Operations and Management Area Working GroupInternet Engineering Task Force (IETF) T. MizrahiInternet DraftRequest for Comments: 7276 MarvellIntended status:Category: Informational N. SprecherExpires: September 2014ISSN: 2070-1721 Nokia Solutions and Networks E. Bellagamba Ericsson Y. WeingartenMarch 28,June 2014 An Overview of Operations, Administration, and Maintenance (OAM) Toolsdraft-ietf-opsawg-oam-overview-16.txtAbstract Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement. Over theyearsyears, various OAM tools have been defined for various layers in the protocol stack. This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, andTRILL.Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document. The target audience of this document includes network equipment vendors, networkoperatorsoperators, and standards developmentorganizations, andorganizations. This document can be used as an index to some of the main OAM tools defined in the IETF.This document provides a brief description of each of the OAM tools in the IETF.At the end of thedocumentdocument, a list of the OAM toolsets and a list of the OAM functions are presented as a summary. Status ofthisThis Memo ThisInternet-Draftdocument issubmitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsnot an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force(IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum(IETF). It represents the consensus ofsix monthsthe IETF community. It has received public review andmay be updated, replaced, or obsoletedhas been approved for publication byotherthe Internet Engineering Steering Group (IESG). Not all documentsatapproved by the IESG are a candidate for anytime. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The listlevel of Internet Standard; see Section 2 of RFC 5741. Information about the currentInternet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The liststatus ofInternet-Draft Shadow Directories canthis document, any errata, and how to provide feedback on it may beaccessedobtained athttp://www.ietf.org/shadow.html. This Internet-Draft will expire on September 28, 2014.http://www.rfc-editor.org/info/rfc7276. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction................................................. 4....................................................4 1.1. Background.............................................. 4.................................................5 1.2. TargetAudience.......................................... 5Audience ............................................6 1.3.OAM-relatedOAM-Related Work in the IETF............................ 6...............................6 1.4. Focusing on the Data Plane.............................. 7.................................7 2. Terminology.................................................. 7.....................................................8 2.1. Abbreviations........................................... 7..............................................8 2.2. TerminologyusedUsed in OAM Standards....................... 9.........................10 2.2.1. General Terms...................................... 9......................................10 2.2.2. Operations,AdministrationAdministration, and Maintenance......... 9........10 2.2.3. Functions,ToolsTools, and Protocols.................... 10....................11 2.2.4. Data Plane, ControlPlanePlane, and Management Plane.... 11....11 2.2.5. The Players....................................... 12........................................12 2.2.6. Proactive andOn-demandOn-Demand Activation................ 12.................13 2.2.7. Connectivity Verification and Continuity Checks... 13....14 2.2.8.Connection OrientedConnection-Oriented vs. ConnectionlessCommunication14Communication ......................................15 2.2.9.Point-to-pointPoint-to-Point vs.Point-to-multipointPoint-to-Multipoint Services... 14....16 2.2.10. Failures......................................... 15..........................................16 3. OAM Functions............................................... 16..................................................17 4. OAM Tools in the IETF -aA Detailed Description.............. 16.................18 4.1. IP Ping................................................ 17...................................................18 4.2. IP Traceroute.......................................... 17.............................................19 4.3. Bidirectional Forwarding Detection (BFD)............... 18..................20 4.3.1. Overview.......................................... 18...........................................20 4.3.2. Terminology....................................... 19........................................20 4.3.3. BFD Control....................................... 19........................................20 4.3.4. BFD Echo.......................................... 19...........................................21 4.4. MPLS OAM............................................... 20..................................................21 4.4.1. LSP Ping.......................................... 20...........................................21 4.4.2. BFD for MPLS...................................... 21.......................................22 4.4.3. OAM for Virtual Private Networks(VPN)(VPNs) over MPLS.. 21..23 4.5. MPLS-TP OAM............................................ 21...............................................23 4.5.1. Overview.......................................... 21...........................................23 4.5.2. Terminology....................................... 22........................................24 4.5.3. Generic Associated Channel........................ 24.........................25 4.5.4. MPLS-TP OAM Toolset............................... 24................................25 4.5.4.1. Continuity Check and Connectivity Verification25..............................26 4.5.4.2. Route Tracing................................ 25.............................26 4.5.4.3. Lock Instruct................................ 25.............................27 4.5.4.4. Lock Reporting............................... 25............................27 4.5.4.5. Alarm Reporting.............................. 26...........................27 4.5.4.6. Remote Defect Indication..................... 26..................27 4.5.4.7. Client Failure Indication.................... 26.................27 4.5.4.8. Performance Monitoring....................... 26....................28 4.5.4.8.1. Packet Loss Measurement (LM)............ 26...28 4.5.4.8.2. Packet Delay Measurement (DM)........... 27..28 4.6. Pseudowire OAM......................................... 27............................................29 4.6.1. Pseudowire OAMusingUsing Virtual Circuit Connectivity Verification (VCCV)...................................... 27...................29 4.6.2. Pseudowire OAMusingUsing G-ACh........................ 29.........................30 4.6.3. Attachment Circuit - Pseudowire Mapping........... 29............30 4.7. OWAMP andTWAMP......................................... 29TWAMP ...........................................31 4.7.1. Overview.......................................... 29...........................................31 4.7.2. Control and Test Protocols........................ 30.........................32 4.7.3. OWAMP............................................. 31..............................................32 4.7.4. TWAMP............................................. 31..............................................33 4.8. TRILL.................................................. 32.....................................................33 5. Summary..................................................... 32........................................................34 5.1. Summary of OAM Tools................................... 32......................................34 5.2. Summary of OAM Functions............................... 35..................................37 5.3. Guidance to Network Equipment Vendors.................. 36.....................38 6. Security Considerations..................................... 36........................................38 7.IANA Considerations ......................................... 37 8.Acknowledgments............................................. 37 9.................................................39 8. References.................................................. 37 9.1......................................................39 8.1. Normative References................................... 37 9.2.......................................39 8.2. Informative References................................. 37....................................39 Appendix A. List of OAM Documents.............................. 43................................ 46 A.1. List of IETF OAM Documents............................. 43............................... 46 A.2. List of Selected Non-IETF OAM Documents................ 48.................. 50 1. IntroductionOAM"OAM" is a general term that refers to a toolset for detecting,isolatingisolating, and reportingfailuresfailures, and for monitoringthenetwork performance. There are several different interpretationstoof the "OAM" acronym. This document refers to Operations,AdministrationAdministration, and Maintenance, as recommended in Section 3 of [OAM-Def]. This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and TRILL. This document focuses on tools for detecting and isolating failures and for performance monitoring. Hence, this document focuses on the tools used for monitoring and measuring the data plane; control and management aspects of OAM are outside the scope of this document. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document. 1.1. Background OAM was originally used in traditional communication technologies such as E1 and T1, evolving intoPDHPlesiochronous Digital Hierarchy (PDH) and then laterin SONET/SDH.into Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH). ATM was probably the first technology to include inherent OAM support from day one, while in other technologies OAM was typically defined in an ad hoc manner after the technology was already defined and deployed. Packet-based networks were traditionally considered unreliable andbest-effort.best effort. Aspacket-basedpacket- based networks evolved, they have become the common transport for both data and telephony, replacing traditional transport protocols. Consequently, packet-based networks were expected to provide a similar "carrier grade" experience, and specifically to support more advanced OAM functions, beyond ICMP and router hellos, that were traditionally used for fault detection. As typical networks have a multi-layer architecture, the set of OAM protocols similarly take a multi-layer structure; each layer has its own OAM protocols. Moreover, OAM can be used at different levels of hierarchy in the network to form a multi-layer OAM solution, as shown in the example in Figure 1. Figure 1 illustrates a network in which IP traffic between two customer edges is transported over an MPLS provider network. MPLS OAM is used at theprovider-levelprovider level for monitoring the connection between the two provider edges, while IP OAM is used at thecustomer-levelcustomer level for monitoring the end-to-end connection between the two customer edges. |<-------------- Customer-level OAM -------------->| IP OAM (Ping, Traceroute, OWAMP, TWAMP) |<- Provider-level OAM ->| MPLS OAM (LSP Ping) +-----+ +----+ +----+ +-----+ | | | |========================| | | | | |-------| | MPLS | |-------| | | | IP | | | | IP | | +-----+ +----+ +----+ +-----+ Customer Provider Provider Customer Edge Edge Edge Edge Figure1 Example:1: Example of Multi-layer OAM 1.2. Target Audience The target audience of this document includes: o Standards development organizations -bothBoth IETF working groups and non-IETF organizations can benefit from this document when designing new OAM protocols, or when looking to reuse existing OAM tools for new technologies. o Network equipment vendors and network operators-can use this document as an index to some of the common IETF OAM tools. It should be noted that some background in OAM is necessary in order to understand and benefit from this document. Specifically, the reader is assumed to be familiar with the termOAM"OAM" [OAM-Def], the motivation for using OAM, and the distinction between OAM and network management [OAM-Mng]. 1.3.OAM-relatedOAM-Related Work in the IETF This memo provides an overview of the different sets of OAM tools defined by the IETF. The set of OAM tools described in this memo are applicable to IP unicast, MPLS, pseudowires, MPLS Transport Profile (MPLS-TP), and TRILL. While OAM tools that are applicable to other technologies exist, they are beyond the scope of this memo. This document focuses on IETF documents that have been published as RFCs, while other ongoing OAM-related work is outside the scope. The IETF has defined OAM protocols and tools in several different contexts. We roughly categorize these efforts into a few sets ofOAM- relatedOAM-related RFCs, listed in Table 1. Each set defines alogically-coupledlogically coupled set of RFCs, although the sets are in some cases intertwined by common tools and protocols. The discussion in this document is ordered according to these sets (the acronyms and abbreviations are listed in Section2.1.).2.1). +--------------+------------+ | Toolset | Transport | | | Technology | +--------------+------------+ |IP Ping | IPv4/IPv6 | +--------------+------------+ |IP Traceroute | IPv4/IPv6 | +--------------+------------+ |BFD | generic | +--------------+------------+ |MPLS OAM | MPLS | +--------------+------------+ |MPLS-TP OAM | MPLS-TP | +--------------+------------+ |Pseudowire OAM| Pseudowires| +--------------+------------+ |OWAMP and | IPv4/IPv6 | |TWAMP | | +--------------+------------+ |TRILL OAM | TRILL | +--------------+------------+ Table11: OAM Toolset Packages in the IETF Documents This document focuses on OAM tools that have been developed in the IETF. A short summary of some of the significant OAM standards that have been developed in other standard organizations is presented in Appendix A.2. 1.4. Focusing on the Data Plane OAM tools may, and quite often do, work in conjunction with a control plane and/or management plane. OAM provides instrumentation tools for measuring and monitoring the data plane. OAM tools often usecontrol planecontrol-plane functions, e.g., to initialize OAM sessions and to exchange various parameters. The OAM tools communicate with the management plane to raise alarms, and often OAM tools may be activated by the management plane (as well as by the control plane), e.g., to locate and localize problems. The considerations of thecontrol planecontrol-plane maintenance tools and the functionality of the management plane are out of scope for this document, which concentrates on presenting thedata planedata-plane tools that are used for OAM. Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document. Since OAM protocols are used for monitoring the data plane, it is imperative for OAM tools to be capable of testing the actual data plane with as much accuracy as possible. Thus, it is important to enforce fate-sharing between OAM traffic that monitors the data plane and thedata planedata-plane traffic it monitors. 2. Terminology 2.1. Abbreviations ACH Associated Channel Header AIS Alarm Indication Signal ATM Asynchronous Transfer Mode BFD Bidirectional Forwarding Detection CC Continuity Check CC-V Continuity Check and Connectivity Verification CV Connectivity Verification DM Delay Measurement ECMPEqual Cost Multiple PathsEqual-Cost Multipath FEC Forwarding Equivalence Class FRR Fast Reroute G-ACh Generic Associated Channel GAL Generic Associated Channel Label ICMP Internet Control Message Protocol L2TP LayerTwo2 Tunneling Protocol L2VPN LayerTwo2 Virtual Private Network L3VPN LayerThree3 Virtual Private Network LCCE L2TP Control Connection Endpoint LDP Label Distribution Protocol LER Label Edge Router LM Loss Measurement LSP Label Switched Path LSR LabelSwitchedSwitching Router ME Maintenance Entity MEG Maintenance Entity Group MEP MEG End Point MIP MEG Intermediate Point MP Maintenance Point MPLS Multiprotocol Label Switching MPLS-TP MPLS Transport Profile MTU Maximum Transmission Unit OAM Operations, Administration, and Maintenance OWAMPOne-wayOne-Way Active Measurement Protocol PDH Plesiochronous Digital Hierarchy PE Provider Edge PSN Public Switched Network PW Pseudowire PWE3 Pseudowire Emulation Edge-to-Edge RBridge Routing Bridge RDI Remote Defect Indication SDH Synchronous Digital Hierarchy SONET Synchronous OpticalNetworkingNetwork TRILL Transparent Interconnection of Lots of Links TTL Time To Live TWAMPTwo-wayTwo-Way Active Measurement Protocol VCCV Virtual Circuit Connectivity Verification VPN Virtual Private Network 2.2. TerminologyusedUsed in OAM Standards 2.2.1. General Terms A wide variety of terms is used in various OAM standards. This section presents a comparison of the terms used in various OAM standards, without fully quoting the definition of each term. An interesting overview of the termOAM"OAM" and its derivatives is presented in [OAM-Def]. A thesaurus of terminology for MPLS-TP terms is presented in [TP-Term],andwhich provides a good summary of some of theOAM relatedOAM-related terminology. 2.2.2. Operations,AdministrationAdministration, and Maintenance The following definition of OAM is quoted from [OAM-Def]: The components of the "OAM" acronym (and provisioning) are defined as follows: o Operations - Operation activities are undertaken to keep the network (and the services that the network provides) up and running. It includes monitoring the network and finding problems. Ideally these problems should be found before users are affected. o Administration - Administration activities involve keeping track of resources in the network and how they are used. It includes all the bookkeeping that is necessary to track networking resources and the network under control. o Maintenance - Maintenance activities are focused on facilitating repairs and upgrades -- for example, when equipment must be replaced, when a router needs a patch for an operating system image, or when a new switch is added to a network. Maintenance also involves corrective and preventive measures to make the managed network run more effectively, e.g., adjusting device configuration and parameters. 2.2.3. Functions,ToolsTools, and Protocols OAM Function An OAM function is an instrumentation measurement type or diagnostic. OAM functions are the atomic building blocks of OAM, where each function defines an OAM capability. Typical examples of OAM functions are presented in Section 3. OAM ProtocolAAn OAM protocol is a protocol used for implementing one or more OAM functions. The OWAMP-Test [OWAMP] is an example of an OAM protocol. OAM Tool An OAM tool is a specific means of applying one or more OAM functions. In somecasescases, an OAM protocol *is* an OAM tool, e.g., OWAMP-Test. In othercasescases, an OAM tool uses a set of protocols that are not strictlyOAM-related;OAM related; for example, Traceroute (Section4.2.)4.2) can be implemented using UDP and ICMP messages, without using an OAM protocol per se. 2.2.4. Data Plane, ControlPlanePlane, and Management Plane Data Plane The data plane is the set of functions used to transfer data in the stratum or layer under consideration [ITU-Terms]. TheData Planedata plane is also known as theForwarding Planeforwarding plane or theUser Plane.user plane. Control Plane The control plane is the set of protocols and mechanisms that enable routers to efficiently learn how to forward packets towards their final destination (based on [Comp]). Management Plane The termManagement Plane,"Management Plane", as described in [Mng], is used to describe the exchange of management messages through management protocols (often transported by IP and by IP transport protocols) between management applications and the managed entities such as network nodes. Data Plane vs. Control Plane vs. Management Plane The distinction between the planes is at times a bit vague. For example, the definition of "Control Plane" above may imply that OAM tools such as ping,BFDBFD, and others are in fact in the control plane. This document focuses on tools used for monitoring the data plane. While these tools could arguably be considered to be in the control plane, these tools monitor the data plane, and hence it is imperative to have fate-sharing between OAM traffic that monitors the data plane and thedata planedata-plane traffic it monitors. Another potentially vague distinction is between the management plane and control plane. The management plane should be seen as separate from, but possibly overlapping with, the control plane (based on [Mng]). 2.2.5. The Players An OAM tool is used between two (or more) peers. Various terms are used in IETF documents to refer to the players that take part in OAM. Table 2 summarizes the terms used in each of the toolsets discussed in this document.+--------------------------+--------------------------++--------------------------+---------------------------+ | Toolset | Terms |+--------------------------+--------------------------++--------------------------+---------------------------+ | Ping / Traceroute|-Host|- Host | | ([ICMPv4], [ICMPv6],|-Node|- Node | | [TCPIP-Tools])|-Interface|- Interface | ||-Gateway|- Gateway | + ------------------------ +------------------------------------------------- + | BFD [BFD]||- System | + ------------------------ +------------------------------------------------- + | MPLS OAM [MPLS-OAM-FW]||- LSR | + ------------------------ +------------------------------------------------- + | MPLS-TP OAM [TP-OAM-FW]|-End|- End Point - MEP | ||-Intermediate|- Intermediate Point - MIP | + ------------------------ +------------------------------------------------- + | Pseudowire OAM [VCCV]|-PE|- PE | ||-LCCE|- LCCE | + ------------------------ +------------------------------------------------- + | OWAMP and TWAMP|-Host|- Host | | ([OWAMP], [TWAMP])|-End|- End system | + ------------------------ +------------------------------------------------- + | TRILL OAM [TRILL-OAM]|-RBridge|- RBridge |+--------------------------+--------------------------++--------------------------+---------------------------+ Table22: Maintenance Point Terminology 2.2.6. Proactive andOn-demandOn-Demand Activation The different OAM tools may be used in one of two basic types of activation: Proactive Proactive activation - indicates that the tool is activated on a continual basis, where messages are sent periodically, and errors are detected when a certain number of expected messages are not received. On-demand On-demand activation - indicates that the tool is activated "manually" to detect a specific anomaly. 2.2.7. Connectivity Verification and Continuity Checks Two distinct classes of failure management functions are used in OAMprotocols, connectivity verificationprotocols: Connectivity Verification andcontinuity checks.Continuity Checks. The distinction between these terms is defined in[MPLS-TP-OAM],[MPLS-TP-OAM] and is used similarly in this document. Continuity Check ContinuitychecksChecks are used to verify that a destination is reachable, and are typically sent proactively, though they can be invokedon- demandon-demand as well. Connectivity Verification Aconnectivity verificationConnectivity Verification function allows Alice to check whether she is connected to Bob or not. It is noted that while the CV function is performed in the data plane, the "expected path" is predeterminedeitherin either the control plane orinthe management plane. Aconnectivity verificationConnectivity Verification (CV) protocol typically uses a CV message, followed by a CV reply that is sent back to the originator. A CV function can be applied proactively or on-demand. ConnectivityverificationVerification tools often perform path verification as well, allowing Alice to verify that messages from Bob are received through the correct path, thereby verifying not only that the two MPs are connected, but also that they are connected through the expected path, allowing detection of unexpected topology changes. ConnectivityverificationVerification functions can also be used for checking the MTU of the path between the two peers. ConnectivityverificationVerification andcontinuity checksContinuity Checks are considered complementarymechanisms,mechanisms and are often used in conjunction with each other. 2.2.8.Connection OrientedConnection-Oriented vs. Connectionless CommunicationConnection OrientedConnection-Oriented InConnection Oriented technologiesconnection-oriented technologies, an end-to-end connection is established (by a control protocol or provisioned by a management system) prior to the transmission of data. Typically a connection identifier is used to identify the connection. Inconnection oriented technologiesconnection-oriented technologies, it is often the case (although not always) that all packets belonging to a specific connection use the same route through the network. Connectionless InConnectionless technologiesconnectionless technologies, data is typically sent between end points without prior arrangement. Packets are routed independently based on their destination address, and hence different packets may be routed in a different way across the network. Discussion The OAM tools described in this document include tools that supportconnection orientedconnection-oriented technologies, as well as tools for connectionless technologies. Inconnection oriented technologiesconnection-oriented technologies, OAM is used to monitor a *specific* connection; OAM packets are forwarded through the same route as the data traffic and receive the same treatment. In connectionless technologies, OAM is used between a source and destination pair without defining a specific connection. Moreover, in somecasescases, the route of OAM packets may differ from the one of the data traffic. For example, the connectionless IP Ping (Section4.1.)4.1) tests the reachability from a source to a given destination, while theconnection orientedconnection-oriented LSP Ping (Section4.4.)4.4.1) is used for monitoring a specific LSP(connection),(connection) and provides the capability to monitor all the available paths used by an LSP. It should be noted that in some cases connectionless protocols are monitored byconnection orientedconnection-oriented OAM protocols. For example, while IP is a connectionless protocol, it can be monitored by BFD (Section4.3. ),4.3), which is connection oriented. 2.2.9.Point-to-pointPoint-to-Point vs.Point-to-multipointPoint-to-Multipoint Services Point-to-point (P2P) A P2P service delivers data from a single source to a single destination. Point-to-multipoint (P2MP) A P2MP service delivers data from a single source to a one or more destinations (based on [Signal]). An MP2MP service is a service that delivers data from more than one source to one or more receivers (based on [Signal]). Note: the two definitions for P2MP and MP2MP are quoted from [Signal]. Although [Signal] describes a specific case of P2MP and MP2MPwhichthat is MPLS-specific, these two definitions also apply to non-MPLS cases. Discussion The OAM tools described in this document include tools for P2P services, as well as tools for P2MP services. The distinction between P2P services and P2MP services affects the corresponding OAM tools. A P2P service is typically simpler to monitor, as it consists of a single pair ofend points.endpoints. P2MP and MP2MP services present several challenges. For example, in a P2MP service, the OAM mechanism not only verifies that each of the destinations is reachable from thesource,source but also verifies that the P2MP distribution tree is intact and loop-free. 2.2.10. Failures The termsFailure, Fault,"Failure", "Fault", andDefect"Defect" are used interchangeably in the standards, referring to a malfunction that can be detected by aconnectivityConnectivity Verification or acontinuity check.Continuity Check. In some standards, such as 802.1ag[IEEE802.1Q] ,[IEEE802.1Q], there is no distinction between these terms, while in other standards each of these terms refers to a different type of malfunction. The terminology used in IETF MPLS-TP OAM is based on the ITU-T terminology, which distinguishes between these three terms in[ITU-T-G.806];[ITU-T-G.806] as follows: Fault The termFault"Fault" refers to an inability to perform a required action, e.g., an unsuccessful attempt to deliver a packet. Defect The termDefect"Defect" refers to an interruption in the normal operation, such as a consecutive period of time where no packets are delivered successfully. Failure The termFailure"Failure" refers to the termination of the required function. While a Defect typically refers to a limited period of time, a failure refers to a long period of time. 3. OAM Functions This subsection provides a brief summary of the common OAM functions used in OAM-related standards. These functions are used as building blocks in the OAM standards described in this document. o Connectivity Verification (CV), PathVerificationVerification, and ContinuityChecksCheck (CC): As defined in Section 2.2.7. o Path Discovery / Fault Localization: This function can be used to trace the route to a destination, i.e., to identify the nodes along the route to the destination. When more than one route is available to a specific destination, this function traces one of the available routes. When a failure occurs, this function attempts to detect the location of the failure. Note that the termroute tracing"route tracing" (orTraceroute) that"Traceroute"), which is used in the context of IP and MPLS, is sometimes referred to aspath tracing"path tracing" in the context of other protocols, such as TRILL. o Performance Monitoring: Typically refers to:o* Loss Measurement (LM) - monitors the packet loss rate.o* Delay Measurement (DM) - monitors the delay and delay variation (jitter). 4. OAM Tools in the IETF -aA Detailed Description This section presents a detailed description of the sets of OAM- related tools in each of the toolsets in Table 1. 4.1. IP Ping Ping is a common networkdiagnosisdiagnostic application for IP networks thatusesuse ICMP. According to [NetTerms], 'Ping' is an abbreviation for Packet internet groper, although the term has been so commonly used that it stands on its own. As defined in [NetTerms], it is a program used to test reachability of destinations by sending them an ICMPechoEcho request and waiting for a reply. The ICMP Echo request/reply exchange in Ping is used as acontinuity checkContinuity Check function for the Internet Protocol. The originator transmits an ICMP Echo request packet, and the receiver replies with an Echo reply. ICMPpingPing is defined in twovariants,variants: [ICMPv4] is used for IPv4, and [ICMPv6] is used for IPv6. Ping can be invokedeitherto either a unicast destination ortoa multicast destination. In the latter case, all members of the multicast group send an Echo reply back to the originator. Ping implementations typically use ICMP messages. UDP Ping is a variant that uses UDP messages instead of ICMPechoEcho messages. Ping is a single-endedcontinuity check,Continuity Check, i.e., it allows the *initiator* of the Echo request to test the reachability. If it is desirable for both ends to test the reachability, both ends have to invoke Ping independently. Note that since ICMP filtering is deployed in some routers and firewalls, the usefulness of Ping is sometimes limited in the widerinternet.Internet. This limitation is equally relevant to Traceroute. 4.2. IP Traceroute Traceroute ([TCPIP-Tools], [NetTools]) is an application that allows users to discover a path between an IP source and an IP destination. The most common way to implement Traceroute [TCPIP-Tools] is described as follows. Traceroute sends a sequence of UDP packets to UDP port 33434 at the destination. By default, Traceroute begins by sending three packets (the number of packets is configurable in most Traceroute implementations), each with an IP Time-To-Live (or Hop Limit in IPv6) value ofoneone, to the destination. These packets expire as soon as they reach the first router in the path. Consequently, that router sends three ICMP Time Exceeded Messages back to the Traceroute application. Traceroute now sends another three UDP packets, each with the TTL value of 2. These messages cause the second router to return ICMP messages. This process continues, withever increasingever-increasing values for the TTL field, until the packets actually reach the destination. Because no application listens to port 33434 at the destination, the destination returns ICMP Destination Unreachable Messages indicating an unreachable port. This event indicates to the Traceroute application that it is finished. The Traceroute program displays the round-trip delay associated with each of the attempts. While Traceroute is a tool that finds *a* path from A to B, it should be noted that traffic from A to B is often forwarded throughEqualEqual- CostMultiple Paths (ECMP).Multipaths (ECMPs). Paris Traceroute [PARIS] is an extension to Traceroute that attempts to discovers all the available paths from A to B by scanning different values of header fields (such as UDP ports) in the probe packets. It is noted that Traceroute is an application, and not a protocol. As such, it has various different implementations. One of the most common ones uses UDP probe packets, as described above. Other implementations exist that use other types of probe messages, such as ICMP or TCP. Note that IP routing may be asymmetric. While Traceroute discovers a path between a source and destination, it does not reveal the reverse path. A few ICMP extensions ([ICMP-MP], [ICMP-Int]) have been defined in the context of Traceroute. These documents define several extensions, including extensions to the ICMP Destination Unreachable message, that can be used by Traceroute applications. Traceroute allows path discovery to *unicast* destination addresses. A similar tool [mtrace] was defined for multicast destinationaddresses, allowing to traceaddresses; it allows tracing the route that a multicast IP packet takes from a source to a particular receiver. 4.3. Bidirectional Forwarding Detection (BFD) 4.3.1. Overview While multiple OAM tools have been defined for various protocols in the protocol stack, Bidirectional Forwarding Detection [BFD], defined by the IETF BFD working group, is a generic OAM tool that can be deployed over various encapsulating protocols, and in various medium types. The IETF has defined variants of the protocol for IP([BFD- IP],([BFD-IP], [BFD-Multi]), for MPLS LSPs [BFD-LSP], and for pseudowires[BFD- VCCV].[BFD-VCCV]. The usage of BFD in MPLS-TP is defined in [TP-CC-CV]. BFD includes two main OAM functions, using two types of BFD packets: BFD Controlpackets,packets and BFD Echo packets. 4.3.2. Terminology BFD operates between *systems*. The BFD protocol is run between two or more systems after establishing a *session*. 4.3.3. BFD Control BFD supports a bidirectionalcontinuity check,Continuity Check, using BFDcontrol packets,Control packets that are exchanged within a BFD session. BFD sessions operate in one of two modes: o Asynchronous mode (i.e., proactive): in thismodemode, BFDcontrolControl packets are sent periodically. When the receiver detects that no BFDcontrolControl packets have been received during a predetermined period of time, a failure is reported. o Demand mode: in this mode, BFDcontrolControl packets are senton-demand.on demand. Upon need, a system initiates a series of BFDcontrolControl packets to check the continuity of the session. BFDcontrolControl packets are sent independently in each direction. Each of theend-pointsendpoints (referred to as systems) of the monitored path maintains its own session identification, called aDiscriminator,Discriminator; bothof whichDiscriminators are included in the BFD Control Packets that are exchanged between theend-points.endpoints. At the time of session establishment, the Discriminators are exchanged between thetwo-end points.two endpoints. In addition, the transmission (and reception) rate is negotiated between the twoend-points,endpoints, based on information included in the control packets. These transmission rates may be renegotiated during the session. During normal operation of the session, i.e., when no failures have been detected, the BFD session is in the Up state. If no BFD Control packets are received during a period of time called the Detection Time, the session is declared to be Down. The detection time is a function of the pre-configured or negotiated transmissionrate,rate and a parameter called Detect Mult. Detect Mult determines the number of missing BFD Control packets that cause the session to be declared as Down. This parameter is included in the BFD Control packet. 4.3.4. BFD Echo A BFDechoEcho packet is sent to a peersystem,system and is looped back to the originator. The echo function can be usedproactively,proactively oron-demand.on demand. The BFDechoEcho function has been defined in BFD for IPv4 and IPv6 ([BFD-IP]), but it is not used in BFD for MPLSLSPs,LSPs or PWs, or in BFD for MPLS-TP. 4.4. MPLS OAM The IETF MPLS working group has defined OAM for MPLS LSPs. The requirements and framework of this effort are defined in [MPLS-OAM-FW] and [MPLS-OAM], respectively. The corresponding OAM tool defined, in this context, is LSP Ping [LSP-Ping]. OAM for P2MP services is defined in [MPLS-P2MP]. BFD for MPLS [BFD-LSP] is an alternative means for detecting data- plane failures, as described below. 4.4.1. LSP Ping LSP Ping is modeled after the Ping/Tracerouteparadigmparadigm, and thus it may be used in one of two modes: o "Ping" mode: In thismodemode, LSP Ping is used for end-to-endconnectivity verificationConnectivity Verification between two LERs. o "Traceroute" mode: This mode is used for hop-by-hop fault isolation. LSP Ping is based on the ICMP Ping operation (of data-planeconnectivity verification)Connectivity Verification) with additional functionality to verify data-plane vs. control-plane consistency for a Forwarding Equivalence Class (FEC) and also to identify Maximum Transmission Unit (MTU) problems. The Traceroute functionality may be used to isolate and localize MPLS faults, using theTime-to-liveTime-To-Live (TTL) indicator to incrementally identify the sub-path of the LSP that is successfully traversed before the faulty link or node. The challenge in MPLS networks is that the traffic of a given LSP may beload balancedload-balanced acrossEqual Cost Multiple paths (ECMP).Equal-Cost Multipaths (ECMPs). LSP Ping monitors all the available paths of an LSP by monitoring its differentForwarding Equivalence Classes (FEC).FECs. Note that MPLS-TP does not use ECMP, and thus does not require OAM over multiple paths. Another challenge is that an MPLS LSP does not necessarily have a return path; traffic that is sent back from the egress LSR to the ingress LSR is not necessarily sent over an MPLS LSP, but it can be sent through a different route, such as an IP route. Thus, responding to an LSP Ping message is not necessarily as trivial as in IP Ping, where the responder just swaps the source and destination IP addresses. Note that this challenge is not applicable to MPLS-TP, where a return path is always available. It should be noted that LSP Ping supports unique identification of the LSP within an addressing domain. The identification is checked using the full FEC identification. LSP Ping is extensible to include additional information needed to support new functionality, by use of Type-Length-Value (TLV) constructs. The usage of TLVs is typically handled by the control plane, as it is not easy to implement in hardware. LSP Ping supports bothasynchronous, as well as,asynchronous and on-demand activation. 4.4.2. BFD for MPLS BFD [BFD-LSP] can be used to detect MPLS LSPdata planedata-plane failures. A BFD session is established for each MPLS LSP that is being monitored. BFD Control packets must be sent along the same path as the monitored LSP. If the LSP is associated with multiple FECs, a BFD session is established for each FEC. While LSP Ping can be used for detecting MPLSdata planedata-plane failures and for verifying the MPLS LSP data plane against the control plane, BFD can only be used for the former. BFD can be used in conjunction with LSP Ping, as is the case in MPLS-TP (see Section4.5.4.).4.5.4). 4.4.3. OAM for Virtual Private Networks(VPN)(VPNs) over MPLS The IETF has defined two classes ofVPNs,VPNs: Layer 2 VPNs(L2VPN)(L2VPNs) and Layer 3 VPNs(L3VPN).(L3VPNs). [L2VPN-OAM] provides the requirements and framework for OAM in the context ofLayer 2 Virtual Private Networks (L2VPN),L2VPNs, and specifically it also defines the OAM layering of L2VPNs over MPLS. [L3VPN-OAM] provides a framework for the operation and management ofLayer 3 Virtual Private Networks (L3VPNs).L3VPNs. 4.5. MPLS-TP OAM 4.5.1. Overview The MPLS working group has defined the OAM toolset that fulfills the requirements for MPLS-TP OAM. The full set of requirements forMPLS- TPMPLS-TP OAM are defined in[MPLS-TP-OAM],[MPLS-TP-OAM] and include both general requirements for the behavior of the OAM tools and a set of operations that should be supported by the OAM toolset. The set of mechanisms required are further elaborated in [TP-OAM-FW], which describes the general architecture of the OAM systemas well as givingand also gives overviews of the functionality of the OAM toolset. Some of the basic requirements for the OAM toolset for MPLS-TP are: o MPLS-TP OAM must be able to support both anIP basedIP-based environment andnon-IP baseda non-IP-based environment. If the network is IP based, i.e., IP routing and forwarding are available, then the MPLS-TP OAM toolset should rely on the IP routing and forwarding capabilities. On the other hand, in environments where IP functionality is not available, the OAM tools must still be able to operate without dependence on IP forwarding and routing. o OAM packets and the user traffic are required to be congruent (i.e., OAM packets are transmittedin-band)in-band), and there is a need to differentiate OAM packets from ordinary user packets in the data plane. Inherent in this requirement is the principle that MPLS-TP OAM be independent of any existingcontrol-plane,control plane, although it should not preclude use of the control-plane functionality. OAM packets are identified by the Generic Associated Channel Label (GAL), which is a reserved MPLS label value (13). 4.5.2. Terminology Maintenance Entity (ME) The MPLS-TP OAM tools are designed to monitor and manage a Maintenance Entity (ME). An ME, as defined in [TP-OAM-FW], defines a relationship between two points of a transport path to which maintenance and monitoring operations apply. The termMaintenance"Maintenance Entity(ME)(ME)" is used in ITU-T Recommendations (e.g., [ITU-T-Y1731]), as well as in the MPLS-TP terminology ([TP-OAM-FW]). Maintenance Entity Group (MEG) The collection of one or more MEs thatbelongsbelong to the same transport path and that are maintained and monitored as a group are known as a Maintenance Entity Group (based on [TP-OAM-FW]). Maintenance Point (MP) A Maintenance Point (MP) is a functional entity that is defined at a node in thenetwork,network and can initiate and/or react to OAM messages. This document focuses on the data-plane functionality of MPs, while MPs interact with the control plane and with the management plane as well. The termMP"MP" is used in IEEE802.1ag,802.1ag and was similarly adopted in MPLS-TP ([TP-OAM-FW]).MaintenanceMEG End Point (MEP) AMaintenanceMEG End Point (MEP) is one of theend pointsendpoints of an ME, and can initiate OAM messages and respond to them (based on [TP-OAM-FW]).MaintenanceMEG Intermediate Point (MIP) In between MEPs, there are zero or more intermediate points, calledMaintenance Entity GroupMEG Intermediate Points (based on [TP-OAM-FW]). AMaintenanceMEG Intermediate Point (MIP) is an intermediate point that does not generally initiate OAM frames (one exception to this is the use of AISnotifications),notifications) but is able to respond to OAM frames that are destined to it. A MIP in MPLS-TP identifies OAM packets destined to it by the expiration of the TTL field in the OAM packet. The termMaintenance Point"Maintenance Point" is a general term for MEPs and MIPs. Up and Down MEPsTheIEEE 802.1ag [IEEE802.1Q] defines a distinction between Up MEPs and Down MEPs. A MEP monitors trafficeitherin either the direction facing thenetwork,network orinthe direction facing the bridge. A Down MEP is a MEP that receives OAM packetsfrom,from and transmits them to the direction of the network. An Up MEP receives OAM packetsfrom,from and transmits them to the direction of the bridging entity. MPLS-TP([TP- OAM-FW])([TP-OAM-FW]) uses a similar distinction on the placement of the MEP- either-- at either the ingress, egress, or forwarding function of the node (Down / Up MEPs). This placement is important for localization of a failure. Note that the termsUp"Up MEP" andDown MEPs"Down MEP" are entirely unrelated to the conventionalup/down"Up"/"Down" terminology, wheredown"Down" meansfaulty,faulty andup is nonfaulty."Up" means not faulty. The distinction between Up and Down MEPs was defined in [TP-OAM-FW], but has not been used in other MPLS-TP RFCs, as of the writing of this document. 4.5.3. Generic Associated Channel In order to address the requirement for in-band transmission ofMPLS- TPMPLS-TP OAM traffic, MPLS-TP uses a Generic Associated Channel (G-ACh), defined in [G-ACh] for LSP-based OAM traffic. This mechanism is based on the same concepts as the PWE3 ACH [PW-ACH] and VCCV [VCCV] mechanisms. However, to address the needs of LSPs as differentiated from PW, the following concepts were defined for [G-ACh]: o An Associated Channel Header (ACH),thatwhich uses a format similar to the PW Control Word [PW-ACH], is a 4-byte header that is prepended to OAM packets. o A Generic Associated Channel Label (GAL). The GAL is a reserved MPLS label value (13) that indicates that the packet is an ACH packet and the payload follows immediately after the label stack. It should be noted that while the G-ACh was defined as part of the MPLS-TP definition effort, the G-ACh is a generic tool that can be used in MPLS in general, and not only in MPLS-TP. 4.5.4. MPLS-TP OAM Toolset To address the functionality that is required of the OAM toolset, the MPLS WG conducted an analysis of the existing IETF and ITU-T OAM tools and their ability to fulfill the required functionality. The conclusions of this analysis are documented in [OAM-Analys]. MPLS-TP uses a mixture of OAM tools that are based on previousstandards,standards and adapted to the requirements of [MPLS-TP-OAM]. Some of the main building blocks of this solution are based on: o Bidirectional Forwarding Detection ([BFD], [BFD-LSP]) for proactivecontinuity checkContinuity Check andconnectivity verification.Connectivity Verification. o LSP Ping as defined in [LSP-Ping] for on-demandconnectivity verification.Connectivity Verification. o New protocol packets, using G-ACH, to address different functionality. o Performance measurementprotocols that are based on the functionality that is described in [ITU-T-Y1731].protocols. The followingsub-sectionssubsections describe the OAM tools defined for MPLS-TP as described in [TP-OAM-FW]. 4.5.4.1. Continuity Check and Connectivity Verification ContinuityCheckChecks and Connectivity Verification are presented in Section2.2.7.2.2.7 of this document. As presented there, these tools may be used either proactively oron-demand.on demand. When using these tools proactively, they are generally used in tandem. For MPLS-TP there are two distincttools,tools: the proactive tool is defined in[TP-CC-CV][TP-CC-CV], while the on-demand tool is defined in [OnDemand-CV]. In on-demand mode, this function should support monitoring between the MEPs and, in addition, between a MEP and MIP. [TP-OAM-FW] highlights, when performing Connectivity Verification, the need for the CC-V messages to include unique identification of the MEG that is being monitored and the MEP that originated the message. The proactive tool [TP-CC-CV] is based on extensions to BFD (see Section4.3.)4.3) with the additional limitation that the transmission and receiving rates are based on configuration by the operator. The on-demand tool [OnDemand-CV] is an adaptation of LSP Ping (see Section4.4.)4.4.1) for the required behavior of MPLS-TP. 4.5.4.2. Route Tracing [MPLS-TP-OAM] defines that there is a need for functionality that would allow a pathend-pointendpoint to identify the intermediate andend- pointsendpoints of the path. This function would be used in on-demand mode. Normally, this path will be used for bidirectional PW, LSP, andsections,Sections; however, unidirectional paths may be supported only if a return path exists. The tool for this is based on the LSP Ping (see Section4.4.)4.4.1) functionality and is described in [OnDemand-CV]. 4.5.4.3. Lock Instruct The Lock Instruct function [Lock-Loop] is used to notify atransporttransport- pathend-pointendpoint of an administrative need to disable the transport path. This functionality will generally be used in conjunction with some intrusive OAM function, e.g.,Performance measurement, Diagnosticperformance measurement or diagnostic testing, to minimize the side-effect on user data traffic. 4.5.4.4. Lock Reporting Lock Reporting is a function used by anend-pointendpoint of a path to report to its far-endend-pointendpoint that a lock condition has been affected on the path. 4.5.4.5. Alarm Reporting AlarmReportingreporting [TP-Fault] provides the means to suppress alarms following detection of defect conditions at the server sub-layer. Alarm reporting is used by an intermediate point of a path, that becomes aware of a fault on the path, to report to theend-pointsendpoints of the path. [TP-OAM-FW] states that this may occur as a result of a defect condition discovered at a server sub-layer. This generates an Alarm Indication Signal (AIS) that continues until the fault is cleared. The consequent action of this function is detailed in [TP-OAM-FW]. 4.5.4.6. Remote Defect Indication Remote Defect Indication (RDI) is used proactively by a pathend- pointendpoint to report to its peerend-pointendpoint that a defect is detected on a bidirectional connection between them. [MPLS-TP-OAM] points out that this function may be applied to a unidirectional LSP only if a return path exists. [TP-OAM-FW] points out that this function is associated with the proactive CC-V function. 4.5.4.7. Client Failure Indication Client Failure Indication (CFI) is defined in [MPLS-TP-OAM] to allow the propagation information from one edge of the network to the other. The information concerns a defect to a client, in the case that the client does not support alarm notification. 4.5.4.8. Performance Monitoring The definition of MPLS performance monitoring was motivated by the MPLS-TP requirements[MPLS-TP-OAM],[MPLS-TP-OAM] but was defined generically for MPLS in [MPLS-LM-DM]. An additional document [TP-LM-DM] defines a performance monitoring profile for MPLS-TP. 4.5.4.8.1. Packet Loss Measurement (LM) Packet Loss Measurement is a function used to verify the quality of the service. Packet loss, as defined in [IPPM-1LM] and [MPLS-TP-OAM], indicates the ratio of the number of user packets lost to the total number of user packets sent during a defined time interval. There are two possible ways of determining this measurement: o Using OAM packets, it is possible to compute the statistics based on a series of OAM packets. This, however, has the disadvantage of beingartificial,artificial and may not be representative since part of the packet loss may be dependent upon packet sizes and upon the implementation of the MEPs that take part in the protocol. oSending delimitingDelimiting messagesforcan be sent at the start and end of a measurement period during which the source and sink of the path count the packets transmitted and received. After the end delimiter, the ratio would be calculated by the path OAM entity. 4.5.4.8.2. Packet Delay Measurement (DM) Packet Delay Measurement is a function that is used to measure one- way or two-way delay of a packet transmission between a pair of theend-pointsendpoints of a path (PW, LSP, or Section). Where: o One-way packet delay, as defined in [IPPM-1DM], is the time elapsed from the start of transmission of the first bit of the packet by a source node until the reception of the last bit of that packet by the destination node. Note that one-way delay measurement requires the clocks of the twoend-pointsendpoints to be synchronized. o Two-way packet delay, as defined in [IPPM-2DM], is the time elapsed from the start of transmission of the first bit of the packet by a source node until the reception of the last bit of theloop-backedlooped-back packet by the same source node, when the loopback is performed at the packet's destination node. Note that due to possible path asymmetry, the one-way packet delay from oneend- pointendpoint to another is not necessarily equal to half of the two-way packet delay. As opposed to one-way delay measurement, two-way delay measurement does not require the twoend-pointsendpoints to be synchronized. For each of these two metrics, the DM function allows the MEP to measure the delay, as well as the delay variation. Delay measurement is performed by exchanging timestamped OAM packets between the participating MEPs. 4.6. Pseudowire OAM 4.6.1. Pseudowire OAMusingUsing Virtual Circuit Connectivity Verification (VCCV) VCCV, as defined in [VCCV], provides a means for end-to-end fault detection anddiagnosticsdiagnostic tools to be used for PWs (regardless of the underlying tunneling technology). The VCCV switching function provides acontrol channelControl Channel associated with each PW. [VCCV] defines three Control Channel (CC) types, i.e., three possible methods for transmitting and identifying OAM messages: oCCControl Channel Type 1: In-band VCCV, as described in [VCCV], is also referred to as "PWE3 Control Word with 0001b as first nibble". It uses the PW Associated Channel Header [PW-ACH]. oCCControl Channel Type 2: Out-of-bandVCCVVCCV, as described in [VCCV], is also referred to as "MPLS Router Alert Label". In thiscasecase, thecontrol channelControl Channel is created by using the MPLS router alert label [MPLS-ENCAPS] immediately above the PW label. oCCControl Channel Type 3: TTL expiryVCCVVCCV, as described in [VCCV], is also referred to as "MPLS PW Label with TTL == 1", i.e., thecontrol channelControl Channel is identified when the value of the TTL field in the PW label is set to 1. VCCV currently supports the following OAM tools: ICMP Ping, LSP Ping, and BFD. ICMP and LSP Ping are IP encapsulated before being sent over the PW ACH. BFD for VCCV [BFD-VCCV] supports two modes of encapsulation--- either IP/UDP encapsulated (with IP/UDP header) or PW-ACH encapsulated (with no IP/UDP header) -- and provides support to signal the AC status. The use of the VCCVcontrol channelControl Channel provides the context, based on the MPLS-PW label, required to bind and bootstrap the BFD session to a particularpseudo wirepseudowire (FEC), eliminating the need to exchange Discriminator values. VCCV consists of two components: (1) the signaled component to communicate VCCV capabilities as part of the VC label, and (2) the switching component to cause the PW payload to be treated as a control packet. VCCV is not directly dependent upon the presence of a control plane. The VCCV capability advertisement may be performed as part of the PW signaling when LDP is used. In case of manual configuration of the PW, it is the responsibility of the operator to set consistent options at both ends. The manual option was created specifically to handle MPLS-TP use cases where no control plane was a requirement. However, new use cases such as pure mobile backhaul find this functionality useful too. The PWE3 working group has conducted an implementation survey of VCCV[VCCV-SURVEY], which[VCCV-SURVEY] that analyzes which VCCV mechanisms are used in practice. 4.6.2. Pseudowire OAMusingUsing G-ACh As mentioned above, VCCV enables OAM for PWs by using acontrol channelControl Channel for OAM packets. When PWs are used in MPLS-TP networks, rather than thecontrol channelsControl Channels defined in VCCV, the G-ACh can be used as an alternativecontrol channel.Control Channel. The usage of the G-ACh for PWs is defined in [PW-G-ACh]. 4.6.3. Attachment Circuit - Pseudowire Mapping The PWE3 working group has defined a mapping and notification of defect states between a pseudowire (PW) and the Attachment Circuits (ACs) of the end-to-end emulated service. This mapping is of key importance to the end-to-end functionality. Specifically, the mapping is provided by [PW-MAP], by [L2TP-EC] for L2TPv3 pseudowires, and by Section 5.3 of [ATM-L2] for ATM. [L2VPN-OAM] provides the requirements and framework for OAM in the context of Layer 2 Virtual Private Networks(L2VPN),(L2VPNs), and specifically it also defines the OAM layering of L2VPNs over pseudowires. The mapping defined in [Eth-Int] allows an end-to-end emulated Ethernet service over pseudowires. 4.7. OWAMP and TWAMP 4.7.1. Overview The IPPM working group in the IETF defines common criteria and metrics for measuring performance of IP traffic ([IPPM-FW]). Some of the key RFCs published by this working group have defined metrics for measuring connectivity [IPPM-Con], delay ([IPPM-1DM], [IPPM-2DM]), and packet loss [IPPM-1LM]. It should be noted that the work of the IETF in the context of performance metrics is not limited to IP networks; [PM-CONS] presents general guidelines for considering new performance metrics. The IPPM working group has defined not only metrics for performancemeasurement,measurement but also protocols that define how the measurement is carried out. TheOne-wayOne-Way Active Measurement Protocol [OWAMP] and the Two-Way Active Measurement Protocol [TWAMP] each define a method and protocol for measuring performance metrics in IP networks. OWAMP [OWAMP] enables measurement of one-way characteristics of IP networks, such as one-way packet loss and one-way delay. For its properoperationoperation, OWAMP requires accuratetime of daytime-of-day setting at itsend points.endpoints. TWAMP [TWAMP] is a similar protocol that enables measurement of both one-way and two-way(round trip)(round-trip) characteristics. OWAMP and TWAMP arebotheach comprised of two separate protocols: o OWAMP-Control/TWAMP-Control: used to initiate, start, and stop test sessions and to fetch their results. Continuity Check and Connectivity Verification are tested and confirmed by establishing the OWAMP/TWAMP Control Protocol TCP connection. o OWAMP-Test/TWAMP-Test: used to exchange test packets between two measurement nodes. Enables the loss and delay measurement functions, as well as detection of other anomalies, such as packet duplication and packet reordering. It should be noted that while [OWAMP] and [TWAMP] define tools for performance measurement, they do not define the accuracy of these tools. The accuracy depends on scale,implementationimplementation, and network configurations. Alternative protocols for performance monitoring are defined, for example, in MPLS-TP OAM ([MPLS-LM-DM],[TP-LM-DM]),[TP-LM-DM]) and in Ethernet OAM [ITU-T-Y1731]. 4.7.2. Control and Test Protocols OWAMP and TWAMP control protocols run over TCP, while the test protocols run over UDP. The purpose of the control protocols is to initiate, start, and stop test sessions, and for OWAMP to fetch results. The test protocols introduce test packets (which contain sequence numbers and timestamps) along the IP path under test according to a schedule, and they record statistics of packet arrival. Multiple sessions may be simultaneously defined, each with a session identifier, and defining the number of packets to be sent, the amount of padding to be added (and thus the packet size), the start time, and the send schedule (which can be either a constant time between test packets or exponentially distributedpseudo-random).pseudorandomly). Statistics recorded conform to the relevant IPPM RFCs. From a security perspective, OWAMP and TWAMP test packets are hard to detect because they are simply UDP streams between negotiated port numbers, with potentially nothing static in the packets. OWAMP and TWAMP also include optional authentication and encryption for both control and test packets. 4.7.3. OWAMP OWAMP defines the following logical roles: Session-Sender,Session- Receiver,Session-Receiver, Server, Control-Client, and Fetch-Client. TheSession- SenderSession-Sender originates test traffic that is received by theSession- Receiver.Session-Receiver. The Server configures and manages the session, as well as returning the results. The Control-Client initiates requests for test sessions, triggers their start, and may trigger their termination. The Fetch-Client requests the results of a completed session. Multiple roles may be combined in a single host--- for example, one host may play the roles of Control-Client, Fetch-Client, and Session-Sender, and a secondplayingmay play the roles of Server and Session-Receiver. In a typical OWAMPsessionsession, the Control-Client establishes a TCP connection to port 861 of the Server, which responds with aserverServer greeting message indicating supported security/integrity modes. The Control-Client responds with the chosen communicationsmodemode, and the Server accepts the mode. The Control-Client then requests and fully describes a test session to which the Server responds with its acceptance and supporting information. More than one test session may be requested with additional messages. The Control-Client then starts a testsession andsession; the Serveracknowledges,acknowledges and then instructs the Session-Sender to start the test. The Session-Sender then sends test packets with pseudorandom padding to the Session-Receiver until the session is complete or until theControl-clientControl-Client stops the session. Once finished, the Session-Sender reports to theServerServer, which recovers data from the Session-Receiver. The Fetch-Client can then send a fetch request to the Server, which responds with an acknowledgementandand, immediatelythereafterthereafter, the result data. 4.7.4. TWAMP TWAMP defines the following logical roles:session-sender, session- reflector, server,Session-Sender, Session-Reflector, Server, andcontrol-client.Control-Client. These are similar to the OWAMP roles, except that the Session-Reflector does not collect any packet information, and there is no need for a Fetch-Client. In a typical TWAMPsessionsession, the Control-Client establishes a TCP connection to port 862 of the Server, and the mode is negotiated as in OWAMP. The Control-Client then requests sessions and starts them. The Session-Sender sends test packets with pseudorandom padding to theSession-ReflectorSession-Reflector, which returns them withinsertion of timestamps.timestamps inserted. 4.8. TRILL The requirements of OAM in TRILL are defined in [TRILL-OAM]. The challenge in TRILL OAM, much like in MPLS networks, is that traffic between RBridges RB1 and RB2 may be forwarded through more than one path. Thus, an OAM protocol between RBridges RB1 and RB2 must be able to monitor all the available paths between the twoRBridge.RBridges. During the writing of thisdocumentdocument, the detailed definition of the TRILL OAM toolsareis still work in progress. This subsection presents the main requirements of TRILL OAM. The main requirements defined in [TRILL-OAM] are: o Continuity Checking (CC) - the TRILL OAM protocol must support a function for CC between any two RBridges RB1 and RB2. o Connectivity Verification (CV) - connectivity between two RBridges RB1 and RB2 can be verified on a per-flow basis. o Path Tracing - allows an RBridge to trace all the available paths to a peer RBridge. o Performance monitoring - allows an RBridge to monitor the packet loss and packet delay to a peer RBridge. 5. Summary This section summarizes the OAM tools and functions presented in this document. This summary is an index to some of the main OAM tools defined in the IETF. This compact indexthatcan be useful to all readers from network operators to standards development organizations. The summary includes a short subsection that presents some guidance to network equipment vendors. 5.1. Summary of OAM Tools This subsection provides a short summary of each of the OAM toolsets described in this document. A detailed list of the RFCs related to each toolset is given in Appendix A.1. +-----------+------------------------------------------+------------+ | Toolset | Description | Transport | | | | Technology | +-----------+------------------------------------------+------------+ |IP Ping | Ping ([IntHost], [NetTerms]) is a simple | IPv4/IPv6 | | | application for testing reachability that| | | | uses ICMP Echo messages ([ICMPv4], | | | | [ICMPv6]). | | +-----------+------------------------------------------+------------+ |IP | Traceroute ([TCPIP-Tools], [NetTools]) is| IPv4/IPv6 | |Traceroute | an application that allows users to trace| | | | the path between an IP source and an IP | | | | destination, i.e., to identify the nodes | | | | along the path. If more than one path | | | | exists between the source anddestination|| | | | destination, Traceroute traces *a* path.The most| | | | The most common implementation ofTraceroute| | | | Traceroute uses UDP probe messages,although there| | | |arealthough there are other implementationsthat use| | | | that use different probes, such as ICMPor TCP.| | | | or TCP. Paris Traceroute [PARIS] is anextension| | | | extension that attempts todiscoversdiscover allthe| | | | the available paths from A to B byscanning| | | | scanning different values of header | | | | fields. | | +-----------+------------------------------------------+------------+ |BFD | Bidirectional Forwarding Detection (BFD) | generic | | | is defined in [BFD] as a framework for a | | | | lightweight generic OAM tool. The | | | | intention is to define a base tool | | | | that can be used with various | | | | encapsulation types, network | | | | environments, andinvarious medium | | | | types. | | +-----------+------------------------------------------+------------+ |MPLS OAM | MPLS LSP Ping, as defined in [MPLS-OAM], | MPLS | | |[MPLS-OAM-FW][MPLS-OAM-FW], and [LSP-Ping], is an OAM | | | | tool for point-to-point and | | | | point-to-multipointMLPSMPLS LSPs. | | | | It includes two main functions: Ping and | | | | Traceroute. | | | | BFD [BFD-LSP] is an alternative means for| | | | detecting MPLS LSPdata planedata-plane failures. | | +-----------+------------------------------------------+------------+ |MPLS-TP OAM| MPLS-TP OAM is defined in a set of RFCs. | MPLS-TP | | | The OAM requirements for MPLS Transport | | | | Profile (MPLS-TP) are defined in | | | | [MPLS-TP-OAM]. Each of the tools in the | | | | OAM toolset is defined in its own RFC, as| | | | specified inSectionAppendix A.1. | | +-----------+------------------------------------------+------------+ |Pseudowire | The PWE3 OAM architecture definescontrol|Control| Pseudowire | |OAM |channelsChannels that support the use of existing| | | | IETF OAM tools to be used for a pseudo- | | | | wire (PW). Thecontrol channelsControl Channels that are| | | | defined in [VCCV] and [PW-G-ACh] may be | | | | used in conjunction with ICMP Ping, LSP | | | | Ping, and BFD to perform CC and CV | | | | functionality. Inadditionaddition, thechannels |channels| | | | support use of any of theMPLS-TP basedMPLS-TP-based | | | | OAM tools for completing their respective| | | | OAM functionality for a PW. | | +-----------+------------------------------------------+------------+ |OWAMP and | TheOne WayOne-Way Active Measurement Protocol | IPv4/IPv6 | |TWAMP | [OWAMP] and theTwo WayTwo-Way Active Measure- | | | | mentProtocolsProtocol [TWAMP] are two protocols | | | | defined in the IP Performance Metrics | | | | (IPPM) working group in the IETF. These | | | | protocols allow various performance | | | | metrics to be measured, such as packet | | | | loss,delay anddelay, delay variation, | | | |duplicationduplication, and reordering. | | +-----------+------------------------------------------+------------+ |TRILL OAM | The requirements of OAM in TRILL are | TRILL | | | defined in [TRILL-OAM]. These | | | | requirements includecontinuity checking,|Continuity Checking,| | | |connectivity verification,Connectivity Verification, pathtracingtracing, | | | | and performance monitoring. During the | | | | writing of thisdocumentdocument, the detailed | | | | definition of the TRILL OAM tools | | | | is work in progress. | | +-----------+------------------------------------------+------------+ Table33: Summary ofOAM-relatedOAM-Related IETF Tools 5.2. Summary of OAM Functions Table 4 summarizes the OAM functions that are supported in each of the toolsets that were analyzed in this section. The columns of thistablestable are the typical OAM functions described in Section 1.3.+-----------+-------+--------+--------+-------+----------++-----------+----------+-------------+----------+----------+-----------+ ||Continu|Connecti|Path |Perform|Other|Continuity|Connectivity |Path |Perf. |Other | ||ity |vity |Discover|ance |FunctionToolset |Check |Verification |Discovery |Monitoring|Functions | ||Check |Verifica|y |Monitor|s| |Toolset||tion||ing| |+-----------+-------+--------+--------+-------+----------++-----------+----------+-------------+----------+----------+-----------+ |IP Ping |Echo | | | | |+ --------- + ----- + ------ + ------ + ----- + -------- ++-----------+----------+-------------+----------+----------+-----------+ |IP | ||Tracerou||Traceroute| | | |Traceroute | ||te| | |+ --------- + ----- + ------ + ------ + ----- + -------- +| +-----------+----------+-------------+----------+----------+-----------+ |BFD |BFD |BFD Control | | |RDIusi-using | ||Control|Control|Control/ | ||ng BFD| |BFD Control| ||/ Echo|Echo | | ||Control|+ --------- + ----- + ------ + ------ + ----- + -------- +| +-----------+----------+-------------+----------+----------+-----------+ |MPLS OAM | |"Ping"|"Tracero|mode |"Trace- | | | |(LSP Ping) ||mode |ute"| |route" | | | | | | |mode | | |+ --------- + ----- + ------ + ------ + ----- + -------- ++-----------+----------+-------------+----------+----------+-----------+ |MPLS-TP |CC|CV/pro-|CV/proactive |Route |-LM|-Diagnos- ||-Diagnostic| |OAM ||active|or on demand |Tracing |-DM |ticTest | | ||or on-| | | |-Lock | | ||demand| | | |-Alarm | | | | | ||Reporting| Reporting | | | | | | |-Client | | | | | ||Failure| Failure | | | | | | ||Indication|Indication| | | | | | |-RDI |+ --------- + ----- + ------ + ------ + ----- + -------- ++-----------+----------+-------------+----------+----------+-----------+ |Pseudowire |BFD |-BFD|LSP-Ping||LSP Ping | | | |OAM | |-ICMP| | | | | | |Ping | | | | | ||-LSP- | | | | | | ||-LSP Ping | | | |+ --------- + ----- + ------ + ------ + ----- + -------- ++-----------+----------+-------------+----------+----------+-----------+ |OWAMP and | - control ||-Delay|-DM | | |TWAMP | protocol || measur| | | | | | ement | | | | | |-Packet| | | | | | loss | | | | | | measur| | | | | | ement|-LM | |+ --------- + ----- + ------ + ------ + ----- + -------- ++-----------+----------+-------------+----------+----------+-----------+ |TRILL OAM |CC |CV |Path|-Delay|-DM | | | | | |tracing| measur| | | | | | | ement | | | | | | |-Packet| | | | | | | loss | | | | | | | measur| | | | | | | ement|-LM | |+-----------+-------+--------+--------+-------+----------++-----------+----------+-------------+----------+----------+-----------+ Table44: Summary of the OAM Functionality in IETF OAM Tools 5.3. Guidance to Network Equipment Vendors As mentioned in Section1.4. ,1.4, it is imperative for OAM tools to be capable of testing the actual data planeinwith as much accuracy as possible. While this guideline may appear obvious, it is worthwhile to emphasize the key importance of enforcing fate-sharing between OAM traffic that monitors the data plane and thedata planedata-plane traffic it monitors. 6. Security Considerations OAM is tightly coupled with the stability of the network. A successful attack on an OAM protocol can create a false illusion ofnon-existent failures,nonexistent failures or prevent the detection of actual ones. In bothcasescases, the attack may result in denial of service. Some of the OAM tools presented in this document include security mechanisms that provide integrity protection, thereby preventing attackers from forging or tampering with OAM packets. For example, [BFD] includes an optional authentication mechanism for BFD Control packets, using either SHA1, MD5, or a simple password. [OWAMP] and [TWAMP] have3three modes of security: unauthenticated, authenticated, and encrypted. The authentication uses SHA1 as the HMAC algorithm, and the encrypted mode uses AES encryption. Confidentiality is typically not considered a requirement for OAM protocols. However, the use of encryption (e.g., [OWAMP] and [TWAMP]) can make it difficult for attackers to identify OAM packets, thus making it more difficult to attack the OAM protocol. OAM can also be used as a means for network reconnaissance; information about addresses, portnumbersnumbers, andaboutthe network topology and performance can be gatheredeitherby either passively eavesdroppingtoon OAMpackets,packets orbyactively sending OAM packets and gathering information from the respective responses. This information can then be used maliciously to attack the network. Note that some of this information, e.g., addresses and port numbers, can begathergathered even when encryption is used ([OWAMP], [TWAMP]). For further details about the security considerations of each OAM protocol, the reader is encouraged to review the Security Considerations section of each document referenced by this memo. 7.IANA Considerations There are no new IANA considerations implied by this document. 8.Acknowledgments The authors gratefully acknowledge Sasha Vainshtein, Carlos Pignataro, David Harrington, Dan Romascanu, Ron Bonica, Benoit Claise, Stewart Bryant, Tom Nadeau, Elwyn Davies, Al Morton, Sam Aldrin, Thomas Narten, and other members of the OPSA WG for their helpful comments on the mailing list. This document was originally prepared using 2-Word-v2.0.template.dot.9.8. References9.1.8.1. Normative References [OAM-Def] Andersson, L.,Vanvan Helvoort, H., Bonica, R., Romascanu, D., and S. Mansfield,S.,"Guidelines for theuseUse of theOAM acronym"OAM" Acronym in theIETF ",IETF", BCP 161, RFC 6291, June 2011.9.2.8.2. Informative References [ATM-L2] Singh, S., Townsley, M., and C. Pignataro, "Asynchronous Transfer Mode (ATM) over Layer 2 Tunneling Protocol Version 3 (L2TPv3)", RFC 4454, May 2006. [BFD] Katz,D.,D. and D. Ward,D.,"Bidirectional Forwarding Detection (BFD)", RFC 5880, June 2010. [BFD-Gen] Katz,D.,D. and D. Ward,D.,"Generic Application of Bidirectional Forwarding Detection (BFD)", RFC 5882, June 2010. [BFD-IP] Katz,D.,D. and D. Ward,D.,"Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)", RFC 5881, June 2010. [BFD-LSP] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow,G.,"Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)", RFC 5884, June 2010. [BFD-Multi] Katz,D.,D. and D. Ward,D.,"Bidirectional Forwarding Detection (BFD) for Multihop Paths", RFC 5883, June 2010. [BFD-VCCV] Nadeau, T., Ed., and C. Pignataro,C.,Ed., "Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity Verification (VCCV)", RFC 5885, June 2010. [Comp] Bonaventure, O., "Computer Networking: Principles, Protocols and Practice", 2008. [Dup] Uijterwaal, H., "A One-Way Packet Duplication Metric", RFC 5560, May 2009. [Eth-Int] Mohan, D., Ed., Bitar, N., Ed., Sajassi, A.,Delord,Ed., DeLord, S., Niger, P., and R. Qiu,R.,"MPLS and Ethernet Operations, Administration, and Maintenance (OAM) Interworking", RFC 7023, October 2013. [G-ACh] Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant,S.,Ed., "MPLS Generic Associated Channel", RFC 5586, June 2009. [ICMP-Ext] Bonica, R., Gan, D., Tappan, D., and C. Pignataro,C.,"ICMP Extensions for Multiprotocol Label Switching", RFC 4950, August 2007. [ICMP-Int] Atlas, A., Ed., Bonica, R., Ed., Pignataro, C., Ed., Shen, N., and JR. Rivers,JR.,"Extending ICMP for Interface and Next-Hop Identification", RFC 5837, April 2010. [ICMP-MP] Bonica, R., Gan, D., Tappan, D., and C. Pignataro,C.,"Extended ICMP to Support Multi-Part Messages", RFC 4884, April 2007. [ICMPv4] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792, September 1981. [ICMPv6] Conta, A., Deering, S., and M. Gupta, Ed., "Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification", RFC 4443, March 2006. [IEEE802.1Q]IEEE 802.1Q,IEEE, "IEEE Standard for Local and metropolitan area networks - Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks", IEEE 802.1Q, October 2012. [IEEE802.3ah]IEEE 802.3,IEEE, "IEEE Standard for Information technology - Local and metropolitan area networks - Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications", IEEE 802.3ah, clause 57, December 2008. [IntHost] Braden, R., Ed., "Requirements for Internet Hosts--- Communication Layers", STD 3, RFC 1122, October 1989. [IPPM-1DM] Almes, G., Kalidindi, S., and M. Zekauskas,M.,"A One-way Delay Metric for IPPM", RFC 2679, September 1999. [IPPM-1LM] Almes, G., Kalidindi, S., and M. Zekauskas,M.,"A One-way Packet Loss Metric for IPPM", RFC 2680, September 1999. [IPPM-2DM] Almes, G., Kalidindi, S., and M. Zekauskas,M.,"ARound-tripRound- trip Delay Metric for IPPM", RFC 2681, September 1999. [IPPM-Con] Mahdavi,J.,J. and V. Paxson,V.,"IPPM Metrics for Measuring Connectivity", RFC 2678, September 1999. [IPPM-FW] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis,M.,"Framework for IP Performance Metrics", RFC 2330, May 1998. [ITU-G8113.1]ITU-T Recommendation G.8113.1/Y.1372.1,ITU-T, "Operations, Administration and Maintenance mechanism for MPLS-TP in Packet Transport Network (PTN)", ITU-T Recommendation G.8113.1/Y.1372.1, November 2012. [ITU-G8113.2]ITU-T Recommendation G.8113.2/Y.1372.2,ITU-T, "Operations, administration and maintenance mechanisms for MPLS-TP networks using the tools defined for MPLS", ITU-T Recommendation G.8113.2/Y.1372.2, November 2012. [ITU-T-CT] Betts, M., "Allocation of a Generic Associated Channel Type for ITU-T MPLS Transport Profile Operation, Maintenance, and Administration (MPLS-TP OAM)", RFC 6671, November 2012. [ITU-T-G.806]ITU-T Recommendation G.806,ITU-T, "Characteristics of transport equipment - Description methodology and generic functionality", ITU-T Recommendation G.806, January 2009. [ITU-T-Y1711]ITU-T Recommendation Y.1711,ITU-T, "Operation & Maintenance mechanism for MPLS networks", ITU-T Recommendation Y.1711, February 2004. [ITU-T-Y1731]ITU-T Recommendation G.8013/Y.1731,ITU-T, "OAM Functions and Mechanisms for Ethernet-based Networks", ITU-T Recommendation G.8013/Y.1731, July 2011. [ITU-Terms]ITU-R/ITU-TITU-R/ITU-T, "ITU-R/ITU-T Terms andDefinitions, online, 2013.Definitions", 2013, <http://www.itu.int/pub/R-TER-DB>. [L2TP-EC] McGill, N. and C. Pignataro, "Layer 2 Tunneling Protocol Version 3 (L2TPv3) Extended Circuit Status Values", RFC 5641, August 2009. [L2VPN-OAM] Sajassi, A., Ed., and D. Mohan,D.,Ed., "Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework", RFC 6136, March 2011. [L3VPN-OAM] El Mghazli, Y., Ed., Nadeau, T., Boucadair, M., Chan, K., and A. Gonguet,A.,"Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management", RFC 4176, October 2005. [Lock-Loop] Boutros, S., Ed., Sivabalan, S., Ed., Aggarwal, R., Ed., Vigoureux, M., Ed., and X. Dai,X.,Ed., "MPLS Transport Profile Lock Instruct and Loopback Functions", RFC 6435, November 2011. [LSP-Ping] Kompella,K.,K. and G. Swallow,G.,"Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures", RFC 4379, February 2006. [Mng] Farrel, A., "Inclusion of Manageability Sections in Path Computation Element (PCE) Working Group Drafts", RFC 6123, February 2011. [MPLS-ENCAPS] Rosen, E., Tappan, D., Fedorkow, G., Rekhter, Y., Farinacci, D., Li,T.T., and A. Conta, "MPLS Label Stack Encoding", RFC 3032, January 2001. [MPLS-LM-DM] Frost,D.,D. and S. Bryant,S.,"Packet Loss and Delay Measurement for MPLS Networks", RFC 6374, September 2011. [MPLS-OAM] Nadeau, T., Morrow, M., Swallow, G., Allan, D., and S. Matsushima,S.,"Operations and Management (OAM) Requirements for Multi-Protocol Label Switched (MPLS) Networks", RFC 4377, February 2006. [MPLS-OAM-FW] Allan, D., Ed., and T. Nadeau,T.,Ed., "A Framework for Multi-Protocol Label Switching (MPLS) Operations and Management (OAM)", RFC 4378, February 2006. [MPLS-P2MP] Yasukawa, S., Farrel, A., King, D., and T. Nadeau,T.,"Operations and Management (OAM) Requirements for Point-to-Multipoint MPLS Networks", RFC 4687, September 2006. [MPLS-TP-OAM] Vigoureux, M., Ed., Ward, D., Ed., and M. Betts,M.,Ed., "Requirements forOAMOperations, Administration, and Maintenance (OAM) in MPLS Transport Networks", RFC 5860, May 2010. [mtrace] Fenner,W.,W. and S. Casner,S.,"A "traceroute" facility for IP Multicast",draft-ietf-idmr-traceroute-ipm-07 (expired),Work in Progress, July 2000. [NetTerms] Jacobsen,O.,O. and D. Lynch,D.,"A Glossary of Networking Terms", RFC 1208, March 1991. [NetTools] Enger,R.,R. and J. Reynolds,J.,"FYI on a Network Management Tool Catalog: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices", FYI 2, RFC 1470, June 1993. [OAM-Analys] Sprecher,N.,N. and L. Fang,L.,"An Overview of theOAM Tool SetOperations, Administration, and Maintenance (OAM) Toolset forMPLS basedMPLS-Based Transport Networks", RFC 6669, July 2012. [OAM-Label] Ohta, H., "Assignment of the 'OAM Alert Label' for Multiprotocol Label Switching Architecture (MPLS) Operation and Maintenance (OAM) Functions", RFC 3429, November 2002. [OAM-Mng] Ersue, M., Ed., and B. Claise,B.,"An Overview of the IETF Network Management Standards", RFC 6632, June 2012. [OnDemand-CV] Gray, E., Bahadur, N., Boutros, S.,Aggarwal,and R. Aggarwal, "MPLS On-Demand Connectivity Verification and Route Tracing", RFC 6426, November 2011. [OWAMP] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M. Zekauskas,M.,"A One-way Active Measurement Protocol (OWAMP)", RFC 4656, September 2006. [PARIS]BriceAugustin,Timur FriedmanB., Friedman, T., andRenataR. Teixeira, "Measuring Load-balanced Paths in the Internet",IMC,IMC '07 Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 2007. [PM-CONS] Clark, A. and B. Claise, "Guidelines for Considering New Performance Metric Development", BCP 170, RFC 6390, October 2011. [PW-ACH] Bryant, S., Swallow, G., Martini, L., and D. McPherson,D.,"Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for Use over an MPLS PSN", RFC 4385, February 2006. [PW-G-ACh] Li, H., Martini, L., He, J., and F. Huang,F.,"Using the Generic Associated Channel Label for Pseudowire in the MPLS Transport Profile (MPLS-TP)", RFC 6423, November 2011. [PW-MAP] Aissaoui, M., Busschbach, P., Martini, L., Morrow, M., Nadeau, T., and Y(J). Stein, "Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping", RFC 6310, July 2011. [Reorder] Morton, A., Ciavattone, L., Ramachandran, G., Shalunov, S., and J. Perser, "Packet Reordering Metrics", RFC 4737, November 2006. [Signal] Yasukawa, S., Ed., "Signaling Requirements forPoint-to- MultipointPoint- to-Multipoint Traffic-Engineered MPLS Label Switched Paths (LSPs)", RFC 4461, April 2006. [TCPIP-Tools] Kessler,G.,G. and S. Shepard,S.,"A Primer On Internet and TCP/IP Tools and Utilities", FYI 30, RFC 2151, June 1997. [TP-CC-CV] Allan, D.,Swallow,Ed., Swallow Ed., G.,Drake, J.,and J. Drake Ed., "Proactive Connectivity Verification, ContinuityCheckCheck, and Remote DefectindicationIndication for the MPLS Transport Profile", RFC 6428, November 2011. [TP-Fault] Swallow, G., Ed., Fulignoli, A., Ed., Vigoureux, M., Ed., Boutros, S., and D. Ward, "MPLS Fault Management Operations, Administration, and Maintenance (OAM)", RFC 6427, November 2011. [TP-LM-DM] Frost, D., Ed., and S. Bryant,S.,Ed., "A Packet Loss and Delay Measurement Profile for MPLS-Based Transport Networks", RFC 6375, September 2011. [TP-OAM-FW] Busi, I., Ed., and D. Allan,D.,Ed., "Operations,AdministrationAdministration, and Maintenance Framework forMPLS-basedMPLS- Based TransportNetworks ",Networks", RFC 6371, September 2011. [TP-Term]Vanvan Helvoort, H., Ed., Andersson, L., Ed., and N. Sprecher,N.,Ed., "A Thesaurus for the Interpretation of TerminologyusedUsed in MPLS Transport Profile (MPLS-TP) Internet-Drafts and RFCs in the Context of the ITU-T's Transport Network Recommendations", RFC 7087, December 2013. [TRILL-OAM] Senevirathne, T., Bond, D., Aldrin, S., Li, Y., and R. Watve,R.,"Requirements for Operations, Administration, and Maintenance (OAM) in Transparent Interconnection of Lots of Links (TRILL)", RFC 6905, March 2013. [TWAMP] Hedayat, K., Krzanowski, R., Morton, A., Yum, K., and J. Babiarz,J.,"A Two-Way Active Measurement Protocol (TWAMP)", RFC 5357, October 2008. [VCCV] Nadeau, T., Ed., and C. Pignataro,C.,Ed., "Pseudowire Virtual Circuit Connectivity Verification (VCCV): A Control Channel for Pseudowires", RFC 5085, December 2007. [VCCV-SURVEY] Del Regno, N., Ed., and A. Malis,A.,Ed., "The Pseudowire (PW) and Virtual Circuit Connectivity Verification (VCCV) Implementation Survey Results", RFC 7079, November 2013. Appendix A. List of OAM Documents A.1. List of IETF OAM Documents Table 5 summarizes theOAM relatedOAM-related RFCspublishedproduced by the IETF. It is important to note that the table lists various RFCs that are different by nature. For example, some of these documents define OAM tools or OAM protocols (or both), while others define protocols that are not strictlyOAM-related,OAM related, but are used by OAM tools. The table also includes RFCs that define the requirements or the framework of OAM in a specific context (e.g., MPLS-TP). The RFCs in the table are categorized in a few sets as defined in Section 1.3. +-----------+--------------------------------------+----------+ | Toolset | Title | RFC | +-----------+--------------------------------------+----------+ |IP Ping | Requirements for Internet Hosts -- | RFC 1122 | | | Communication Layers [IntHost] | | | +--------------------------------------+----------+ | | A Glossary of Networking Terms | RFC 1208 | | | [NetTerms] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 792 | | | [ICMPv4] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 4443 | | | (ICMPv6) for the Internet Protocol | | | | Version 6 (IPv6) Specification | | | | [ICMPv6] | | +-----------+--------------------------------------+----------+ |IP | A Primer On Internet and TCP/IP | RFC 2151 | |Traceroute | Tools and Utilities [TCPIP-Tools] | | | +--------------------------------------+----------+ | | FYI on a Network Management Tool | RFC 1470 | | | Catalog: Tools for Monitoring and | | | | Debugging TCP/IP Internets and | | | | Interconnected Devices [NetTools] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 792 | | | [ICMPv4] | | | +--------------------------------------+----------+ | | Internet Control Message Protocol | RFC 4443 | | | (ICMPv6) for the Internet Protocol | | | | Version 6 (IPv6) Specification | | | | [ICMPv6] | | | +--------------------------------------+----------+ | | Extended ICMP to Support Multi-Part | RFC 4884 | | | Messages [ICMP-MP] | | | +--------------------------------------+----------+ | | Extending ICMP for Interface and | RFC 5837 | | | Next-Hop Identification [ICMP-Int] | | +-----------+--------------------------------------+----------+ |BFD | Bidirectional Forwarding Detection | RFC 5880 | | | (BFD) [BFD] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5881 | | | (BFD) for IPv4 and IPv6 (Single Hop) | | | | [BFD-IP] | | | +--------------------------------------+----------+ | | Generic Application of Bidirectional | RFC 5882 | | | Forwarding Detection[BFD-Gen](BFD)[BFD-Gen] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5883 | | | (BFD) for Multihop Paths [BFD-Multi] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5884 | | | (BFD) for MPLS Label Switched Paths(LSPs)| | | | (LSPs) [BFD-LSP] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5885 | | | for the Pseudowire Virtual Circuit | | | | Connectivity Verification (VCCV) | | | | [BFD-VCCV] | | +-----------+--------------------------------------+----------+ |MPLS OAM | Operations and Management (OAM) | RFC 4377 | | | Requirements for Multi-Protocol Label| | | | Switched (MPLS) Networks [MPLS-OAM] | | | +--------------------------------------+----------+ | | A Framework for Multi-Protocol | RFC 4378 | | | Label Switching (MPLS) Operations | | | | and Management (OAM) [MPLS-OAM-FW] | | | +--------------------------------------+----------+ | | Detecting Multi-Protocol Label | RFC 4379 | | | Switched (MPLS) Data Plane Failures | | | | [LSP-Ping] | | | +--------------------------------------+----------+ | | Operations and Management (OAM) | RFC 4687 | | | Requirements for Point-to-Multipoint | | | | MPLS Networks [MPLS-P2MP] | | | +--------------------------------------+----------+ | | ICMP Extensions for Multiprotocol | RFC 4950 | | | Label Switching [ICMP-Ext] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5884 | | | for MPLS Label Switched Paths (LSPs) | | | | [BFD-LSP] | | +-----------+--------------------------------------+----------+ |MPLS-TP | Requirements forOAM in MPLS-TPOperations, | RFC 5860 | |OAM | Administration, and Maintenance (OAM)| | | | in MPLS Transport Networks | | | | [MPLS-TP-OAM] | | | +--------------------------------------+----------+ | | MPLS Generic Associated Channel | RFC 5586 | | | [G-ACh] | | | +--------------------------------------+----------+ | |MPLS-TP OAM FrameworkOperations, Administration, and | RFC 6371 | | | Maintenance Framework for MPLS-Based | | | | Transport Networks [TP-OAM-FW] | | | +--------------------------------------+----------+ | | Proactive Connectivity Verification, | RFC 6428 | | | Continuity Check, and Remote Defect | | | | Indication for the MPLS Transport | | | | Profile [TP-CC-CV] | | | +--------------------------------------+----------+ | | MPLS On-Demand Connectivity | RFC 6426 | | | Verification and Route Tracing | | | | [OnDemand-CV] | | | +--------------------------------------+----------+ | | MPLS Fault Management Operations, | RFC 6427 | | | Administration, and Maintenance (OAM)| | | | [TP-Fault] | | | +--------------------------------------+----------+ | | MPLS Transport Profile Lock Instruct | RFC 6435 | | | and Loopback Functions [Lock-Loop] | | | +--------------------------------------+----------+ | | Packet Loss and Delay Measurement for| RFC 6374 | | | MPLS Networks [MPLS-LM-DM] | | | +--------------------------------------+----------+ | | A Packet Loss and Delay Measurement | RFC 6375 | | | Profile for MPLS-Based Transport | | | | Networks [TP-LM-DM] | | +-----------+--------------------------------------+----------+ |Pseudowire | Pseudowire Virtual Circuit | RFC 5085 | |OAM | Connectivity Verification (VCCV): | | | | A Control Channel for Pseudowires | | | | [VCCV] | | | +--------------------------------------+----------+ | | Bidirectional Forwarding Detection | RFC 5885 | | | for the Pseudowire Virtual Circuit | | | | Connectivity Verification (VCCV) | | | | [BFD-VCCV] | | | +--------------------------------------+----------+ | | Using the Generic Associated Channel | RFC 6423 | | | Label for Pseudowire in the MPLS | | | | Transport Profile (MPLS-TP) | | | | [PW-G-ACh] | | | +--------------------------------------+----------+ | | Pseudowire (PW) Operations, | RFC 6310 | | | Administration, and Maintenance (OAM)| | | | Message Mapping [PW-MAP] | | | +--------------------------------------+----------+ | | MPLS and Ethernet Operations, | RFC 7023 | | | Administration, and Maintenance (OAM)| | | | Interworking [Eth-Int] | | +-----------+--------------------------------------+----------+ |OWAMP and | A One-way Active Measurement Protocol| RFC 4656 | |TWAMP | (OWAMP) [OWAMP] | | | +--------------------------------------+----------+ | | A Two-Way Active Measurement Protocol| RFC 5357 | | | (TWAMP) [TWAMP] | | | +--------------------------------------+----------+ | | Framework for IP Performance Metrics | RFC 2330 | | | [IPPM-FW] | | | +--------------------------------------+----------+ | | IPPM Metrics for Measuring | RFC 2678 | | | Connectivity [IPPM-Con] | | | +--------------------------------------+----------+ | | A One-way Delay Metric for IPPM | RFC 2679 | | | [IPPM-1DM] | | | +--------------------------------------+----------+ | | A One-way Packet Loss Metric for IPPM| RFC 2680 | | | [IPPM-1LM] | | | +--------------------------------------+----------+ | | A Round-trip Delay Metric for IPPM | RFC 2681 | | | [IPPM-2DM] | | | +--------------------------------------+----------+ | | Packet Reordering Metrics | RFC 4737 | | | [Reorder] | | | +--------------------------------------+----------+ | | A One-Way Packet Duplication Metric | RFC 5560 | | | [Dup] | | +-----------+--------------------------------------+----------+ |TRILL OAM | Requirements for Operations, | RFC 6905 | | | Administration, and Maintenance (OAM)| | | | in Transparent Interconnection of | | | | Lots of Links (TRILL) | | +-----------+--------------------------------------+----------+ Table55: Summary of IETFOAM RelatedOAM-Related RFCs A.2. List of Selected Non-IETF OAM Documents In addition to the OAM tools defined by the IETF, the IEEE and ITU-T have also defined various OAM tools that focus onEthernet,Ethernet and various othertransport networktransport-network environments. These various tools, defined by the three standard organizations, are often tightlycoupled,coupled and have had a mutual effect on each other. The ITU-T and IETF have both defined OAM tools for MPLS LSPs,[ITU-T-Y1711][ITU-T-Y1711], and [LSP-Ping]. The following OAM standards by the IEEE and ITU-T are to some extent linked to the IETF OAM tools listed above and are mentioned here only as referencematerial:material. o OAM tools for Layer 2 have been defined by the ITU-T in[ITU-T-Y1731],[ITU-T-Y1731] and by the IEEE in 802.1ag[IEEE802.1Q] .[IEEE802.1Q]. The IEEE 802.3 standard defines OAM for one-hop Ethernet links [IEEE802.3ah]. o The ITU-T has defined OAM for MPLS LSPs in[ITU-T-Y1711],[ITU-T-Y1711] and for MPLS-TP OAM in [ITU-G8113.1] and [ITU-G8113.2]. It should be noted that these non-IETF documents deal in many cases with OAM functions below the IP layer (Layer 2, Layer 2.5) and that in some cases operators use a multi-layered OAM approach, which is a function of the way their networks are designed. Table 6 summarizes some of the main OAM standards published bynon- IETFnon-IETF standard organizations. This document focuses on IETF OAM standards, but these non-IETF standards are referenced in this document where relevant. +-----------+--------------------------------------+---------------+ | | Title|Standard/Draft| Document | +-----------+--------------------------------------+---------------+ |ITU-T | Operation & Maintenance mechanism | ITU-T Y.1711 | |MPLS OAM | for MPLS networks [ITU-T-Y1711] | | | +--------------------------------------+---------------+ | | Assignment of the 'OAM Alert Label' | RFC 3429 | | | for Multiprotocol Label Switching | | | | Architecture (MPLS) Operation and | | | | Maintenance (OAM) Functions | | | | [OAM-Label] | | | | | | | | Note: although this is an IETF | | | | document, it is listed as one of the| | | | non-IETF OAM standards, since it | | | | was defined as a complementary part | | | | of ITU-T Y.1711. | | +-----------+--------------------------------------+---------------+ |ITU-T | Operations, administration and |ITU-T G.8113.2 | |MPLS-TP OAM| Maintenance mechanisms for MPLS-TP | | | | networks using the tools defined for | | | | MPLS [ITU-G8113.2] | | | | | | | | Note: this document describes the | | | | OAM toolset defined by the IETF for | | | | MPLS-TP, whereas ITU-T G.8113.1 | | | | describes the OAM toolset defined | | | | by the ITU-T. | | | +--------------------------------------+---------------+ | | Operations, Administration and |ITU-T G.8113.1 | | | Maintenance mechanism for MPLS-TP in | | | | Packet Transport Network (PTN) | | | +--------------------------------------+---------------+ | | Allocation of a Generic Associated | RFC 6671 | | | Channel Type for ITU-T MPLS Transport| | | | Profile Operation, Maintenance, and | | | | Administration (MPLS-TP OAM) | | | | [ITU-T-CT] | | | | | | | | Note: although this is an IETF | | | | document, it is listed as one of the| | | | non-IETF OAM standards, since it | | | | was defined as a complementary part | | | | of ITU-T G.8113.1. | | +-----------+--------------------------------------+---------------+ |ITU-T | OAM Functions and Mechanisms for | ITU-T Y.1731 | |Ethernet | Ethernet-based Networks | | |OAM | [ITU-T-Y1731] | | +-----------+--------------------------------------+---------------+ |IEEE | Connectivity Fault Management | IEEE 802.1ag | |CFM | [IEEE802.1Q] | | | | | | | | Note: CFM was originally published | | | | as IEEE802.1ag,802.1ag but is now | | | | incorporated in the 802.1Q standard.| | +-----------+--------------------------------------+---------------+ |IEEE | Management of Data Driven and Data | IEEE 802.1ag | |DDCFM | Dependent Connectivity Faults | | | | [IEEE802.1Q] | | | | | | | | Note: DDCFM was originally published| | | | as IEEE802.1Qaw,802.1Qaw but is now | | | | incorporated in the 802.1Q standard.| | +-----------+--------------------------------------+---------------+ |IEEE | Media Access Control Parameters, | IEEE 802.3ah | |802.3 | Physical Layers, and Management | | |link level | Parameters for Subscriber Access | | |OAM | Networks [IEEE802.3ah] | | | | | | | | Note: link level OAM was originally | | | | defined in IEEE802.3ah,802.3ah and is now | | | | incorporated in the 802.3 standard. | | +-----------+--------------------------------------+---------------+ Table66: Non-IETF OAM Standards Mentioned inthisThis Document Authors' Addresses Tal Mizrahi Marvell 6 Hamada St.Yokneam,Yokneam 20692 IsraelEmail:EMail: talmi@marvell.com Nurit Sprecher Nokia Solutions and Networks 3 Hanagar St. Neve Ne'eman B HodHasharon,Hasharon 45241 IsraelEmail:EMail: nurit.sprecher@nsn.com Elisa Bellagamba Ericsson 6 Farogatan St.Stockholm,Stockholm 164 40 Sweden Phone: +46 761440785Email:EMail: elisa.bellagamba@ericsson.com Yaacov Weingarten 34 Hagefen St. KarneiShomron,Shomron 4485500 IsraelEmail:EMail: wyaacov@gmail.com