draft-ietf-ippm-twamp-00.txt | draft-ietf-ippm-twamp-01.txt | |||
---|---|---|---|---|
J. Babiarz | J. Babiarz | |||
Internet Draft Nortel Networks | Internet Draft Nortel Networks | |||
Expires: May 11, 2006 K. Hedayat | Expires: December 2006 K. Hedayat | |||
Brix Networks | Brix Networks | |||
R. Krzanowski | R. Krzanowski | |||
Verizon | Verizon | |||
Kiho Yum | Kiho Yum | |||
Juniper Networks | Juniper Networks | |||
November 7, 2005 | ||||
A Two-way Active Measurement Protocol (TWAMP) | A Two-way Active Measurement Protocol (TWAMP) | |||
draft-ietf-ippm-twamp-00 | draft-ietf-ippm-twamp-01 | |||
Status of this Memo | Status of this Memo | |||
By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
skipping to change at page 1, line 41 | skipping to change at page 1, line 39 | |||
as reference material or to cite them other than as "work in | as reference material or to cite them other than as "work in | |||
progress." | progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
Copyright Notice | Copyright Notice | |||
Copyright (C) The Internet Society (2005). | Copyright (C) The Internet Society (2006). | |||
Abstract | Abstract | |||
The IPPM One-way Active Measurement Protocol [OWAMP] provides a | The IPPM One-way Active Measurement Protocol [OWAMP] provides a | |||
common protocol for measuring one-way metrics between network | common protocol for measuring one-way metrics between network | |||
devices. OWAMP [OWAMP] can be used in both directions | devices. OWAMP [OWAMP] can be used in both directions | |||
independently to measure one-way metrics in both directions between | independently to measure one-way metrics in both directions between | |||
two network elements. However, it does not accommodate round-trip | two network elements. However, it does not accommodate round-trip | |||
or two-way measurements. This draft proposes a Two-way Active | or two-way measurements. This draft proposes a Two-way Active | |||
Measurement Protocol, based on the One-way Active Measurement | Measurement Protocol, based on the One-way Active Measurement | |||
Protocol [OWAMP], that will accommodate two-way or round-trip | Protocol [OWAMP], that will accommodate two-way or round-trip | |||
skipping to change at page 2, line 37 | skipping to change at page 2, line 37 | |||
4.6 Stop-Sessions.............................................6 | 4.6 Stop-Sessions.............................................6 | |||
4.7 Fetch-Session.............................................6 | 4.7 Fetch-Session.............................................6 | |||
5. TWAMP Test....................................................7 | 5. TWAMP Test....................................................7 | |||
5.1 Sender Behavior...........................................7 | 5.1 Sender Behavior...........................................7 | |||
5.2 Reflector Behavior........................................8 | 5.2 Reflector Behavior........................................8 | |||
6. Implementers Guide...........................................12 | 6. Implementers Guide...........................................12 | |||
6.1 Complete TWAMP...........................................12 | 6.1 Complete TWAMP...........................................12 | |||
6.2 TWAMP Light..............................................12 | 6.2 TWAMP Light..............................................12 | |||
7. Security Considerations......................................13 | 7. Security Considerations......................................13 | |||
8. IANA Considerations..........................................13 | 8. IANA Considerations..........................................13 | |||
9. References...................................................13 | 9. References.................................................1413 | |||
9.1 Normative References.....................................14 | 9.1 Normative References.....................................14 | |||
1. Introduction | 1. Introduction | |||
The IETF IP Performance Metrics (IPPM) working group has proposed | The IETF IP Performance Metrics (IPPM) working group has proposed | |||
the draft standard for round-trip delay [RFC2681] metric. IPPM has | the draft standard for round-trip delay [RFC2681] metric. IPPM has | |||
also proposed a new protocol for establishment of sessions for | also proposed a new protocol for establishment of sessions for | |||
measurement of one-way metrics [OWAMP]. Two-way Active Measurement | measurement of one-way metrics [OWAMP]. Two-way Active Measurement | |||
Protocol uses the methodology and architecture of OWAMP [OWAMP] to | Protocol uses the methodology and architecture of OWAMP [OWAMP] to | |||
define an open protocol for measurement of two-way or round-trip | define an open protocol for measurement of two-way or round-trip | |||
skipping to change at page 11, line 29 | skipping to change at page 11, line 29 | |||
Sender Sequence Number is the Sequence Number of the packet | Sender Sequence Number is the Sequence Number of the packet | |||
transmitted by the Session-Sender that corresponds to this test | transmitted by the Session-Sender that corresponds to this test | |||
packet. | packet. | |||
Similar to OWAMP [OWAMP] the TWAMP packet layout is the same in | Similar to OWAMP [OWAMP] the TWAMP packet layout is the same in | |||
authenticated and encrypted modes. The encryption operation of | authenticated and encrypted modes. The encryption operation of | |||
Session-Receiver packet follow the same rules of Session-Sender | Session-Receiver packet follow the same rules of Session-Sender | |||
packets as defined in OWAMP [OWAMP]. | packets as defined in OWAMP [OWAMP]. | |||
The minimum data segment length is, therefore, 36 octets in | The minimum data segment length is, therefore, 40 octets in | |||
unauthenticated mode, and 80 octets in both authenticated mode and | unauthenticated mode, and 80 octets in both authenticated mode and | |||
encrypted modes. | encrypted modes. | |||
The Session-Reflector TWAMP-Test packet layout is the same in | The Session-Reflector TWAMP-Test packet layout is the same in | |||
authenticated and encrypted modes. The encryption operations are, | authenticated and encrypted modes. The encryption operations are, | |||
however, different. The difference is that in encrypted mode both | however, different. The difference is that in encrypted mode both | |||
the sequence numbers and timestamps are encrypted to provide | the sequence numbers and timestamps are encrypted to provide | |||
maximum data integrity protection while in authenticated mode the | maximum data integrity protection while in authenticated mode the | |||
sequence numbers are encrypted and the timestamps are sent in clear | sequence numbers are encrypted and the timestamps are sent in clear | |||
text. Sending the timestamp in clear text in authenticated mode | text. Sending the timestamp in clear text in authenticated mode | |||
skipping to change at page 13, line 20 | skipping to change at page 13, line 20 | |||
| Control-Client | | Session-Reflector | | | Control-Client | | Session-Reflector | | |||
| Session-Sender |<--TWAMP-Test----->| | | | Session-Sender |<--TWAMP-Test----->| | | |||
+-----------------+ +-------------------+ | +-----------------+ +-------------------+ | |||
This example provides a simple architecture for responders where | This example provides a simple architecture for responders where | |||
their role will be to simply act as light test points in the | their role will be to simply act as light test points in the | |||
network. The controller establishes the test session with the | network. The controller establishes the test session with the | |||
Server through non-standard means. After the session is | Server through non-standard means. After the session is | |||
established the controller transmits test packets to the responder. | established the controller transmits test packets to the responder. | |||
The responder follows the Session-Receiver behavior of TWAMP as | The responder follows the Session-Receiver behavior of TWAMP as | |||
described in section 5.2.1. The controller receives the reflected | described in section 5.2.1 with the following exceptions. The | |||
test packets and collects two-way metrics. This architecture allows | Session-Reflector SHOULD copy the sequence number of the received | |||
for collection of two-way metrics. | packet to the Sequence Number field of the reflected packet. This | |||
is necessary since in case of TWAMP Light the Session-Reflector | ||||
does not have knowledge of the session state. The controller | ||||
receives the reflected test packets and collects two-way metrics. | ||||
This architecture allows for collection of two-way metrics. | ||||
This example eliminates the need for the TWAMP-Control protocol and | This example eliminates the need for the TWAMP-Control protocol and | |||
assumes that the Session-Reflector is configured and communicates | assumes that the Session-Reflector is configured and communicates | |||
its configuration with the Server through non-standard means. | its configuration with the Server through non-standard means. | |||
Furthermore, the Server does not support the Fetch-Session command | Furthermore, the Server does not support the Fetch-Session command | |||
and the responder does not collect the received packet information. | and the responder does not collect the received packet information. | |||
The Session-Reflector simply reflects the incoming packets back to | The Session-Reflector simply reflects the incoming packets back to | |||
the controller while copying the necessary information and | the controller while copying the necessary information and | |||
generating sequence number and timestamp values per section 5.2.1. | generating sequence number and timestamp values per section 5.2.1. | |||
skipping to change at page 16, line 4 | skipping to change at page 16, line 8 | |||
This document and the information contained herein are provided on | This document and the information contained herein are provided on | |||
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE | an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE | |||
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND | REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND | |||
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, | THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, | |||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT | EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT | |||
THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR | THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR | |||
ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A | ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A | |||
PARTICULAR PURPOSE. | PARTICULAR PURPOSE. | |||
Copyright Notice | Copyright Notice | |||
Copyright (C) The Internet Society (2005). | ||||
Copyright (C) The Internet Society (2006). | ||||
This document is subject to the rights, licenses and restrictions | This document is subject to the rights, licenses and restrictions | |||
contained in BCP 78, and except as set forth therein, the authors | contained in BCP 78, and except as set forth therein, the authors | |||
retain all their rights. | retain all their rights. | |||
Acknowledgment | Acknowledgment | |||
Funding for the RFC Editor function is currently provided by the | Funding for the RFC Editor function is currently provided by the | |||
Internet Society. | Internet Society. | |||
End of changes. 8 change blocks. | ||||
11 lines changed or deleted | 14 lines changed or added | |||
This html diff was produced by rfcdiff 1.32. The latest version is available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |