Internet-Draft | Using Simple TWAMP for Segment Routing | September 2023 |
Gandhi, et al. | Expires 14 March 2024 | [Page] |
Segment Routing (SR) leverages the source routing paradigm. SR is applicable to both Multiprotocol Label Switching (SR-MPLS) and IPv6 (SRv6) data planes. This document describes procedures for Performance Measurement in SR networks using the mechanisms defined in RFC 8762 (Simple Two-Way Active Measurement Protocol (STAMP)) and its optional extensions defined in RFC 8972 and further augmented in draft-ietf-ippm-stamp-srpm. The procedure described is used for links, end-to-end SR paths (including SR Policies and SR Flexible Algorithm IGP paths) as well as Layer-3 and Layer-2 services in SR networks, and is applicable to both SR-MPLS and SRv6 data planes.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 14 March 2024.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Segment Routing (SR) leverages the source routing paradigm and greatly simplifies network operations for Software Defined Networks (SDNs). SR is applicable to both Multiprotocol Label Switching (SR-MPLS) and IPv6 (SRv6) data planes [RFC8402]. SR takes advantage of the Equal-Cost Multipaths (ECMPs) between source and transit nodes, between transit nodes and between transit and destination nodes. SR Policies as defined in [RFC9256] are used to steer traffic through a specific, user-defined paths using a stack of Segments. A comprehensive SR Performance Measurement (PM) toolset is one of the essential requirements to measure network performance to provide Service Level Agreements (SLAs).¶
The Simple Two-Way Active Measurement Protocol (STAMP) provides capabilities for the measurement of various performance metrics in IP networks [RFC8762] without the use of a control channel to pre-signal session parameters. [RFC8972] defines optional extensions, in the form of TLVs, for STAMP. [I-D.ietf-ippm-stamp-srpm] augments that framework to define STAMP extensions for SR networks.¶
This document describes procedures for Performance Measurement in SR networks using the mechanisms defined in STAMP [RFC8762] and its optional extensions defined in [RFC8972] and further augmented in [I-D.ietf-ippm-stamp-srpm]. The procedure described is used for links, end-to-end SR paths [RFC8402] (including SR Policies [RFC9256] and SR Flexible Algorithm (Flex-Algo) IGP paths [RFC9350]) as well as Layer-3 (L3) and Layer-2 (L2) services in SR networks, and is applicable to both SR-MPLS and SRv6 data planes.¶
STAMP requires protocol support on the Session-Reflector to process the received test packets, and hence the received test packets need to be punted from the forwarding fast path and return test packets need to be generated. This limits the scale for number test sessions and the ability to provide faster measurement interval. This document enhances the procedure for Performance Measurement using STAMP to improve the scale for number of sessions and the interval for measurement of SR paths, for both SR-MPLS and SRv6 data planes.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
ECMP: Equal Cost Multi-Path.¶
HMAC: Hashed Message Authentication Code.¶
I2E: Ingress-To-Egress.¶
IHS: Ingress-To-Egress, Hop-By-Hop or Select Scope.¶
L2: Layer-2.¶
L3: Layer-3.¶
MBZ: Must be Zero.¶
MNA: MPLS Network Action.¶
MPLS: Multiprotocol Label Switching.¶
PSID: Path Segment Identifier.¶
SHA: Secure Hash Algorithm.¶
SID: Segment ID.¶
SR: Segment Routing.¶
SRH: Segment Routing Header.¶
SR-MPLS: Segment Routing with MPLS data plane.¶
SRv6: Segment Routing with IPv6 data plane.¶
SSID: STAMP Session Identifier.¶
STAMP: Simple Two-Way Active Measurement Protocol.¶
TC: Traffic Class.¶
TSF: Timestamp and Forward.¶
TTL: Time To Live.¶
VPN: Virtual Private Network.¶
In the Reference Topology shown below, the STAMP Session-Sender S1 initiates a STAMP test packet and the STAMP Session-Reflector R1 transmits a reply STAMP test packet. The reply test packet may be transmitted to the STAMP Session-Sender S1 on the same path (same set of links and nodes) or a different path in the reverse direction from the path taken towards the Session-Reflector. The T1 is a transmit timestamp and T4 is a receive timestamp, both added by node S1. The T2 is a receive timestamp and T3 is a transmit timestamp, both added by node R1.¶
The nodes S1 and R1 may be connected via a link or an SR path [RFC8402]. The link may be a physical interface, virtual link, or Link Aggregation Group (LAG) [IEEE802.1AX], or LAG member link. The SR path may be an SR Policy [RFC9256] on node S1 (called head-end) with destination to node R1 (called tail-end) or SR Flex-Algo IGP path [RFC9350].¶
T1 T2 / \ +-------+ Test Packet +-------+ | | - - - - - - - - - ->| | | S1 |=====================| R1 | | |<- - - - - - - - - - | | +-------+ Reply Test Packet +-------+ \ / T4 T3 STAMP Session-Sender STAMP Session-Reflector Reference Topology¶
For performance measurement in SR networks, the STAMP Session-Sender and Session-Reflector can use the base test packets defined [RFC8762]. However, the STAMP test packets defined in [RFC8972] are preferred in SR environment because of the optional extensions. The STAMP test packets are encapsulated using IP/UDP header and use the Destination UDP port 862 [RFC8762], by default. In this document, the STAMP test packets using IP/UDP header are considered for SR networks, where the STAMP test packets are further encapsulated with an SR-MPLS or SRv6 header. The STAMP test packets MUST carry the same IP/SR encapsulation as used by the data packets on the SR path under measurement.¶
The STAMP test packets are used in one-way, round-trip (also referred to as two-way in this document) and loopback delay measurement modes in SR networks. Note that one-way and round-trip measurement modes are referred to in [RFC8762] and are further described in this document because of the introduction of loopback measurement mode in SR networks.¶
The procedure defined in [RFC8762] is used to measure packet loss based on the transmission and reception of the STAMP test packets. The optional STAMP extensions defined in [RFC8972] are used for direct measurement of packet loss in SR networks. The measurement modes defined in this document are also applicable to measure packet loss in SR networks.¶
The STAMP test packets are transmitted on the same path as the data traffic flow under measurement to measure the delay and packet loss experienced by the data traffic flow.¶
Typically, the STAMP test packets are transmitted along an IP path between a Session-Sender and a Session-Reflector to measure delay and packet loss along that IP path. Matching forward and reverse direction paths for STAMP test packets, even for directly connected nodes are not guaranteed.¶
It may be desired in SR networks that the same path (same set of links and nodes) between the Session-Sender and Session-Reflector be used for the STAMP test packets in both directions. This is achieved by using the optional STAMP extensions for SR-MPLS and SRv6 networks specified in [I-D.ietf-ippm-stamp-srpm]. The STAMP Session-Reflector uses the return path parameters for the reply test packet from the received Session-Sender test packet, as described in [I-D.ietf-ippm-stamp-srpm].¶
An example of a STAMP Reference Model with some of the typical measurement parameters for STAMP test sessions is shown in Figure 1.¶
A Destination UDP port number MUST be selected for STAMP function as described in [RFC8762]. The same Destination UDP port can be used for STAMP test sessions for links, end-to-end SR paths, and L3 and L2 services in SR networks. In this case, the Destination UDP port does not distinguish between the link, end-to-end SR path, or L3 and L2 service STAMP test sessions. The Source UDP port is dynamically chosen by the Session-Sender. The same or different UDP Source port can be used for STAMP test sessions for links, end-to-end SR paths, and L3 and L2 services in SR networks.¶
Examples of the Timestamp Format is Precision Time Protocol 64-bit truncated (PTPv2) [IEEE1588] and Network Time Protocol (NTP). By default, the Session-Reflector replies in kind to the timestamp format received in the received Session-Sender test packet, as indicated by the "Z" flag in the Error Estimate field as described in [RFC8762].¶
Examples of Delay Measurement Mode can be one-way, two-way (i.e., round-trip) and loopback mode as described in this document.¶
Examples of Packet Loss Type can be round-trip, near-end (forward direction) and far-end (backward direction) packet loss as defined in [RFC8762].¶
When using the authentication mode for the STAMP test sessions, the matching Authentication Type (e.g., HMAC-SHA-256) and Keychain MUST be configured on STAMP Session-Sender and STAMP Session-Reflector [RFC8762].¶
The controller shown in the "Example STAMP Reference Model" is intended for provisioning the STAMP test sessions and not intended for the dynamic signaling of the SR parameters for the STAMP test sessions between the Session-Sender and Session-Reflector.¶
Note that the YANG data model defined for STAMP in [I-D.ietf-ippm-stamp-yang] can be used to provision the Session-Sender and Session-Reflector and also for streaming telemetry of the operational data.¶
The content of an example Session-Sender test packet using an IP and UDP header [RFC0768] is shown in Figure 2. The payload contains the Session-Sender test packet defined in Section 3 of [RFC8972] as transmitted in an IP network. Note that [RFC8972] updates the Session-Sender test packet defined in [RFC8762] with optional STAMP Session Identifier (SSID). The SR encapsulation of the STAMP test packet is further described later in this document.¶
The Session-Sender test packet as shown in Figure 2 is transmitted over the link for delay measurement. The local and remote IP addresses of the link MUST be used as Source and Destination Addresses in the IP header of the Session-Sender test packets, respectively. For IPv6 links, the link local addresses [RFC7404] can be used in the IPv6 header. An SR encapsulation (e.g., containing adjacency SID of the link) can also be added for transmitting the Session-Sender test packets for links.¶
The Session-Sender can use the local Address Resolution Protocol (ARP) table or any other similar method to obtain the IP and MAC addresses for the links for transmitting STAMP packets.¶
Note that the Session-Sender test packet is further encapsulated with a Layer-2 header containing Session-Reflector MAC address as the MAC Destination Address and Session-Sender MAC address as the MAC Source Address for Ethernet links.¶
An SR-MPLS Policy Candidate-Path can contain one or more Segment Lists. Each SR-MPLS Segment List contains a list of 32-bit Label Stack Entry (LSE) that includes a 20-bit label value, 8-bit Time-To-Live (TTL) value, 3-bit Traffic-Class (TC) value and 1-bit End-Of-Stack (S) field. A Session-Sender test packet MUST be transmitted using each Segment List of the SR-MPLS Policy Candidate-Path for delay measurement.¶
The content of an example Session-Sender test packet for an SR-MPLS Policy using the same SR-MPLS encapsulation as the data traffic is shown in Figure 3.¶
The head-end node address of the SR-MPLS Policy MUST be used as the Source Address in the IP header of the Session-Sender test packet. The endpoint address of the SR-MPLS Policy MUST be used as the Destination Address in the IP header of the Session-Sender test packet.¶
In the case of SR-MPLS Policy with Color-Only Destination Steering, with endpoint as unspecified address (the null endpoint is 0.0.0.0 for IPv4 or :: for IPv6 (all bits set to the 0 value)) as defined in Section 8.8.1 of [RFC9256], the loopback address from the range 127/8 for IPv4, or the loopback address ::1/128 for IPv6 [RFC4291] can be used as the Destination Address in the IP header of the Session-Sender test packets, respectively. In this case, the SR-MPLS encapsulation MUST ensure the Session-Sender test packets reach the endpoint of the SR Policy (for example, by adding the Prefix SID of the SR-MPLS Policy endpoint in the Segment List if required).¶
The Segment List can be empty in the case of a single-hop SR-MPLS Policy Candidate-Path with Implicit NULL label.¶
The Session-Reflector may receive Session-Sender test packets with no MPLS header, for example, when using Penultimate Hop Popping (PHP).¶
The Path Segment Identifier (PSID) [I-D.ietf-spring-mpls-path-segment] of an SR-MPLS Policy (either for Segment List or for Candidate-Path) can be added in the Segment List of the STAMP test packets as shown in Figure 3, and can be used for direct measurement as described in Section 6, titled "Direct Measurement in SR Networks".¶
An SRv6 Policy Candidate-Path can contain one or more Segment Lists. Each Segment List can contain a number of SRv6 SIDs as defined in [RFC8986]. A Session-Sender test packet MUST be transmitted using each Segment List of the SRv6 Policy Candidate-Path for delay measurement. A packet can contain an outer IPv6 header and SRv6 Segment Routing Header (SRH) carrying a Segment List as described in [RFC8754].¶
The content of an example Session-Sender test packet for an SRv6 Policy using the same IPv6/SRH encapsulation as the data traffic is shown in Figure 4.¶
The head-end node address of the SRv6 Policy MUST be used as the Source Address in the IPv6 header of the Session-Sender test packet.¶
The Segment List of the SRv6 Policy Candidate-Path can be empty. In this case, the endpoint address of the SRv6 Policy MUST be used as the Destination Address in the IPv6 header of the Session-Sender test packet.¶
Note that the Session-Sender test packets can be transmitted without adding the IP header with Source Address of the Session-Sender and Destination Address of the Session-Reflector after the SRH. The Session-Sender MUST ensure that the Session-Sender test packets using the Segment List reach the SRv6 Policy endpoint (for example, by adding the Prefix SID or IPv6 address of the endpoint in the Segment List if required).¶
The SRv6 network programming is described in [RFC8986]. The procedure defined for Upper-Layer (UL) Header processing for SRv6 End SIDs in Section 4.1.1 of [RFC8986] MUST be used to process the IPv6/UDP header in the received Session-Sender test packets on the Session-Reflector.¶
The Path Segment Identifier (PSID) [I-D.ietf-spring-srv6-path-segment] of the SRV6 Policy (either for Segment List or for Candidate-Path) can be added in the Segment List of the STAMP test packets as shown in Figure 4 and can be used for direct measurement as described in Section 6, titled "Direct Measurement for Links and SR Paths".¶
The procedure for delay measurement described for end-to-end SR-MPLS and SRv6 Policies is equally applicable to the P2MP SR-MPLS and SRv6 Policies.¶
The Point-to-Multipoint (P2MP) SR path that originates from a root node terminates on multiple destinations called leaf nodes (e.g., P2MP SR Policy [I-D.ietf-pim-sr-p2mp-policy] Candidate-Path). The Session-Sender root node MUST transmit the Session-Sender test packets using the Segment Lists that may contain replication SIDs [I-D.ietf-spring-sr-replication-segment] for delay measurement.¶
The Source Address in the Session-Sender test packets MUST be set to the address of the root-node of the P2MP SR-MPLS and SRv6 Policy.¶
For P2MP SR-MPLS path, the Destination Address in the Session-Sender test packets MUST be set to a loopback address from the range 127/8 for IPv4, or the loopback address ::1/128 for IPv6. In this case, the SR-MPLS encapsulation MUST ensure the Session-Sender test packets reach the leaf nodes of the SR-MPLS Policy.¶
The P2MP root node measures the delay for each leaf node independently using the Source Address of the leaf node from the received Session-Reflector reply test packets.¶
The delay measurement of end-to-end SR paths in an SR network is applicable to both SR-MPLS and SRv6 Flex-Algo IGP paths.¶
Flex-Algo in IGP in SR networks [RFC9350] has Prefix SIDs advertised by the nodes for each Flex-Algo. The STAMP test packets MUST be transmitted on the Flex-Algo path using the same encapsulation as the data traffic for delay measurement.¶
For delay measurement of an SR-MPLS Flex-Algo IGP path, the Session-Sender test packets MUST carry the Flex-Algo Prefix SID Label of the Session-Reflector for that Flex-Algo IGP path in the MPLS header.¶
For delay measurement of an SRv6 Flex-Algo IGP path, the Session-Sender test packets MUST carry the Flex-Algo Prefix SIDs of the Session-Sender and Session-Reflector for that Flex-Algo IGP path as the Source Address and Destination Address in the IPv6 header, respectively.¶
The delay measurement procedure defined in this document for end-to-end SR path is also applicable to L3VPN services in an SR network for both SR-MPLS and SRv6 data planes.¶
For delay measurement of end-to-end L3VPN service over SR-MPLS path, the same SR-MPLS label stack (as shown in Figure 3) as the data packets of the L3VPN service including the L3VPN service SR-MPLS label is used to transmit Session-Sender test packets.¶
An IP header (as shown in Figure 2) MUST be added in the Session-Sender test packets after the SR-MPLS encapsulation. The Destination Address on the Session-Reflector added in the IP header MUST be reachable via the IP table lookup associated with the L3VPN service SR-MPLS label.¶
For delay measurement of end-to-end L3VPN service over SRv6 path, the same IPv6/SRH encapsulation (as shown in Figure 4) as the data packets of the L3VPN service including the L3VPN service SRv6 SID (for example, End.DT6 SID instance, End.DT4 SID instance, etc. defined in [RFC8986]) is used to transmit Session-Sender test packets.¶
An inner IP header (as shown in Figure 2) MUST be added in the Session-Sender test packets after the IPv6/SRH encapsulation. The Destination Address on the Session-Reflector added in the inner IP header MUST be reachable via the IPv4 or IPv6 table lookup associated with the L3VPN service SRv6 SID.¶
The delay measurement procedure defined in this document for end-to-end SR path is also applicable to L2VPN services in an SR network for both SR-MPLS and SRv6 data planes.¶
For delay measurement of end-to-end L2VPN service over SR-MPLS path, the same SR-MPLS label stack (as shown in Figure 3) as the data packets of the L2VPN service including the L2VPN service SR-MPLS label is used to transmit Session-Sender test packets.¶
An L2 header (added after the SR-MPLS encapsulation) MUST be added in the Session-Sender test packets that contains the MAC Source Address of the Session-Sender and MAC Destination Address of the Session-Reflector. The MAC Destination Address added in the L2 header MUST be reachable via the MAC L2 table lookup associated with the L2VPN service SR-MPLS label.¶
An IP header (as shown in Figure 2) MUST be added in the Session-Sender test packets after the L2 header. It contains the Source Address of the Session-Sender and Destination Address of the Session-Reflector.¶
For delay measurement of end-to-end L2VPN service over SRv6 path, the same IPv6/SRH encapsulation (as shown in Figure 4) as the data packets of the L2VPN service including the L2VPN service SRv6 SID (for example, End.DT2U SID instance defined in [RFC8986]) is used to transmit Session-Sender test packets.¶
An L2 header (added after the IPv6/SRH encapsulation) MUST be added in the Session-Sender test packets that contains the MAC Source Address of the Session-Sender and MAC Destination Address of the Session-Reflector. The MAC Destination Address added in the L2 header MUST be reachable via the MAC L2 table lookup associated with the L2VPN service SRv6 SID.¶
An inner IP header (as shown in Figure 2) can be added in the Session-Sender test packets after the L2 header. It contains the Source Address of the Session-Sender and Destination Address of the Session-Reflector.¶
The Session-Reflector decapsulates the outer IP header (if present) and the SR header (SR-MPLS header or SRH if present) from the received Session-Sender test packets. The Session-Reflector reply test packet is generated using the information from the IP/UDP header of the received Session-Sender test packet as shown in Figure 5.¶
The payload contains the Session-Reflector test packet defined in Section 3 of [RFC8972].¶
In one-way delay measurement mode, a reply test packet with the contents as shown in Figure 5 is transmitted by the Session-Reflector, for links, end-to-end SR paths and L3 and L2 services in SR networks. The Session-Reflector reply test packet can be transmitted in the reverse direction on the same path as the forward direction or a different path than the forward direction to the Session-Sender.¶
In this mode, as per Reference Topology, all timestamps T1, T2, T3, and T4 are collected by the STAMP test packets. However, only timestamps T1 and T2 are used to measure one-way delay as (T2 - T1). Note that the delay value (T2 - T1) is referred to as near-end (forward direction) one-way delay and the delay value (T4 - T3) is referred to as far-end (backward direction) one-way delay. The one-way delay measurement mode requires the clocks on the Session-Sender and Session-Reflector to be synchronized.¶
In two-way (i.e., round-trip) delay measurement mode, a reply test packet as shown in Figure 5 SHOULD be transmitted by the Session-Reflector on the same path in the reverse direction as the forward direction, e.g., on the same link in the reverse direction or on the reverse SR path associated with the forward SR path [I-D.ietf-pce-sr-bidir-path].¶
In two-way delay measurement mode for links, the Session-Sender can request in the test packet to the Session-Reflector to transmit the reply test packet back on the same link in the reverse direction, for example, in an ECMP environment. It can use the Control Code Sub-TLV in the Return Path TLV defined in [I-D.ietf-ippm-stamp-srpm] for this request.¶
In two-way delay measurement mode for end-to-end SR paths, the Session-Sender can request in the test packet to the Session-Reflector to transmit the reply test packet back on a specific reverse SR path, for example, in an ECMP environment or in SR Flex-Algo IGP environment. It can use a Segment List sub-TLV in the Return Path TLV defined in [I-D.ietf-ippm-stamp-srpm] for this request.¶
In this mode, as per Reference Topology, all timestamps T1, T2, T3, and T4 are collected by the STAMP test packets. All four timestamps are used to measure two-way delay as ((T4 - T1) - (T3 - T2)). When clock synchronization on the Session-Sender and Session-Reflector nodes is not available, the one-way delay (as an average of forward and reverse direction delay) can be derived using two-way delay divided by two.¶
The content of an example Session-Reflector reply test packet transmitted for two-way delay measurement of an end-to-end SR-MPLS Policy using the same SR-MPLS encapsulation as the data traffic in the reverse direction is shown in Figure 6.¶
The content of an example Session-Reflector reply test packet transmitted for two-way delay measurement of an end-to-end SRv6 Policy using the same IPv6/SRH encapsulation as the data traffic in the reverse direction is shown in Figure 7.¶
The procedure defined for Upper-Layer Header processing for SRv6 End SIDs in Section 4.1.1 in [RFC8986] MUST be used to process the IPv6/UDP header in the received Session-Reflector reply test packets on the Session-Sender.¶
The Session-Sender test packets are transmitted in loopback measurement mode to measure loopback delay of a bidirectional circular path. In this mode, the received Session-Sender test packets MUST NOT be punted out of the fast path in forwarding (i.e., to slow path or control-plane) at the Session-Reflector. In other words, the Session-Reflector does not process them and generate Session-Reflector test packets. This is a new measurement mode, not defined by the STAMP process in [RFC8762]. In this mode, the only STAMP TLV defined in [RFC8972] is applicable is "Extra Padding TLV (Value 1)".¶
T1 / +-------+ Test Packet +-------+ | | - - - - - - - - - - | | | S1 |====================|| R1 | | |<- - - - - - - - - - | | +-------+ Return Test Packet +-------+ \ Loopback T4 STAMP Session-Sender Reference Topology for Loopback Mode¶
In this mode, as per Reference Topology for Loopback, the Session-Sender test packet received back at the Session-Sender retrieves the timestamp T1 from the test packet and collects the receive timestamp T4 locally. Both these timestamps are used to measure the loopback delay as (T4 - T1). The one-way delay (as an average of forward and reverse direction delay) can be derived using the loopback delay divided by two. The loopback delay includes the STAMP test packet processing delay on the Session-Reflector component. The Session-Reflector processing delay component includes only the time required to loop the STAMP test packet from the incoming interface to the outgoing interface in the forwarding plane. The Session-Reflector does not timestamp the Session-Sender test packets and does not need timestamping capability.¶
The Session-Sender MUST set the Destination UDP port to the UDP port it uses to receive the return Session-Sender test packets (other than the UDP port 862 which is used by the STAMP Session-Reflector). The same UDP port can be used as the Source UDP port in the Session-Sender test packet.¶
The Session-Reflector does not support the STAMP process, hence the loopback function simply processes the encapsulation including IP and SR headers (but does not process the UDP header) to forward the received Session-Sender test packet to the Session-Sender without STAMP modifications defined in [RFC8762].¶
The Session-Sender may use the STAMP Session ID (SSID) field in the received reply STAMP test packet or local configuration to identify its STAMP test session that uses the loopback mode. At the Session-Sender, the 'Session-Sender Sequence Number', 'Session-Sender Timestamp', 'Session-Sender Error Estimate', and 'Session-Sender TTL' fields in the received STAMP test packets MUST be ignored in this mode.¶
In the case of loopback mode for links, an inner IP header for the return path is added in the Session-Sender test packets as shown in Figure 8 in the Session-Sender test packets and it MUST set the Destination Address equal to the Session-Sender address.¶
The Session-Sender test packets for the links in loopback mode may be transmitted optionally with an outer IP header as shown in Figure 9. An SR encapsulation (e.g., containing adjacency SID of the link) can also be added for transmitting the Session-Sender test packets for links.¶
Note that the Session-Sender test packet is further encapsulated with a Layer-2 header containing Session-Reflector MAC address as the Destination Address and Session-Sender MAC address as the MAC Source Address for Ethernet links.¶
An SR-MPLS path uses an MPLS header for carrying a Segment List in MPLS label stack. In the case of loopback mode for SRv6 paths, the Session-Sender test packet can either carry the Segment List of the forward SR-MPLS path only or both the forward and the reverse SR-MPLS paths in MPLS header as shown in Figure 10.¶
In the case of SR-MPLS Policy using Penultimate Hop Popping (PHP), the Session-Sender MUST ensure that the STAMP test packets reach the SR-MPLS Policy endpoint (for example, by adding the Prefix SID of the SR-MPLS Policy endpoint in the Segment List of the forward path if required).¶
To receive the return Session-Sender test packet on a specific SR-MPLS path in an ECMP environment, the SR-MPLS label stack needs to carry the specific reverse direction SR-MPLS path, in addition to the forward direction SR-MPLS path. For example, it can carry the corresponding SR-MPLS label stack of the Segment List of the reverse SR-MPLS Policy Candidate-Path [I-D.ietf-pce-sr-bidir-path] or the Binding SID of the reverse SR-MPLS Policy or the SR-MPLS Prefix Segment Identifier of the Session-Sender. For SR-MPLS Flex-Algo IGP paths, it MUST carry the matching SR-MPLS Flex-Algo Prefix SID label of the Session-Sender.¶
The IP header of the Session-Sender test packets MUST set the Destination Address equal to the Session-Sender address as shown in Figure 8.¶
In the case of loopback mode for SR-MPLS paths, the MPLS header can carry the SR-MPLS label stack of the forward SR path only.¶
The IP header for the return path of the Session-Sender test packets MUST set the Destination Address equal to the Session-Sender address as shown in Figure 8 to forward the packet to the Session-Sender.¶
The Session-Reflector decapsulates the MPLS header and forwards the packet using the IP header for the return path that follows in the packet.¶
An SRv6 path uses an IPv6 header and SRv6 Segment Routing Header (SRH) for carrying a Segment List as described in [RFC8754]. In the case of loopback mode for SRv6 paths, the Session-Sender test packet can either carry the Segment List of the forward SRv6 path only or both the forward and the reverse SRv6 paths in IPv6/SRH as shown in Figure 11.¶
The Session-Sender MUST ensure that the Session-Sender test packets using the Segment List reach the SRv6 Policy endpoint (for example, by adding the Prefix SID or IPv6 address of the SRv6 Policy endpoint in the Segment List if required).¶
To receive the return Session-Sender test packet on a specific SRv6 path in an ECMP environment, the SRv6 Segment List needs to carry the specific reverse direction SRv6 path, in addition to the forward direction SRv6 path. For example, it can carry the corresponding Segment List of the reverse SRv6 Policy Candidate-Path [I-D.ietf-pce-sr-bidir-path] or the Binding SID of the reverse SRv6 Policy or the SRv6 Prefix Segment Identifier of the Session-Sender. For SRv6 Flex-Algo IGP paths, it MUST carry the matching SRv6 Flex-Algo Prefix SID of the Session-Sender.¶
An inner IP header can be added in the Session-Sender test packet that has the Destination Address equal to the Session-Sender address as shown in Figure 8.¶
In the case of loopback mode for SRv6 paths, the Session-Sender test packet can contain the Segment List of the forward SRv6 path only.¶
An inner IP header for return path MUST be added in the Session-Sender test packets that has the Destination Address equal to the Session-Sender address as shown in Figure 8 to forward the packet to the Session-Sender.¶
The Session-Reflector decapsulates the outer IPv6 and SR headers and forwards the packet using the inner IP header for the return path that follows in the packet.¶
The loopback measurement mode is also applicable to L3VPN services in an SR network for both SR-MPLS and SRv6 data planes.¶
For L3VPN service over SR-MPLS path, Session-Sender test packets are generated as described in Section titled "Session-Sender Test Packet for L3 Service over SR-MPLS Path". In loopback mode, the Session-Sender test packets are transmitted without adding the IP header for the forward path, with Source Address of the Session-Sender and Destination Address of the Session-Reflector after the MPLS header.¶
An IP header for return path MUST be added in the Session-Sender test packets that has the Destination Address equal to the Session-Sender address as shown in Figure 8 to forward the packet to the Session-Sender. In this case, the Destination Address added in the IP header for the return path MUST be reachable via the IP table lookup associated with the L3VPN service SR-MPLS label in the reverse direction.¶
The Session-Reflector decapsulates the MPLS header and forwards the packet using the IP header for the return path that follows in the packet.¶
For L3VPN service over SRv6 path, Session-Sender test packets are generated as described in Section titled "Session-Sender Test Packet for L3 Service over SRv6 Path". In loopback mode, the Session-Sender test packets are transmitted without adding the IP header for the forward path, with Source Address of the Session-Sender and Destination Address of the Session-Reflector after the IPv6/SRH.¶
An inner IP header for return path MUST be added in the Session-Sender test packets that has the Destination Address equal to the Session-Sender address as shown in Figure 8 to forward the packet to the Session-Sender. In this case, the Destination Address added in the inner IP header for the return path MUST be reachable via the IPv4 or IPv6 table lookup associated with the L3VPN service SRv6 SID in the reverse direction.¶
The Session-Reflector decapsulates the outer IPv6 header and SR header (if present) and forwards the packet using the inner IP header for the return path that follows in the packet.¶
The loopback measurement mode is also applicable to L2VPN services in an SR network for both SR-MPLS and SRv6 data planes.¶
For L2VPN service over SR-MPLS path, Session-Sender test packets are generated as described in Section titled "Session-Sender Test Packet for L2 Service over SR-MPLS Path". In loopback mode, the Session-Sender test packets are transmitted without adding the IP header for the forward path, with Source Address of the Session-Sender and Destination Address of the Session-Reflector after the MPLS header.¶
An IP header for return path MUST be added in the Session-Sender test packets that has the Destination Address equal to the Session-Sender address as shown in Figure 8 to forward the packet to the Session-Sender. In this case, the Destination Address added in the IP header for the return path MUST be reachable via the IP table lookup associated with the L2VPN service SR-MPLS label in the reverse direction.¶
The Session-Reflector decapsulates the MPLS header and L2 header and forwards the packet using the inner IP header for the return path that follows in the packet.¶
For L2VPN service over SRv6 path, Session-Sender test packets are generated as described in Section titled "Session-Sender Test Packet for L2 Service over SRv6 Path". In loopback mode, the Session-Sender test packets are transmitted without adding the IP header for the forward path, with Source Address of the Session-Sender and Destination Address of the Session-Reflector after the IPv6/SRH.¶
An inner IP header for return path MUST be added in the Session-Sender test packets that has the Destination Address equal to the Session-Sender address as shown in Figure 8 to forward the packet to the Session-Sender. In this case, the Destination Address added in the inner IP header for the return path MUST be reachable via the IPv4 or IPv6 table lookup associated with the L3VPN service SRv6 SID in the reverse direction.¶
The Session-Reflector decapsulates the outer IPv6 header, SR header and L2 header and forwards the packet using the inner IP header for the return path that follows in the packet.¶
This document defines a new STAMP measurement mode, called enhanced loopback mode, that is loopback mode enabled with network programming function. In this mode, both transmit (T1) and receive (T2) timestamps in data plane are collected by the Session-Sender test packets as shown in Figure 1. The network programming function optimizes the "operations of punt test packet and generate return test packet" on the Session-Reflector as timestamping is implemented in forwarding fast path in hardware. This helps to achieve higher number of STAMP test session scale and faster measurement interval.¶
The Session-Sender adds transmit timestamp (T1) in the payload of the Session-Sender test packet. The Session-Reflector adds the receive timestamp (T2) in the payload of the received test packet in forwarding fast path in hardware without punting the test packet (e.g., to slow path or control-plane). The network programming function carried by the test packet enables the Session-Reflector to add the receive timestamp (T2) at the specific offset in the payload of the test packet.¶
For an end-to-end SR path including SR Policy, STAMP Session-Sender test packets are transmitted in enhanced loopback mode, enabled with network programming function for timestamp and forward the packet as described in the following sub-sections.¶
The enhanced loopback measurement mode for SR-MPLS paths is described below.¶
MPLS Network Action (MNA) Sub-Stack defined in [I-D.ietf-mpls-mna-hdr] is used for SR-MPLS data plane to enable network programming function of "timestamp and forward" for the received test packet. The MNA Sub-Stack carries the MNA Label (bSPL value TBA1) as defined in [I-D.ietf-mpls-mna-hdr]. A new MNA Opcode (value MNA.TSF) is defined for the Timestamp and Forward network action.¶
In the Session-Sender test packets for SR-MPLS Policies, the MNA Sub-Stack with Opcode MNA.TSF is added in the MPLS header as shown in Figure 13, to collect "Receive Timestamp" field in the payload of the test packet. The Ingress-to-Egress (I2E), Hop-By-Hop (HBH), Select scope (IHS) is set to "I2E" when return path is IP/UDP and set to "Select" when the return path is SR-MPLS. The Network Action Sub-Stack Length (NASL) is set to 0 when there is no Label Stack Entry (LSE) after the MNA.TSF Opcode in the MNA Sub-Stack. The U flag is set to skip the network action and forward the packet (and not drop the packet). The Label Stack for the reverse direction SR-MPLS path can be added after the MNA Sub-Stack (not shown in the Figure 13) to receive the return test packet on a specific path.¶
When a Session-Reflector receives a packet with MNA Sub-Stack with Opcode MNA.TSF, after timestamping the packet in STAMP payload at the specific offset, the Session-Reflector pops the MNA Sub-Stack (after completing any other network actions) and forwards the packet using the next label or IP header in the packet (just like the data packets for the normal traffic).¶
New MPLS Network Action Opcode is defined called "Timestamp and Forward Network Action, MNA.TSF". The MNA.TSF Opcode is statically configured on the STAMP Session-Reflector node with a value from "Private Use from Range 111-126". The timestamp format for 64-bit PTPv2 and NTP to be added in the STAMP payload is statically configured for MNA.TSF. The offset in the STAMP payload (e.g., for unauthenticated mode (value 16)) is also statically configured for MNA.TSF.¶
The STAMP Session-Sender needs to know if the Session-Reflector can process the MNA Sub-Stack with Opcode MNA.TSF to avoid dropping the test packets. The signaling extension for this capability exchange or local configuration are outside the scope of this document.¶
The enhanced loopback measurement mode for SRv6 paths is described below.¶
The [RFC8986] defines SRv6 Endpoint Behaviours for SRv6 nodes. A new Timestamp and Forward Endpoint Behaviour is defined for Segment Routing Header (SRH) [RFC8754] to enable "Timestamp and Forward (TSF)" function for the received test packets.¶
In the Session-Sender test packets for SRv6 Policies, Timestamp and Forward Endpoint Function (End.TSF) is carried with the target Segment Identifier (SID) in SRH [RFC8754] as shown in Figure 14, to collect "Receive Timestamp" field in the payload of the test packet. The Segment List for the reverse direction path can be added after the target SID to receive the return test packet on a specific path. When a Session-Reflector receives a packet with Timestamp and Forward Endpoint (End.TSF) for the target SID, which is local, after timestamping the packet at the specific offset, the Session-Reflector forwards the packet using the next SID in the SRH or inner IPv6 header in the packet (just like the data packets for the normal traffic).¶
New SRv6 Endpoint Behavior is defined called "Endpoint Behavior bound to SID with Timestamp and Forward (End.TSF)". The End.TSF is a node SID instantiated at STAMP Session-Reflector node. The End.TSF is statically configured on the STAMP Session-Reflector node and not advertised into the routing protocols. The timestamp format for 64-bit PTPv2 and NTP to be added in the STAMP payload is statically configured for End.TSF. The offset in the STAMP payload (e.g., for unauthenticated mode (value 16)) is also statically configured for End.TSF.¶
The STAMP Session-Sender needs to know if the Session-Reflector can process the Timestamp and Forward Endpoint Function to avoid dropping test packets. The signaling extension for this capability exchange or local configuration are outside the scope of this document.¶
The procedure described in Section 4 for delay measurement in SR networks using STAMP test packets can also be used for packet loss measurement in SR networks. The Sequence Number field in the STAMP test packet can be used as described in Section 4 "Theory of Operation" in [RFC8762], to detect round-trip, near-end (forward direction) and far-end (backward direction) packet loss in SR networks. This method is used for inferred packet loss measurement that provides only an approximate view of the data packet loss.¶
In the case of the loopback mode introduced in this document, only the round-trip packet loss detection is applicable.¶
The STAMP "Direct Measurement" TLV (Type 5) defined in [RFC8972] can be used in SR networks for data packet loss measurement. The STAMP test packets with this TLV are transmitted using the procedures described in Section 4 for delay measurement using STAMP test packets to collect the Session-Sender transmit counters and Session-Reflector receive and transmit counters of the data packet flows for direct measurement.¶
The PSID carried in the received data packet for the traffic flow under measurement can be used to measure receive data packets (for receive traffic counter) for an end-to-end SR path on the Session-Reflector. The PSID in the received Session-Sender test packet header can be used to associate the receive traffic counter to the end-to-end SR path on the Session-Reflector. In the case of L3 and L2 services in SR networks, the associated SR-MPLS service labels or SRv6 service SIDs, can be used for receive traffic counters.¶
In the case of the loopback mode introduced in this document, the direct measurement is not applicable.¶
An SR Policy can have ECMPs between the source and transit nodes, between transit nodes and between transit and destination nodes. Usage of Anycast SID [RFC8402] by an SR Policy can result in ECMP paths via transit nodes part of that Anycast group. The STAMP test packets need to be transmitted to traverse different ECMP paths to measure end-to-end delay of an SR Policy.¶
Forwarding plane has various hashing functions available to forward packets on specific ECMP paths. The mechanisms described in [RFC8029] and [RFC5884] for handling ECMPs are also applicable to delay measurement.¶
For SR-MPLS Policy, sweeping of MPLS entropy label [RFC6790] values can be used in Session-Sender test packets and Session-Reflector reply test packets to take advantage of the hashing function in forwarding plane to influence the ECMP path taken by them.¶
In IPv4 header of the Session-Sender test packets and Session-Reflector reply test packets sweeping of Destination Address from the range 127/8 can be used to exercise ECMP paths taken by them when using MPLS header.¶
As specified in [RFC6437], Flow Label field in the outer IPv6 header can also be used for sweeping to exercise different IPv6 ECMP paths.¶
The STAMP test session state monitoring allows to know if the performance measurement test is active or idle. The threshold-based notification for delay and packet loss may not be generated if the delay and packet loss values do not change significantly. For an unambiguous monitoring, the controller needs to distinguish the cases whether the performance measurement is active, or delay and packet loss values are not changing significantly to cross the threshold.¶
The STAMP test session state is initially notified as active as soon as one or more reply test packets are received at the Session-Sender. The STAMP test session state is notified as idle (or failed) when consecutive N number of reply test packets are not received at the Session-Sender after the session state is notified as active, where N (consecutive packet loss count) is a locally provisioned value. In this case, the failed state of the STAMP test session on the Session-Sender also indicates that the connectivity verification to the Session-Reflector has failed.¶
The processing rules described in this section are applicable to the STAMP test packets for links, end-to-end SR paths, and L3 and L2 services in SR networks.¶
The TTL field in the IPv4 and MPLS headers of the Session-Sender and Session-Reflector test packets MUST be set to 255 as per Generalized TTL Security Mechanism (GTSM) [RFC5082].¶
The Hop Limit (HL) field in the IPv6 header of the Session-Sender and Session-Reflector test packets MUST be set to 255 as per Generalized TTL Security Mechanism (GTSM) [RFC5082].¶
The Router Alert IP option (RAO) [RFC2113] MUST NOT be set in the STAMP test packets to be able to punt the test packets using the UDP ports for STAMP.¶
The Flow Label field in the IPv6 header of the STAMP test packet is set to the value that is used by the data traffic flow on the SR path being measured by the Session-Sender.¶
The Session-Reflector SHOULD return the same Flow Label value it received in the STAMP test packet IPv6 header in the STAMP reply test packet, and it can be based on the local policy on the Session-Reflector.¶
For IPv4 test packets, where the hardware is not capable of re-computing the UDP checksum or adding checksum complement [RFC7820], the Session-Sender and Session-Reflector can set the UDP checksum value to 0 [RFC8085].¶
For IPv6 test packets, where the hardware is not capable of re-computing the UDP checksum or adding checksum complement [RFC7820], the Session-Sender and Session-Reflector can use the procedure defined in [RFC6936] for the UDP checksum (with value set to 0) for the UDP ports used for STAMP sessions.¶
Editorial note: Please remove this section prior to publication.¶
The following routing platforms running IOS-XR operating system have participated in an interop testing for one-way, two-way and loopback measurement modes:¶
* Cisco 8802 (based Cisco Silicon One Q200)¶
* Cisco ASR9904 with Lightspeed linecard and Tomahawk linecard¶
* Cisco NCS5508 (based on Broadcom Jericho2 platform)¶
* Cisco NCS5500 (based on Broadcom Jericho1 platform)¶
The security considerations specified in [RFC8762] and [RFC8972] also apply to the procedures described in this document.¶
The security considerations specified in [I-D.ietf-ippm-stamp-srpm] are also applicable to the procedures defined in this document.¶
Use of HMAC-SHA-256 in the authenticated mode protects the data integrity of the STAMP test packets. The message integrity protection using HMAC defined in Section 4.4 of [RFC8762] can be used with the procedure described in this document. SRv6 STAMP test packets can use the HMAC protection authentication defined for SRH in [RFC8754].¶
STAMP uses the well-known UDP port number that could become a target of denial of service (DoS) or could be used to aid on-path attacks. Thus, the security considerations and measures to mitigate the risk of the attack documented in Section 6 of [RFC8545] equally apply to the procedures described in this document.¶
When using the procedures defined in [RFC6936], the security considerations specified in [RFC6936] also apply.¶
The procedures defined in this document is intended for deployment in a single network administrative domain. As such, the Session-Sender address, Session-Reflector address, and IP and SR forward and return paths are provisioned by the operator for the STAMP session. It is assumed that the operator has verified the integrity of the IP and SR forward and return paths used to transmit STAMP test packets.¶
The security considerations specified in [I-D.ietf-mpls-mna-hdr] are also applicable to the procedures defined in this document.¶
The security considerations specified in [RFC8986] are also applicable to the procedures defined in this document.¶
This document does not require any IANA action.¶
The authors would like to thank Thierry Couture and Ianik Semco for the discussions on the use-cases for Performance Measurement in Segment Routing. The authors would also like to thank Greg Mirsky, Gyan Mishra, Xie Jingrong, and Mike Koldychev for reviewing this document and providing useful comments and suggestions. Patrick Khordoc, Haowei Shi, Amila Tharaperiya Gamage, Pengyan Zhang, Ruby Lin and Radu Valceanu have helped improve the mechanisms described in this document.¶
The following people have substantially contributed to this document:¶
Bart Janssens Colt Email: Bart.Janssens@colt.net¶
Navin Vaghamshi Reliance Email: Navin.Vaghamshi@ril.com¶
Moses Nagarajah Telstra Email: Moses.Nagarajah@team.telstra.com¶
Amit Dhamija Rakuten Email: amit.dhamija@rakuten.com¶