sooncontrol plane. LSP Ping supports both asynchronous, asthey reachwell as, on-demand activation. 4.5. MPLS-TP OAM 4.5.1. Overview The MPLS working group has defined thefirst routerOAM toolset that fulfills the requirements for MPLS-TP OAM. The full set of requirements for MPLS- TP OAM are defined in [MPLS-TP-OAM], and include both general requirements for thepath. That router respondsbehavior of the OAM mechanisms and a set of operations that should be supported bysending three ICMP Time Exceeded Messages totheTraceroute application. Traceroute now sends another three UDP packets, each withOAM toolset. The set of mechanisms required are further elaborated in [TP-OAM-FW], which describes theTTL valuegeneral architecture of2. These messages causethesecond router to return ICMP messages. This process continues, with ever increasing values forOAM system as well as giving overviews of theTTL field, untilfunctionality of thepackets actually reachOAM toolset. Some of thedestination. Because no application listens to port 33434 at the destination,basic requirements for thedestination returns ICMP Destination Unreachable Messages indicating an unreachable port. This event indicatesOAM toolset for MPLS-TP are: o MPLS-TP OAM must be able to support both an IP based and non-IP based environment. If theTraceroute application that itnetwork isfinished. The Traceroute program displaysIP based, i.e. IP routing and forwarding are available, then theround-trip delay associated with each ofMPLS-TP OAM toolset should rely on theattempts. Note thatIP routingmay be asymmetric. While Traceroute reveals the path between a sourceanddestination, it may not revealforwarding capabilities. On thereverse path. A few ICMP extensions ([ICMP-Ext], [ICMP-MP], [ICMP-Int]) have been definedother hand, in environments where IP functionality is not available, thecontext of Traceroute. These extensions augment the ICMP Destination Unreachable message, and canOAM tools must still beused by Traceroute applications. 3.2. Bidirectional Forwarding Detection (BFD) 3.2.1. Overview While multipleable to operate without dependence on IP forwarding and routing. o OAMmechanisms have been defined for various protocols in the protocol stack, Bidirectional Forwarding Detection [BFD], defined bypackets and theIETF BFD working group,user traffic are required to be congruent (i.e. OAM packets are transmitted in-band) and there is agenericneed to differentiate OAMmechanism that can be deployed over various encapsulating protocols, andpackets from data plane ones. Inherent invarious medium types. The IETF has defined variants ofthis requirement is theprotocol for IP ([BFD-IP], [BFD-Multi]), for MPLS LSPs [BFD-LSP], and for PWE3 [BFD-VCCV]. The usage of BFD inprinciple that MPLS-TPis defined in [MPLS-TP-CC- CV]. BFD includes two mainOAMfunctions, using two typesbe independent ofBFD packets: BFD Control packets, and BFD Echo packets. 3.2.2. BFD Control BFD supports a bidirectional continuity check, using BFD control packets, thatany existing control-plane, although it should not preclude use of the control-plane functionality. 4.5.2. Terminology Maintenance Entity (ME) The MPLS-TP OAM tools areexchanged withindesigned to monitor and manage aBFD session. BFD sessions operate in one of two modes: o Asynchronous mode (i.e. proactive):Maintenance Entity (ME). An ME, as defined inthis mode BFD control packets are sent periodically. When the receiver detects that no BFD control packet have been received during[TP-OAM-FW], defines apredetermined periodrelationship between two points oftime,afailuretransport path to which maintenance and monitoring operations apply. The term Maintenance Entity (ME) isdetected. o Demand mode:used inthis mode, BFD control packets are sent on-demand. Upon need, a system initiates a series of BFD control packets to verify the liveness of the session. BFD control packets are sent independentlyITU-T Recommendations (e.g. [ITU-T-Y1731]), as well as ineach direction. Each oftheend-pointsMPLS-TP terminology ([TP-OAM-FW]). Maintenance Entity Group (MEG) The collection of one or more MEs that belongs to themonitoredsame transport pathmaintains its own session identification, calledand that are maintained and monitored as aDiscriminator, both of whichgroup areincluded in the BFD Control Packetsknown as a Maintenance Entity Group (based on [TP-OAM-FW]). Maintenance Point (MP) A Maintenance Point (MP) is a functional entity thatare exchanged betweenis defined at a node in theend-points. Atnetwork, and can initiate and/or react to OAM messages. This document focuses on thetimedata-plane functionality ofsession establishment, the Discriminators are exchanged between the two-end points. In addition, the transmission (and reception) rate is negotiated between the two end- points, based on information included inMPs, while MPs interact with the controlpackets. These transmission rates may be renegotiated during the session. During normal operation of the session, i.e. no failures are detected,plane and with theBFD sessionmanagement plane as well. The term MP is used in IEEE 802.1ag, and was similarly adopted in MPLS-TP ([TP-OAM-FW]). Maintenance End Point (MEP) A Maintenance End Point (MEP) is one of theUp state. If no BFD Control packets are received during a fixed periodend points oftime,an ME, and can initiate OAM messages and respond to them (based on [TP-OAM-FW]). Maintenance Intermediate Point (MIP) In between MEPs, there are zero or more intermediate points, calledthe Detection Time, the sessionMaintenance Entity Group Intermediate Points (based on [TP-OAM-FW]). A Maintenance Intermediate Point (MIP) isdeclaredan intermediate point that does not generally initiate OAM frames (one exception tobe Down. The detection timethis isa function of the negotiated transmission time, and a parameter called Detect Mult. Detect Mult determinesthenumberuse ofmissing BFD Control packetsAIS notifications), but is able to respond to OAM frames thatcause the sessionare destined tobe declared as Down. This parameter is includedit. A MIP in MPLS-TP identifies OAM packets destined to it by theBFD Controlvalue of the TTL field in the OAM packet.3.2.3. BFD Echo A BFD echo packetThe term Maintenance Point issent toapeer system,general term for MEPs andis looped back to the originator. The echo function can be used proactively, or on-demand.MIPs. Up and Down MEPs TheBFD echo function has been defined in BFD for IPv4IEEE 802.1ag [IEEE802.1Q] defines a distinction between Up MEPs andIPv6 ([BFD-IP]), butDown MEPs. A MEP isnot useda bridge interface that is monitored by an OAM protocol either inBFD for MPLS LSPs, PWs,the direction facing the network, or inBFD for MPLS-TP. 3.3. MPLSthe direction facing the bridge. A Down MEP is a MEP that receives OAMThe IETF MPLS working group has definedpackets from, and transmits them to the direction of the network. An Up MEP receives OAM packets from, and transmits them to the direction of the bridging entity. MPLS-TP ([TP-OAM-FW]) uses a similar distinction on the placement of the MEP - either at the ingress, egress, or forwarding function of the node (Down / Up MEPs). This placement is important forMPLS LSPs.localization of a failure. Therequirementsdistinction between Up andframeworkDown MEPs was defined in [TP-OAM-FW], but has not been used in other MPLS-TP RFCs, as of the writing of thiseffort aredocument. 4.5.3. Generic Associated Channel In order to address the requirement for in-band transmission of MPLS- TP OAM traffic, MPLS-TP uses a Generic Associated Channel (G-ACh), defined in[MPLS-OAM- FW] and [MPLS-OAM], respectively. The corresponding[G-ACh] for LSP-based OAM traffic. This mechanismdefined, in this context, is LSP Ping [LSP-Ping]. LSP Pingis based onICMP Pingthe same concepts as the PWE3 ACH andjust like its predecessor may be used in oneVCCV mechanisms. However, to address the needs oftwo modes:LSPs as differentiated from PW, the following concepts were defined for [G-ACh]: o"Ping" mode: In this mode LSP pingAn Associated Channel Header (ACH), that uses a format similar to the PW Control Word, isused for end-to-end connectivity verification between two LERs. o "Traceroute" mode: This modea 4-byte header that isused for hop-by-hop fault isolation. LSP Ping extends the basic ICMP Ping operation (of data-plane connectivity verification) with functionalityprepended toverify data-plane vs. control-plane consistency for a Forwarding Equivalence Class (FEC) and also Maximum Transmission Unit (MTU) problems.OAM packets. o A Generic Associated Label (GAL). Thetraceroute functionality may be used to isolate and localize theGAL is a reserved MPLSfaults, using the Time-to-live (TTL) indicator to incrementally identify the sub-path of the LSPlabel value (13) that indicates that the packet issuccessfully traversed beforean ACH packet and thefaulty link or node.payload follows immediately after the label stack. It should be noted thatLSP Ping supports unique identificationwhile the G-ACh was defined as part of theLSP within an addressing domain. The identification is checked usingMPLS-TP definition effort, thefull FEC identification. LSP Ping is easily extensible to include additional information needed to support new functionality, by use of Type-Length-Value (TLV) constructs. The usage of TLVsG-ACh istypically not easy to performa generic tool that can be used inhardware,MPLS in general, andis thus typically handled by the control plane. LSP Ping supports both asynchronous, as well as, on-demand activation. 3.4.not only in MPLS-TP. 4.5.4. MPLS-TP OAM3.4.1. Overview The MPLS working groupToolset To address the functionality that iscurrently working on definingrequired of the OAMtoolset that fulfillstoolset, therequirements for MPLS-TP OAM. The full set of requirements for MPLS-TP OAM are defined in [MPLS-TP-OAM], and include both general requirements for the behaviorMPLS WG conducted an analysis of the existing IETF and ITU-T OAM mechanisms anda set of operations that should be supported bytheir ability to fulfill theOAM toolset.required functionality. Thesetconclusions ofmechanisms requiredthis analysis arefurther elaborateddocumented in[TP-OAM-FW], which describes the general architecture[OAM-Analys]. The MPLS working group currently plans to use a mixture oftheOAMsystem as well as giving overviews ofmechanisms that are based on various existing standards, and adapt them to thefunctionalityrequirements ofthe OAM toolset.[MPLS-TP-OAM]. Some of thebasic requirementsmain building blocks of this solution are based on: o Bidirectional Forwarding Detection ([BFD], [BFD-LSP]) forthe OAM toolsetproactive continuity check and connectivity verification. o LSP Ping as defined in [LSP-Ping] forMPLS-TP are:on-demand connectivity verification. oMPLS-TP OAM must be ableNew protocol packets, using G-ACH, tosupport both an IP based and non-IP based environment. If the network is IP based, i.e. IP routing and forwardingaddress different functionality. o Performance measurement protocols that areavailable, then the MPLS-TP OAM toolset should relybased on theIP routing and forwarding capabilities. On the other hand, in environments where IPfunctionality that isnot available,described in [ITU-T-Y1731]. The following sub-sections describe the OAM toolsmust still be able to operate without dependence on IP forwardingdefined for MPLS-TP as described in [TP-OAM-FW]. 4.5.4.1. Continuity Check androuting. o OAM packetsConnectivity Verification Continuity Check andthe user traffic are required to be congruent (i.e. OAM packetsConnectivity Verification aretransmitted in-band) and there is a need to differentiate OAM packets from user-plane ones. Inherentpresented in Section 2.2.6. of thisrequirementdocument. As presented there, these tools may be used either proactively or on-demand. When using these tools proactively, they are generally used in tandem. For MPLS-TP there are two distinct tools, the proactive tool is defined in [TP-CC-CV] while theprinciple that MPLS-TP OAM be independent of any existing control-plane, although iton-demand tool is defined in [OnDemand-CV]. In on-demand mode, this function shouldnot preclude use ofsupport monitoring between thecontrol-plane functionality. 3.4.2. Generic Associated Channel In order to addressMEPs and, in addition, between a MEP and MIP. [TP-OAM-FW] highlights, when performing Connectivity Verification, therequirementneed forin-band transmissionthe CC-V messages to include unique identification ofMPLS- TP OAM traffic, MPLS-TP uses a Generic Associated Channel (G-ACh), defined in [G-ACh] for LSP-based OAM traffic. This mechanismthe MEG that is being monitored and the MEP that originated the message. The proactive tool [TP-CC-CV] is based on extensions to BFD (see Section 4.3.) with thesame concepts asadditional limitation that thePWE3 ACHtransmission andVCCV mechanisms. However, to addressreceiving rates are based on configuration by theneedsoperator. The on-demand tool [OnDemand-CV] is an adaptation ofLSPs as differentiated from PW, the following concepts were definedLSP Ping (see Section 4.4.) for[G-ACh]: o An Associated Channel Header (ACH), that uses a format similar tothePW Control Word, is a 4-byte headerrequired behavior of MPLS-TP. 4.5.4.2. Route Tracing [MPLS-TP-OAM] defines thatis prepended to OAM packets. o A Generic Associated Label (GAL). The GALthere is areserved MPLS label value (13) that indicatesneed for functionality that would allow a path end-point to identify thepacket is an ACH packetintermediate and end- points of thepayload follows immediately after the label stack. 3.4.3. MPLS-TP OAM Toolset To addresspath. This function would be used in on-demand mode. Normally, this path will be used for bidirectional PW, LSP, and sections, however, unidirectional paths may be supported only if a return path exists. The tool for this is based on the LSP Ping (see Section 4.4.) functionalitythatand isrequireddescribed in [OnDemand-CV]. 4.5.4.3. Lock Instruct The Lock Instruct function [Lock-Loop] is used to notify a transport path end-point of an administrative need to disable the transport path. This functionality will generally be used in conjunction with some intrusive OAMtoolset,function, e.g. Performance measurement, Diagnostic testing, to minimize theMPLS WG conductedside-effect on user data traffic. 4.5.4.4. Lock Reporting Lock Reporting is a function used by ananalysisend-point of a path to report to its far-end end-point that a lock condition has been affected on theexisting IETF and ITU-T OAM mechanisms and their abilitypath. 4.5.4.5. Alarm Reporting Alarm Reporting [TP-Fault] provides the means tofulfillsuppress alarms following detection of defect conditions at therequired functionality. The conclusionsserver sub-layer. Alarm reporting is used by an intermediate point ofthis analysis are documented in [OAM-Analys]. The MPLS working group currently plans to useamixture of OAM mechanismspath, thatare basedbecomes aware of a fault onvarious existing standards, and adapt themthe path, to report to therequirements of [MPLS-TP-OAM]. Someend-points of themain building blocks ofpath. [TP-OAM-FW] states that thissolution are based on: o Bidirectional Forwarding Detection ([BFD], [BFD-LSP]) for proactive continuity check and connectivity verification. o LSP Pingmay occur asdefined in [LSP-Ping] for on-demand connectivity verification. o New protocol packets, using G-ACH, to address different functionality. o Performance measurement protocolsa result of a defect condition discovered at a server sub-layer. This generates an Alarm Indication Signal (AIS) thatare based oncontinues until thefunctionality thatfault isdescribed in [ITU-T-Y1731].cleared. Thefollowing sub-sections describe the OAM tools defined for MPLS-TP as describedconsequent action of this function is detailed in [TP-OAM-FW].3.4.3.1. Continuity Check and Connectivity Verification Continuity Check and Connectivity Verification are presented in Section 2.2.5. of4.5.4.6. Remote Defect Indication Remote Defect Indication (RDI) is used proactively by a path end- point to report to its peer end-point that a defect is detected on a bidirectional connection between them. [MPLS-TP-OAM] points out that thisdocument. As presented there, these toolsfunction may beused either proactively or on-demand. When using these tools proactively, they are generally used in tandem. For MPLS-TPapplied to a unidirectional LSP only if thereare two distinct tools, the proactive toola return path exists. [TP-OAM-FW] points out that this function isdefined in [TP-CC-CV] whileassociated with theon-demand toolproactive CC-V function. 4.5.4.7. Client Failure Indication Client Failure Indication (CFI) is defined in[OnDemand-CV].Proactively[MPLS-TP-OAM]states that the function shouldto allow theMEPspropagation information from one edge of the network tomonitortheliveness and connectivity ofother. The information concerns atransport path. In on-demand mode, this function shoulddefect to a client, in the case that the client does not support alarm notification. 4.5.4.8. Performance Monitoring The definition of MPLS performance monitoringbetweenwas motivated by theMEPs and,MPLS-TP requirements [MPLS-TP-OAM], but was defined generically for MPLS inaddition, between[MPLS-LM-DM]. An additional document [TP-LM-DM] defines aMEP and MIP. [TP-OAM-FW] highlights, when performing Connectivity Verification, the needperformance monitoring profile forthe CC-V messagesMPLS-TP. 4.5.4.8.1. Packet Loss Measurement (LM) Packet Loss Measurement is a function used toinclude unique identificationverify the quality of theMEG that is being monitoredservice. Packet loss, as defined in [IPPM-1LM] and [MPLS-TP-OAM], indicates theMEP that originatedratio of themessage. The proactive tool [TP-CC-CV] is based on extensionsnumber of user packets lost toBFD (see Section 3.2. ) with the additional limitation thatthetransmission and receiving ratestotal number of user packets sent during a defined time interval. There are two possible ways of determining this measurement: o Using OAM packets, it is possible to compute the statistics based onconfiguration bya series of OAM packets. This, however, has theoperator. The on-demand tool [OnDemand-CV] is an adaptationdisadvantage of being artificial, and may not be representative since part ofLSP Ping (see Section 3.3. ) fortherequired behaviorpacket loss may be dependent upon packet sizes and upon the implementation ofMPLS-TP. 3.4.3.2. Route Tracing [MPLS-TP-OAM] definesthe MEPs thatthere is a needtake part in the protocol. o Sending delimiting messages forfunctionality that would allowthe start and end of apath end-point to identifymeasurement period during which theintermediatesource andend- pointssink of thepath. This function would be used in on-demand mode. Normally, thispathwill be used for bidirectional PW, LSP,count the packets transmitted andsections, however, unidirectional paths mayreceived. After the end delimiter, the ratio would besupported only if a returncalculated by the pathexists. The tool for thisOAM entity. 4.5.4.8.2. Packet Delay Measurement (DM) Packet Delay Measurement isbased on the LSP Ping (see Section 3.3. ) functionality and is described in [OnDemand-CV]. 3.4.3.3. Lock Instruct The Lock Instructa function[Lock-Loop]that is used tonotifymeasure one- way or two-way delay of atransport path end-pointpacket transmission between a pair ofan administrative need to disable the transport path. This functionality will generally be used in conjunction with some intrusive OAM function, e.g. Performance measurement, Diagnostic testing, to minimizetheside-effect on user data traffic. 3.4.3.4. Lock Reporting Lock Reporting is a function used by an end-pointend-points of a pathto report to its far-end end-point that a lock condition has been affected on the path. 3.4.3.5. Alarm Reporting Alarm Reporting(PW, LSP, or Section). Where: o One-way packet delay, as defined in [IPPM-1DM], isa function used by an intermediate pointthe time elapsed from the start ofa path, that becomes awaretransmission ofa fault onthepath, to report tofirst bit of theend-pointspacket by a source node until the reception of thepath. [TP-OAM-FW] stateslast bit of thatthis may occurpacket by the destination node. o Two-way packet delay, asa resultdefined in [IPPM-2DM], is the time elapsed from the start of transmission of the first bit of the packet by adefect condition discovered at a server sub-layer. This generates an Alarm Indication Signal (AIS) that continuessource node until thefaultreception of the last bit of the loop-backed packet by the same source node, when the loopback iscleared. The consequent actionperformed at the packet's destination node. For each ofthisthese two metrics, the DM functionis detailed in [TP-OAM-FW]. 3.4.3.6. Remote Defect Indication Remote Defect Indication (RDI) is used proactively by a path end- pointallows the MEP toreport to its peer end-point that a defectmeasure the delay, as well as the delay variation. Delay measurement isdetected on a bidirectional connectionperformed by exchanging timestamped OAM packets betweenthem. [MPLS-TP-OAM] points out that this function may be applied to a unidirectional LSP only if there a return path exists. [TP-OAM-FW] points out that this function is associated withtheproactive CC-V function. 3.4.3.7. Client Failure Indication Client Failure Indication (CFI) isparticipating MEPs. 4.6. Pseudowire OAM 4.6.1. Pseudowire OAM using Virtual Circuit Connectivity Verification (VCCV) VCCV, as defined in[MPLS-TP-OAM][VCCV], provides a means for end-to-end fault detection and diagnostics tools toallow the propagation information from one edgebe extended for PWs (regardless of thenetwork to the other.underlying tunneling technology). Theinformation concerns a defect toVCCV switching function provides aclient,control channel associated with each PW. [VCCV] defines three Control Channel (CC) types, i.e., three possible methods for transmitting and identifying OAM messages: o CC Type 1: In-band VCCV, as described inthe case that the client does not support alarm notification. 3.4.3.8. Packet Loss Measurement (LM) Packet Loss Measurement[VCCV], isa function usedalso referred toverify the quality ofas "PWE3 Control Word with 0001b as first nibble". It uses theservice. This function indicatesPW Associated Channel Header [PW-ACH]. o CC Type 2: Out-of-band VCCV [VCCV], is also referred to as "MPLS Router Alert Label". In this case theratio of packets that are not delivered out of all packets that are transmittedcontrol channel is created by using thepath source. There are two possible ways of determining this measurement:MPLS router alert label [RFC3032] immediately above the PW label. oUsing OAM packets, itCC Type 3: TTL expiry VCCV [VCCV], ispossiblealso referred tocompute the statistics based on a series of OAM packets. This, however, hasas "MPLS PW Label with TTL == 1", i.e., thedisadvantage of being artificial, and may not be representative since partcontrol channel is identified when the value of thepacket loss may be dependent upon packet sizes. o Sending delimiting messages forTTL field in thestart and end of a measurement period during whichPW label is set to 1. VCCV currently supports thesourcefollowing OAM mechanisms: ICMP Ping, LSP Ping, andsinkBFD. ICMP and LSP Ping are IP encapsulated before being sent over the PW ACH. BFD for VCCV [BFD-VCCV] supports two modes of encapsulation - either IP/UDP encapsulated (with IP/UDP header) or PW-ACH encapsulated (with no IP/UDP header) and provides support to signal thepath countAC status. The use of thepackets transmitted and received. AfterVCCV control channel provides theend delimiter,context, based on theratio would be calculated byMPLS-PW label, required to bind and bootstrap thepath OAM entity. 3.4.3.9. Packet Delay Measurement (DM) Packet Delay Measurement isBFD session to afunction that is usedparticular pseudo wire (FEC), eliminating the need tomeasure one- way or two-way delayexchange Discriminator values. VCCV consists ofa packet transmission between a pairtwo components: (1) signaled component to communicate VCCV capabilities as part of VC label, and (2) switching component to cause theend-points ofPW payload to be treated as apath (PW, LSP, or Section). Where: o One-way packet delaycontrol packet. VCCV is not directly dependent upon thetime elapsed from the startpresence oftransmissiona control plane. The VCCV capability negotiation may be performed as part of thefirst bitPW signaling when LDP is used. In case of manual configuration of thepacketPW, it is the responsibility of the operator to set consistent options at both ends. The manual option was created specifically to handle MPLS-TP use cases where no control plane was a requirement. However, new use cases such as pure mobile backhaul find this functionality useful too. 4.6.2. Pseudowire OAM using G-ACh As mentioned above, VCCV enables OAM for PWs by using asource node untilcontrol channel for OAM packets. When PWs are used in MPLS-TP networks, rather than thereceptioncontrol channels defined in VCCV, the G-ACh can be used as an alternative control channel. The usage of the G-ACh for PWs is defined in [PW-G-ACh]. 4.6.3. Attachment Circuit - Pseudowire Mapping The PWE3 working group has defined a mapping and notification of defect states between a pseudowire (PW) and the Attachment Circuits (ACs) of the end-to-end emulated service. This mapping is of key importance to the end-to-end functionality. Specifically, the mapping is provided by [PW-MAP], by [L2TP-EC] for L2TPv3 pseudowires, and Section 5.3 of [ATM-L2] for ATM. 4.7. OWAMP and TWAMP 4.7.1. Overview The IPPM working group in the IETF defines common criteria and metrics for measuring performance of IP traffic ([IPPM-FW]). Some of the key RFCs published by this working group have defined metrics for measuring connectivity [IPPM-Con], delay ([IPPM-1DM], [IPPM-2DM]), and packet loss [IPPM-1LM]. It should be noted that the work of the IETF in the context of performance metrics is not limited to IP networks; [PM-CONS] presents general guidelines for considering new performance metrics. The IPPM working group has defined not only metrics for performance measurement, but also protocols that define how the measurement is carried out. The One-way Active Measurement Protocol [OWAMP] and the Two-Way Active Measurement Protocol [TWAMP] define a method and protocol for measuring performance metrics in IP networks. OWAMP [OWAMP] enables measurement of one-way characteristics of IP networks, such as one-way packet loss and one-way delay. For its proper operation OWAMP requires accurate time of day setting at its end points. TWAMP [TWAMP] is a similar protocol that enables measurement of both one-way and two-way (round trip) characteristics. OWAMP and TWAMP are both comprised of two separate protocols: o OWAMP-Control/TWAMP-Control: used to initiate, start, and stop test sessions and to fetch their results. Continuity Check and Connectivity Verification are tested and confirmed by establishing the OWAMP/TWAMP Control Protocol TCP connection. o OWAMP-Test/TWAMP-Test: used to exchange test packets between two measurement nodes. Enables the loss and delay measurement functions, as well as detection of other anomalies, such as packet duplication and packet reordering. It should be noted that while [OWAMP] and [TWAMP] define tools for performance measurement, they do not define the accuracy of these tools. The accuracy depends on scale, implementation and network configurations. Alternative protocols for performance monitoring are defined, for example, in MPLS-TP OAM ([MPLS-LM-DM], [TP-LM-DM]), and in Ethernet OAM [ITU-T-Y1731]. 4.7.2. Control and Test Protocols OWAMP and TWAMP control protocols run over TCP, while the test protocols run over UDP. The purpose of the control protocols is to initiate, start, and stop test sessions, and for OWAMP to fetch results. The test protocols introduce test packets (which contain sequence numbers and timestamps) along the IP path under test according to a schedule, and record statistics of packet arrival. Multiple sessions may be simultaneously defined, each with a session identifier, and defining the number of packets to be sent, the amount of padding to be added (and thus the packet size), the start time, and the send schedule (which can be either a constant time between test packets or exponentially distributed pseudo-random). Statistics recorded conform to the relevant IPPM RFCs. OWAMP and TWAMP test traffic is designed with security in mind. Test packets are hard to detect because they are simply UDP streams between negotiated port numbers, with potentially nothing static in the packets. OWAMP and TWAMP also include optional authentication and encryption for both control and test packets. 4.7.3. OWAMP OWAMP defines the following logical roles: Session-Sender, Session- Receiver, Server, Control-Client, and Fetch-Client. The Session- Sender originates test traffic that is received by the Session- Receiver. The Server configures and manages the session, as well as returning the results. The Control-Client initiates requests for test sessions, triggers their start, and may trigger their termination. The Fetch-Client requests the results of a completed session. Multiple roles may be combined in a single host - for example, one host may play the roles of Control-Client, Fetch-Client, and Session-Sender, and a second playing the roles of Server and Session-Receiver. In a typical OWAMP session the Control-Client establishes a TCP connection to port 861 of the Server, which responds with a server greeting message indicating supported security/integrity modes. The Control-Client responds with the chosen communications mode and the Server accepts the modes. The Control-Client then requests and fully describes a test session to which the Server responds with its acceptance and supporting information. More than one test session may be requested with additional messages. The Control-Client then starts a test session and the Server acknowledges. The Session- Sender then sends test packets with pseudorandom padding to the Session-Receiver until the session is complete or until the Control- client stops the session. Once finished, the Fetch-Client sends a fetch request to the server, which responds with an acknowledgement and immediately thereafter the result data. 4.7.4. TWAMP TWAMP defines the following logical roles: session-sender, session- reflector, server, and control-client. These are similar to the OWAMP roles, except that the Session-Reflector does not collect any packet information, and there is no need for a Fetch-Client. In a typical TWAMP session the Control-Client establishes a TCP connection to port 862 of the Server, and mode is negotiated as in OWAMP. The Control-Client then requests sessions and starts them. The Session-Sender sends test packets with pseudorandom padding to the Session-Reflector which returns them with insertion of timestamps. 4.8. TRILL The requirements of OAM in TRILL are defined in [TRILL-OAM]. The main challenge in TRILL OAM is that traffic between RBridges RB1 and RB2 may be forwarded through more than one path. Thus, an OAM protocol between RBridges RB1 and RB2 must be able to monitor all the available paths between the two RBridge. During the writing of this document the detailed definition of the TRILL OAM tools are still work in progress. This subsection presents the main requirements of TRILL OAM. The main requirements defined in [TRILL-OAM] are: o Continuity Checking (CC) - the TRILL OAM protocol must support a function for CC between any two RBridges RB1 and RB2. o Connectivity Verification (CV) - connectivity between two RBridges RB1 and RB2 can be verified on a per-flow basis. o Path Tracing - allows an RBridge to trace all the available paths to a peer RBridge. o Performance monitoring - allows an RBridge to monitor the packet loss and packet delay to a peer RBridge. 4.9. Summary of OAM Mechanisms This subsection provides a short summary of each of the OAM mechanism categories described in this document. A detailed list of the RFCs related to each category is given in Appendix A.1. +-----------+------------------------------------------+------------+ | Category | Description | Transport | | | | Technology | +-----------+------------------------------------------+------------+ |IP Ping | Ping ([IntHost], [NetTerms]) is a simple | IPv4/IPv6 | | | application for testing reachability that| | | | uses ICMP Echo messages ([ICMPv4], | | | | [ICMPv6]). | | +-----------+------------------------------------------+------------+ |IP | Traceroute ([TCPIP-Tools], [NetTools]) is| IPv4/IPv6 | |Traceroute | an application that allows users to trace| | | | the path between an IP source and an IP | | | | destination, i.e., to identify the nodes | | | | along the path. If more than one path | | | | exists between the source and destination| | | | Traceroute traces *a* path. The most | | | | common implementation of Traceroute | | | | uses UDP probe messages, although there | | | | are other implementations that use | | | | different probes, such as ICMP or TCP. | | +-----------+------------------------------------------+------------+ |BFD | Bidirectional Forwarding Detection (BFD) | generic | | | is defined in [BFD] as a framework for a | | | | lightweight generic OAM mechanism. The | | | | intention is to define a base mechanism | | | | that can be used with various | | | | encapsulation types, network | | | | environments, and in various medium | | | | types. | | +-----------+------------------------------------------+------------+ |MPLS OAM | MPLS LSP Ping, as defined in [MPLS-OAM], | MPLS | | | [MPLS-OAM-FW] and [LSP-Ping], is an OAM | | | | mechanism for point-to-point and | | | | point-to-multipoint MLPS LSPs. | | | | It includes two main functions: Ping and | | | | Traceroute. | | | | It is noted that while this category | | | | focuses on LSP Ping, other OAM mechanisms| | | | can be used in MPLS networks, e.g., BFD. | | +-----------+------------------------------------------+------------+ |MPLS-TP OAM| MPLS-TP OAM is defined in a set of RFCs. | MPLS-TP | | | The OAM requirements for MPLS Transport | | | | Profile (MPLS-TP) are defined in | | | | [MPLS-TP-OAM]. Each of the tools in the | | | | OAM toolset is defined in its own RFC, as| | | | specified in Section A.1. | | +-----------+------------------------------------------+------------+ |Pseudowire | The PWE3 OAM architecture defines control| Pseudowire | |OAM | channels that support the use of existing| | | | IETF OAM tools to be used for a pseudo- | | | | wire (PW). The control channels that are| | | | defined in [VCCV] and [PW-G-ACh] may be | | | | used in conjunction with ICMP Ping, LSP | | | | Ping, and BFD to perform CC and CV | | | | functionality. In addition the channels | | | | support use of any of the MPLS-TP based | | | | OAM tools for completing their respective| | | | OAM functionality for a PW. | | +-----------+------------------------------------------+------------+ |OWAMP and | The One Way Active Measurement Protocol | IPv4/IPv6 | |TWAMP | (OWAMP) and the Two Way Active Measure- | | | | ment Protocols (TWAMP) are two protocols | | | | defined in the IP Performance Metrics | | | | (IPPM) working group in the IETF. These | | | | protocols allow various performance | | | | metrics to be measured, such as packet | | | | loss, delay and delay variation, | | | | duplication and reordering. | | +-----------+------------------------------------------+------------+ |TRILL OAM | The requirements of OAM in TRILL are | TRILL | | | defined in [TRILL-OAM]. These | | | | requirements include continuity checking,| | | | connectivity verification, path tracing | | | | and performance monitoring. During the | | | | writing of this document the detailed | | | | definition of the TRILL OAM tools | | | | is work in progress. | | +-----------+------------------------------------------+------------+ Table 3 Summary of OAM-related IETF Mechanisms 4.10. Summary of OAM Functions Table 4 summarizes the OAM functions that are supported in each of the categories that were analyzed in this section. The columns of this tables are the typical OAM functions described in Section 1.3. +-----------+-------+--------+--------+-------+----------+ | |Continu|Connecti|Path |Perform|Other | | |ity |vity |Discover|ance |Function | | |Check |Verifica|y |Monitor|s | | Category | |tion | |ing | | +-----------+-------+--------+--------+-------+----------+ |IP Ping |Echo | | | | | + --------- + ----- + ------ + ------ + ----- + -------- + |IP | | |Tracerou| | | |Traceroute | | |te | | | + --------- + ----- + ------ + ------ + ----- + -------- + |BFD |BFD |BFD | | |RDI usi- | | |Control|Control | | |ng BFD | | |/ Echo | | | |Control | + --------- + ----- + ------ + ------ + ----- + -------- + |MPLS OAM | |"Ping" |"Tracero| | | |(LSP Ping) | |mode |ute" | | | | | | |mode | | | + --------- + ----- + ------ + ------ + ----- + -------- + |MPLS-TP |CC |CV/pro- |Route |-LM |-Diagnos- | |OAM | |active |Tracing |-DM | tic Test | | | |or on- | | |-Lock | | | |demand | | |-Alarm | | | | | | |Reporting | | | | | | |-Client | | | | | | |Failure | | | | | | |Indication| | | | | | |-RDI | + --------- + ----- + ------ + ------ + ----- + -------- + |Pseudowire |BFD |-BFD |LSP-Ping| | | |OAM | |-ICMP | | | | | | | Ping | | | | | | |-LSP- | | | | | | | Ping | | | | + --------- + ----- + ------ + ------ + ----- + -------- + |OWAMP and | - control | |-Delay | | |TWAMP | protocol | | measur| | | | | | ement | | | | | |-Packet| | | | | | loss | | | | | | measur| | | | | | ement | | + --------- + ----- + ------ + ------ + ----- + -------- + |TRILL OAM |CC |CV |Path |-Delay | | | | | |tracing | measur| | | | | | | ement | | | | | | |-Packet| | | | | | | loss | | | | | | | measur| | | | | | | ement | | +-----------+-------+--------+--------+-------+----------+ Table 4 Summary of thelast bitOAM Functionality in IETF OAM Mechanisms 5. Security Considerations This memo presents an overview ofthat packet byexisting OAM mechanisms, and proposes no new OAM mechanisms. Therefore, this document introduces no security considerations. However, thedestination node. o Two-way packet delayOAM mechanism reviewed in this document can and do present security issues. The reader is encouraged to review thetime elapsed from the start of transmission of the first bitSecurity Considerations section ofthe packeteach document referenced bya source node until the reception of the last bit of the loop-backed packetthis memo. 6. IANA Considerations There are no new IANA considerations implied bythe same source node, when the loopback is performed at the packet's destination node. Similarly to the packet loss measurementthiscould be performed in eitherdocument. 7. Acknowledgments The authors gratefully acknowledge Sasha Vainshtein, Carlos Pignataro, David Harrington, Dan Romascanu, Ron Bonica and other members of the OPSAWG mailing list for their helpful comments. This document was prepared using 2-Word-v2.0.template.dot. 8. References 8.1. Informative References [LSP-Ping] Kompella, K., Swallow, G., "Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures", RFC 4379, February 2006. [MPLS-OAM] Nadeau, T., Morrow, M., Swallow, G., Allan, D., Matsushima, S., "Operations and Management (OAM) Requirements for Multi-Protocol Label Switched (MPLS) Networks", RFC 4377, February 2006. [MPLS-OAM-FW] Allan, D., Nadeau, T., "A Framework for Multi-Protocol Label Switching (MPLS) Operations and Management (OAM)", RFC 4378, February 2006. [OAM-Label] Ohta, H., "Assignment of thetwo ways outlined above. 3.5. PWE3 OAM 3.5.1. PWE3'OAM Alert Label' for Multiprotocol Label Switching Architecture (MPLS) Operation and Maintenance (OAM) Functions", RFC 3429, November 2002. [MPLS-TP-OAM] Vigoureux, M., Ward, D., Betts, M., "Requirements for OAMusingin MPLS Transport Networks", RFC 5860, May 2010. [G-ACh] Bocci, M., Vigoureux, M., Bryant, S., "MPLS Generic Associated Channel", RFC 5586, June 2009. [VCCV] Nadeau, T., Pignataro, C., "Pseudowire Virtual Circuit Connectivity Verification(VCCV) VCCV, as defined in [VCCV], provides a means(VCCV): A Control Channel forend-to-end fault detection and diagnostics tools to be extendedPseudowires", RFC 5085, December 2007. [PW-ACH] Bryant, S., Swallow, G., Martini, L., McPherson, D., "Pseudowire Emulation Edge-to-Edge (PWE3) Control Word forPWs (regardless of the underlying tunneling technology). The VCCV switching function provides a control channel associated with each PW (based on the PW Associated Channel Header (ACH) which is defined in [PW-ACH]), and allows transmitting the OAM packets in-band with PW data (using CC Type 1: In-band VCCV). VCCV currently supports the following OAM mechanisms: ICMP Ping, LSP Ping, and BFD. ICMPUse over an MPLS PSN", RFC 4385, February 2006. [ATM-L2] Singh, S., Townsley, M., andLSP Ping are IP encapsulated before being sentC. Pignataro, "Asynchronous Transfer Mode (ATM) overthe PW ACH. BFD for VCCV [BFD-VCCV] supports two modes of encapsulation - either IP/UDP encapsulated (with IP/UDP header) or PW-ACH encapsulated (with no IP/UDP header)Layer 2 Tunneling Protocol Version 3 (L2TPv3)", RFC 4454, May 2006. [L2TP-EC] McGill, N. and C. Pignataro, "Layer 2 Tunneling Protocol Version 3 (L2TPv3) Extended Circuit Status Values", RFC 5641, August 2009. [PW-MAP] Aissaoui, M., Busschbach, P., Martini, L., Morrow, M., Nadeau, T., andprovides support to signal the AC status. The use of the VCCV control channel provides the context, based on the MPLS-PW label, required to bindY(J). Stein, "Pseudowire (PW) Operations, Administration, andbootstrap the BFD session to a particular pseudo wire (FEC), eliminating the need to exchange Discriminator values. VCCV consists of two components: (1) signaled component to communicate VCCV capabilities as part of VC label,Maintenance (OAM) Message Mapping", RFC 6310, July 2011. [ICMPv4] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792, September 1981. [ICMPv6] Conta, A., Deering, S., and(2) switching component to cause the PW payload to be treated as a control packet. VCCV is not directly dependent upon the presence of a control plane. The VCCV capability negotiation may be performed as part of the PW signaling when LDP is used. In case of manual configuration of the PW, it isM. Gupta, "Internet Control Message Protocol (ICMPv6) for theresponsibilityInternet Protocol Version 6 (IPv6) Specification", RFC 4443, March 2006. [IntHost] Braden, R., "Requirements for Internet Hosts -- Communication Layers", RFC 1122, October 1989. [NetTerms] Jacobsen, O., Lynch, D., "A Glossary ofthe operator to set consistent options at both ends. 3.5.2. PWE3 OAM using G-ACh As mentioned above, VCCV enables OAMNetworking Terms", RFC 1208, March 1991. [MPLS-P2MP] Yasukawa, S., Farrel, A., King, D., Nadeau, T., "Operations and Management (OAM) Requirements for Point-to-Multipoint MPLS Networks", RFC 4687, September 2006. [ICMP-Ext] Bonica, R., Gan, D., Tappan, D., Pignataro, C., "ICMP Extensions for Multiprotocol Label Switching", RFC 4950, August 2007. [ICMP-MP] Bonica, R., Gan, D., Tappan, D., Pignataro, C., "Extended ICMP to Support Multi-Part Messages", RFC 4884, April 2007. [ICMP-Int] Atlas, A., Bonica, R., Pignataro, C., Shen, N., Rivers, JR., "Extending ICMP forPWs by usingInterface and Next-Hop Identification", RFC 5837, April 2010. [TCPIP-Tools] Kessler, G., Shepard, S., "A Primer On Internet and TCP/IP Tools and Utilities", RFC 2151, June 1997. [NetTools] Enger, R., Reynolds, J., "FYI on acontrol channel for OAM packets. When PWs are used in MPLS-TP networks, rather than the control channels defined in VCCV, the G-ACh can be used as an alternative control channel. The usage of the G-AChNetwork Management Tool Catalog: Tools forPWs is defined in [PW-G-ACh]. 3.6. OWAMPMonitoring andTWAMP 3.6.1. Overview The IPPM working group in the IETF defines common criteriaDebugging TCP/IP Internets andmetricsInterconnected Devices", RFC 1470, June 1993. [IPPM-FW] Paxson, V., Almes, G., Mahdavi, J., and Mathis, M., "Framework formeasuring performance ofIPtraffic ([IPPM-FW]). Some of the key RFCs published by this working group have defined metricsPerformance Metrics", RFC 2330, May 1998. [IPPM-Con] Mahdavi, J., Paxson, V., "IPPM Metrics formeasuring connectivity [IPPM-Con], delay ([IPPM-1DM], [IPPM-2DM]), and packet loss [IPPM-1LM]. Alternative protocolsMeasuring Connectivity", RFC 2678, September 1999. [IPPM-1DM] Almes, G., Kalidindi, S., Zekauskas, M., "A One-way Delay Metric forperformance measurement are defined,IPPM", RFC 2679, September 1999. [IPPM-1LM] Almes, G., Kalidindi, S., Zekauskas, M., "A One-way Packet Loss Metric forexample, in MPLS-TP OAM ([MPLS-LM-DM], [TP-LM-DM]), and in Ethernet OAM [ITU-T-Y1731]. The IPPM working group has defined not only metricsIPPM", RFC 2680, September 1999. [IPPM-2DM] Almes, G., Kalidindi, S., Zekauskas, M., "A Round-trip Delay Metric for IPPM", RFC 2681, September 1999. [PM-CONS] Clark, A. and B. Claise, "Guidelines forperformance measurement, but also protocols that define how the measurement is carried out. TheConsidering New Performance Metric Development", BCP 170, RFC 6390, October 2011. [OWAMP] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and Zekauskas, M., "A One-way Active Measurement Protocol[OWAMP](OWAMP)", RFC 4656, September 2006. [TWAMP] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., andtheBabiarz, J., "A Two-Way Active Measurement Protocol[TWAMP] define a method(TWAMP)", RFC 5357, October 2008. [Reorder] Morton, A., Ciavattone, L., Ramachandran, G., Shalunov, S., andprotocolJ. Perser, "Packet Reordering Metrics", RFC 4737, November 2006. [Dup] Uijterwaal, H., "A One-Way Packet Duplication Metric", RFC 5560, May 2009. [BFD] Katz, D., Ward, D., "Bidirectional Forwarding Detection (BFD)", RFC 5880, June 2010. [BFD-IP] Katz, D., Ward, D., "Bidirectional Forwarding Detection (BFD) formeasuring delay and packet loss in IP networks. OWAMP [OWAMP] enables measurement of one-way characteristics of IP networks, such as one-way packet loss and one-way delay. For its proper operation OWAMP requires accurate time of day setting at its end points. TWAMP [TWAMP] is a similar protocol that enables measurement of two- way (round trip) characteristics. TWAMP does not require accurate time of day, and, furthermore, allows the use of a simple session reflector, making it an attractive alternative to OWAMP. OWAMP and TWAMP use two separate protocols: a Control plane protocol, and a Test plane protocol. 3.6.2. Control and Test Protocols OWAMPIPv4 andTWAMP control protocols run over TCP, while the test protocols run over UDP. The purposeIPv6 (Single Hop)", RFC 5881, June 2010. [BFD-Gen] Katz, D., Ward, D., "Generic Application of Bidirectional Forwarding Detection (BFD)", RFC 5882, June 2010. [BFD-Multi] Katz, D., Ward, D., "Bidirectional Forwarding Detection (BFD) for Multihop Paths", RFC 5883, June 2010. [BFD-LSP] Aggarwal, R., Kompella, K., Nadeau, T., and Swallow, G., "Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)", RFC 5884, June 2010. [BFD-VCCV] Nadeau, T., Pignataro, C., "Bidirectional Forwarding Detection (BFD) for thecontrol protocols is to initiate, start,Pseudowire Virtual Circuit Connectivity Verification (VCCV)", RFC 5885, June 2010. [TP-OAM-FW] Busi, I., Allan, D., "Operations, Administration andstop test sessions,Maintenance Framework for MPLS-based Transport Networks ", RFC 6371, September 2011. [TP-CC-CV] Allan, D., Swallow, G., Drake, J., "Proactive Connectivity Verification, Continuity Check and Remote Defect indication forOWAMP to fetch results. The test protocols introduce test packets (which contain sequence numbersMPLS Transport Profile", RFC 6428, November 2011. [OnDemand-CV] Gray, E., Bahadur, N., Boutros, S., Aggarwal, R. "MPLS On-Demand Connectivity Verification andtimestamps) along the IP path under test according to a schedule,Route Tracing", RFC 6426, November 2011. [MPLS-LM-DM] Frost, D., Bryant, S., "Packet Loss andrecord statistics of packet arrival. Multiple sessions may be simultaneously defined, each with a session identifier,Delay Measurement for MPLS Networks", RFC 6374, September 2011. [TP-LM-DM] Frost, D., Bryant, S., "A Packet Loss anddefining the number of packets to be sent, the amount of padding to be added (and thus the packet size), the start time,Delay Measurement Profile for MPLS-Based Transport Networks", RFC 6375, September 2011. [TP-Fault] Swallow, G., Fulignoli, A., Vigoureux, M., Boutros, S., "MPLS Fault Management Operations, Administration, andthe send schedule (which can be eitherMaintenance (OAM)", RFC 6427, November 2011. [Lock-Loop] Boutros, S., Sivabalan, S., Aggarwal, R., Vigoureux, M., Dai, X., "MPLS Transport Profile Lock Instruct and Loopback Functions", RFC 6435, November 2011. [ITU-T-CT] Betts, M., "Allocation of aconstant time between test packets or exponentially distributed pseudo-random). Statistics recorded conform to the relevant IPPM RFCs. OWAMPGeneric Associated Channel Type for ITU-T MPLS Transport Profile Operation, Maintenance, andTWAMP test traffic is designed with security in mind. Test packets are hard to detect because they are simply UDP streams between negotiated port numbers, with potentially nothing staticAdministration (MPLS-TP OAM)", RFC 6671, November 2012. [PW-Map] M. Aissaoui, P. Busschbach, L. Martini, M. Morrow, T. Nadeau, "Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping", RFC 6310, July 2011. [PW-G-ACh] Li, H., Martini, L., He, J., Huang, F., "Using the Generic Associated Channel Label for Pseudowire in thepackets. OWAMP and TWAMP also include optional authentication and encryptionMPLS Transport Profile (MPLS-TP)", RFC 6423, November 2011. [OAM-Def] Andersson, L., Van Helvoort, H., Bonica, R., Romascanu, D., Mansfield, S., "Guidelines forboth control and test packets. 3.6.3. OWAMP OWAMP definesthefollowing logical roles: Session-Sender, Session- Receiver, Server, Control-Client, and Fetch-Client. The Session- Sender originates test traffic that is received byuse of theSession- Receiver. The Server configures and managesOAM acronym in thesession, as well as returningIETF ", RFC 6291, June 2011. [OAM-Analys] Sprecher, N., Fang, L., "An Overview of theresults. The Control-Client initiates requestsOAM Tool Set fortest sessions, triggers their start, and may trigger their termination. The Fetch-Client requestsMPLS based Transport Networks", RFC 6669, July 2012. [TP-Term] Van Helvoort, H., Andersson, L., Sprecher, N., "A Thesaurus for the Terminology used in Multiprotocol Label Switching Transport Profile (MPLS-TP) drafts/RFCs and ITU-T's Transport Network Recommendations", work-in-progress, draft-ietf-mpls- tp-rosetta-stone, July 2012. [Cont] Dugal, D., Pignataro, C., Dunn, R., "Protecting theresultsRouter Control Plane", RFC 6192, March 2011. [Mng] Farrel, A., "Inclusion ofa completed session. Multiple roles may be combinedManageability Sections ina single host -Path Computation Element (PCE) Working Group Drafts", RFC 6123, February 2011. [TRILL-OAM] Senevirathne, T., Bond, D., Aldrin, S., Li, Y., Watve, R., "Requirements forexample, one host may play the rolesOperations, Administration, and Maintenance (OAM) in Transparent Interconnection ofControl-Client, Fetch-Client,Lots of Links (TRILL)", RFC 6905, March 2013. [IEEE802.1Q] IEEE 802.1Q, "IEEE Standard for Local andSession-Sender,metropolitan area networks - Media Access Control (MAC) Bridges anda second playing the roles of ServerVirtual Bridged Local Area Networks", October 2012. [ITU-T-Y1731] ITU-T Recommendation G.8013/Y.1731, "OAM Functions andSession-Receiver. In a typical OWAMP session the Control-Client establishes a TCP connection to port 861 of the Server, which responds with a server greeting message indicating supported security/integrity modes. The Control-Client respondsMechanisms for Ethernet-based Networks", July 2011. [ITU-T-Y1711] ITU-T Recommendation Y.1711, "Operation & Maintenance mechanism for MPLS networks", February 2004. [IEEE802.3ah] IEEE 802.3, "IEEE Standard for Information technology - Local and metropolitan area networks - Carrier sense multiple access withthe chosen communications modecollision detection (CSMA/CD) access method andthe Server accepts the modes. The Control-Client then requestsphysical layer specifications", clause 57, December 2008. [ITU-T-G.806] ITU-T Recommendation G.806, "Characteristics of transport equipment - Description methodology andfully describes a test session to which the Server responds with its acceptancegeneric functionality", January 2009. [ITU-G8113.2] ITU-T Recommendation G.8113.2/Y.1372.2, "Operations, administration andsupporting information. More than one test session may be requested with additional messages. The Control-Client then starts a test sessionmaintenance mechanisms for MPLS-TP networks using the tools defined for MPLS", November 2012. [ITU-G8113.1] ITU-T Recommendation G.8113.1/Y.1372.1, "Operations, Administration and Maintenance mechanism for MPLS-TP in Packet Transport Network (PTN)", November 2012. Appendix A. List of OAM Documents A.1. List of IETF OAM Documents Table 5 summarizes theServer acknowledges. The Session- Sender then sends test packets with pseudorandom padding to the Session-Receiver untilOAM related RFCs published by thesessionIETF. It iscompleteimportant to note that the table lists various RFCs that are different by nature. For example, some of these documents define OAM tools oruntilOAM protocols (or both), while others define protocols that are not strictly OAM-related, but are used by OAM tools. The table also includes memos that define theControl- client stopsrequirements or thesession. Once finished,framework of OAM in theFetch-Client sendscontext of afetch requestspecific transport technology, or describe how to use existing OAM tools in a new transport technology. The RFCs in theserver, which responds with an acknowledgement and immediately thereafter the result data. 3.6.4. TWAMP TWAMP definestable are categorized in a few sets as defined in Section 1.3. +-----------+--------------------------------------+----------+ | Category | Title | RFC | +-----------+--------------------------------------+----------+ |IP Ping | Requirements for Internet Hosts -- | RFC 1122 | | | Communication Layers [IntHost] | | | +--------------------------------------+----------+ | | A Glossary of Networking Terms | RFC 1208 | | | [NetTerms] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 792 | | | [ICMPv4] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 4443 | | | (ICMPv6) for thefollowing logical roles: session-sender, session- reflector, server,Internet Protocol | | | | Version 6 (IPv6) Specification | | | | [ICMPv6] | | +-----------+--------------------------------------+----------+ |IP | A Primer On Internet and TCP/IP | RFC 2151 | |Traceroute | Tools andcontrol-client. These are similar to the OWAMP roles, except that the Session-Reflector does not collect any packet information,Utilities [TCPIP-Tools] | | | +--------------------------------------+----------+ | | FYI on a Network Management Tool | RFC 1470 | | | Catalog: Tools for Monitoring andthere is no need| | | | Debugging TCP/IP Internets and | | | | Interconnected Devices [NetTools] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 792 | | | [ICMPv4] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 4443 | | | (ICMPv6) fora Fetch-Client. In a typical TWAMP sessiontheControl-Client establishes a TCP connectionInternet Protocol | | | | Version 6 (IPv6) Specification | | | | [ICMPv6] | | | +--------------------------------------+----------+ | | Extended ICMP toport 862 of the Server,Support Multi-Part | RFC 4884 | | | Messages [ICMP-MP] | | | +--------------------------------------+----------+ | | Extending ICMP for Interface andmode is negotiated as in OWAMP. The Control-Client then requests sessions| RFC 5837 | | | Next-Hop Identification [ICMP-Int] | | +-----------+--------------------------------------+----------+ |BFD | Bidirectional Forwarding Detection | RFC 5880 | | | [BFD] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5881 | | | (BFD) for IPv4 andstarts them. The Session-Sender sends test packets with pseudorandom padding to the Session-Reflector which returns them with insertion of timestamps. 3.7. Summary of OAM Functions Table 3 summarizes the OAM functions that are supported in each of the categories that were analyzed in this section. +-----------+-------+--------+--------+-----------+-------+--------+IPv6 (Single Hop) | | | | [BFD-IP] | |Standard |Continu|Connecti|Path |Defect |Perform|Other| +--------------------------------------+----------+ ||ity |vity |Discover|Indications|ance |Function|||Check |Verifica|yGeneric Application of Bidirectional ||Monitor|sRFC 5882 | | ||tionForwarding Detection [BFD-Gen] | ||ing| +--------------------------------------+----------+ |+-----------+-------+--------+--------+-----------+-------+--------+ |IP Ping||EchoBidirectional Forwarding Detection | RFC 5883 | | | (BFD) for Multihop Paths [BFD-Multi] |+ --------- + ----- + ------ + ------ + --------- + ----- + ------ + |IP| ||Tracerou|+--------------------------------------+----------+ | | Bidirectional Forwarding Detection ||TracerouteRFC 5884 | ||te| for MPLS Label Switched Paths (LSPs) | | |+ --------- + ----- + ------ + ------ + --------- + ----- + ------ + |BFD |BFD |BFD| [BFD-LSP] | | | +--------------------------------------+----------+ | ||Control|EchoBidirectional Forwarding Detection | RFC 5885 | | | for the Pseudowire Virtual Circuit |+ --------- + ----- + ------ + ------ + --------- + ----- + ------ + |MPLS OAM||"Ping" |"Tracero|| | Connectivity Verification (VCCV) | ||(LSP Ping)||mode |ute"| [BFD-VCCV] | | +-----------+--------------------------------------+----------+ |MPLS OAM | Operations and Management (OAM) | RFC 4377 | ||mode| Requirements for Multi-Protocol Label| | | |+ --------- + ----- + ------ + ------ + --------- + ----- + ------ + |MPLS-TP |CC |CV/pro- |Route |-Alarm |-LM |-Diagnos| |OAMSwitched (MPLS) Networks [MPLS-OAM] ||active |Tracing|Reporting |-DM|tic Tes|+--------------------------------------+----------+ | ||or on-A Framework for Multi-Protocol ||-ClientRFC 4378 | | | Label Switching (MPLS) Operations | |t| | and Management (OAM) [MPLS-OAM-FW] ||demand| |Failure+--------------------------------------+----------+ ||-Lock| Detecting Multi-Protocol Label | RFC 4379 | | | Switched (MPLS) Data Plane Failures | |Indication|| | [LSP-Ping] | | | +--------------------------------------+----------+ ||-Remote| Operations and Management (OAM) | RFC 4687 | | | Requirements for Point-to-Multipoint | | |Defect| MPLS Networks [MPLS-P2MP] | | | +--------------------------------------+----------+ | | ICMP Extensions for Multiprotocol | RFC 4950 |Indication|| |+ --------- + ----- + ------ + ------ + --------- + ----- + ------ + |PWE3 OAM |BFD |-BFD |LSP-Ping|Label Switching [ICMP-Ext] | | +-----------+--------------------------------------+----------+ |MPLS-TP | Requirements for OAM in MPLS-TP | RFC 5860 ||-ICMP|OAM | [MPLS-TP-OAM] | | | +--------------------------------------+----------+ | | MPLS Generic Associated Channel | RFC 5586 |Ping| | [G-ACh] | | | +--------------------------------------+----------+ | ||-LSP-MPLS-TP OAM Framework | RFC 6371 | | | [TP-OAM-FW] | | | +--------------------------------------+----------+ |Ping| Proactive Connectivity Verification, | RFC 6428 | | |+ --------- + ----- + ------ + ------ + --------- + ----- + ------ + |OWAMPContinuity Check, and Remote Defect | | | ||-Delay | | |TWAMPIndication for the MPLS Transport | | | | Profile [TP-CC-CV] |measur|| | +--------------------------------------+----------+ | | MPLS On-Demand Connectivity | RFC 6426 | |ement| Verification and Route Tracing | | | | [OnDemand-CV] | ||-Packet|| +--------------------------------------+----------+ | | MPLS Fault Management Operations, | RFC 6427 | | |lossAdministration, and Maintenance (OAM)| | | | [TP-Fault] | | | +--------------------------------------+----------+ | |measur|MPLS Transport Profile Lock Instruct | RFC 6435 | | | and Loopback Functions [Lock-Loop] | | |ement+--------------------------------------+----------+ | |+-----------+-------+--------+--------+-----------+-------+--------+ Table 3 Summary of OAM Functions 4. Security Considerations This memo presents an overview of existing OAM mechanisms, and proposes no new OAM mechanisms. Therefore, this document introduces no security considerations. However, the OAM mechanism reviewed in this document can and do present security issues. The reader is encouraged to review the Security Considerations section of each document reference by this memo. 5. IANA Considerations There are no new IANA considerations implied by this document. 6. Acknowledgments The authors gratefully acknowledge Sasha Vainshtein, Carlos Pignataro, David Harrington, Dan Romascanu, Ron Bonica and other members of the OPSAWG mailing list for their helpful comments. This document was prepared using 2-Word-v2.0.template.dot. 7. References 7.1. Normative References [LSP-Ping] Kompella, K., Swallow, G., "Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures", RFC 4379, February 2006. [MPLS-OAM] Nadeau, T., Morrow, M., Swallow, G., Allan, D., Matsushima, S., "Operations and Management (OAM) Requirements for Multi-Protocol Label Switched (MPLS) Networks", RFC 4377, February 2006. [MPLS-OAM-FW] Allan, D., Nadeau, T., "A Framework for Multi-Protocol Label Switching (MPLS) OperationsPacket Loss andManagement (OAM)",Delay Measurement for| RFC4378, February 2006. [OAM-Label] Ohta, H., "Assignment of the 'OAM Alert Label' for Multiprotocol Label Switching Architecture (MPLS) Operation6374 | | | MPLS Networks [MPLS-LM-DM] | | | +--------------------------------------+----------+ | | A Packet Loss andMaintenance (OAM) Functions",Delay Measurement | RFC3429, November 2002. [MPLS-TP-OAM] Vigoureux, M., Ward, D., Betts, M., "Requirements6375 | | | Profile forOAM in MPLSMPLS-Based TransportNetworks", RFC 5860, May 2010. [G-ACh] Bocci, M., Vigoureux, M., Bryant, S., "MPLS Generic Associated Channel", RFC 5586, June 2009. [VCCV] Nadeau, T., Pignataro, C., "Pseudowire| | | | Networks [TP-LM-DM] | | +-----------+--------------------------------------+----------+ |Pseudowire | Pseudowire Virtual Circuit | RFC 5085 | |OAM | Connectivity Verification (VCCV): | | | | A Control Channel forPseudowires", RFC 5085, December 2007. [PW-ACH] Bryant, S., Swallow, G., Martini, L., McPherson, D., "Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for Use over an MPLS PSN", RFC 4385, February 2006. [ICMPv4] Postel, J., "Internet Control Message Protocol", STD 5,Pseudowires | | | | [VCCV] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC792, September 1981. [ICMPv6] Conta, A., Deering, S., and M. Gupta, "Internet Control Message Protocol (ICMPv6)5885 | | | for theInternet Protocol Version 6 (IPv6) Specification", RFC 4443, March 2006. [MPLS-P2MP] Yasukawa, S., Farrel, A., King, D., Nadeau, T., "Operations and Management (OAM) Requirements for Point-to-Multipoint MPLS Networks", RFC 4687, September 2006. [ICMP-Ext] Bonica, R., Gan, D., Tappan, D., Pignataro, C., "ICMP Extensions for Multiprotocol Label Switching", RFC 4950, August 2007. [ICMP-MP] Bonica, R., Gan, D., Tappan, D., Pignataro, C., "Extended ICMP to Support Multi-Part Messages",Pseudowire Virtual Circuit | | | | Connectivity Verification (VCCV) | | | | [BFD-VCCV] | | | +--------------------------------------+----------+ | | Using the Generic Associated Channel | RFC4884, April 2007. [ICMP-Int] Atlas, A., Bonica, R., Pignataro, C., Shen, N., Rivers, JR., "Extending ICMP6423 | | | Label forInterface and Next-Hop Identification",Pseudowire in the MPLS | | | | Transport Profile (MPLS-TP) | | | | [PW-G-ACh] | | | +--------------------------------------+----------+ | | Pseudowire (PW) Operations, | RFC5837, April 2010. [TCPIP-Tools] Kessler, G., Shepard, S., "A Primer On Internet6310 | | | Administration, andTCP/IP ToolsMaintenance (OAM)| | | | Message Mapping [PW-Map] | | +-----------+--------------------------------------+----------+ |OWAMP andUtilities",| A One-way Active Measurement Protocol| RFC2151, June 1997. [NetTools] Stine, R., "FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices",4656 | |TWAMP | [OWAMP] | | | +--------------------------------------+----------+ | | A Two-Way Active Measurement Protocol| RFC1147, April 1990. [IPPM-FW] Paxson, V., Almes, G., Mahdavi, J., and Mathis, M., "Framework5357 | | | [TWAMP] | | | +--------------------------------------+----------+ | | Framework for IP PerformanceMetrics",Metrics | RFC2330, May 1998. [IPPM-Con] Mahdavi, J., Paxson, V., "IPPM2330 | | | [IPPM-FW] | | | +--------------------------------------+----------+ | | IPPM Metrics for MeasuringConnectivity",| RFC2678, September 1999. [IPPM-1DM] Almes, G., Kalidindi, S., Zekauskas, M., "A2678 | | | Connectivity [IPPM-Con] | | | +--------------------------------------+----------+ | | A One-way Delay Metric forIPPM",IPPM | RFC2679, September 1999. [IPPM-1LM] Almes, G., Kalidindi, S., Zekauskas, M., "A2679 | | | [IPPM-1DM] | | | +--------------------------------------+----------+ | | A One-way Packet Loss Metric forIPPM",IPPM| RFC2680, September 1999. [IPPM-2DM] Almes, G., Kalidindi, S., Zekauskas, M., "A2680 | | | [IPPM-1LM] | | | +--------------------------------------+----------+ | | A Round-trip Delay Metric forIPPM", RFC 2681, September 1999. [OWAMP] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and Zekauskas, M., "A One-way Active Measurement Protocol (OWAMP)",IPPM | RFC4656, September 2006. [TWAMP] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., and Babiarz, J., "A Two-Way Active Measurement Protocol (TWAMP)",2681 | | | [IPPM-2DM] | | | +--------------------------------------+----------+ | | Packet Reordering Metrics | RFC5357, October 2008. [BFD] Katz, D., Ward, D., "Bidirectional Forwarding Detection (BFD)",4737 | | | [Reorder] | | | +--------------------------------------+----------+ | | A One-Way Packet Duplication Metric | RFC5880, June 2010. [BFD-IP] Katz, D., Ward, D., "Bidirectional Forwarding Detection (BFD)5560 | | | [Dup] | | +-----------+--------------------------------------+----------+ |TRILL OAM | Requirements forIPv4 and IPv6 (Single Hop)",Operations, | RFC5881, June 2010. [BFD-Gen] Katz, D., Ward, D., "Generic Application6905 | | | Administration, and Maintenance (OAM)| | | | in Transparent Interconnection ofBidirectional Forwarding Detection (BFD)", RFC 5882, June 2010. [BFD-Multi] Katz, D., Ward, D., "Bidirectional Forwarding Detection (BFD)| | | | Lots of Links (TRILL) | | +-----------+--------------------------------------+----------+ Table 5 Summary of IETF OAM Related RFCs A.2. List of Selected Non-IETF OAM Documents In addition to the OAM mechanisms defined by the IETF, the IEEE and ITU-T have also defined various OAM mechanisms that focus on Ethernet, and various other transport network environments. These various mechanisms, defined by the three standard organizations, are often tightly coupled, and have had a mutual effect on each other. The ITU-T and IETF have both defined OAM mechanisms for MPLS LSPs, [ITU-T-Y1711] and [LSP-Ping]. The following OAM standards by the IEEE and ITU-T are to some extent linked to IETF OAM mechanisms listed above and are mentioned here only as reference material: o OAM mechanisms forMultihop Paths", RFC 5883, June 2010. [BFD-LSP] Aggarwal, R., Kompella, K., Nadeau, T.,Layer 2 have been defined by the ITU-T in [ITU-T-Y1731], andSwallow, G., "Bidirectional Forwarding Detection (BFD)by the IEEE in 802.1ag [IEEE802.1Q] . The IEEE 802.3 standard defines OAM for one-hop Ethernet links [IEEE802.3ah]. o The ITU-T has defined OAM for MPLSLabel Switched Paths (LSPs)", RFC 5884, June 2010. [BFD-VCCV] Nadeau, T., Pignataro, C., "Bidirectional Forwarding Detection (BFD)LSPs in [ITU-T-Y1711], and MPLS-TP OAM in [ITU-G8113.1] and [ITU-G8113.2]. It should be noted that these non-IETF documents deal in many cases with OAM functions below the IP layer (Layer 2, Layer 2.5) and in some cases operators use a multi-layered OAM approach, which is a function of the way their networks are designed. Table 6 summarizes some of the main OAM standards published by non- IETF standard organizations. This document focuses on IETF OAM standards, but these non-IETF standards are referenced in this document where relevant. +-----------+--------------------------------------+---------------+ | | Title |Standard/Draft | +-----------+--------------------------------------+---------------+ |ITU-T | Operation & Maintenance mechanism | ITU-T Y.1711 | |MPLS OAM | for MPLS networks [ITU-T-Y1711] | | | +--------------------------------------+---------------+ | | Assignment of thePseudowire Virtual Circuit Connectivity Verification (VCCV)",'OAM Alert Label' | RFC5885, June 2010. [TP-OAM-FW] Busi, I., Allan, D., "Operations, Administration3429 | | | for Multiprotocol Label Switching | | | | Architecture (MPLS) Operation and | | | | Maintenance (OAM) Functions | | | | [OAM-Label] | | | | | | | | Note: although this is an IETF | | | | document, it is listed as one of the| | | | non-IETF OAM standards, since it | | | | was defined as a complementary part | | | | of ITU-T Y.1711. | | +-----------+--------------------------------------+---------------+ |ITU-T | Operations, administration and |ITU-T G.8113.2 | |MPLS-TP OAM| MaintenanceFramework for MPLS-based Transport Networks ", RFC 6371, September 2011. [TP-CC-CV] Allan, D., Swallow, G., Drake, J., "Proactive Connectivity Verification, Continuity Check and Remote Defect indicationmechanisms forMPLS Transport Profile", RFC 6428, November 2011. [OnDemand-CV] Gray, E., Bahadur, N., Boutros, S., Aggarwal, R. "MPLS On-Demand Connectivity Verification and Route Tracing", RFC 6426, November 2011. [MPLS-LM-DM] Frost, D., Bryant, S., "Packet Loss and Delay MeasurementMPLS-TP | | | | networks using the tools defined for | | | | MPLSNetworks", RFC 6374, September 2011. [TP-LM-DM] Frost, D., Bryant, S., "A Packet Loss and Delay Measurement Profile[ITU-G8113.2] | | | | | | | | Note: this document describes the | | | | OAM toolset defined by the IETF forMPLS-Based Transport Networks", RFC 6375, September 2011. [TP-Fault] Swallow, G., Fulignoli, A., Vigoureux, M., Boutros, S., "MPLS Fault Management| | | | MPLS-TP, whereas ITU-T G.8113.1 | | | | describes the OAM toolset defined | | | | by the ITU-T. | | | +--------------------------------------+---------------+ | | Operations,Administration,Administration and |ITU-T G.8113.1 | | | Maintenance(OAM)", RFC 6427, November 2011. [Lock-Loop] Boutros, S., Sivabalan, S., Aggarwal, R., Vigoureux, M., Dai, X., "MPLSmechanism for MPLS-TP in | | | | Packet TransportProfile Lock Instruct and Loopback Functions", RFC 6435, November 2011. [ITU-T-CT] Betts, M., "AllocationNetwork (PTN) | | | +--------------------------------------+---------------+ | | Allocation of a Generic Associated | RFC 6671 | | | Channel Type for ITU-T MPLSTransportTransport| | | | Profile Operation, Maintenance, and | | | | Administration (MPLS-TPOAM)", RFC 6671, November 2012. [PW-Map] M. Aissaoui, P. Busschbach, L. Martini, M. Morrow, T. Nadeau, "Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping", RFC 6310, July 2011. [PW-G-ACh] Li, H., Martini, L., He, J., Huang, F., "Using the Generic Associated Channel Label for Pseudowire in the MPLS Transport Profile (MPLS-TP)", RFC 6423, November 2011. 7.2. Informative References [OAM-Def] Andersson, L., Van Helvoort, H., Bonica, R., Romascanu, D., Mansfield, S., "Guidelines for the useOAM) | | | | [ITU-T-CT] | | | | | | | | Note: although this is an IETF | | | | document, it is listed as one ofthethe| | | | non-IETF OAMacronym in the IETF ", RFC 6291, June 2011. [OAM-Analys] Sprecher, N., Fang, L., "An Overviewstandards, since it | | | | was defined as a complementary part | | | | oftheITU-T G.8113.1. | | +-----------+--------------------------------------+---------------+ |ITU-T | OAMTool Set for MPLS based Transport Networks", RFC 6669, July 2012. [TP-Term] Van Helvoort, H., Andersson, L., Sprecher, N., "A Thesaurus for the Terminology used in Multiprotocol Label Switching Transport Profile (MPLS-TP) drafts/RFCsFunctions andITU-T's Transport Network Recommendations", work-in-progress, draft-ietf-mpls- tp-rosetta-stone, July 2012. [IEEE802.1ag]Mechanisms for | ITU-T Y.1731 | |Ethernet | Ethernet-based Networks | | |OAM | [ITU-T-Y1731] | | +-----------+--------------------------------------+---------------+ |IEEE | Connectivity Fault Management | IEEE 802.1ag | |CFM | [IEEE802.1Q] | | | | | | | | Note: CFM was originally published | | | | as IEEE802.1Q, "IEEE Standard for Local802.1ag, but is now | | | | incorporated in the 802.1Q standard.| | +-----------+--------------------------------------+---------------+ |IEEE | Management of Data Driven andmetropolitan area networks -Data | IEEE 802.1ag | |DDCFM | Dependent Connectivity Faults | | | | [IEEE802.1Q] | | | | | | | | Note: DDCFM was originally published| | | | as IEEE 802.1Qaw, but is now | | | | incorporated in the 802.1Q standard.| | +-----------+--------------------------------------+---------------+ |IEEE | Media Access Control(MAC) Bridges and Virtual Bridged Local Area Networks", October 2012. [ITU-T-Y1731] ITU-T Recommendation G.8013/Y.1731, "OAM FunctionsParameters, | IEEE 802.3ah | |802.3 | Physical Layers, andMechanisms for Ethernet-based Networks", July 2011. [ITU-T-Y1711] ITU-T Recommendation Y.1711, "Operation & Maintenance mechanismManagement | | |link level | Parameters forMPLS networks", February 2004.Subscriber Access | | |OAM | Networks [IEEE802.3ah] | | | | | | | | Note: link level OAM was originally | | | | defined in IEEE802.3, "IEEE Standard for Information technology - Local and metropolitan area networks - Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications", clause 57, December 2008. [ITU-T-G.806] ITU-T Recommendation G.806, "Characteristics of transport equipment - Description methodology and generic functionality", January 2009. [ITU-G8113.2] ITU-T Recommendation G.8113.2/Y.1372.2, "Operations, administration802.3ah, andmaintenance mechanisms for MPLS-TP networks usingis now | | | | incorporated in thetools defined for MPLS", November 2012. [ITU-G8113.1] ITU-T Recommendation G.8113.1/Y.1372.1, "Operations, Administration and Maintenance mechanism for MPLS-TP802.3 standard. | | +-----------+--------------------------------------+---------------+ Table 6 Non-IETF OAM Standards Mentioned inPacket Transport Network (PTN)", November 2012.this Document Authors' Addresses Tal Mizrahi Marvell 6 Hamada St. Yokneam, 20692 Israel Email: talmi@marvell.com Nurit Sprecher Nokia Siemens Networks 3 Hanagar St. Neve Ne'eman B Hod Hasharon, 45241 Israel Email: nurit.sprecher@nsn.com Elisa Bellagamba Ericsson 6 Farogatan St. Stockholm, 164 40 Sweden Phone: +46 761440785 Email: elisa.bellagamba@ericsson.com Yaacov Weingarten 34 Hagefen St. Karnei Shomron, 4485500 Israel Email: wyaacov@gmail.com