One document matched: draft-ww-opsawg-multi-layer-oam-01.xml


<?xml version="1.0" encoding="UTF-8"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<rfc category="info" docName="draft-ww-opsawg-multi-layer-oam-01.txt"
     ipr="trust200902">
  <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>

  <?rfc toc="yes" ?>

  <?rfc symrefs="yes" ?>

  <?rfc sortrefs="yes"?>

  <?rfc iprnotified="no" ?>

  <?rfc strict="yes" ?>

  <front>
    <title abbrev="Multi-Layer OAM">Problem Statement and Architecture for
    Transport-Independent Multiple Layer OAM</title>

    <author fullname="Qin Wu" initials="Q." surname="Wu">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>

          <city>Nanjing</city>

          <region>Jiangsu</region>

          <code>210012</code>

          <country>China</country>
        </postal>

        <email>bill.wu@huawei.com</email>
      </address>
    </author>

    <author fullname="Mishael Wexler" initials="M." surname="Wexler">
      <organization>Huawei</organization>

      <address>
        <postal>
          <street>Riesstr. 25</street>

          <region>Munich</region>

          <code>80992</code>

          <country>Germany</country>
        </postal>

        <email>mishael.wexler@huawei.com</email>
      </address>
    </author>

    <author fullname="Mohamed Boucadair" initials="M" surname="Boucadair">
      <organization>France Telecom</organization>

      <address>
        <postal>
          <street>Rennes 35000</street>

          <country>France</country>
        </postal>

        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>

    <author fullname="Sam Aldrin" initials="S." surname="Aldrin">
      <organization abbrev="Huawei USA">Huawei Technologies USA</organization>

      <address>
        <postal>
          <street>2330 Central Expressway</street>

          <city>NSanta Clara</city>

          <region>CA</region>

          <code>95051</code>

          <country>USA</country>
        </postal>

        <email>aldrin.ietf@gmail.com</email>
      </address>
    </author>

    <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
      <organization>Ericsson</organization>

      <address>
        <email>gregory.mirsky@ericsson.com</email>
      </address>
    </author>

    <author fullname="Pradeep Jain" initials="P." surname="Jain">
      <organization>Nuage Networks</organization>

      <address>
        <postal>
          <street>755 Ravendale Drive</street>

          <city>Mountain View</city>

          <region>CA</region>

          <code>94043</code>

          <country>USA</country>
        </postal>

        <email>pradeep@nuagenetworks.net</email>
      </address>
    </author>

    <date year="2014"/>

    <area>RTG</area>

    <workgroup>Operations and Management Area Working Group</workgroup>

    <keyword>RFC</keyword>

    <keyword>Request for Comments</keyword>

    <keyword>I-D</keyword>

    <keyword>Internet-Draft</keyword>

    <keyword>Multi-Layer OAM, Transport Independent</keyword>

    <abstract>
      <t>Operations, Administration, and Maintenance (OAM) mechanismsare
      critical building blocks in network operations that are used for service
      assurance, fulfillment, or service diagnosis, troubleshooting, and
      repair. The current practice is that many technologies rely on their own
      OAM protocols that are exclusive to a given layer. There is little
      consolidation of OAM in either data plane or management plane nor
      well-documented inter-layer OAM operations. Vendors and Operators
      dedicate significant resources and effort through the whole OAM
      life-cycle each time when a new technology is (to be) introduced. This
      is even exacerbated when dealing with integration of OAM across multiple
      technologies.</t>

      <t>This document describes the problem space and defines an architecture
      for the generic and integrated OAM with a focus of multi-layer and
      cross-layer considerations.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>Operations, Administration, and Maintenance (OAM) mechanisms being
      understood and used in context of RFC 6291 [RFC6291] are critical
      building blocks in network operations that are used for service
      assurance, fulfillment, or service diagnosis, troubleshooting, and
      repair. The key foundations of OAM and its functional roles in
      monitoring and diagnosing the behavior of networks have been studied at
      OSI layers 1, 2 and 3 since a while. As a reminder, OAM functions are
      used in many management applications for various objectives such as (i)
      failure detection, (ii) reporting the defect/ failure information, (iii)
      defect/failure localization, (iv) performance monitoring, and (v)
      service recovery. </t>

      <t>The current practice that consists in enabling OAM techniques for
      each layer has shown its limits; this is a need for cross-layer and
      inter-layer OAM considerations [RFC7276]. This need for inter-layer OAM
      is motivated by the need to achieve: network optimization, efficient
      enforcement of TE (Traffic Engineering) techniques including ensuring
      path diversity at distinct layers or computing completely disjoint paths
      at several layers, fine-grain tweaking, ease of root cause analysis,
      ability to maintain a network-wise visibility in addition to
      layer-specific one, etc. </t>

      <t>It is worth to mention also that there are two restrictions for
      multi-layer structure as discussed in [RFC7276]: <list style="symbols">
          <t>Each layer has its own OAM protocol, OAM should not cross layer
          boundaries.</t>

          <t>Each layer OAM used at different level of hierarchy in the
          network.</t>
        </list></t>

      <t>Moreover, there is little consolidation of OAM in either data plane
      or management plane. Vendors and operators dedicate a lot resources and
      effort through the whole OAM life-cycle each time a new technology is
      (to be) introduced. Integration of OAM across multiple technologies in
      either data plane or management plane is extremely difficult to
      achieve.</t>

      <t>When operating networks with more than one technology, maintenance
      and troubleshooting are achieved per technology and per layer, operation
      process can be very cumbersome since OAM is not defined to cross layer
      boundaries. Another challenge is presented by use of different
      technologies and corresponding OAM on the same layer of adjacent network
      domains. Interworking between different OAM often not defined and are
      left to proprietary solutions. In many cases when keeping network
      complexity down and simplifying OAM is needed, it is desirable to have a
      generic and integrated OAM to cover heterogeneous networking
      technologies. </t>

      <t>This document defines the problem space and describes an architecture
      for the generic and integrated OAM in the multi-layer and multi-domain
      networks. In particular, it outlines the problems encountered with
      existing OAM protocols and their impact on introduction of new
      technologies (see Section 3). </t>

      <t>This document covers the following:<list style="symbols">
          <t>Data plane OAM consolidation by looking at the common active OAM
          functions (including, Connectivity Verification (CV), Path
          Verification and Continuity Checks (CC), Path Discovery, Performance
          Measurement) necessary to monitor and diagnose a network; </t>

          <t>Management plane consolidation by interacting with data plane OAM
          and abstracting OAM information common to different layer via
          uniformed interface.</t>
        </list></t>
    </section>

    <section title="Terminology">
      <t>This document defines the following terms:<list style="hanging">
          <t hangText="Transport Independent Multi-Layer OAM :"><vspace
          blankLines="1"/>In an multi-layer network, transport independent OAM
          is OAM that can be deployed independent of media, data protocols,
          and routing protocols It denotes the ability to exchange OAM
          information across layers and domains between nodes along forwarding
          path, and gather OAM information that are common to different layers
          and expose it to the management application through a unified
          interface. These aspects are not specific to a given transport
          technology. </t>

          <t hangText="OAM function :"><vspace blankLines="1"/>Refers to the
          atomic building blocks of OAM; an OAM function defines an OAM
          capability (See section 2.2.3 of [RFC7276]).</t>

          <t hangText="OAM protocol :"><vspace blankLines="1"/>Refers to a
          protocol used for implementing one or more OAM functions (See
          section 2.2.3 of [RFC7276]).</t>

          <t hangText="OAM tool :"><vspace blankLines="1"/>Denotes a specific
          means of applying one or more OAM functions. An OAM protocol can be
          an OAM tool. An OAM tool can use a set of OAM protocols or a set of
          protocols that are not strictly OAM related (See section 2.2.3 of
          [RFC7276]).</t>

          <t hangText="OAM packet :"><vspace blankLines="1"/>Refers to a
          packet generated at Maintenance Point using an OAM protocol. An OAM
          packet, which carries OAM information, is usually forwarded through
          the same route/path as the data traffic and receive the same
          (forwarding) treatment.</t>

          <t hangText="Maintenance Domain (MD):"><vspace
          blankLines="1"/>Refers to the part of a network whereOAM function is
          performed (initiated).</t>

          <t hangText="Maintenance Point (MP):"><vspace blankLines="1"/>Is a
          generic functional entity that is associated with a particular MD,
          defined at a specific layer of a network and can initiate and/or
          react to OAM packets.</t>

          <t hangText="Maintenance Endpoint (MEP):"><vspace blankLines="1"/>Is
          an endpoint MP that initiates OAM packets and responds to them.</t>

          <t hangText="Maintenance Intermediary Point(MIP):"><vspace
          blankLines="1"/>In between MEPs, there are zero or more intermediate
          points, called Maintenance Intermediary Point. A Maintenance
          Intermediary Point (MIP) is an intermediate MP that does not
          generally initiate OAM packets but is able to respond to OAM packets
          that are destined to it. </t>

          <t hangText="Network Element (NE) :"><vspace blankLines="1"/>Denotes
          a physical or virtual network device/function that connects directly
          to the network. NE can host MPs and provide network connectivity to
          one or many MPs.</t>
        </list></t>

      <section title="Acronyms and Abbreviations">
        <t><list>
            <t>CC - Continuity Check</t>

            <t>CV - Connectivity Verification</t>

            <t>SNMP - Simple Network Management Protocol</t>

            <t>NETCONF - Network Configuration</t>

            <t>ETH - Ethernet</t>

            <t>APS - Automatic Protection Switching</t>

            <t>LT - LinkTrace</t>

            <t>RDI - Remote Defect Indication</t>

            <t>AIS - Alarm indication Signal</t>

            <t>OWAMP - One Way Active Measurement Protocol</t>

            <t>TWAMP - Two Way Active Measurement Protocol</t>

            <t>CFM - Connectivity Fault Management</t>
          </list></t>
      </section>
    </section>

    <section title="Problem Statement">
      <t>OAM mechanisms are usually oriented toward a single network
      technology or a single layer. Each technology or layer has its best
      suited OAM tools. Some of them providing rich functionality rely on the
      capabilities of one protocol, while the others provide each function
      with a different protocol; In the current situation, there is little, or
      no re-use, of software and hardware for each OAM protocol. </t>

      <t>Integration of OAM across multiple technologies is extremely
      difficult. Vendors and operators waste a lot through the whole OAM
      life-cycle when a new technology is introduced: <list>
          <t>(1) Design and development: For every new protocol there is a
          need to invest in complete life-cycle (i.e.,the design and
          development of data, control and management planes). In some cases,
          even adding a single OAM function requires the above complete
          life-cycle. </t>

          <t>(2) Operation and Maintenance: There is a need to re-train
          operation people for almost every newly introduced technology or
          feature. The above causes a slow time-to-market and a waste of time
          and effort for any new technology and/or OAM function. </t>
        </list></t>

      <t>Specifically, in Service Function Chaining environment, every Service
      Function may operate at a different layer and may use different
      encapsulation and tunneling techniques. When taking into account
      virtualization related technologies, the number of encapsulation and
      tunneling options increase even more. Still, end-to-end service OAM
      mechanisms and information exchanges between Service Functions should be
      provided to operate and maintain the network as a whole. This requires a
      generic toolkit that can provide all necessary tools in context of
      multi-technology, multi-layer, physical and virtual environments. </t>

      <t>A particular problem is how OAM information at different layer is
      made available to a management application for use and learnt via the
      unified management interface. For example, in the case of an multi-
      layer network, OAM information needs to be imposed to the packet and
      injected into the network and at last abstracted from various layers and
      expose them to the management application. </t>

      <section title="Use of Existing Protocols">
        <t>OAM information resides at each layer and may currently be
        exchanged at each network layer in a domain by using various
        encapsulation technologies at the Layer 2 & Layer 3 levels. OAM
        information may be gathered and exported from a domain (for example,
        northbound) using SNMP [RFC3411]or NETCONF/YANG [RFC6241]. </t>

        <t>It is desirable that a solution to the problem described in this
        document does not require the implementation of a new, network-wide
        protocol or introduce a shim layer to carry OAM information. Instead,
        it would be advantageous to make use of an existing protocols or
        functionalities that are commonly implemented and are currently
        deployed in operational networks. This has many benefits in network
        stability, time to deployment, and operator training. </t>

        <t>It is recognized, however, that existing protocols or
        functionalities are unlikely to be immediately suitable to this
        problem space without some protocol extensions. Extending protocols
        must be done with care and with consideration for the stability of
        existing deployments. In extreme cases, when there is a lack of
        functionality, although similar mechanisms exist in other
        technologies, a new protocol can be preferable to a "messy" hack of an
        existing protocol. </t>
      </section>

      <section title="Strong Technology dependency">
        <t>OAM protocols are relying heavily on the specific network
        technology they are associated with. For example, ICMP, LSP Ping are
        using different network technologies but provide the same OAM
        functionality, i.e., Path Discovery. Another example is BFD,LSP Ping
        are using different network technologies but provide the same
        functionality, i.e., Continuity Verification. Figure 1 shows common
        OAM functionalities shared by various existing OAM protocols. </t>

        <figure>
          <artwork>|--------+------------+--------------+--------------+------------+
|        |Continuity  |  Connectivity|    Path      | Performance|
|        |  Check     |  Verification|  Discovery   | Measurement|
+--------+------------+--------------+--------------+------------+
|        |            |              |              |-Delay      |
| ICMP   | Echo(Ping) |  Echo(Ping)  |  Traceroute  |-Loss rough |
|        |            |              |              | measurement|
+--------+------------+--------------+--------------+------------+
|        |            |              |              |            |
| BFD    |  BFD       |   BFD Echo   |              |            |
|        | Control    |              |              |            |
+--------+------------+--------------+--------------+------------+
| LSP    |            |              |              | - Delay    |
| Ping   |            |   Ping       |  Traceroute  | - Packet   |
|        |            |              |              |    Loss    |
+--------+------------+--------------+--------------+------------+
|        |            |              |              | -OWAMP     |
| IPPM   |            |              |              | -TWAMP     |
|        |            |              |              |            |
|--------+------------+--------------+--------------+------------+
| MPLS-TP|            |              |              |            |
| OAM    |     CC     |   CV         |  Traceroute  | -Delay     |
|        |(use of BFD)|(use of BFD)  |              | -Packet    |
|        |            |              |              |   Loss     |
+--------+------------+--------------+--------------+------------+

             Figure 1.Examples of OAM tools</artwork>
        </figure>
      </section>

      <section title="Weakness of Cross-Layer OAM">
        <t>Troubleshooting is cumbersome due to protocol variety and lack of
        multi-layer OAM. Usually OAM messages should not cross layer
        boundaries. Each of the service, network and transport layers
        possesses its well-discernable and native OAM stream. In addition, OAM
        messages should not be leaked outside of a management domain within a
        layer, where a management domain is governed by a single business
        organization. When having networks with more than one technology,
        maintenance and troubleshooting are done per technology and layer.</t>

        <t>These rules could in some cases ease the understanding in which
        technology the operation is done or fault is located. In some cases,
        when one layer OAM fails, it may be desirable to drop down to the
        another layer OAM and issue the corresponding OAM command, using the
        same APIs, if OAM in multiple layers can be supported. However, in
        most cases switching tools and layers in the same operation process is
        cumbersome and not serving the main idea - to find the root cause
        location. It would be very helpful to have a generic mechanisms that
        is end to end basis, allow management application interact with data
        plane OAM and can ping IPv4 host by an IPv6 source or having one tool
        to troubleshoot combined IP, MPLS, Ethernet, GRE and VXLAN network.
        </t>

        <t>In Service Function Chaining environment, it is necessary to
        provide end-to-end OAM across certain or all entities and involving
        many layers. Inter-layer OAM considerations are key in an SFC context
        because problems may occur at the network layer or at the service
        chaining layer. </t>
      </section>

      <section title="Lack of OAM above Layer 3">
        <t>The Layer 2/3 OAM protocols are quite rich in their functionality,
        well defined, standardized and heavily used. In the last years a lot
        of work was conducted to consider maintenance domains and levels in
        order to better handle the issues of technology re-use, smooth
        interoperability and interworking between domains. </t>

        <t>The above mechanisms are not defined for the technologies above
        Layer 3. Therefore, in the SFC environment where a Service Function
        Chaining is composed by a set of Service Functions, but providing an
        end-to-end chain or path from a source to destination in a given order
        [I.D-ietf-sfc- problem- statement], no standard exists as a reference
        for OAM since when the service packets is steered through a set of
        service nodes distributed in the network, each service node may act at
        different layers above layer 3.</t>
      </section>

      <section title="Issues of Abstraction">
        <t>In multi-layer network, OAM functions are enabled at different
        layers and various OAM information needs to be gathered from various
        layers. Without multi-layer OAM in place, it is hard for management
        applications to understand what information at different layers stands
        for. One possible solution to these issues is to abstract the OAM
        information shared across layers, i.e., using the same tool or API to
        activate the OAM functions at different layers and retrieve the
        results. </t>

        <t>The challenge is to abstract in a way that retains as much useful
        information as possible while filtering the data that is not needed to
        be leaked to other layers. An important part of this effort is a clear
        understanding of what information is actually needed.</t>
      </section>

      <section title="Issue of OAM Information Gathering from Layers Covering Heterogeneous Network Technologies">
        <t>In SFC, the service packets are steered through a set of service
        nodes distributed in the network. In the NVO3 network, the data packet
        may also traverse a set of overlay nodes distributed in the network.
        Overlay technologies or other tunneling technologies can be used to
        stitch these service nodes or overlay node in order to form end to end
        path.</t>

        <t>When any overlay Segment or segment of service chain fails to
        deliver user traffic, there is a need to provide a tool that would
        enable users to detect such failures, and a mechanism to isolate
        faults. It may also be desirable to test the data path before mapping
        user traffic to the Overlay Segment or segment of service chain.</t>

        <section title="Focus on Service Function Chaining">
          <t>When the service packets are steered through a set of service
          nodes distributed in the network, each service node may work at
          different layer above layer 3 and may have several SFs collocated
          with itself. When OAM mechanism is applied, it is necessary to allow
          OAM packet To be exchanged between these service nodes or service
          function at different layers. When Service functions that are part
          of the SFC doesn't support OAM capability(e.g., an SFC-unaware
          service function), service node should be responsible for monitoring
          and diagnosing and reporting service availability to the service
          function. It is more desirable to allow a service function register
          with service node. Either service function reports status to service
          node or service node performs live check of the service function.
          </t>

          <t>In addition, service functions usually don't have Layer 2-3
          switching/routing capability and therefore are not aware of any OAM
          function at Layer 2-3. Also when there are no OAM functions at
          service Layers above layer 3, it is hard to identify layer that can
          be used to gather OAM information when it comes to a fault situation
          or degradation of performance. For example, when a data packet is
          transmitted from one service function to another service function
          and the data packet may be lost between two service functions or
          discarded by either of them. Consider when two service functions are
          embedded in (associated with) two different service nodes, how to
          detect the fault between them and how to isolate problem to that
          layer? </t>

          <t>Editor's Note: Section 3.6.1 is too specific. This text can be
          presented as an example to illustrate a problem not a problem per se
          or moved to a use case draft.</t>
        </section>
      </section>
    </section>

    <section title="Architecture Overview">
      <t>Figure 2 shows the reference architecture for Layering OAM. This
      reference architecture assumes that <list style="symbols">
          <t>Any network element can use different technologies and
          corresponding OAM on the same layer at the boundary of two adjacent
          domains</t>

          <t>Any two network element may provide service delivery at different
          layer</t>

          <t>Management entity can manage network devices in more than one
          maintenance domains.</t>
        </list></t>

      <t>In this architecture, three layers are defined:<list>
          <t>M1: "Data Plane layer"</t>

          <t>M2: "Management Plane layer"</t>

          <t>M3: "Service Plane layer"</t>
        </list></t>

      <t>In the M1 layer, a typical network can be partitioned into several
      domains. Each domain has at least two MEPs and none or one to more MIPs.
      MEP is a maintenance functional entity that is implemented into a
      Network Element either at the maintenance domain boundary or in the
      maintenance domain and can generate, send and receive OAM packets. MIP
      is a maintenance functional entity that is implemented into a Network
      Element in the maintenance domain and can forward OAM packets. Either
      MEP or MIP may be at different layer and use various different
      encapsulating protocols. </t>

      <t>The M2 contains the interface which management entity uses to manage
      individual network devices. In this document, we further require
      management entities to use this interface as uniform interface (API and
      or UI) to gather OAM information from MEP and MIP in the network
      devices(either physical or virtual entity) and execute transactions or
      operations on MEP and MIP across domains, layers and vendors. Protocols
      that can be used to manipulate the configuration of a network device
      include SNMP [RFC1157], Command Line Interfaces, NETCONF [RFC6241], and
      other protocols. </t>

      <t>On the M3 layer, there is a uniform interface (API and/or UI) that
      covers all the managed devices and can execute network-wide
      transactions. This layer allows applications and operators to execute
      configuration, monitoring and action tasks across multiple network
      devices, from a mix of domains, layers, vendors. Still the abstraction
      level is that of the network elements themselves, so whatever
      configuration, status, actions and notifications they provide, that is
      what you get here, but without having to worry about the location and
      the protocol to reach the device.</t>

      <t><figure>
          <artwork>    Service                  +-------------------+
---- Plane                   |     Customer      |
  ^  Layer                   +-------------------+
  |
  |                  +-------------+          +-------------+
  V                  |  Management |          |  Management |
 ---Management       |   Entity    |          |   Entity    |
  ^   Plane          +-------------+          +-------------+
  |   Layer
  |
  |
  |     |----------------------------+    +---------------------+
  |     |Maintenance Domain 1        |    |Maintenance Domain 2 |
  |     |                            |    |                     |
  |     |                            |    |                     |
  |   NE|        NE       NE       NE|    |      NE          NE |
  V  +-----+    +-----+  +-----+    +------+     +-----+     +--+--+
---- | MEP +----+ MIP +--| MIP +----|  MEP +-----| MIP +-----+ MEP |
     +-----+    +-----+  +-----+    ++----++     +-----+     +-----+
    Data Plane                       |    |                     |
      Layer                          |    |                     |
        +----------------------------+    +---------------------+

     Figure 2 Architecture for Layering OAM in the management plane</artwork>
        </figure></t>

      <t>An example of service-specific that depicts OAM layers can be found
      in [RFC4176] (L3VPN case).</t>
    </section>

    <section title="Existing Work">
      <t>The following discuss related IETF work and is provided for
      reference. This section is not exhaustive, rather it provides an
      overview of few initiatives focusing on the pain-points of OAM: <list
          style="numbers">
          <t>[I-D.tissa-netmod-oam] is an important work that creates a YANG
          unified data model for OAM that is based on IEEE CFM model. This
          model may be used also for IP OAM functionality. This effort is
          focused on the management plane of OAM and should be complemented by
          an accompanying data-plane and/or control-plane work. It may require
          also some extensions to address wider variety of functions and
          technologies. </t>

          <t>Several contributions conducted in the past years, had tried to
          address new technologies using existing mechanisms.
          [I-D.jain-nvo3-overlay- oam] and MPLS-TP OAM documents are only
          examples for such efforts. </t>
        </list></t>
    </section>

    <section title="Architectural Consideration">
      <section title="Basic Components">
        <section title="Overlay OAM"/>

        <section title="OAM at the top of Layer 3"/>
      </section>

      <section title="OAM Functions in the Data Plane">
        <t>Many OAM functions may require protocol extensions or new protocol
        development to meet the transport requirements. In the existing OAM
        tools, Some of them providing rich functionality in one protocol,the
        other providing each function with a different protocol and each
        technology is developed independently. </t>

        <t>To consolidate OAM in the data plane, the OAM in multi-layer
        Environment is expect to support the following common OAM functions
        used in OAM-related standards. These functions are used as building
        blocks in the data plane OAM standards described in this document.
        </t>

        <section title="Continuity Check">
          <t>This type of mechanisms check that the monitored layer and/or
          entity are alive and providing path from specific point(s) to other
          point(s). Some examples are IP Ping, BFD [RFC5880] and ETH CC. </t>
        </section>

        <section title="Connectivity Verification">
          <t>Verifying that the actual connection is consistent with the
          required connection and no misconnection occurred. Some examples are
          IP Ping, and ETH loopback. </t>
        </section>

        <section title="Path Discovery">
          <t>Used to discover the path that specific service traverses in the
          network. Some examples are LSP Traceroute, IP Traceroute and
          ETH-LT/linktrace. </t>
        </section>

        <section title="Performance Measurement">
          <t>A function that monitors the performance parameters of a network
          entity. Such parameters could be Delay, Delay-variation, loss,
          availability of services and class of services. Examples are
          TWAMP[RFC5357]/ OWAMP[RFC4656] and Y.1731,MPLS Loss and Delay
          Measurement [RFC6374]. </t>
        </section>

        <section title="Protection Switching Coordination">
          <t>A function that is used to signal protection switching states and
          commands. Examples are ETH APS messages and MPLS-TP Protection
          Switching Coordination OAM [RFC6378]. </t>
        </section>

        <section title="Alarm/defect Indication">
          <t>A function that is used to indicate that a failure occurred
          downstream or upstream within a connection/service. Used also to
          trigger fast protection or to suppress alarms. Examples are ETH AIS
          and ETH RDI, MPLS-TP RDI [RFC6428]. </t>
        </section>

        <section title="Maintenance Commands">
          <t> A function that is used to signal a maintenance state or command
          within a connection/service. Examples can be ETH Lockout. </t>
        </section>
      </section>

      <section title="OAM in Management Plane">
        <t>Management systems play an important role in configuring or
        provisioning OAM functionality consistently across all devices in the
        network, and for automating the monitoring and troubleshooting of
        network faults. However OAM is not provision. In general, provisioning
        is used to configure the network to provide new services, whereas OAM
        is used to keep the network in a state that it can support already
        existing services.</t>

        <t>As we know each layer has its own OAM protocols. OAM can be used at
        different levels of hierarchy in the network to form a multi-layer OAM
        solution [RFC7276]. To support multi-layer OAM covering various
        heterogeneous transport technologies, the OAM in the management needs
        to be consolidated as follows: <list style="symbols">
            <t>OAM information needs to be abstracted that are common to
            different layer and different domain.</t>

            <t>Support customized OAM service, e.g., customized service
            diagnose.</t>

            <t>OAM information is provided to management entity from managed
            device via a uniform interface (API and/or UI)</t>

            <t>Sets up MD MEP and MIP in the network provision phase</t>

            <t>Enables basic OAM functionality(e.g., enable the origin of ping
            and trace packets or configure Connectivity Fault Management
            (CFM)) on the managed devices in the service activation phase.</t>
          </list></t>

        <t>The different OAM tools may be used in one of two basic types of
        activation: <list style="symbols">
            <t>Proactive activation - indicates that the tool is activated on
            a continual basis, where messages are sent periodically, and
            errors are detected when a certain number of expected messages are
            not received.</t>

            <t>On-demand activation - indicates that the tool is activated
            "manually" to detect a specific anomaly.</t>
          </list></t>

        <t/>
      </section>
    </section>

    <section title="Building on Existing Protocols"/>

    <section title="Scoping Future Work">
      <t>This section includes a set of candidate items for activities to be
      conducted within IETF.</t>

      <t>These objectives are not frozen; further discussion is required to
      target key issues and scope the work to be conducted within IETF
      accordingly.</t>

      <t>Candidate investigation items are listed below:<list style="symbols">
          <t>Understand and discuss situations where an OAM protocol can be
          tuned and optimized for a specific data plane.</t>

          <t>OAM consolidation in the data plane:<list style="symbols">
              <t>Exchange OAM information at the service layer atop of layer
              3.</t>

              <t>Deployed over various encapsulating protocols, and in various
              medium types</t>
            </list></t>

          <t>OAM consolidation in the management plane:<list style="symbols">
              <t>Abstract OAM information common to different layers.</t>

              <t>Expose OAM information via unified interface to management
              entities, independently of the layer they belong to.</t>

              <t>Discuss how information gathered from various layers can be
              correlated for the sake of network operations optimization
              purposes.</t>

              <t>Propose means to help during service diagnosis; these means
              may rely on filtering information to be leaked to other layers
              so that time recovery can be optimized. A typical example would
              be efficient root cause analysis that is fed with input from
              various layers.</t>

              <t>Propose means that would help to optimize a network as a
              whole instead of the monolithic approach that is specific to a
              given layer. For example, investigate means that would help in
              computing diverse and completely disjoint paths, not only at
              layer 3 but also at the physical layer.</t>
            </list></t>
        </list></t>
    </section>

    <section title="Manageability Considerations"/>

    <section title="Security Considerations">
      <t>Security considerations are not addressed in this problem statement
      only document. Given the scope of OAM, and the implications on data and
      control planes, security considerations are clearly important and will
      be addressed in the specific protocol and deployment documents.</t>
    </section>

    <section title="Acknowledgements">
      <t>The authors would like to thank Romascanu, Dan, Tissa Senevirathne
      for their valuable reviews and suggestions.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <reference anchor="RFC2119">
        <front>
          <title abbrev="RFC Key Words">Key words for use in RFCs to Indicate
          Requirement Levels</title>

          <author fullname="Scott Bradner" initials="S." surname="Bradner">
            <organization>Harvard University</organization>

            <address>
              <postal>
                <street>1350 Mass. Ave.</street>

                <street>Cambridge</street>

                <street>MA 02138</street>
              </postal>

              <phone>- +1 617 495 3864</phone>

              <email>sob@harvard.edu</email>
            </address>
          </author>

          <date month="March" year="1997"/>

          <area>General</area>

          <keyword>keyword</keyword>

          <abstract>
            <t>In many standards track documents several words are used to
            signify the requirements in the specification. These words are
            often capitalized. This document defines these words as they
            should be interpreted in IETF documents. Authors who follow these
            guidelines should incorporate this phrase near the beginning of
            their document: <list>
                <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
                "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
                "OPTIONAL" in this document are to be interpreted as described
                in RFC 2119.</t>
              </list></t>

            <t>Note that the force of these words is modified by the
            requirement level of the document in which they are used.</t>
          </abstract>
        </front>
      </reference>

      <reference anchor="RFC7276">
        <front>
          <title>An Overview of Operations, Administration, and Maintenance
          (OAM) Tools</title>

          <author fullname="T. Mizrahi" initials="T." surname="Mizrahi">
            <organization/>
          </author>

          <author fullname="N. Sprecher" initials="N." surname="Sprecher">
            <organization/>
          </author>

          <date day="10" month="June" year="2014"/>
        </front>

        <seriesInfo name="RFC" value="7276"/>

        <format target="http://tools.ietf.org/html/rfc7276" type="TXT"/>
      </reference>

      <reference anchor="RFC6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the
          IETF</title>

          <author fullname="L. Andersson" initials="L." surname="Andersson">
            <organization/>
          </author>

          <author fullname="H. van Helvoort" initials="H." surname="Helvoort">
            <organization/>
          </author>

          <author fullname="R. Bonica" initials="R." surname="Bonica">
            <organization/>
          </author>

          <author fullname="D. Romascanu" initials="D." surname="Romascanu">
            <organization/>
          </author>

          <author fullname="S. Mansfield" initials="S." surname="Mansfield">
            <organization/>
          </author>

          <date day="10" month="June" year="2011"/>
        </front>

        <seriesInfo name="RFC" value="6291"/>

        <format target="http://tools.ietf.org/html/rfc6291" type="TXT"/>
      </reference>
    </references>

    <references title="Informative References">
      <reference anchor="RFC3411">
        <front>
          <title>An Architecture for Describing Simple Network Management
          Protocol (SNMP) Management Frameworks</title>

          <author fullname="D. Harrington" initials="D." surname="Harrington">
            <organization/>
          </author>

          <author fullname="R. Presuhn" initials="R." surname="Presuhn">
            <organization/>
          </author>

          <date day="10" month="December" year="2002"/>
        </front>

        <seriesInfo name="RFC" value="3411"/>

        <format target="http://tools.ietf.org/html/rfc3411" type="TXT"/>
      </reference>

      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>

          <author fullname="R. Enns" initials="R." surname="Enns">
            <organization/>
          </author>

          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
            <organization/>
          </author>

          <author fullname="J. Schoenwaelder" initials="J."
                  surname="Schoenwaelder">
            <organization/>
          </author>

          <author fullname="A. Bierman" initials="A." surname="Bierman">
            <organization/>
          </author>

          <date month="June" year="2011"/>
        </front>

        <seriesInfo name="RFC" value="6241"/>

        <format target="http://tools.ietf.org/html/rfc6241" type="TXT"/>
      </reference>

      <reference anchor="I-D.ietf-sfc-problem-statement">
        <front>
          <title>Network Service Chaining Problem Statement</title>

          <author fullname="P.Quinn" initials="P." surname="Quinn">
            <organization/>
          </author>

          <author fullname="J.Guichard" initials="J." surname="Guichard">
            <organization/>
          </author>

          <author fullname="S.Surendra" initials="S." surname="Surendra">
            <organization/>
          </author>

          <date month="August" year="2013"/>
        </front>

        <seriesInfo name="ID" value="draft-ietf-sfc-problem-statement"/>
      </reference>

      <reference anchor="I-D.tissa-netmod-oam">
        <front>
          <title>YANG Data Model for Operations Administration and Maintenance
          (OAM)</title>

          <author fullname="Tissa Senevirathne" initials="T."
                  surname="Senevirathne ">
            <organization/>
          </author>

          <author fullname="Norman Finn" initials="N." surname="Finn">
            <organization/>
          </author>

          <author fullname="Deepak Kumar " initials="D." surname="Kumar ">
            <organization/>
          </author>

          <author fullname="Samer Salam" initials="S." surname="Salam ">
            <organization/>
          </author>

          <date month="March" year="2014"/>
        </front>

        <seriesInfo name="ID" value="draft-tissa-netmod-oam-00"/>
      </reference>

      <reference anchor="I-D.jain-nvo3-overlay-oam">
        <front>
          <title>Generic Overlay OAM and Datapath Failure Detection</title>

          <author fullname="P. Jain" initials="P." surname="Jain">
            <organization/>
          </author>

          <date month="February" year="2014"/>
        </front>

        <seriesInfo name="ID" value="draft-jain-nvo3-overlay-oam-01"/>
      </reference>

      <reference anchor="RFC5880">
        <front>
          <title>Bidirectional Forwarding Detection (BFD)</title>

          <author fullname="D. Katz" initials="D." surname="Katz">
            <organization/>
          </author>

          <author fullname="D.Ward" initials="D." surname="Ward">
            <organization/>
          </author>

          <date month="June" year="2010"/>
        </front>

        <seriesInfo name="RFC" value="5880"/>

        <format target="http://tools.ietf.org/html/rfc5880" type="TXT"/>
      </reference>

      <reference anchor="RFC4656">
        <front>
          <title>A One-way Active Measurement Protocol (OWAMP)</title>

          <author fullname="S.Shalunov" initials="S." surname="Shalunov">
            <organization/>
          </author>

          <author fullname="A.Karp" initials="A." surname="Karp">
            <organization/>
          </author>

          <author fullname="J.Boote" initials="J." surname="Boote">
            <organization/>
          </author>

          <author fullname="M.Zekauskas" initials="M." surname="Zekauskas">
            <organization/>
          </author>

          <date month="September" year="2006"/>
        </front>

        <seriesInfo name="RFC" value="4656"/>

        <format target="http://tools.ietf.org/html/rfc4656" type="TXT"/>
      </reference>

      <reference anchor="RFC5357">
        <front>
          <title>A Two-Way Active Measurement Protocol (TWAMP)</title>

          <author fullname="K.Hedeyat" initials="K." surname="Hedeyat">
            <organization/>
          </author>

          <author fullname="R.Krzanowski" initials="R." surname="Krzanowski">
            <organization/>
          </author>

          <author fullname="A.Morton" initials="A." surname="Morton">
            <organization/>
          </author>

          <author fullname="K.Yum" initials="K." surname="Yum">
            <organization/>
          </author>

          <author fullname="J.Babiarz" initials="J." surname="Babiarz">
            <organization/>
          </author>

          <date month="October" year="2008"/>
        </front>

        <seriesInfo name="RFC" value="5357"/>

        <format target="http://tools.ietf.org/html/rfc5357" type="TXT"/>
      </reference>

      <reference anchor="RFC6374">
        <front>
          <title>Packet Loss and Delay Measurement for MPLS Networks</title>

          <author fullname="D. Frost" initials="D." surname="Frost">
            <organization/>
          </author>

          <author fullname="S.Bryant" initials="S." surname="Bryant">
            <organization/>
          </author>

          <date month="September" year="2011"/>
        </front>

        <seriesInfo name="RFC" value="6374"/>

        <format target="http://tools.ietf.org/html/rfc6374" type="TXT"/>
      </reference>

      <reference anchor="RFC6378">
        <front>
          <title>Packet Loss and Delay Measurement for MPLS Networks</title>

          <author fullname="Y. Weingarten" initials="Y." surname="Weingarten">
            <organization/>
          </author>

          <author fullname="S.Bryant" initials="S." surname="Bryant">
            <organization/>
          </author>

          <author fullname="E.Osborne" initials="E." surname="Osborne">
            <organization/>
          </author>

          <author fullname="N.Sprecher" initials="N." surname="Sprecher">
            <organization/>
          </author>

          <author fullname="A. Fuligoli" initials="A." surname="Fuligoli">
            <organization/>
          </author>

          <date month="October" year="2011"/>
        </front>

        <seriesInfo name="RFC" value="6378"/>

        <format target="http://tools.ietf.org/html/rfc6378" type="TXT"/>
      </reference>

      <reference anchor="RFC6428">
        <front>
          <title>Proactive Connectivity Verification, Continuity Check, and
          Remote Defect Indication for the MPLS Transport Profile</title>

          <author fullname="D. Allan" initials="D." surname="Allan">
            <organization/>
          </author>

          <author fullname="G.Swallow" initials="G." surname="Swallow">
            <organization/>
          </author>

          <author fullname="J.Drake" initials="J." surname="Drake">
            <organization/>
          </author>

          <date month="November" year="2011"/>
        </front>

        <seriesInfo name="RFC" value="6428"/>

        <format target="http://tools.ietf.org/html/rfc6428" type="TXT"/>
      </reference>
    </references>
  </back>
</rfc>

PAFTECH AB 2003-20262026-04-24 04:08:29