draft-ietf-ippm-checksum-trailer-02.txt | draft-ietf-ippm-checksum-trailer-03.txt | |||
---|---|---|---|---|
Network Working Group T. Mizrahi | Network Working Group T. Mizrahi | |||
Internet Draft Marvell | Internet Draft Marvell | |||
Intended status: Informational | Intended status: Experimental | |||
Expires: January 2016 July 20, 2015 | Expires: April 2016 October 14, 2015 | |||
UDP Checksum Complement in OWAMP and TWAMP | UDP Checksum Complement in OWAMP and TWAMP | |||
draft-ietf-ippm-checksum-trailer-02.txt | draft-ietf-ippm-checksum-trailer-03.txt | |||
Abstract | Abstract | |||
The One-Way Active Measurement Protocol (OWAMP) and the Two-Way | The One-Way Active Measurement Protocol (OWAMP) and the Two-Way | |||
Active Measurement Protocol (TWAMP) are used for performance | Active Measurement Protocol (TWAMP) are used for performance | |||
monitoring in IP networks. Delay measurement is performed in these | monitoring in IP networks. Delay measurement is performed in these | |||
protocols by using timestamped test packets. Some implementations use | protocols by using timestamped test packets. Some implementations use | |||
hardware-based timestamping engines that integrate the accurate | hardware-based timestamping engines that integrate the accurate | |||
transmission timestamp into every outgoing OWAMP/TWAMP test packet | transmission timestamp into every outgoing OWAMP/TWAMP test packet | |||
during transmission. Since these packets are transported over UDP, | during transmission. Since these packets are transported over UDP, | |||
skipping to change at page 1, line 47 | skipping to change at page 1, line 47 | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This Internet-Draft will expire on January 20, 2016. | This Internet-Draft will expire on April 14, 2016. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 25 | skipping to change at page 2, line 25 | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction...................................................2 | 1. Introduction...................................................2 | |||
2. Conventions used in this document..............................4 | 2. Conventions used in this document..............................4 | |||
2.1. Terminology...............................................4 | 2.1. Terminology...............................................4 | |||
2.2. Abbreviations.............................................4 | 2.2. Abbreviations.............................................5 | |||
3. Using the UDP Checksum Complement in OWAMP and TWAMP...........5 | 3. Using the UDP Checksum Complement in OWAMP and TWAMP...........5 | |||
3.1. Overview..................................................5 | 3.1. Overview..................................................5 | |||
3.2. OWAMP / TWAMP Test Packets with Checksum Complement.......5 | 3.2. OWAMP / TWAMP Test Packets with Checksum Complement.......5 | |||
3.2.1. Transmission of OWAMP/TWAMP with Checksum Complement.8 | 3.2.1. Transmission of OWAMP/TWAMP with Checksum Complement.8 | |||
3.2.2. Intermediate Updates of OWAMP/TWAMP with Checksum | 3.2.2. Intermediate Updates of OWAMP/TWAMP with Checksum | |||
Complement..................................................9 | Complement..................................................9 | |||
3.2.3. Reception of OWAMP/TWAMP with Checksum Complement....9 | 3.2.3. Reception of OWAMP/TWAMP with Checksum Complement....9 | |||
3.3. Interoperability with Existing Implementations............9 | 3.3. Interoperability with Existing Implementations............9 | |||
3.4. Using the Checksum Complement with or without Authentication | 3.4. Using the Checksum Complement with or without Authentication | |||
...............................................................9 | ...............................................................9 | |||
skipping to change at page 4, line 40 | skipping to change at page 4, line 40 | |||
The term Checksum Complement is used throughout this document and | The term Checksum Complement is used throughout this document and | |||
refers to the 2 octets at the end of the UDP payload, used for | refers to the 2 octets at the end of the UDP payload, used for | |||
updating the UDP checksum by intermediate entities. | updating the UDP checksum by intermediate entities. | |||
The usage of the Checksum Complement can in some cases simplify the | The usage of the Checksum Complement can in some cases simplify the | |||
implementation, since if the packet data is processed in a serial | implementation, since if the packet data is processed in a serial | |||
order, it is simpler to first update the timestamp field, and then | order, it is simpler to first update the timestamp field, and then | |||
update the Checksum Complement rather than to update the timestamp | update the Checksum Complement rather than to update the timestamp | |||
and then update the UDP checksum, residing at the UDP header. | and then update the UDP checksum, residing at the UDP header. | |||
The Checksum Complement mechanism is also defined for the Network | ||||
Time Protocol in [NTPComp]. | ||||
2. Conventions used in this document | 2. Conventions used in this document | |||
2.1. Terminology | 2.1. Terminology | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
document are to be interpreted as described in [KEYWORDS]. | document are to be interpreted as described in [KEYWORDS]. | |||
2.2. Abbreviations | 2.2. Abbreviations | |||
skipping to change at page 12, line 5 | skipping to change at page 12, line 5 | |||
[IEEE1588] IEEE TC 9 Instrumentation and Measurement Society, | [IEEE1588] IEEE TC 9 Instrumentation and Measurement Society, | |||
"1588 IEEE Standard for a Precision Clock | "1588 IEEE Standard for a Precision Clock | |||
Synchronization Protocol for Networked Measurement and | Synchronization Protocol for Networked Measurement and | |||
Control Systems Version 2", IEEE Standard, 2008. | Control Systems Version 2", IEEE Standard, 2008. | |||
[IPPMIPsec] Pentikousis, K., Zhang, E., Cui, Y., "IKEv2-based | [IPPMIPsec] Pentikousis, K., Zhang, E., Cui, Y., "IKEv2-based | |||
Shared Secret Key for O/TWAMP", draft-ietf-ippm-ipsec | Shared Secret Key for O/TWAMP", draft-ietf-ippm-ipsec | |||
(work in progress), May 2015. | (work in progress), May 2015. | |||
[NTPComp] Mizrahi, T., "UDP Checksum Complement in the Network | ||||
Time Protocol (NTP)", draft-ietf-ntp-checksum-trailer | ||||
(work in progress), October 2015. | ||||
[ZeroChecksum] Fairhurst, G., Westerlund, M., "Applicability | [ZeroChecksum] Fairhurst, G., Westerlund, M., "Applicability | |||
Statement for the Use of IPv6 UDP Datagrams with Zero | Statement for the Use of IPv6 UDP Datagrams with Zero | |||
Checksums", RFC 6936, April 2013. | Checksums", RFC 6936, April 2013. | |||
Authors' Addresses | Authors' Addresses | |||
Tal Mizrahi | Tal Mizrahi | |||
Marvell | Marvell | |||
6 Hamada St. | 6 Hamada St. | |||
Yokneam, 20692 Israel | Yokneam, 20692 Israel | |||
End of changes. 6 change blocks. | ||||
5 lines changed or deleted | 12 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |